Lab 1-1 Q&A
When examining a Linux kernel version number of 4.18.8, what is the minor number? A. 4 B. 18 C. 8 D. None of these
B. 18
When examining a Linux kernel version number of 4.18.8, what is the revision number? A. 4 B. 18 C. 8 D. None of these
C. 8
What is the core component of the Linux GUI? A. Desktop B. X-Windows C. Ubuntu D. None of these
B. X-Windows
Linux is freely developed and considered open source software. It is covered under this public license. A. OSI B. LUA C. GNU D. PST
C. GNU
A Linux developmental kernel is classified as -rc2. What does this indicate? A. It is stable B. Ready for production C. Needs more testing D. A and B only
C. Needs more testing
When installing the latest Linux version, you can choose Red Hat, Ubuntu, GNOME or KDE distributions. Which of the choices will be common to all distributions? A. GUI B. Desktop C. Bootloader D. Kernel
D. Kernel
Which choice identifies a compressed archive of files that can be installed on a Linux system without updating the central software database? A. RPM B. DPM C. Pacman D. Tarball
D. Tarball
What is the total cost of the software needed to install a native Linux server? A. $0 B. Less than $100 C. Less than $1000 D. Varies according to configuration
A. $0
When examining a Linux kernel version number of 4.18.8, what is the major number? A. 4 B. 18 C. 8 D. None of these
A. 4
Which of the choices is NOT used to identify a Linux kernel version? A. Name B. Major Number C. Minor Number D. Revision Number
A. Name
On which distribution is the Ubuntu Linux distribution based? A. Red Hat B. Debian C. Gentoo D. Arch
B. Debian
When using an Internet browser in Linux to reach a website, how is the address www.linux.org handled? A. It is a FQNN and goes directly to the site B. It is FQDN and is translated by DNS C. It is a FQDN and is translated by DHCP D. None of these are correct
B. It is FQDN and is translated by DNS
Which term describes the security analysis that attempts to break into systems to test the strength of the system? A. Vulnerability assessment B. Penetration test C. Cyber attack D. None of these
B. Penetration test
The most common method of Linux clustering is known as ____________ clustering.
Beowulf
A Linux server can NOT provide which of the services listed? A. NTP B. FTP C. DHCP D. MTA E. All of these can be provided
E. All of these can be provided