Lab 1-1 Q&A

Ace your homework & exams now with Quizwiz!

When examining a Linux kernel version number of 4.18.8, what is the minor number? A. 4 B. 18 C. 8 D. None of these

B. 18

When examining a Linux kernel version number of 4.18.8, what is the revision number? A. 4 B. 18 C. 8 D. None of these

C. 8

What is the core component of the Linux GUI? A. Desktop B. X-Windows C. Ubuntu D. None of these

B. X-Windows

Linux is freely developed and considered open source software. It is covered under this public license. A. OSI B. LUA C. GNU D. PST

C. GNU

A Linux developmental kernel is classified as -rc2. What does this indicate? A. It is stable B. Ready for production C. Needs more testing D. A and B only

C. Needs more testing

When installing the latest Linux version, you can choose Red Hat, Ubuntu, GNOME or KDE distributions. Which of the choices will be common to all distributions? A. GUI B. Desktop C. Bootloader D. Kernel

D. Kernel

Which choice identifies a compressed archive of files that can be installed on a Linux system without updating the central software database? A. RPM B. DPM C. Pacman D. Tarball

D. Tarball

What is the total cost of the software needed to install a native Linux server? A. $0 B. Less than $100 C. Less than $1000 D. Varies according to configuration

A. $0

When examining a Linux kernel version number of 4.18.8, what is the major number? A. 4 B. 18 C. 8 D. None of these

A. 4

Which of the choices is NOT used to identify a Linux kernel version? A. Name B. Major Number C. Minor Number D. Revision Number

A. Name

On which distribution is the Ubuntu Linux distribution based? A. Red Hat B. Debian C. Gentoo D. Arch

B. Debian

When using an Internet browser in Linux to reach a website, how is the address www.linux.org handled? A. It is a FQNN and goes directly to the site B. It is FQDN and is translated by DNS C. It is a FQDN and is translated by DHCP D. None of these are correct

B. It is FQDN and is translated by DNS

Which term describes the security analysis that attempts to break into systems to test the strength of the system? A. Vulnerability assessment B. Penetration test C. Cyber attack D. None of these

B. Penetration test

The most common method of Linux clustering is known as ____________ clustering.

Beowulf

A Linux server can NOT provide which of the services listed? A. NTP B. FTP C. DHCP D. MTA E. All of these can be provided

E. All of these can be provided


Related study sets

Ch. 21 Antidepressant Agents, Ch. 21 - Antidepressant Agents, Pharmacology - Prep U - Chapter 21

View Set

Chapter 21 - Reaction, Revolution, and Romanticism

View Set

ATI Testing and Remediation Beginning

View Set

Life Insurance: Provision, Options, and Riders Quiz

View Set

GSC 3: Sustainability of supply chains

View Set