CS Exam (Chs. 12 - 20)
BASH scripts on a Linux distribution are files that end in which of the following characters? A) .sh B) .wc C) .sc D) .ba
A
Which of the following NFS server processes handles the recovery process if the NFS server is rebooted when NFS clients are actively using the NFS server's resources? A) rpc.idmapd B) rpc.statd C) rpc.mountd D) rpc.rquotad
B
Which setting for the Dovecot server specifies the location of where Dovecot stores its data? A) mail_location B) base_dir C) listen D) !include
B
Which zone file contains a list of the root servers? A) /var/named/named.localhost B) /var/named/named.ca C) /etc/named.conf D) /etc/resolv.conf
B
Who is responsible for developing a solid strategy for backing up an organization's data? A) End user B) System administrator C) CEO D) President
B
The /etc/anacrontab file is used by the __________ command to determine how to execute commands that were missed by the crond daemon while a system was shut down. A) crontab B) tab C) etc D) anacron
D
The Perl scripting language can be used for which of the following applications? A) Code testing B) Data parsing C) Web development D) All of the above
D
The Python scripting language is often used for which of the following applications? A) Scientific applications B) System tools C) Network-based applications D) All of the above
D
To discover SAMBA servers in your workgroup, execute the __________ command. A) testparm B) smbclient C) smbpasswd D) nmblookup
D
Which of the following is NOT true when comparing the IMAP and POP protocols? A) IMAP supports the feature of folders or mailboxes. B) POP is generally considered a simpler protocol, resulting in an easier implementation. C) With IMAP, individual parts of a message can be retrieved separately. D) POP allows multiple simultaneous connections.
D
DHCP stands for which of the following? A) Dynamic Host Configuration Protocol B) Domain Host Configuration Process C) Dynamic Host Configuration Process D) Domain Host Configuration Protocol
A
Each computer on a network is called a __________, and it can include many different systems, such as desktop and laptop computers, printers, routers, switches, and cell phones. A) host B) subnet C) protocol D) LAN
A
In the event that a remote system has its network card replaced, which option of the arp command is used to delete an entry from the ARP table? A) -d B) -I C) -i D) -D
A
The primary configuration file for the BIND server is the __________ file. A) /etc/named.conf B) /var/named/named.ca C) /etc/resolv.conf D) /var/named/named.localhost
A
To start a BASH script, enter __________ as the first line of the script file in a text editor. A) #!/bin/bash B) #hello.sh C) echo $PATH D) $./hello.sh
A
Which flow control statement in the BASH scripting language executes a block of code repeatedly as long as the conditional statement is false? A) The until loop B) The case statement C) The while loop D) The for loop
A
Which of the following Fedora scripts is used to generate the database that the locate command uses daily? A) mlocate B) logrotate C) man-db.cron D) None of the above
A
Which of the following NFS server processes exists only on systems that run NFSv4? A) rpc.idmapd B) rpc.statd C) rpc.mountd D) rpc.rquotad
A
Which of the following SAMBA packages contains software used by both the SAMBA server and client utilities? A) SAMBA-common B) SAMBA-swat C) SAMBA-client D) None of the above
A
Which of the following backup storage locations depends on network access and could be expensive and slow? A) Remote B) Disk C) Tape D) Optical media
A
Which of the following commands displays a file with a number at the beginning of each line? A) nl B) ba C) ls D) fi
A
Which of the following commands is used to display the router hops from one system to another (in other words, from one router to another)? A) traceroute B) auto C) ping D) netcat
A
Which of the following directories to consider including in a backup strategy contains thirdparty software installed on the system? A) /opt B) /sbin C) /home D) /etc
A
Which of the following is a Distributed File System (DFS) protocol that was originally created by Sun Microsystems in 1984? A) NFS B) SMB C) CIFS D) SAMBA
A
Which of the following crontab command options is used to list the entries in the crontab file? A) -r B) -u C) -l D) -e
C
Which of the following directories contains programs that will be executed once per day? A) /etc/cron.day B) /etc/cron.weekday C) /etc/cron.daily D) /etc/day.cron
C
Which of the following directories contains programs that will be executed once per month? A) /etc/cron.month B) /etc/monthly.cron C) /etc/cron.monthly D) /etc/month.cron
C
Which of the following files are used to control access to the at command? A) /etc/at.allow B) /etc/at.deny C) Both A and B D) Neither A nor B
C
Which of the following files is useful to redirect email to local user accounts? A) /etc/postfix/virtual B) /etc/postfix/main.cf C) /etc/aliases D) $HOME/mail.backup
C
Which of the following is NOT one of the three most commonly used scripting languages on Linux? A) Perl B) BASH C) MySQL D) Python
C
Which of the following is NOT true when comparing scripting and compiled languages? A) Scripts traditionally are not compiled. B) Scripts often take less coding to perform a task. C) Compiled languages can be executed directly from source code. D) Scripting languages are typically easier to learn.
C
Which of the following refers to the process of dividing a larger network into a smaller one and results in the loss of assignable IP addresses? A) Autoconfiguration B) NAT C) Subnetting D) Routing
C
Which of the following scripting languages, created by Guido van Rossum in the late 1980's, has a very rigid indentation scheme? A) BASH B) Perl C) Python D) None of the above
C
Which of the following shell settings causes the expansion of wildcards to be avoided? A) set -u B) set -e C) set -f D) set -x
C
The "3-2-1 Rule" for backups states that you should store three copies of all important backup data, use at least two types of media for the backups, and make sure at least one backup is kept __________. A) onsite B) hidden C) online D) offsite
D
The Red Hat variety of Linux distributions includes which of the following? A) Fedora B) CentOS C) Red Hat Enterprise Linux D) All of the above
D
The original __________ were .com, .org, .net, .int, .edu, .gov, and .mil; many others have been added in recent years. A) domain names B) subdomains C) FQDNs D) top-level domains
D
Which of the following commands doesn't search the live filesystem, but rather searches from a database that is generated automatically daily? A) extract B) find C) ionice D) locate
D
Which of the following commands is a utility that can be used for debugging network issues? A) traceroute B) auto C) ping D) netcat
D
Which of the following directories either are not stored on the hard drive or contain temporary information that never needs to be backed up? A) /etc B) /lib C) /bin D) /proc
D
Which output component of the ifconfig command includes statistics regarding how many network packets have been received correctly? A) TX errors B) TX packets C) RX errors D) RX packets
D
After you have discovered a SAMBA server, you can see what shares are available on the SAMBA server by executing the __________ command. A) testparm B) smbclient C) smbpasswd D) nmblookup
B
All users listed in the __________ file are denied access to the crontab command while all other users can execute the crontab command successfully. A) /var/spool/cron B) /etc/cron.deny C) /etc/crontab D) /etc/cron.allow
B
The permissions for the /var/spool/at directory should be __________. A) -rwsr-xr-x B) drwx------ C) -rw-r--r-- D) drwxr-xr-x
B
There are variables available in BASH scripts that represent the arguments passed into the script. The first argument is assigned to which of the following variables? A) $0 B) $1 C) #0 D) #1
B
To start the process of creating a chroot __________, you first need to create directories where all the files are placed. A) device B) jail C) signature D) account
B
Which backup strategy is based on a mathematical puzzle game? A) Bacula B) Tower of Hanoi C) Amanda D) None of the above
B
Which class of IPv4 addresses is only used for research and development? A) C B) E C) B D) A
B
Which field of the /etc/anacrontab file contains the command that should be executed? A) 2 B) 4 C) 1 D) 3
B
Which field of the /etc/anacrontab file contains the name of the command that was skipped? A) 1 B) 3 C) 4 D) 2
B
Which field of the crontab table specifies the hour that a command should execute? A) 6 B) 2 C) 3 D) 1
B
Which of the following NFS mount options specifies how many times to retry to mount an NFS share? A) rsize= B) retrans= C) timeo= D) retry=
B
Which of the following crontab command options is used to specify a user account? A) -r B) -u C) -l D) -e
B
Which of the following directories contains programs that will be executed once per hour? A) /etc/hour.cron B) /etc/cron.hourly C) /etc/cron.hour D) /etc/hourly.cron
B
Which of the following directories contains programs that will be executed once per week? A) /etc/cron.week B) /etc/cron.weekly C) /etc/week.cron D) /etc/weekly.cron
B
Which of the following directories to consider including in a backup strategy rarely changes because this is the location of most of the system's commands, documentation, and programs? A) /bin B) /usr C) /var D) /boot
B
Which of the following flags that can be assigned an interface indicates that the interface is active? A) BROADCAST B) UP C) PROMISC D) MULTICAST
B
Which of the following indicates that the code line is part of a BASH script? A) /usr/bin/logger B) #!/bin/sh C) EXITVALUE=$? D) /usr/sbin/logrotate
B
Which of the following is NOT true regarding IPv4 and IPv6? A) IPv4 uses a method called dotted decimal notation, a 32-bit number divided into four octets. B) IPv4 has a more efficient routing technique than IPv6. C) IPv4 has been an Internet standard for a long time and is slowly being replaced by IPv6. D) IPv6 uses a technique called hexadecimal notation, which uses a 128-bit number.
B
Which of the following is a unique numeric-based value that is like the street name on a traditional envelope? A) Packet header B) IP address C) Network packet D) Port
B
Which of the following is not one of the three sections in the default smb.conf file? A) [printers] B) [security] C) [global] D) [homes]
B
Which of the following is the most widely used email server on Linux? A) SMTP B) Postfix C) Sendmail D) IMAP
B
Which of the following network ports is associated with the SMTP service that is used to send email? A) 22 B) 25 C) 110 D) 389
B
Which of the following shell settings causes your shell script to exit prematurely if an unset variable is used? A) set -e B) set -u C) set -x D) set -f
B
Which of the following universal files is used by applications to determine the sources from which to obtain name-service information, as well as in what order? A) /etc/sysctl.conf B) /etc/nsswitch.conf C) /etc/resolv.conf D) /etc/hosts
B
Which of the following, in coding terms, refers to a location where people share programs? A) Archive B) Repository C) Collection D) Library
B
NFS requires another service called RPC, which stands for which of the following? A) Reverse Procedure Call B) Remote Portmap Call C) Remote Procedure Call
C
Some Linux distributions include __________, an automated tool that configures network settings without any interaction on your part. A) ESSID B) ARP C) Network Manager D) WPA
C
The /etc/services file is useful to administrators in that it contains ports that have been assigned to services by the __________. A) ICMP B) CIDR C) IANA D) System administrator
C
The Internet Protocol (IP) is part of a __________ networking model called the ISO-OSI network model. A) three-layer B) five-layer C) seven-layer D) nine-layer
C
The __________ system provides users with a way to execute a program at one specific time in the future. A) crontab B) anacron C) at D) time
C
The system administrator edits the __________ file to enable executing system-critical processes at specific intervals. A) /var/spool/cron B) /etc/cron.deny C) /etc/crontab D) /etc/cron.allow
C
To create a crontab entry, execute the crontab command with the __________ option. A) -l B) -r C) -e D) -u
C
When a command or program finishes execution in a BASH script and the command executed successfully, it will return an exit status value of __________ to the calling program. A) 2 B) 1 C) 0 D) 3
C
Which field of the /etc/crontab file includes the name of the command to execute? A) 6 B) 2 C) 7 D) 4
C
According to the text example, which of the following levels is associated with a full backup? A) Level 0 B) Level 1 C) Level 2 D) Level 3
A
After installing the iscsi-initiator-utils package, you can use which of the following commands to see the name of the targets provided by an iSCSI server? A) iscsiadm B) iscsid C) tgtd D) sendtargets
A
After you make changes to the smb.conf file and before starting the SAMBA server, you should execute which of the following commands to verify the syntax of the configuration file? A) testparm B) smbclient C) smbpasswd D) nmblookup
A
Any system user can create a(n) __________ entry that will result in a daemon executing a program on a routine basis. A) crontab B) at C) system D) table
A
CIFS is an abbreviation for which of the following? A) Common Internet File System B) Common Internet File Server C) Configuration Internet File System D) Configuration Internet File Server
A
Which of the following statements is true regarding the locate and find commands? A) The locate command is faster than the find command. B) The find command searches from a database that is generated automatically daily. C) The locate command searches the live filesystem. D) The find command is faster than the locate command.
A
Which of the following subnet masks is essentially the same format as dotted decimal notation? A) Variable-Length Subnet Mask (VLSM) format B) Binary format C) Classless Inter-Domain Routing (CIDR) format D) None of the above
A
__________ devices are the most common network device on Linux systems. A) Ethernet B) Persistent C) Wireless D) Gateway
A
A network is created when at least __________ or more computers communicate through some sort of connection. A) 1 B) 2 C) 3 D) 4
B
A scripting feature called __________ will execute a file as if the code from that file was embedded within the script. A) locating B) sourcing C) logging D) finding
B
Command substitution, the process of executing a subcommand within a larger command, can be performed using which of the following methods? A) ($cmd) B) $(cmd) C) (#cmd) D) #(cmd)
B
Each line of the crontab table is broken into fields, separated by one or more __________ characters. A) colon B) space C) semicolon D) asterisk
B
In reference to networking, UDP is an acronym for which of the following? A) Unique Database Protocol B) User Datagram Protocol C) Unique Datagram Protocol D) User Database Protocol
B
In a case statement in the BASH scripting language, which character can be used to represent "or"? A) * B) ? C) | D) []
C
In the BASH shell, an "else, if" statement is spelled __________ and is not required if you don't want to perform additional conditional checks. A) elseif B) fi C) elif D) else,if
C
Which of the following backup storage locations offers the advantages of low cost and medium shelf life, but requires a lot of maintenance? A) Remote B) Disk C) Tape D) Optical media
C
Which of the following commands can be used on the NFS server to display what is currently shared or to temporarily share a resource? A) nfsstat B) showmount C) exportfs D) mount
C
Which of the following commands creates the database that is used by the locate command? A) renice B) dbcreate C) updatedb D) ionice
C
Which of the following commands is normally used to perform simple hostname-to-IPaddress translation operations? A) hostname B) dig C) host D) netstat
C
Which of the following is NOT true when securing access to BASH scripts? A) Make sure only the authorized users have access to the scripts and the ability to execute them. B) Never place SUID or SGID permission on a BASH script. C) A good permission set for a script is -rwxrwx--- whereas a bad permission set is -rwxr-x---. D) Placing BASH scripts on a publicly accessible system poses a greater threat than on an internal server.
C
Which of the following is a network storage solution based on the communication protocol provided by SCSI? A) WWID B) LUN C) iSCSI D) Initiator
C
Which of the following is a protocol that was invented in the mid-1980s by IBM for the purpose of being able to share directories between hosts on a LAN? A) DFS B) NFS C) SMB D) CIFS
C
Which of the following Fedora scripts is used to initialize or manually update index database caches? A) mlocate B) logrotate C) man-db.cron D) None of the above
C) man-db.cron (p 278)
Use the __________ file when you want to allow access to a few users but deny access to most users. A) /var/spool/cron B) /etc/cron.deny C) /etc/crontab D) /etc/cron.allow
D
When using conditional statements in BASH scripts, which of the following is true regarding the spacing around the square brackets? A) There should be no spaces before or after a square bracket. B) There should be a space before but not after each square bracket. C) There should be a space after but not before each square bracket. D) There should be a space before and after each square bracket.
D
Which field of the crontab table can include only values between 0 and 7? A) 4 B) 3 C) 1 D) 5
D
Which of the following NFS sharing options specifies that file data changes are made to disk immediately, which has an impact on performance, but is less likely to result in data loss? A) rw B) async C) ro D) sync
D
Which of the following is a disadvantage to BASH shell scripting? A) You can use Linux commands natively in BASH shell scripts. B) Just about every Linux (and Unix) distribution will have the BASH shell. C) The language allows loop controls, variables, and exit status values. D) BASH shell scripting doesn't include object-oriented programming.
D
Which of the following is a third-party backup utility that supports clients from different platforms, including Linux, Microsoft Windows, macOS, and Unix? A) Amanda B) bzip2 C) Tower of Hanoi D) Bacula
D
Which of the following is an NFS utility that can be compared to an old-fashioned telephone operator? A) libwrap B) rpcinfo C) exportfs D) portmap
D
Which of the following is an SMB-based protocol made popular on Microsoft Windows systems? A) DFS B) NFS C) LAN D) CIFS
D
Which of the following is an example of an IPv4 address? A) 192.168.100 B) 11000000 C) 11000000.10101000 D) 192.168.100.25
D
Which of the following is not true regarding security issues for script contents? A) A script security policy should require all scripts to be free of any sensitive data. B) In order to execute a script, the read permission has to be enabled for a user. C) Unlike with most system binary commands, a user can see everything in a BASH script. D) It is safer to use a variable rather than an absolute path when executing script commands.
D
Which of the following is recommended for securing the crontab and at commands? A) Create written rules for the use of crontab and at that all users must follow, with consequences for misuse. B) On workstations, provide access to users who routinely use the workstations and deny all others. C) On system-critical servers, consider removing access to the crontab and at commands for all users. D) All of the above
D
Which of the following lines exits a script with a "success" return value of 0? A) 0 exit B) exit zero C) zero exit D) exit 0
D
Which of the following major components to email is responsible for accepting the email message from the MUA and sending it to the correct receiving mail server? A) MDA B) MSA C) POP D) MTA
D
Which of the following permissions does the text recommend for securing the /etc/anacrontab file? A) -rwx------ B) drwx----- C) -rwsr-xr-x D) -rw------
D
Which of the following permissions does the text recommend for securing the /etc/at.allow file? A) drwx----- B) -rwx------ C) -rwsr-xr-x D) -rw------
D
Which of the following ranges of IP addresses are for private use only? A) 10.0.0.0-10.255.255.255 B) 172.16.0.0-172.31.255.255 C) 192.168.0.0-192.168.255.255 D) All of the above
D
Each user has their own collection of crontab entries that only the root user has access to. These files are typically located in which of the following directories? A) /var/spool/cron B) /etc/cron.deny C) /etc/crontab D) /etc/cron.allow
A
Having a security policy for BASH scripts is important, because __________ will make use of existing scripts to compromise the system. A) hackers B) end users C) system administrators D) managers
A
If you are trying to attach a wireless device to a wireless access point (wireless router), you could execute the __________ command to see a list of available wireless routers. A) iwlist B) iwconfig C) eth0 D) Ad-Hoc
A
Most default /etc/crontab files are designed to execute the __________ script. A) run-parts B) www-data C) sync D) None of the above
A
Variables used in BASH scripts should be surrounded by which of the following? A) Double quotes B) Single quotes C) Square brackets D) Parentheses
A
Which of the following commands is used to remove an at job before it is executed? A) atrm B) atq C) atr D) atqt
A
Which of the following commands makes entries in the system log? A) logger B) log C) logrotate D) grep
A
Which of the following commands was originally designed to back up filesystems to tape devices, and can now also be used to back up to non-tape devices? A) tar B) rsync C) dd D) cpio
A
Which of the following is a well-defined standard for network communications between two hosts? A) Protocol B) Subnet C) Client D) Service
A
Which of the following is not recommended when developing a security plan for storage devices? A) A database with private company data should be stored in an external-facing web server. B) Sensitive data needs to be secure from prying eyes, including users who have valid access to the system. C) A data recovery system should be put in place to allow for the quick recovery of lost data. D) All critical data needs to be backed up on a regular basis in the event that a storage device fails or a disaster (such as fire or flood) destroys the storage devices.
A
Which of the following is the de facto standard name resolution solution for the majority of systems connected to the Internet? A) DNS B) LDAP C) NIS D) DHCP
A
Which of the following options for the netstat command displays information based on a specific interface? A) -i B) -a C) -s D) -t
A
Which of the following options for the tar command is used to create a tar ball? A) -c B) -t C) -C D) -z
A
Which of the following permissions does the text recommend for securing the /etc/cron.monthly file? A) drwx----- B) -rwsr-xr-x C) -rwx------ D) -rw------
A
Which of the following permissions does the text recommend for securing the /etc/cron.d file? A) drwx----- B) -rw-r--r-- C) drwxr-xr-x D) -rwsr-xr-x
A
Which of the following permissions does the text recommend for securing the /etc/cron.hourly file? A) drwx----- B) -rw-r--r-- C) -rw------ D) -rwx------
A
Which of the following programs can perform actions like blocking SPAM, redirecting mail to other user accounts, and making copies of the email message and sending them to other accounts? A) Procmail B) MTA C) Postfix D) Dovecot
A
Which of the following protocol suites is used primarily to send error messages and for determining the status of network devices? A) ICMP B) IP C) UDP D) TCP
A
Which of the following protocols is used to determine where to send information across a network? A) IP address B) TCP C) ICMP D) UDP
A
Which of the following refers to the system where you make changes directly to the zone files? A) Master name server B) Authoritative name server C) Slave name server D) Reverse lookup zone
A
Which section of the man page indicates that the argument to the logrotate command is its configuration file? A) SYNOPSIS B) NAME C) DESCRIPTION D) EXAMPLES
A
Which of the following permissions does the text recommend for securing the /etc/cron.deny file? A) drwx----- B) -rw-r--r-- C) -rw------ D) -rwx------
C
Which of the following permissions does the text recommend for securing the /usr/bin/at file? A) -rw------ B) drwx----- C) -rwx------ D) -rw-r--r--
C
Which of the following Postfix settings should be set to yes on publicly accessible Postfix servers to prevent techniques that are used to harvest email addresses? A) relay_domains B) disable_vrfy_command C) relayhost D) inet_interfaces
B
Which of the following backup storage locations is fast and easily available, but is not portable? A) Remote B) Disk C) Tape D) Optical media
B
Which of the following commands can be used to determine if the Network Manager is running on your system? A) systemctl disable NetworkManager B) nmcli device status C) systemctl stop NetworkManager D) None of the above
B
Which of the following commands displays the parameters of a wireless network interface? A) iwlist B) iwconfig C) eth0 D) mode
B
Which of the following commands is designed to back up files to a remote system and can communicate via Secure Shell (SSH), making the backup process secure? A) tar B) rsync C) dd D) cpio
B
Which of the following commands is useful for performing DNS queries on specific DNS servers? A) hostname B) dig C) host D) netstat
B
Which of the following commands optimizes the functionality of the man page when executed automatically on a daily basis? A) renice B) mandb C) touch D) trap
B
Which of the following is NOT true regarding aspects of the Perl scripting language? A) Perl's syntax is fairly simple, derived primarily from the C language. B) Perl code is inflexible; you are limited by the structure. C) Perl has very powerful features, such as robust regular expressions. D) It normally does not take very long to learn Perl.
B
Which of the following is NOT true regarding security concerns for crontab and at? A) If you remove a user's ability to use the crontab and at commands, then any of that user's existing crontab and at jobs would still execute. B) Every system has the same crontab and at systems. C) Disabling access only limits the user's ability to create more crontab and at jobs. D) Your security policy should have a procedure in place to identify and remove existing jobs when a user is blocked access.
B
Which of the following is NOT true regarding the Python scripting language? A) It is extendable or embedded. B) It has a small standard library. C) The data structures are more diverse than those of many languages. D) It has object-oriented features.
B
Which of the following is NOT true regarding the ip command? A) The ip command is designed to replace the ifconfig, arp, and route commands. B) The ip command is no longer under development. C) The ip command provides more features than the ifconfig, arp, and route commands. D) If you inherit an older or legacy system, the ip command might not exist.
B
Which of the following is true regarding the LAN and WAN general classes of networks? A) A WAN is a network that describes all the hosts that communicate directly with one another on the same network. B) A WAN is a collection of LANs that can communicate through routers or switches. C) A LAN is a network that describes a collection of WANs. D) A city is analogous to a WAN and the entire country is analogous to a LAN.
B
Which of the following permissions does the text recommend for securing the /etc/cron.allow file? A) drwx----- B) -rw------ C) -rwsr-xr-x D) -rwx------
B
Which of the following permissions does the text recommend for securing the /etc/cron.daily file? A) -rw------ B) drwx----- C) -rwx------ D) drwxr-xr-x
B
Which of the following permissions does the text recommend for securing the /etc/crontab file? A) -rwx------ B) -rw------ C) drwx----- D) drwxr-xr-x
B
Which of the following refers to creating small programs based on the Linux commands that you want to routinely (or occasionally) execute? A) Executing B) Scripting C) Compiling D) Parsing
B
Which of the following procmail flags is used to perform case-sensitive matching? A) W B) H C) D D) B
C
A __________ is a host on a network that offers a service; it serves something to the receiver, which is known as a client. A) port B) network packet C) server D) protocol
C
After installing the correct DHCP server package, you can configure the server by editing the __________ file. A) /etc/named.conf B) dhcpd.leases C) /etc/dhcpd.conf D) ddns-update-style
C
Comments in a BASH script start with the __________ character and extend to the end of the line. A) * B) $ C) # D) /
C
How many root servers are there at the top of the DNS domain structure? A) 9 B) 11 C) 13 D) 15
C
If you want to perform integer (numeric) comparison operations in a BASH script, which option results in true if the first value is greater than or equal to the second value? A) -gt B) -ne C) -ge D) -le
C
Which of the following commands is used to create a new SAMBA account for a Linux user account? A) testparm B) smbclient C) smbpasswd D) nmblookup
C
Which of the following commands is used to filter out comment lines and blank lines? A) trap B) touch C) grep D) mandb
C
Which of the following commands is used to verify that a remote host can respond to a network connection? A) traceroute B) auto C) ping D) netcat
C
Which of the following commands is useful for backing up entire devices, whether entire hard disks, individual partitions, or logical volumes? A) tar B) rsync C) dd D) cpio
C
Which of the following commands lists active network devices when executed with no arguments? A) nmcli B) ifup C) ifconfig D) ifdown
C
Which of the following commands shows the status of the SAMBA server, including which machines are connected to it and what resource is being accessed? A) smbrank B) stat C) smbstatus D) symlink
C
Which of the following is a third-party backup utility that is an open source software tool popular on both Unix and Linux distributions? A) Bacula B) Tower of Hanoi C) Amanda D) gzip
C
Which of the following is a well-defined message that includes data as well as metadata sent across networks? A) Packet header B) IP address C) Network packet D) Port
C
Which of the following is not true regarding how often you should perform backups? A) Backups typically use a different schedule for different directories. B) There is no exact rule that tells you how often to perform backups. C) Backups should always be performed on a daily basis. D) Backups can be scheduled based on how often data changes in each directory.
C
Which of the following is not true regarding zone file syntax? A) Each record consists of fields of data separated by either spaces or tabs (whitespace). B) Each line defines a record, and in most cases the end of the line is the end of the record. C) Comment lines begin with a colon (:) character and continue to the end of the line. D) When times are given in the zone file, the default time value is seconds.
C
Which of the following occurs when a fake DNS server provides incorrect data when a query is performed? A) Zone transfer B) TSIG C) DNS spoofing D) TTL
C
Which of the following permissions does the text recommend for securing the /usr/bin/crontab file? A) -rw------ B) -rwsr-xr-x C) -rwx------ D) drwx-----
C
Which of the following refers to a backup that is performed only on the files that have changed since a previous backup? A) Full backup B) Intermittent backup C) Incremental backup
C
The output for the atq command includes which of the following? A) User name B) Job number C) Date the command will execute D) All of the above
D
Which of the following backup storage locations offers decent speed and low cost, but low storage capacity? A) Remote B) Disk C) Tape D) Optical media
D
Which of the following commands allows automatic rotation, compression, removal, and mailing of log files? A) logger B) file C) grep D) logrotate
D
Which of the following commands can be used to display or modify the routing table? A) arp B) routing C) ifconfig D) route
D
Which of the following is a program that is running on the host, listening for incoming messages on a specific port number? A) Protocol B) Subnet C) Client D) Service
D
Which of the following shell settings causes a script to exit automatically if any command in the script fails? A) set -f B) set -x C) set -u D) set -e
D
Which of the following technologies can be used for a network connection? A) Wireless B) Ethernet C) Fiber optic D) All of the above
D
Which of the following zone record types is used in reverse lookup zone files to translate IP addresses into domain names? A) Address record type B) Name server record type C) Canonical record type D) Pointer record type
D