Linux+ LX0-104 - WGU/UCertify

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which parameter should be used with the netstat command to view a list of the listening and nonlistening sockets? A) -a B) -l C) -s D) --active

A) -a

Which of the following parameters is used to specify the input file with the at command? A) -f B) -l C) -r D) -t

A) -f

Which of the following files can be used to impose limitations on SSH connections? (Choose All That Apply) A) /etc/hosts.allow B) /etc/hosts.deny C) /etc/nologin D) None of these. Limitations on SSH can be applied using password authentication.

A) /etc/hosts.allow B) /etc/hosts.deny C) /etc/nologin

Which of the following files are used to configure the TCP Wrapper? (Choose Two) A) /etc/hosts.allow B) /etc/nologin C) /etc/inittab D) /etc/hosts.deny

A) /etc/hosts.allow D) /etc/hosts.deny

All of the KDE Display Manager (KDM) files on your Linux computer are located in the /etc/kde4/kdm directory. You need to configure the extra KDM options that expand on X Display Manager (XDM). Which file should you access? A) /etc/kde4/kdm/kdmrc B) /etc/kde4/kdm/Xreset C) /etc/X11/xdm/xdm-config D) /etc/X11/xdm/Xaccess

A) /etc/kde4/kdm/kdmrc

Which of the following configuration files does the logrotate program consult for its settings? A) /etc/logrotate.conf B) /usr/sbin/logrotate/logrotate.conf C) /usr/src/logrotate/logrotate.conf D) /etc/logrotate/.conf E) ∼/.logrotate

A) /etc/logrotate.conf

Which of the following is the default directory for crontab files? A) /var/spool/cron B) /etc/cron C) /etc/crontab D) /etc/cron/crontab

A) /var/spool/cron

A script contains the following lines: ls names.txt echo $? If the ls command executes successfully, what is the returned exit status? A) 0 B) 1 C) 10 D) -10

A) 0

Which port number is used by TCP over SSH? A) 22 B) 25 C) 110 D) 443

A) 22 The 22 port number is used by TCP over SSH. Port numbers 25, 110, and 443 are used by TCP over SMTP, POP3, and HTTPS, respectively.

Which of the following ports serves as the default port for the HTTPS protocol? A) 443 B) 80 C) 143 D) 631

A) 443

Which locale code set does NOT support characters used in many non-English languages? A) ASCII B) UTF-8 C) ISO-8859 D) Unicode

A) ASCII

Which of the following steps can be used to deny a user the ability to run the crontab command? (Choose Two) A) Add the user account name to the /etc/cron.deny file. B) Add the user to the /etc/cron.allow file. C) Remove the user account name from the /etc/cron.allow file. D) Remove the user from the /etc/cron.deny file.

A) Add the user account name to the /etc/cron.deny file. C) Remove the user account name from the /etc/cron.allow file.

Which of the following utilities is used to search for Braille displays at the USB port in a Debian-based Linux operating system? A) BrlTTY B) GOK C) stty D) orca

A) BrlTTY

You've just installed MySQL, and you intend to use it to store information about the animals in a zoo, from the anteaters to the zebras. What command are you likely to use first, once you start MySQL? A) CREATE DATABASE animals; B) USE animals; C) CREATE TABLE animals; D) INSERT INTO animals; E) UPDATE animals;

A) CREATE DATABASE animals;

Which of the following sections is concerned with fonts in the xorg.conf file? A) Files B) Fonts C) Monitor D) Module

A) Files

What is the purpose of an ORDER BY clause in a SELECT statement? A) It determines how information in a list is ordered. B) It determines how information in a list is grouped. C) It combines data from multiple tables. D) It restricts the records that are returned.

A) It determines how information in a list is ordered.

The /etc/sudoers file on a computer includes the following line. What is its effect? %admin ALL=(ALL) ALL A) Members of the admin group may run all programs with root privileges by using sudo. B) Users in the admin user alias, defined earlier in the file, may run all programs with root privileges by using sudo. C) The admin user alias is defined to include all users on the system. D) The admin command alias is defined to include all commands. E) The user admin may run all programs on the computer as root by using sudo.

A) Members of the admin group may run all programs with root privileges by using sudo.

Which of the following AccessX features enables the cursor keypad to be emulated as a pointing device? A) Mouse keys B) Mouse gestures C) Bounce keys D) Sticky keys

A) Mouse keys

Which of the following types of attacks involves sending bogus email to lure unsuspecting individuals into divulging sensitive financial or other information? A) Phishing B) Script kiddies C) Spoofing D) Ensnaring E) Hacking

A) Phishing

When you configure an X server, you need to make changes to configuration files and then start or restart the X server. Which of the following can help streamline this process? A) Shut down X by switching to a runlevel in which X doesn't run automatically, and then reconfigure it and use startx to test X startup. B) Shut down X by booting into single-user mode, and then reconfigure X and use telinit to start X running again. C) Reconfigure X, and then unplug the computer to avoid the lengthy shutdown process before restarting the system and X along with it. D) Use the startx utility to check the X configuration file for errors before restarting the X server. E) Connect the Linux computer's network port directly to the X server, without using any intervening routers, in order to reduce network latency.

A) Shut down X by switching to a runlevel in which X doesn't run automatically, and then reconfigure it and use startx to test X startup.

Which of the following is true about telnet? (Choose Two) A) Telnet is used to access remote systems over a network. B) Telnet establishes a connection using UDP port number 23. C) Telnet uses encryption to secure the data. D) Telnet is an application layer protocol.

A) Telnet is used to access remote systems over a network. D) Telnet is an application layer protocol.

What does the number 703 represent in the following /etc/passwd entry? george:x:703:100:George Brown:/home/george:/bin/tcsh A) The account's user ID (UID) number B) The account's process ID (PID) number C) The account's group ID (GID) number D) The account's globally unique ID (GUID) number

A) The account's user ID (UID) number

Barbara is a Linux system administrator whose system run level is set to 3. Her default shell is currently configured as BASH. Barbara wants the X Window system to start automatically whenever she logs on to the system. Which file should Barbara edit to configure the X Window system to start automatically at login? A) ~/.bash_login B) ~/.bash.login C) ~/.bash_logon D) ~/.bash_enter

A) ~/.bash_login

What is the effect of the groupadd -g 127 pack command? A) The computer creates a group called pack and assigns it a GID of 127. B) The computer creates a group called 127 using its group-packing option. C) The computer changes the name of the group with GID 127 to pack. D) The computer optimizes the /etc/group file to speed access to members of the group with GID 127. E) The user pack is added to the group with a GID of 127.

A) The computer creates a group called pack and assigns it a GID of 127.

A user is having trouble typing certain keys, like Control and Alt. Every time the user presses these keys a sound is played and the keys remain active even when they are released. Which of the following are probable causes of this issue? (Choose All That Apply) A) The sticky keys feature is turned on. B) The slow keys feature is active. C) The bounce keys feature is causing this. D) The toggle keys feature is active.

A) The sticky keys feature is turned on. D) The toggle keys feature is active.

Which of the following statements are true about the xinetd service? (Choose Three) A) The xinetd service allows access control mechanism. B) The xinetd directory contains a list of configuration files for each service. C) Standard users have read-write permission to the xinetd.d directory when the xinetd service is started. D) Each service using xinetd can store the configuration in a separate file.

A) The xinetd service allows access control mechanism. B) The xinetd directory contains a list of configuration files for each service. D) Each service using xinetd can store the configuration in a separate file.

Which of the following statements are correctly stated about the #! sequence? (Choose Three) A) This sequence must be at the beginning of the line. B) The shebang tells the system the name of the interpreter that should be used to execute the script that follows. C) The shebang is declared in the last line of the script. D) The shebang line is ignored by the interpreter.

A) This sequence must be at the beginning of the line. B) The shebang tells the system the name of the interpreter that should be used to execute the script that follows. D) The shebang line is ignored by the interpreter.

Which of the following protocols is used by the display manager to communicate with the servers over a network? A) XDMCP B) XDM C) XMPP D) XMODEM

A) XDMCP

You find that the ssh_host_dsa_key file in /etc/ssh has 0666 (-rw-rw-rw-) permissions. Your SSH server has been in operation for several months. Should you be concerned? A) Yes B) No C) Only if the ssh_host_dsa_key.pub file is also world-readable D) Only if you're launching SSH from a super server E) Only if you're using a laptop computer

A) Yes

Which of the following commands is used to assign new names to regular commands? A) alias B) echo C) set D) export

A) alias

Which of the following commands list the user's pending jobs? (Choose Two) A) atq B) at -l C) aqt D) at -d

A) atq B) at -l

Which of the following commands can be used to set a password so that the user is required to change it every 30 days? (Choose Two) A) chage B) passwd C) pwconv D) pwck

A) chage B) passwd

You have created a script named script_12. You need ensure that the script is executable. Which command should you use? A) chmod B) sed C) chown D) umask

A) chmod

Which of the following can be used to schedule a task to run daily at a specific time? A) crontab B) at C) cron D) atq

A) crontab

Which of the following commands is used to perform complex DNS lookups? A) dig B) whois C) route D) ntpd

A) dig

Which of the following are valid looping statements in bash shell scripting? (Select all that apply.) A) for B) while C) if-then D) until E) case

A) for B) while D) until

A system administrator wants to view the list of the groups associated with a user named Jason. The system administrator wants only the user's group names to be displayed in the list. Which command can be used to obtain the desired list? A) groups jason B) users -g jason C) grep jason /etc/group D) grep jason /etc/passwd

A) groups jason

Which of the following if statements will generate an error? (Choose two) A) if [condition] B) if ($1 > $2) C) if [ condition ] D) if (($1 > $2))

A) if [condition] B) if ($1 > $2)

A Linux user named Susan wants to print a file named resume.doc. The printer that is attached to the tempora print queue is often busy. Therefore, Susan would like the system to send her an e-mail message after her print job has completed. Susan uses the original BSD LPD version of lpr. Which print request command should Susan issue in the given scenario? A) lpr -Ptempora -m susan resume.doc B) lpr -P tempora -m susan resume.doc C) lpr -Ptempora -mail susan resume.doc D) The BSD LPD version of lpr cannot send e-mail messages

A) lpr -Ptempora -m susan resume.doc

You need to view a list of the files that are open on your Linux computer. Which command should you use? A) lsof B) who C) last D) nmap

A) lsof

Your DNS server has IP address as 10.11.12.11. Which of the following lines will you add in the /etc/resolv.conf file? A) nameserver 10.11.12.11 B) HOSTNAME=nameserver C) HOSTNAME=10.11.12.11 D) hosts: files dns

A) nameserver 10.11.12.11

Which TCP/IP utility displays the current protocol statistics and port connections for Windows and UNIX/Linux computers? A) netstat B) tracepath C) ping D) traceroute

A) netstat

Which statement describes the contents of the resolv.conf file? A) stores the IP address of the name servers B) stores the IP address and host name mappings C) stores information on the file system partitions D) stores the configuration information for the Network File Server (NFS)

A) stores the IP address of the name servers

Which of the following commands is used to change the user login name? A) usermod B) useradd C) passwd D) groupadd

A) usermod

Which command is used to obtain detailed information about any window in X window system? A) xwininfo B) xdpyinfo C) xdm D) xvidtune

A) xwininfo

Which of the following logger options is used to record the process ID of the logger process? A) -s B) -i C) -p D) -t

B) -i

Which of the following files is used to store the user password information? A) /etc/aliases B) /etc/shadow C) /etc/gshadow D) /etc/exports

B) /etc/shadow

Which configuration file would you edit if you want to redirect the system log files of several Linux servers to an administrative Linux server? A) /etc/sys/log.conf B) /etc/syslog.conf C) /var/log/messages D) /var/logs/syslog.conf

B) /etc/syslog.conf

Which of the following is a valid IPv4 address for a single computer on a TCP/IP network? A) 202.9.257.33 B) 63.63.63.63 C) 107.29.5.3.2 D) 98.7.104.0/24 E) 255.255.255.255

B) 63.63.63.63

What information about print jobs does the lpq command display? (Select two.) A) The name of the application that submitted the job B) A numerical job ID that can be used to manipulate the job C) The amount of ink or toner left in the printer D) The username of the person who submitted the job E) The estimated time to finish printing the job

B) A numerical job ID that can be used to manipulate the job D) The username of the person who submitted the job

Which of the following is correctly stated about the DELETE command? (Choose 3) A) The deleted records can be recovered using the undo option. B) All the rows can be deleted without deleting the table. C) The WHERE command specifies the record that is to be deleted. D) A user cannot undo the deleted records.

B) All the rows can be deleted without deleting the table. C) The WHERE command specifies the record that is to be deleted. D) A user cannot undo the deleted records.

You see the following line in a script: mail -s "Error" -c abort < /tmp/msg root What is the effect of this line, if and when it executes? A) An email is sent to the user Error, the script is aborted using root privileges, and error messages are written to /tmp/msg. B) An email with the subject of Error and the contents from /tmp/msg is sent to the local users root and abort. C) An email with the subject of Error and the contents of /tmp/msg is sent to the local user root, and then the script is aborted. D) An email is sent with Error priority to the local user root, and the email system is then shut down with error messages being stored in /tmp/msg. E) An email with the subject of Error and contents of /tmp/msg is sent to root, and information on this is logged with priority abort.

B) An email with the subject of Error and the contents from /tmp/msg is sent to the local users root and abort.

What types of files might you expect to find in /etc/skel? (Select three.) A) A copy of the /etc/shadow file B) An empty set of directories to encourage good file management practices C) A README or similar welcome file for new users D) A starting .bashrc file E) The RPM or Debian package management database

B) An empty set of directories to encourage good file management practices C) A README or similar welcome file for new users D) A starting .bashrc file

What software can you use to drive a Braille display device? (Select two.) A) Emacspeak B) BRLTTY C) A 2.6.26 or later kernel D) GOK E) A framebuffer driver

B) BRLTTY C) A 2.6.26 or later kernel

Which of the following variable types is best suited to hold the value of a currency value (dollars and cents) in a SQL database? A) FLOAT B) DECIMAL C) INTEGER D) VARCHAR E) DOUBLE PRECISION

B) DECIMAL

Which of the following commands will you use to delete the record where the FirstName is "Richard" from the employee table? A) DELETE FirstName="Richard" B) DELETE FROM employee WHERE FirstName="Richard" C) DELETE FirstName="Richard" FROM employee D) DELETE FROM employee FirstName="Richard"

B) DELETE FROM employee WHERE FirstName="Richard"

You examine your /etc/aliases file and find that it contains the following line: -------------------- root: jody -------------------- What can you conclude from this? A) Email addressed to jody on this system will be sent to the local user root. B) Email addressed to root on this system will be sent to the local user jody. C) The local user jody has broken into the system and has acquired root privileges. D) The local user jody has permission to read email directly from root's mail queue. E) The administrator may log in using either username: root or jody.

B) Email addressed to root on this system will be sent to the local user jody.

You want to use xinetd access controls to limit who may access a server that's launched via xinetd. Specifically, only users on the 192.168.7.0/24 network block should be able to use that server. How may you do this? A) Enter hosts_allowed = 192.168.7.0/24 in the /etc/xinetd.conf configuration file for the server in question. B) Enter only_from = 192.168.7.0/24 in the /etc/xinetd.conf configuration file for the server in question. C) Enter server : 192.168.7., where "server" is the server's name, in the /etc/hosts.allow file. D) Enter server : 192.168.7., where "server" is the server's name, in the /etc/hosts.deny file. E) Type iptables -L 192.168.7.0 to enable only users of 192.168.7.0/24 to access the server.

B) Enter only_from = 192.168.7.0/24 in the /etc/xinetd.conf configuration file for the server in question.

Which of the following are true of functions in Linux? (Choose Two) A) Functions need to be declared with the function keyword. B) Functions can be declared using the function keyword. C) A function is called by its name in a script. D) A function can run independently in a script.

B) Functions can be declared using the function keyword. C) A function is called by its name in a script.

What information can be read from the /etc/group file? (Choose All That Apply) A) Path of the group's home directory B) Group's name C) List of user's belonging to a group D) GID of the group

B) Group's name C) List of user's belonging to a group D) GID of the group

Which of the following runs independently of any program running in the CPU? A) System clock B) Hardware clock C) kill D) who

B) Hardware clock

What is the purpose of the groupadd command? A) It adds new users to a group on a Linux computer. B) It adds new groups on a Linux computer. C) It modifies groups on a Linux computer. D) It modifies user accounts on a Linux computer.

B) It adds new groups on a Linux computer.

What is an advantage of a font server? A) It provides faster font displays than are otherwise possible. B) It can simplify font maintenance on a network with many X servers. C) It's the only means of providing TrueType support for XFree86 4."x". D) It enables the computer to turn a bitmapped display into an ASCII text file. E) It enables X to use font smoothing, which isn't possible with core fonts.

B) It can simplify font maintenance on a network with many X servers.

What is the function of the ∼/.profile file? A) It's the user configuration file for the ProFTP server. B) It's one of a user's bash startup scripts. C) It's the user configuration file for the ProFile file manager. D) Its presence tells tcsh to ignore file modes. E) It holds the user's encrypted password.

B) It's one of a user's bash startup scripts.

Which SQL clause will allow you to combine data from multiple tables to produce your query results? A) SELECT B) JOIN C) WHERE D) GROUP BY

B) JOIN

Which of the following entries are found in the /etc/hosts file? A) A list of hosts allowed to access this one remotely B) Mappings of IP addresses to hostnames C) A list of users allowed to access this host remotely D) Passwords for remote web administration E) A list of port numbers and their associated protocols

B) Mappings of IP addresses to hostnames

Which of the following is the default screen reader of the GNOME desktop environment? A) GOK B) Ocra C) Emacspeak D) Touchegg

B) Ocra

For best SSH server security, how should you set the Protocol option in /etc/ssh/sshd_config? A) Protocol 1 B) Protocol 2 C) Protocol 1,2 D) Protocol 2,1 E) Protocol *

B) Protocol 2

You need to retrieve the contents of the name and phone_number fields from the Customers table in a SQL database. Which command should you use? A) SELECT name, phone_number FROM Customers B) SELECT name, phone_number FROM Customers; C) SELECT name phone_number FROM Customers; D) SELECT (name phone_number) FROM Customers;

B) SELECT name, phone_number FROM Customers;

A user executes the ls command and gets the following output: --------------------------------------------------- user@uCertify:/$ ls drwxr-xr-x2 root root4096 Nov8 14:48 bin drwxr-xr-x3 root root4096 Nov 11 08:21 boot drwxr-xr-x20 root root4680 Nov 17 08:15 dev --------------------------------------------------- Instead of a simple directory list, the user gets the long listing format. Which of the following are true? (Choose all that apply.) A) The ls command by default displays the output in long listing format. B) The ls command is executing as an extended version of itself (as ls -l). C) The ls command has an alias set. D) None of these.

B) The ls command is executing as an extended version of itself (as ls -l). C) The ls command has an alias set.

A user loads a driver module for the Ethernet card eth0 on a Linux system. The user verifies the eth0 configuration by issuing the ifconfig eth0 command on the system but does not see any change in the network configuration. What could be a possible cause of the error? A) The user did not edit the /etc/services file on the system. B) The user did not restart the network services on the system. C) The user did not edit the /etc/sysconfig/network file on the system. D) The user did not issue the /sbin/lsmod command after loading the module.

B) The user did not restart the network services on the system.

Which of the following is generally true of Linux programs that print? A) They send data directly to the printer port. B) They produce PostScript output for printing. C) They include extensive collections of printer drivers. D) They can print only with the help of add-on commercial programs. E) They specify use of the Verdana font.

B) They produce PostScript output for printing.

Which command can be used to store the shortcut to the ls -l --color=always command in a special variable named aa in a BASH shell? A) set alias aa="ls -l --color=always" B) alias aa="ls -l --color=always" C) export alias aa="ls -l --color=always" D) setenv alias aa="ls -l --color=always"

B) alias aa="ls -l --color=always"

You're installing Linux on a critical business system. Which of the following programs might you want to add to ensure that a daily backup job is handled correctly? A) tempus B) anacron C) crontab D) ntpd E) syslog-ng

B) anacron

Which options in the xinetd configuration file tell it to listen to only one network interface for a service? (Choose All That Apply) A) only_from B) bind C) interface D) no_access

B) bind C) interface

Which of the following commands is used to view a Linux user's login shell? A) cat /etc/user B) cat /etc/passwd C) cat /etc/shadow D) cat /etc/gshadow

B) cat /etc/passwd

Which of the following commands will you use to see the crontab file of the root? A) cat /var/cron/root B) cat /var/spool/cron/root C) cat /var/spool/cron D) cat /cron/root

B) cat /var/spool/cron/root

You work as a system administrator for Perfect Solutions Inc. For the security purpose, you want to ensure that no user should login with the same password for more than 6 days. Which of the following commands will you use to get the task done? A) chage -m 6 B) chage -M 6 C) chage -I 6 D) chage -E 6

B) chage -M 6

Several users have requested to be able to create regularly scheduled jobs on their Linux computers. These jobs should not run as root. Which command should they use? A) cron B) crontab C) anacron D) at

B) crontab

Which of the following commands will you use to make a shell variable named HOMEALIAS available to subshells? A) export $HOMEALIAS B) export HOMEALIAS C) set HOMEALIAS D) set $HOMEALIAS

B) export HOMEALIAS

You need to encrypt a confidential e-mail message. Which tool should you use? A) ssh B) gpg C) scp D) mail

B) gpg

Which of the following commands is used to remove a group named payroll? A) rm payroll B) groupdel payroll C) payroll remove D) groupmod payroll

B) groupdel payroll

Which of the following commands is used to view or assign an IP address to a network interface? A) ping B) ifconfig C) route D) telnet

B) ifconfig

What does the man 5 passwd command display? A) a short description of the passwd command B) information regarding the password file C) the Incorrect usage of the man command error message D) the No entry for passwd in section 5 of the manual error message

B) information regarding the password file

Which of the following utilities is used to start, stop, and reorder jobs in a print queue? A) lprm B) lpc C) lpq D) lpr

B) lpc

What tool might you use to print a four-page PostScript file on a single sheet of paper? A) PAM B) mpage C) 4Front D) route E) 411toppm

B) mpage

Which of the following commands is identical to the sendmail -bi command? A) mailq B) newaliases C) sendmail -Ac D) sendmail -Am

B) newaliases

Which command will ping the IP address 192.168.1.10 ten times? A) ping -q 10 192.168.1.10 B) ping -c 10 192.168.1.10 C) ping -i 10 192.168.1.10 D) ping -n 10 192.168.1.10

B) ping -c 10 192.168.1.10

Which of the following commands is used to move all the password related information to the /etc/shadow file? A) iconv B) pwconv C) passwd D) chage

B) pwconv

Which of the following commands can be used to run a single command as root without logging in as the superuser? A) su B) sudo C) login D) sh

B) sudo

Which of the following commands can be used to limit the system's resources? A) limit B) ulimit C) sudo D) slimit

B) ulimit

You work as a network administrator for McNeil Inc. The company has a Linux-based network. You want to create a new user account from the shell. Which of the following commands will you use? A) mount B) useradd C) createuser D) cruser

B) useradd

Which of the following commands could be used to create a user account named sam? A) usermod sam B) useradd sam C) vim /etc/user D) chage sam

B) useradd sam

Which command will delete a user named Cathy from a Linux system but leave the contents of Cathy's home directory intact? A) rm -rf cathy B) userdel cathy C) userdel -r cathy D) delete user cathy

B) userdel cathy

Which of the following commands is used to modify a user account? A) useradd B) usermod C) userdel D) userchage

B) usermod

Which of the following commands will you use to add a user sam to the root group? A) usermod -G sam B) usermod -G root sam C) usermod -G sam root D) usermod -G root

B) usermod -G root sam

Which utility can intercept network packets and log them or display them on the screen? A) ifconfig B) netstat C) tcpdump D) route

C) tcpdump

Which file will you edit to execute cleanup tasks after exiting the shell? A) ~/.bash_exit B) ~/.bash_cleanup C) ~/.bash_logout D) ~/.bash_quit

C) ~/.bash_logout

Which of the following options is used with the gpg command to invalidate a public key? A) --gen-key B) --out C) --gen-revoke D) --export

C) --gen-revoke

You need to manually set the hardware clock to a specific date using the hwclock command. Which parameters should you use? (Choose All That Apply) A) --utc B) --localtime C) --set D) --date

C) --set D) --date

What file would you edit to restrict the number of simultaneous logins a user can employ? A) /etc/pam.d/login-limits B) /etc/bashrc C) /etc/security/limits.conf D) /etc/inittab E) /etc/passwd

C) /etc/security/limits.conf

Your login server is using PAM, and you want to limit users' access to system resources. Which configuration file will you need to edit? A) /etc/limits.conf B) /etc/pam/limits.conf C) /etc/security/limits.conf D) /etc/security/pam/limits.conf E) /usr/local/limits.conf

C) /etc/security/limits.conf

Which file should the system administrator edit to set the BASH shell prompt settings for all future users of a Linux system? A) /etc/profile B) /etc/bashrc C) /etc/skel/.bashrc D) /etc/profile/.bash_profile

C) /etc/skel/.bashrc

In which directory are the e-mail messages for the JSmith user stored? A) /home/JSmith B) /var/spool/mqueue/JSmith C) /var/spool/mail/JSmith D) /var/spool/JSmith

C) /var/spool/mail/JSmith

Which of the following port addresses is used by the CUPS to access the CUPS web-based interface tool? A) 6161 B) 636 C) 631 D) 639

C) 631 http:// localhost:631

A user issues the atq command. What will be result of the command? A) The user's pending job will be deleted. B) The user's pending jobs will be executed. C) A list of the user's pending jobs will be displayed. D) The user's pending jobs will be placed in the default priority queue.

C) A list of the user's pending jobs will be displayed.

Which of the following is not a popular SMTP server for Linux? A) Postfix B) Sendmail C) Fetchmail D) Exim E) qmail

C) Fetchmail

Which of the following are common display managers on Linux? (Choose Two) A) Telnet B) login C) GDM D) sshd E) XDM

C) GDM E) XDM

Which of the following protocols is used by the CUPS to manage jobs and queues? A) IP B) POP C) IPP D) ICMP

C) IPP

Which of the following statements is true about the /etc/skel directory? A) It contains configuration files used to set up the Point-to-Point protocol. B) It contains files that are used to configure the CUPS printing service. C) It contains files that are automatically copied to a user's home directory when the user is added to a system. D) It contains files that are used to configure the Sendmail mail service.

C) It contains files that are automatically copied to a user's home directory when the user is added to a system.

Which of the following statements are true about the xdmcp protocol? (Choose Two) A) It supports graphical login for the local host. B) It works over UDP port number 117. C) It supports graphical login for the remote host on the network. D) It authenticates with the display manager in a plain text.

C) It supports graphical login for the remote host on the network. D) It authenticates with the display manager in a plain text.

Which of the following protocols synchronizes clock between computers on a network? A) FTP B) TCP C) NTP D) SMTP

C) NTP

As part of a security audit, you plan to use Nmap to check all of the computers on your network for unnecessary servers. Which of the following tasks should you do prior to running your Nmap check? A) Back up /etc/passwd on the target systems to eliminate the possibility of it being damaged. B) Obtain the root passwords to the target systems so that you can properly configure them to accept the Nmap probes. C) Obtain written permission from your boss to perform the Nmap sweep. D) Configure /etc/sudoers on the computer you intend to use for the sweep, to give yourself the ability to run Nmap. E) Disable any firewall between the computer that's running Nmap and the servers you intend to scan.

C) Obtain written permission from your boss to perform the Nmap sweep.

Which of the following programs may be used to provide computer-generated speech for users who have trouble reading computer displays? (Select two.) A) SoX B) Braille C) Orca D) talk E) Emacspeak

C) Orca E) Emacspeak

What of the following is one effect caused by the following line in a system bash startup script accomplish? ulimit -Sc 0 A) Programs launched from bash are limited to the use of a single CPU, if the computer is equipped with multiple CPUs. B) Programs launched from bash have no limits on the number of processes that may be launched from the shell. C) Programs launched from bash won't create core files if they crash unless the user overrides this setting with another use of ulimit's -c option. D) Programs launched from bash won't create core files if they crash, and no user override of this setting is possible. E) Programs launched from bash can use as much CPU time as they like unless the user overrides this setting with another call to ulimit.

C) Programs launched from bash won't create core files if they crash unless the user overrides this setting with another use of ulimit's -c option.

Which of the following information are present in the crontab file of a specific user? (Choose all that apply) A) Summary of the task to be executed B) Name of user that runs the task C) Programs to be started by cron D) Time when the programs should run

C) Programs to be started by cron D) Time when the programs should run

Which of the following keys is used to press more than one key at a time? A) Mouse keys B) Bounce keys C) Sticky keys D) Toggle keys

C) Sticky keys

You want to create a user account named John_Davis that uses all of the default settings configured in the /etc/logins.def file. Which command should you execute? A) usermod John_Davis B) usermod -U John_Davis C) useradd John_Davis D) useradd -r John_Davis

C) useradd John_Davis

Which of the following features do KDM and GDM provide that XDM doesn't? A) An encrypted remote X-based access ability, improving network security B) The ability to accept logins from remote computers, once properly configured C) The ability to select the login environment from a menu on the main login screen D) A login screen that shows the username and password simultaneously rather than sequentially E) An option to log into text mode if X should fail to start

C) The ability to select the login environment from a menu on the main login screen

Which of the following are required when configuring a computer to use a static IP address? (Select two.) A) The IP address of the DHCP server B) The hostname of the NBNS server C) The computer's IP address D) The network mask E) The IP address of the NTP server

C) The computer's IP address D) The network mask

A monitor's manual lists its range of acceptable synchronization values as 27kHz-96kHz horizontal and 50Hz-160Hz vertical. What implications does this have for the resolutions and refresh rates the monitor can handle? A) The monitor can run at up to 160Hz vertical refresh rate in all resolutions. B) The monitor can handle up to 160Hz vertical refresh rate depending on the color depth. C) The monitor can handle up to 160Hz vertical refresh rate depending on the resolution. D) The monitor can handle vertical resolutions of up to 600 lines (96,000 ÷ 160), but no more. E) The monitor can handle horizontal resolutions of up to 600 columns (96,000 ÷ 160), but no more.

C) The monitor can handle up to 160Hz vertical refresh rate depending on the resolution.

Which of the following is true of public and private SSH keys? (Choose Two) A) Data encrypted using a public key may be decrypted with any private key. B) Data is encrypted using the private key and decrypted using the public key. C) The private key must never be shared. D) The SSH key pair must be created by the owner of the private key.

C) The private key must never be shared. D) The SSH key pair must be created by the owner of the private key.

A Linux user issues the su -c "rm -rf /sampledirectory/*" command. What will be the outcome of the command? A) An error will be generated because there is no -c parameter defined for the su command. B) The user will be logged in as a user named c before the system issues the rm -rf /sampledirectory/* command. C) The user will be prompted to enter a super user password before the user can issue the rm -rf /sampledirectory/* command as a super user. D) Without being prompted for a password, the user will issue the rm -rf /sampledirectory/* command as a super user and then log out to the previous login identity.

C) The user will be prompted to enter a super user password before the user can issue the rm -rf /sampledirectory/* command as a super user.

What is the function of Nmap? A) To identify local programs that use particular ports B) To map port numbers onto service names C) To scan computers for open ports D) To block ports from outside access E) To mount remote NFS exports on the local filesystem

C) To scan computers for open ports

Which of the following SQL statements is used to replace old data in a table with the new data? A) REPLACE B) ALTER C) UPDATE D) CHANGE

C) UPDATE

In which of the following cases will the ulimit command execute if and only if the cat command executes successfully? A) cat /etc/security/limits.conf || ulimit B) cat /etc/security/limits.conf & ulimit C) cat /etc/security/limits.conf && ulimit D) cat /etc/security/limits.conf | ulimit

C) cat /etc/security/limits.conf && ulimit

Which commands could be used to change your Linux computer's time zone? (Choose All That Apply) A) locale B) date C) cp D) ln E) ls

C) cp The cp command copies the appropriate time zone information to the /etc/localtime file. D) ln The ln command creates a link between the time zone file and the /etc/localtime file.

Your manager has asked that you configure logrotate to run on a regular, unattended basis. What utility/feature should you configure to make this possible? A) at B) logrotate.d C) cron D) inittab E) ntpd

C) cron

Which of the following are not Linux DHCP clients? (Select two.) A) pump B) dhcpcd C) dhcpd D) dhclient E) ifconfig

C) dhcpd E) ifconfig

You need to view the environment variables configured for your current Linux session. You can use all of the following commands EXCEPT: A) env B) set C) export D) printenv

C) export

Which of the following statements in a script adds two numbers passed as positional parameters? A) function sum { echo $(( 1 + 2 )); } B) function sum { echo (( $1 + $2 )); } C) function sum { echo $(( $1 + $2 )); } D) function sum { echo $1 + $2 ; }

C) function sum { echo $(( $1 + $2 )); }

You want to add a printer using the Web-based administrative tools built into CUPS. Assuming the server is configured for this, what URL would you enter in a Web browser running on the server computer itself to accomplish this goal? A) http://www.ghostscript.com/config/ B) http://www.cups.org/configure.html C) http://localhost:631 D) http://127.0.0.1 E) http://www.localhost/cups/

C) http://localhost:631

Which of the following commands brings up the network interfaces? A) ifdown B) ip add C) ifup D) dig

C) ifup

Which of the following acts as an interface for sending messages to the syslog? A) syslogd B) klogd C) logger D) newaliases

C) logger

You need to configure your Linux computer to automatically compress the current log files and remove old log files. Which utility should you use? A) logger B) grep C) logrotate D) tail

C) logrotate

Which of the following CUPS utilities can be used to send a file to the print queue for printing? A) lpq B) lprm C) lpr D) lpc

C) lpr

You work as a network administrator for McNeil Inc. You want to remove a file from a print queue. Which of the following commands will you use to accomplish the task? A) lpq B) lpr C) lprm D) lpqdel

C) lprm

Which of the following commands can be used to identify the job_id of a job in a print queue? (Choose Two) A) lprm B) lpr C) lpstat D) lpq

C) lpstat D) lpq

Which of the following is a mail transfer agent whose configuration files are human readable and support 250 directives? A) sendmail B) qmail C) postfix D) exim

C) postfix

Which of the following environment variables is used to specify which X session to run? A) $HOME B) $EDITOR C) $LOGNAME D) $DISPLAY

D) $DISPLAY

Which of the following useradd parameters is used to set the number of days between password expiry and account disabling? A) -r B) -o C) -p D) -f

D) -f

You need to ensure that certain users are unable to run at jobs. Which file should you edit? A) /etc/cron.allow B) /etc/cron.deny C) /etc/at.allow D) /etc/at.deny

D) /etc/at.deny

Which of the following files contains list of IP addresses and their corresponding host names? A) /etc/service B) /etc/resolv.conf C) /etc/nsswitch.conf D) /etc/hosts

D) /etc/hosts

A Linux user writes the following BASH shell script (line numbers included for reference only): -------------------------------- 1. X=10 2. while [ $X != 0 ] 3. do 4. echo $X 5. X=$((X-1)) 6. enddo -------------------------------- Which line in the above code will generate a syntactical error after the script is executed? A) 2 B) 3 C) 5 D) 6

D) 6

Which of the following statements about the X Window System or X is false? A) It provides the basic framework for building GUI environments. B) It supports client-server model. C) It provides network transparency. D) By default, it encrypts network traffic between an X server and remote X clients.

D) By default, it encrypts network traffic between an X server and remote X clients.

How does the lpc utility for CUPS differ from its counterpart in BSD LPD and LPRng? A) The lpc utility is unique to CUPS; it doesn't ship with BSD LPD or LPRng. B) CUPS doesn't ship with an lpc command, but BSD LPD and LPRng do. C) CUPS's lpc is much more complex than its counterpart in BSD LPD and LPRng. D) CUPS's lpc is much simpler than its counterpart in BSD LPD and LPRng. E) The lpc utility is identical in all three of these printing systems.

D) CUPS's lpc is much simpler than its counterpart in BSD LPD and LPRng.

Which of the following is true of sticky keys? A) Manages repeated, accidental keypress B) Requires a key to be pressed longer to register a keypress C) Plays sound on activation and deactivation of locking keys D) Causes a modifier key to remain active after being pressed once.

D) Causes a modifier key to remain active after being pressed once.

Which of the following services uses both TCP and UDP? A) DHCP B) POP C) NNTP D) DNS

D) DNS

Which of the following protocols is used by network devices to send only error messages whenever a requested service is not available? A) TCP B) UDP C) IP D) ICMP

D) ICMP

Which of the following variables overrides other LC_* variables when set? A) LC_COLLATE B) LC_CTYPE C) LC_PAPER D) LC_ALL

D) LC_ALL

Which environment variable stores the format for the command prompt? A) PROMPT B) PSI C) PAGER D) PS1 E) None of these

D) PS1

Which of the following SQL statements selects the fields ID and Emp_name from a table named Employees? A) SELECT (ID,Emp_name) FROM Employees; B) SELECT (ID Emp_name) FROM Employees; C) SELECT ID Emp_name FROM Employees; D) SELECT ID,Emp_name FROM Employees;

D) SELECT ID,Emp_name FROM Employees;

Using a packet sniffer, you notice a lot of traffic directed at TCP port 22 on a local computer. What protocol does this traffic use, assuming it's using the standard port? A) HTTP B) SMTP C) Telnet D) SSH E) NNTP

D) SSH The Secure Shell (SSH) protocol uses port 22, so if the traffic to port 22 is using the correct protocol, it's SSH traffic and option D is correct. The Hypertext Transfer Protocol (HTTP; option A) is conventionally bound to port 80; the Simple Mail Transfer Protocol (SMTP; option B) uses port 25; Telnet (option C) uses port 23; and the Network News Transfer Protocol (NNTP; option E) uses port 119. None of these would normally be directed to port 22.

Which section of the X configuration file includes the color depth setting? A) Module B) Device C) Monitor D) Screen

D) Screen

Which of the following DNS debugging tools reports responses from the name server and also details about the query? A) export B) xwininfo C) xhost D) dig

D) dig

What is NOT a function of the netstat command? A) displaying information on the routing tables B) displaying statistical details for each supported protocol C) displaying information on masqueraded connections D) displaying the route taken by data packets to reach a network host

D) displaying the route taken by data packets to reach a network host

Which of the following is prefixed with an account's hashed password to lock that account? A) asterisk (*) B) hash (#) C) blank space D) exclamation (!)

D) exclamation (!)

You need to temporarily change your locale environment variables to Great Britain settings. Which command should you use? A) date B) iconv C) locale D) export

D) export

Which of the following commands adds a password to a group to allow users, not a member of the group, to join the group temporarily? A) passwd B) groupadd C) groupmod D) gpasswd

D) gpasswd

Which of the following commands is used to set the CMOS clock? A) time B) date C) clock D) hwclock

D) hwclock

Which of the following commands provides limited control over printer and class queues provided by cups? A) lpq B) lpr C) lprm D) lpc

D) lpc

Which command is equivalent to the sendmail -bp command? A) sendmail -q B) newaliases C) mail D) mailq

D) mailq

How would you copy a file (sample.txt) from your local computer to the mary account on trex.pangaea.edu using SSH encryption? A) ssh sample.txt [email protected] B) ssh sample.txt [email protected]: C) scp sample.txt [email protected] D) scp sample.txt [email protected]: E) sftp sample.txt [email protected]

D) scp sample.txt [email protected]:

Which of the following configuration files is responsible for converting domain names of nameservers to their corresponding IP addresses? A) .htaccess B) httpd.conf C) /etc/conf.modules D) auto.master map E) /etc/resolv.conf

E) /etc/resolv.conf

What is the purpose of the -n option to route? A) It causes no operation to be performed; route reports what it would do if -n were omitted. B) It precedes the specification of a netmask when setting the route. C) It limits route's output to descriptions of non-Internet routes. D) It forces interpretation of a provided address as a network address rather than a host address. E) It causes machines to be identified by IP address rather than hostname in output.

E) It causes machines to be identified by IP address rather than hostname in output.

Which script statement is an example of a function? A) for f in 'ls *.txt' ; do vi -r $f done B) if [ -s /tmp/dump ] then echo "/tmp/dump found; aborting!" exit fi C) while [ $i -lt 4 ] do xterm & i=$[$i+1] done D) until [ $COUNT -gt 5 ]; do echo Value of count is: $COUNT let COUNT=COUNT+1 done E) copier() { cp $a $b }

E) copier() { cp $a $b }

TCP and UDP use _____ numbers to communicate with the upper layers of the OSI model to keep track of different conversations crossing the network simultaneously.

TCP and UDP use *port* numbers to communicate with the upper layers of the OSI model to keep track of different conversations crossing the network simultaneously.

The ________ command is used to list the user's jobs scheduled by the at command.

atq, at -l Both the atq command and the at -l command list the user's pending jobs.

What command would you use to create a group, named students, in a Linux environment.

groupadd students


Conjuntos de estudio relacionados

Forensic Identification of Marijuana: Final Study Guide

View Set

Chapter 11 Vocab Set: AGRICULTURE

View Set

Chapter 3 Key Terms College Accounting

View Set

Ch 12: Developing an Effective Business Plan

View Set

NRS 102 NCLEX Renal & Urinary (Chapter 51 & 52)

View Set

Med surge chapter 16 death and dying

View Set

Programming Languages of Interest

View Set

The Child with Hematologic or Immunologic Dysfunction

View Set

MP King Arthur: Book 2, Chapters 1-4 (Comprehension)

View Set