Thursday, September 16, 2004

mmm...

st
MAc OX X 10.4
FreeBSD 5.x
Tiger SMP
Spotlight RSS
Expppose widget
Dashboard 3D
iChat AV VoiceOver
.Mac sync indexing
Automator Xcode 2.0
---
==

6 Comments:

Blogger stanley2 said...

Your Comment Has Been Saved.
It may take a moment for your comment to appear on the site at the original post
Post a Comment On: stamford "Flickr"
12 Comments -Hide Original Post Collapse comments This is a test post from , a fancy photo sharing thing.
posted by stanley2 at 11:53 PM on Mar 31 2005


stanley2 said...
Most linux systems offer a display manager runlevel. What statement about
this runlevel is true?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


X11 can be started using startx in this runlevel

X11 can be started using xinit in this runlevel

X11 is started automaticly for user root

X11 is started automaticly an offers a login window

This runlevel has nothing to do with X11

7:51 AM


stanley2 said...
Question 31/34


--------------------------------------------------------------------------------



You want to configure an X11 server. For that purpose you have to enter
various information about your hardware. Which informations are necessary to
configure the server?






--------------------------------------------------------------------------------

Choose every correct answer.
Mark question for review



--------------------------------------------------------------------------------


mouse

keyboard

network adapter

monitor

printer



--------------------------------------------------------------------------------

7:52 AM


stanley2 said...
Question 30/34


--------------------------------------------------------------------------------



What would the following command search for?
find / -perm +4000






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


All files which are "unchanged" since more than 4000 minutes.

All files which are permutated more than 4000 times.

All files which are permutated more than 4000 minutes ago.

All files with a permission of at least 4000

All files which are networking sockets with a permanent connection and which have transmitted more than 4000 Bytes



--------------------------------------------------------------------------------

7:52 AM


stanley2 said...
What command is used to change group membership of a file?
(Just the command - no options
-
What would be the default file permission modes for new files
if you set umask to 027 ?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


755

640

720

027

750
-

What ist the numeric value of the permission mode drwxr-xr-T
-The user foo has got a userquota of 20 megabyte in his home directory. Now
you want to give him 40 megabyte instead. What is to do?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


Edit the file /home/quota.user with an editor

Edit the entry for /home in /etc/fstab

Use the command repquota foo

Use the command edquota foo

Use the command addquota foo 20M

7:53 AM


stanley2 said...
While monitoring the integrity of the filesystems, you detect, that there
are no more free inodes left on the /home partition although there are many
megabytes free space. What could be the reason?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


This is a typical filesystem error on ext2 partitions.

A user has created lots of very small files.

The inode table is corrupted.

There are lots of cross-linked files.

The report of many megabytes free space is wrong due to an overflow of the 32 Bit Free-Space-Variable

7:54 AM


stanley2 said...
Question 22/34


--------------------------------------------------------------------------------



What command is used to create a new filesystem on /dev/hda2 ?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


format /dev/hda2

mkform /dev/hda2

mkfilesystem /dev/hda2

mkfs /dev/hda2

fdisk /dev/hda2

Question 21/34


--------------------------------------------------------------------------------



What statement concerning the following wildcard is correct?
[A-Z]*






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


All files beginning with an uppercase letter followed by one letter

All files beginning with an non numeric letter

All files beginning with an uppercase non numeric letter

All files without numbers in their names

All files beginning with one of the letters A, Z or -



--------------------------------------------------------------------------------



How could you display any line of text from the file foo which starts
with an upcase letter?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


grep [A-Z] foo

grep "[A-Z]" foo

grep "$[A-Z]" foo

grep "^[A-Z]" foo

grep "+[A-Z]" foo

7:55 AM


stanley2 said...
Which statements concerning the tool renice are true?






--------------------------------------------------------------------------------

Choose every correct answer.
Mark question for review



--------------------------------------------------------------------------------


A normal user may only change the nice values of his own processes.

A normal user can decrease the nice value of his own processes.

Once a nice value is increased, a normal user may not decrease it, even if it is his own process.

root can change the nice-values of all processes of one user with a single command.

renice allows a normal user to fasten his processes


--------------------------------------------------------------------------------



What is a daemon-process?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


A hung process which refuses to accept keyboard input

A process which has already done its work but couldn't die due to other reasons

A process without own terminal

A process which isn't reachable by any signals

A process which isn't reachable by any signals but the KILL signal


How could you remove a not empty directory /foo?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


rmdir /foo

rmdir -rf /foo

rm -f /foo

rm -r /foo

deltree /foo

7:56 AM


stanley2 said...
What command is used to cut a big file into many smaller files (just the command - no options)?

How could you get the number of all accounts on your system, including
administrative and system accounts?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


numusers -r

wc -l /etc/passwd

count --lines /etc/passwd

userinfo -n

userinfo --get_num


Question 13/34


--------------------------------------------------------------------------------



What would the following command result in?
echo `date +%H:%M` > file






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


The string "date +%H:%M" will be written into the file

The string "`date +%H:%M`" will be written into the file

The current time (Hours:Minutes) will be written into the file

The current time (Hours:Minutes) will be written into the variable named file.

This isn't a valid command


How could you describe the following commandline?
foo || bar






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


The command foo redirect its output to the command bar.

The command foo writes its output into the file bar.

The command bar is only processed if the command foo leaves without error.

The command bar is only processed if the command foo leaves with an error.

This isn't a valid commandline

7:57 AM


stanley2 said...
How can you describe the function of the following commands?
foo | bar >> foobar






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


The command foo redirects its output to the command bar, which writes its output to foobar. If foobar exists, it will be overwritten.

The command foo redirects its output to the command bar, which writes its output to foobar. If foobar exists, the results will be appended.

The command bar gets its input from the file foo and writes its output to foobar. If foobar exists, it will be overwritten.

The command bar gets its input from the file foo and writes its output to foobar. If foobar exists, the results will be appended.

The command foo writes its output to the file bar. If this file exists foo writes into the file foobar instead


Which command would you use to get a list of all files inside the rpm-packet
foobar.rpm in /home/bob?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


rpm -ql /home/bob/foobar.rpm

rpm -ql -p /home/bob/foobar.rpm

rpm -l /home/bob/foobar.rpm

rpm -l -p /home/bob/foobar.rpm


You want to deinstall a deb packet foobar from your system. What would be a
proper command?






--------------------------------------------------------------------------------

Choose every correct answer.
Mark question for review



--------------------------------------------------------------------------------


remove foobar

remove foobar.deb

dpkg -r foobar

dselect foobar

apt-get remove foobar

7:58 AM


stanley2 said...
Which program is used to determine which shared libraries are used by a particular
other program?
You want to install the tarball foobar.tar.gz. What command would unpack the
achive?






--------------------------------------------------------------------------------

Choose every correct answer.
Mark question for review



--------------------------------------------------------------------------------


tar x foobar.tar.gz

untar foobar.tar.gz

tar tzvf foobar.tar.gz

tar xzf foobar.tar.gz

zcat foobar.tar.gz | tar xf -


Enter the full path of the LILO configuration file

7:58 AM


stanley2 said...
Which is the partition ID of a Linux Swap Partition
Which of the following programs could be used to load necessary modules when
the system detects a newly connected USB-device?






--------------------------------------------------------------------------------

Choose every correct answer.
Mark question for review



--------------------------------------------------------------------------------


usb-plug

hotplug

usb-dyn

usbmgr

usbmanager


What is the meaning of the SCSI-Address 1,5,0 ?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


The fifth device on the first SCSI-cable is deactivated

The device with SCSI-ID 5 on the second SCSI-Bus, LUN 0

A SCSI-1 device on Bus 0 with the SCSI ID 5

The first device on the fifth bus with LUN 0

This isn't a valid SCSI address


Which of the following statements are true?






--------------------------------------------------------------------------------

Choose every correct answer.
Mark question for review



--------------------------------------------------------------------------------


The LBA-mode of a harddisk is used to turn on DMA or UDMA

A harddisk with more than 1024 cylinders should be used in LBA-mode

A harddisk with more than 1.2 GByte capacity can only be used in LBA-mode

LBA-mode does not change the capacity of a harddisk

A harddisk with more than 1024 cylinders can't be mounted without LBA-mode

7:59 AM


stanley2 said...
http://www.linux-praxis.de/lpisim/lpi101sim/main.php3
Question 1/34


--------------------------------------------------------------------------------



Which harddisks should be used in LBA-mode?






--------------------------------------------------------------------------------

Choose the best answer.
Mark question for review



--------------------------------------------------------------------------------


Harddisks with more than 1024 cylinders

Harddisks with more than 1.2 GByte

Harddisks capable of UDMA66

IDE-harddisks which are used as master

IDE-harddisks which are used as slave



--------------------------------------------------------------------------------

8:03 AM


This is a test post from , a fancy photo sharing thing.
posted by stanley2 at 11:53 PM on Mar 31 2005

Leave your comment You can use some HTML tags, such as ...This blog does not allow anonymous comments.

You're currently posting as stanley2.
Or you can sign in as a different user.

8:05 AM  
Blogger stanley2 said...

....

8:08 AM  
Blogger stanley2 said...

LPI 101 TEST

1. You are writing a script to automate some tasks. You would like to be able to have a log of everything that you see printed to your console, yet you want to be able to see the output on the console as well.
What textutils command would typically be used to accomplish this?

2. The _____ daemon is needed to establish a PPP link to another computer?

3. What must be added to the following to enable group quotas for /usr ? /dev/hda2 /usr ext2 defaults 1 1

4. Which command will tell you which groups you belong to ?

5. What utility is used to verify the integrity of a filesystem? (Do not specify path or parameters)

6. What command could be used to get a hierarchical view of all the processes running on the system without requiring your to provide any switches or options ?

7. which command can setup process's priority befor process execute ?

8. Type in the command line that will execute cmd2 regardless of exit status of cmd1. Assume these commands are on the systems PATH and the command names are cmd1 and cmd2 ?

9. which command can return first few lines in a file ?

10. You want to redirect the last 30 lines of a file to another file. What single command would best fit your needs?

11. The ______ command is typically used to search files for a specified string.

12. Which of the following contains typical targets of a Makefile ?
A. Prefix, exec_prefix, bindir, mandir
B. CFLAGS, CPPFLAGS, LIBS, LDFLAGS
C. PATHS, DESTDIR, MANPAGES, CONFIGFILES
D. clean, test, install, uninstall

13. You have a system that uses LILO from the Master Boot Record. You have just recompiled a new kernel. You already have a backup kernel setup to boot from LILO so you overwrite your existing kernel with new kernel image using the same name and location. When you reboot, you find the system does not boot. What is likely to be the problem?
A. The new kernel image is above the 1024 cylinder and therefore cannot be loaded.
B. You did not update your /etc/lilo.conf file to boot the new kernel.
C. You need to boot the new kernel with a boot floppy to restore the old kernel.
D. You reboot before re-installing LILO in the Master Boot Record.

14. You are building a server that will undergo many hardware and operating system upgrades. The server is the file server for all users on your 100 user network. Which directory should have its own mountpoint and/or hard drive?
A. /boot
B. /sbin
C. /home
D. /etc

15. You have created a really long letter and after you are done you notice that you used the name "Bob" many times but you forgot to capitalize it in many instances. Which command could replace "bob" with "Bob" in all instances and generate a New letter for printing?
A. sed '/bob/Bob' letter>newletter
B. sed s/bob/Bob/ letter newletter
C. sed 's/bob/Bob/' letter>newletter
D. sed 's/bob,Bob/' letter>newletter

16. You want to examine the changelog for the installed package "postfix". Which command will display the changelog?
A. rpm -Vc postfix
B. rpm -qpil postfix
C. rpm --changelog postfix
D. rpm -q --changelog postfix
E. rpm -qa --changelog postfix

17. Your lead system administrator has just instructed you to check the GPG signature an upgrade RPM (linuxconf-1.16r10.2.i386.rpm) prior to installing it. What is the correct command to accomplish this task?
A. rpm -qV linuxconf-1.16r10.2.i386.rpm
B. rpm -Vpil linuxconf-1.16r10.2.i386.rpm
C. rpm -qpil linuxconf-1.16r10.2.i386.rpm
D. rpm --checksig linuxconf-1.16r10.2.i386.rpm
E. rpm -qp --checksig linuxconf-1.16r10.2.i386.rpm

18. After a minor security incident you are instructed by your lead sys-admin to verify the RPM's installed on a running system.
Which command will create a complete report which you can analyze for changes which may be security related ?
A. rpm -Va >report
B. rpm -Qavy >report
C. rpm -Vqt --nomd5 >report
D. rpm --checkfiles >report
E. rpm -Va --nofiles >report

19. You need to know where all the configuration files for the installed package named "postfix" are located.
Assuming it was installed with rpm, which command will list this information for you?
A. rpm -qc postfix
B. rpm -Vc postfix
C. prm --config postfix
D. rpm -listconfig postfix
E. prm -qa --config postfix

20. You have just typed the following three commands and got the folowing output:
prompt> echo $PATH
/usr/bin:/usr/local/bin:usr/sbin:opt/kde/bin
prompt> pwd
/home/anna/games
promt> ls
game1 game2 game3
You want to run the program game1, but get the response that it is not found. What did you forget to do ?
A. To type ./game1 rather than game1.
B. To switch the directory /home/anna first.
C. To unset your PATH before running the program.
D. To set execution permissions for the program game1.

21. When the kill command is given with only the PID number of the process to kill,this corresponds to which type of kill signal?
A. 2-SIGINT
B. 1-SIGHUP
C. 9-SIGKILL
D. 3-SIGOUIT
E. 15-SIGTERM

22. In the command "test < king | testking"
A. The stdout from the command testking is saved to the file test.
B. The stdout from the command test is saved to the file testking.
C. The command testking receives its stdin from the stderr of test.
D. The command testking receives its stdin from the stdout of test.
E. The command king receives its stdin from the contents of the file testking.

23. To keep a process running after you logged out, you start it with the command:
A. nohup
B. fg
C. live
D. sh

24. You have just edited /etc/syslog.conf to log error messages from the mail facility to the file /var/log/mail/errors. What else must you do to activate the change you just made?
A. nothing,it is now active.
B. touch /var/log/mailerrors
C. kill -9 `cat /var/run/syslog.pid`
D. kill -HUP `pidof syslogd`
E. touch /var/log/mailerrors;kill -HUP `syslogd`

25. You have a Linux system with a 100GB ext2 partition containing large amounts of data. To minimize the boot time, you decide to convert it to a journaling filesystem. Which journaling file system would be easiest to convert the partition to (without destroying existing data)?
A. resiserfs
B. vfat
C. ext3
D. xfs

26. You want to make sure certain directories are excluded when you update your locate database file. Where would you typically store this configuration?
A. /etc/locatedb.conf
B. /etc/slocatedb.conf
C. /etc/searchdb.conf
D. /etc/updatedb.conf

27. Which entry in /etc/fstab will allow any user to mount and unmount /dev/cdrom?
A. /dev/cdrom /cd ro,noauto,unhide, all iso9660 0 0
B. /dev/cdrom /cd iso9660 ro,noauto,nonroot 0 0
C. /dev/cdrom /cd iso9660 ro,user,noauto,unhide 0 0
D. /dev/cdrom /cd iso9660 ro,users,noauto,unhide 0 0
E. /dev/cdrom /cd iso9660 ro,noauto,defaults 0 0

28. What does the command "ln test king" typically do ?
A. It will create a symbolic link from test to king.
B. It will create a hard link from king to test.
C. It will create a symbolic link from king to test.
D. It will create a copy of the file test in king.

29. What symbol can be placed at the end of a line to indicate that the command continues on the next line?
A. /
B. \
C. ;
D. |
E. :

30. Two directories require different quota for file system usage. The /var/mail directory needs a 20MB quota, and the /home directories require a 40MB quota. What must be true about these directories?
A. They must exist on Ext3 partitions
B. They must be on different drives
C. They must be on different partitions
D. They must be mounted by the root user

31. You are writing text in vi. Now you want to save your changes and exit.
Which two sequence of inputs will accomplish this?
A. ZZ
B. :w!
C. zz
D. :wq!
E. XX

32. Which of the following commands may be used to view PCI devices seen by the Linux kernel? (Choose two)
A. less lspci
B. less /dev/pci
C. less /proc/pci
D. less /proc/devices/pci
E. lspci | less

33. which file will be ldconfig command read ?
A. /etc/ld.so.conf
B. /etc/ldconfig
C. /etc/update.db
D. /etc/cache

34. What file would you edit in your home directory to change which window manager you want to use?
A. Xinit
B. .xinitrc
C. XF86Setup
D. xstart
E. xf86init

35. Which of the following best describes the order in which X Window files are executed or read ?
A. startx -> xinit -> xinitrc -> Xclients
B. xinit -> startx -> Xclients -> xinitrc
C. xinitrc -> Xclients -> startx -> xinit
D. Xclients -> startx -> xinitrc -> xinit

36. What section of the XF86Config file contains the entry to set the path for fonts used?
A. Fonts
B. Files
C. Ttype
D. ATM
E. FontPath

37. What is the name of the default XFree86 Font Server?
A. xfs
B. xfserver
C. xfree86fs
D. Xfs
E. xfontserver

38. You have a user whose account you need to lock but not remove. To accomplish this, what file should you edit and what do you do?
A. edit /etc/gshadow and just remove his name.
B. Edit /etc/passwd and change all numbers to 0.
C. Edit /etc/shadow file and remove the last field.
D. Edit /etc/passwd and insert an * after the first :.
E. Edit /etc/group file put a # dign in front of his name.

39. The output from the jobs command in bash is :
[1] Stopped joe superbatch. 1.sort
[2]- Stopped (signal) lynx http://www.microsoft.com/
[3]+ Stopped(signal) top
Which of these commands could be used to kill the process running top?
A. kill %3
B. bg %3
C. kill -9 3
D. fg %3;kill
E. job %3 -kill

40. One of the lines in the output from the command `ls -l /home/poms` is
drwxrwxr-x 3 devel poms 1024 Oct 22 16:28 foo
The output from the command `groups bubba` is – bubba:bubba poms acts.
If user bubba executes the command `touch /home/poms/foo/bar`,which of the following must be true?(choose two)
A. The group for /home/poms/foo/bar with be poms.
B. The owner for /home/poms/foo/bar with be devel.
C. The owner for /home/poms/foo/bar with be bubba.
D. The group for /home/poms/foo/bar with be bubba.
E. The permissions for /home/poms/foo/bar will allow group read.

6:52 AM  
Blogger stanley2 said...

模擬測驗

1. How can you describe the function of the following commands? foo | xargs bar
(1) The command foo redirects its output to the command xargs. xargs writes its output to bar
(2) The command foo redirects its output to the command xargs. After that the command bar is started
(3) The command xargs gets its input by the file foo and writes its output to the file bar
(4) The command bar is started with the output of the command foo as parameters
(5) The command foo is started with the output of the command bar as parameters

2. Which of the following commands could be used to turn all characters inside a textfile into uppercase without opening the file in an editor?
Choose every correct answer.
(1) upcase
(2) recode
(3) sed
(4) tr
(5) vi

3. What would the following command result in? cp /home/foo/bar /home/bar/foo /foo
Choose the best answer.
(1) The files /home/foo/bar, /home/bar/foo, and /foo are copied into the current directory
(2) The file /home/foo/bar is copied into the directorys /home/bar/foo and /foo
(3) The files /home/foo/bar and /home/bar/foo are copied together in the file /foo
(4) The files /home/foo/bar and /home/bar/foo are copied into the directory /foo
(5) This isn't a valid commandline

4. What set of files would be affected by the following wildcard? foo.*bar
Choose every correct answer.
(1) foo.bar foo.1bar foo.2bar
(2) foobar foo.2bar foo.34bar
(3) foo.1bar foo.2bar foo.Fbar
(4) foo.1bar foo.2bar Foo.3.bar
(5) foobar foo1bar foo2bar

5. The file foo has a permission mode of -rw-------, is owned by user bar and belongs to group foobar. Which of the following commands would allow members of the group foobar to read the file?
Choose every correct answer.
(1) chmod o+r foo
(2) chmod g+r foo
(3) chmod +r foo
(4) chmod a+r foo
(5) chmod 604 foo

6.How could you change the group membership of the file foobar to group foo?
Choose the best answer.
(1) chown foo foobar
(2) chgrp foo foobar
(3) chgroup foo foobar
(4) chgrp foobar foo

7. What command sorts its input stream in alphabetic order (just the command - no options)?

8. /dev/____ ist the first logical partition of the slave on the second IDE-channel.

9. What command is used to display a textfile in reversed order?just the command,no options .

10. How can you describe the function of the following commands?複選
foo | bar >foobar
(1) The command foobar gets its input from the command bar
(2) The command bar writes its output to the file foobar
(3) The command foo writes its output to the file bar
(4) The command foo redirects its output to the command bar
(5) STDIN of foo is connected to STDOUT of bar

11. What would be the default file permission modes for new files if you set umask to 022?
(1) 755
(2) 644
(3) 664
(4) 220
(5) 550

12. Which of the following directorys have to be placed on the root partition?
複選
(1) /tmp
(2) /etc
(3) /var
(4) /bin
(5) /boot




1. What would the following command result in?
echo $(date +%H:%M)>file
(1) The string “date +%H:%M” will be written into the file.
(2) The content of the variable named “date +%H:%M” will be written into the file.
(3) The current time will be written into the file.
(4) This isn’t a valid command.

2. How would you get the number of all accounts on your system,including administrative and system accounts?
(1) numusers –r
(2) wc –l /etc/passwd
(3) count --lines /etc/passwd
(4) userinfo –n
(5) userinfo --get_num

3. What would be the result of the following command?
cp *.* /tmp
(1) All files in the current directory would be copied to /tmp
(2) All files in the current directory,which have exactly one dot inside their names would be copied to /tmp
(3) All files in the current directory,which have one or more dots anywhere inside their names but not at the beginning would be copied to /tmp
(4) All files in the current directory,which have one or more dots inside their names – but neither at the beginning nor at the end of the name would be copied to /tmp

4. Which command is not usable to install debian packages?
(1) dpkg
(2) dselect
(3) apt-get
(4) dinst

5. What tool could you use to change the nice value of a running processes?複選
(1) ps
(2) top
(3) nice
(4) renice
(5) setpriority

6. Which of the following statements are true?複選
(1) The LBA-mode of a harddisk is used to turn on DMA or UDMA
(2) A harddisk with more than 1024 cylinders should be used in LBA-mode
(3) A harddisk with more than 1.2 GByte capacity can only be used in LBA-mode
(4) LBA-mode does not change

6:56 AM  
Blogger stanley2 said...

回首頁          

LPI 102 General Linux, Part 2     

Section A

QUESTION NO: 1
On a default Linux system, what file system type does the dump command act upon?
A. Ext2
B. UFS
C. JFS
D. XFS
E. ReiserFS
Answer: A


QUESTION NO: 2
Your machine has two working NIC's with proper addresses. You want to split your network into
two new subnets. What single command will accomplish this?
A. ifconfig
B. route
C. default
D. netstat
E. None of the choices
Answer: A


QUESTION NO: 3
Which file system should never be backed up, and therefore never have to be restored?
A. ufs
B. usr
C. tmp
D. home
E. swap
Answer: E


QUESTION NO: 4
Which directory tree are you the least likely to backup or restore?
A. /tmp
B. /var
C. /proc
D. /usr
E. /usr
Answer: C


QUESTION NO: 5
What command will verify the syntax of a hosts.allow and hosts.deny file combination?
A. tcpdchk
B. verify --tcp
C. ipswitch
D. tcpdump
E. tcpdmatch
Answer: A


QUESTION NO: 6
How can you enable onscreen (non-printing) numbers in a vi session?
A. :set num
B. :set nu
C. :set -o number
D. :set +o num
E. None of the choices
Answer: B


QUESTION NO: 7
When starting vi with the file nohup.out, which of the following will enable onscreen numbers?
A. vi +/set num nohup.out
B. vi +"set nu" nohup.out
C. vi /+"set number" nohup.out
D. vi +":set num" nohup.out
E. echo "set numb" | vi nohup.out
Answer: B


QUESTION NO: 8
What command will set a regular users password to force changing it every 60 days? Choose all that
apply.
A. passwd -x 60 user1
B. chage -M 60 user1
C. passwd +x 60 user1
D. useradd -e 60 user1
E. usermod -f 60 user1
Answer: A, B


QUESTION NO: 9
Which of the following commands will flush all print jobs on all configured queues of the system?
A. lprm -a all
B. lprm -all
C. lprm -a *
D. lpflush -all
Answer: A


QUESTION NO: 10
Your /etc/passwd file appears to have approximately 1/2 shadow passwords and 1/2 standard unix
encrypted passwords. What utility would you most likely run again to fix this?
A. pwconv
B. passconvert
C. useradd -conv
D. pwhash
E. passwd -fix
Answer: A


QUESTION NO: 11
Your server has two fully functional NIC's with correct IP configuration. The server is not
forwarding traffic between the NIC's. Which command string will set the cards to forward properly?
A. setparam 1 > /proc/sys/net/ipv4/ip_autoconfig
B. echo 1 > /proc/sys/net/ipv4/ip_forward
C. set $=1 /proc/sys/net/ipv4/route
D. cat $1 > /proc/sys/net/ethernet
E. vi +/1 /proc/sys/net/unix/max_dgram_qlen
Answer: B


QUESTION NO: 12
Which of the following are valid commands to affect your system's printing?
A. lpq
B. lprm
C. lpstatus
D. lpr
E. lpio
Answer: A, B, D


QUESTION NO: 13
What configuration file is used for settings and conversion parameters for the ftp daemon?
A. ftpusers
B. ftpconvert
C. ftpconversions
D. in.ftpd
E. ftpdefaults
Answer: C


QUESTION NO: 14
Which two commands share the same database for retrieving information?
A. whatis
B. whereis
C. apropos
D. find
E. man
Answer: A, C


QUESTION NO: 15
What command will show only complete word matches for a search term?
A. whatis
B. apropos
C. locate
D. find
E. whereis
Answer: A


QUESTION NO: 16
What command will show partial word matches for a search term?
A. apropos
B. locate
C. whereis
D. whatis
E. find
Answer: A


QUESTION NO: 17
What command is the functional equivalent of the command "man -k searchterm"?
A. apropos searchterm
B. whatis searchterm
C. locate searchterm
D. find / -name searchterm
E. None of the selections
Answer: A


QUESTION NO: 18
What command is the functional equivalent of the command "man -f searchterm"?
A. whatis searchterm
B. apropos searchterm
C. locate searchterm
D. find / -name searchterm
E. None of the selections
Answer: A


QUESTION NO: 19
Where can you specify options that affect the booting of the system?
A. /etc/lilo.conf
B. boot= prompt
C. linux:
D. init 3
E. init 5
Answer: A, B


QUESTION NO: 20
Which commands will print two copies of the file to the default printer? Choose all that apply.
A. cat hosts | lpr -#2
B. lpr -K2 hosts
C. lpr -P -count 2 hosts
D. cat hosts > lpr ; cat hosts > lpr
E. for 1 in 2 lpr hosts
Answer: A, B


QUESTION NO: 21
On a default install of a Linux server, regardless of the distribution version, what are the easiest
methods to disable telnet, but not uninstall or remove the service? Choose two.
A. Comment telnet out of the /etc/inetd.conf file
B. Delete the /etc/rc.d/init.d/telnet file
C. Rename all SXXtelnet links in the /etc/rc or /etc/rc.d directories
D. Run "chmod 554 /etc/xinetd.d/telnet"
E. Nothing, it's not enabled by default
Answer: A, E


QUESTION NO: 22
Which daemon or service can be configured as a non-root user?
A. cron
B. ntp
C. lpr
D. nmbd
E. slocate
Answer: A


QUESTION NO: 23
Which of the following options will speed up traceroute for distant network queries?
A. -n
B. -p
C. -0
D. -t
E. -q
Answer: A


QUESTION NO: 24
What command could you use to confirm function of a ppp connection before establishing it?
A. minicom
B. hyperterminal
C. setserial
D. modemset
E. None of the choices
Answer: A


QUESTION NO: 25
What file on a system contains a list of hosts that can't connect to the machine's services?
A. /etc/hosts/denial
B. /etc/hosts.deny
C. /etc/host.notallow
D. /etc/inetd.conf
E. /etc/hosts.not
Answer: B


QUESTION NO: 26
Which of the following IP address ranges are considered private, according to RFC 1918? Choose all
that apply.
A. 10.0.0.0 - 10.255.255.255
B. 192.168.0.0 - 192.168.255.255
C. 172.16.0.0 - 172.31.255.255
D. 191.168.16.0 - 192.168.31.255
E. 172.16.0.0 - 172.16.255.255
Answer: A, B, C


QUESTION NO: 27
Which protocol is used for the majority of the ping command's actions?
A. ICMP
B. UDP
C. TCP
D. NDP
E. NCP
Answer: A


QUESTION NO: 28
What modprobe option will cause inactive kernel modules to be unloaded?
A. autoclean
B. inactive
C. remove
D. timeout
E. holdoff
Answer: A


QUESTION NO: 29
Select all of the protocols that are supported by the Linux implementation of ppp.
A. chap
B. mschap
C. pap
D. spap
E. eap
Answer: A, B, C


QUESTION NO: 30
What command with options will cause the redirection symbol (>) to fail to overwrite the contents of
an existing file?
A. set -o noclobber
B. set +o nooverwrite
C. export OVERWRITE=no
D. alias >='!>'
E. None of the choices
Answer: A


QUESTION NO: 31
Where can the lilo command install the boot menu and information? Choose all that apply.
A. Master Boot Record
B. BIOS
C. First Sector of a Partition
D. BootBlk
E. Boot Prom
Answer: A, C


QUESTION NO: 32
Which of the following is not a valid make command during a kernel recompile?
A. make dep
B. make clean
C. make xconfig
D. make modules
E. make gzlilo
Answer: E


QUESTION NO: 33
Which parameters should appear in a valid /etc/printcap file to allow a local printer queue to point to
another machine's print queue? Choose two.
A. rm
B. rp
C. remoteip
D. netprinter
E. netip
Answer: A, B

QUESTION NO: 34
Which of the following commands will print the file putty on the printer hplaserj? Choose all that
apply.
A. lpr -P hplaserj -F putty
B. lpr -Phplaserj putty
C. lpc printer=hplaserj file=putty
D. lpr -p hplaserj putty
E. lpr -P hplaserj putty
Answer: B, E


QUESTION NO: 35
Which of the following services would you be least likely to configure to be governed over by the
Internet Super Server?
A. ftp
B. telnet
C. ssh
D. finger
E. bind
Answer: C


QUESTION NO: 36
What ppp option governs how long an interrupted connection will remain down before it attempts to
reconnect?
A. holddown
B. holdoff
C. inactive
D. delay
E. wait
Answer: B


QUESTION NO: 37
What files affect the functioning of TCP Wrappers? Choose Two.
A. /etc/hosts.deny
B. /etc/nsswitch.conf
C. /etc/security/authconfig
D. /etc/default/clients
E. /etc/hosts.allow
Answer: A, E


QUESTION NO: 38
You are not using the WINS service on your network, but need to provide NETBIOS resolution to
your hosts. What is the name of the daemon that provides these services on a Linux server?
A. nmbd
B. dns
C. winsd
D. lmhostsd
E. smbd
Answer: A


QUESTION NO: 39
Select from the list below the daemons that are present on a standard Linux server to support routing.
Choose all that apply.
A. gated
B. ripd
C. routed
D. ospfd
E. bgpd
Answer: B, C, D, E


QUESTION NO: 40
You are performing an onsite security inspection of division of your company. On an Apache server,
you want to determine what files are needed and which can be removed from the /etc/httpd folder.
Which of the following are possibly valid Apache confguration files? Choose all that apply.
A. httpd.conf
B. apached.conf
C. srm.conf
D. access.conf
E. in.http.conf
Answer: A, C, D


QUESTION NO: 41
In order to allow a Win95 host to resolve the name of and map network drives to your Linux server,
what services should be running? Choose Two.
A. nmbd
B. smbd
C. named
D. routed
E. winsd
Answer: A, B


QUESTION NO: 42
What is the simplest method to connect a Win98 host to a Linux Server? Choose all that apply.
A. Velcro
B. Samba
C. NFS
D. DNS
E. WINS
Answer: A, B


QUESTION NO: 43
What files affect the name resolution functionality of a Linux host? Choose Three.
A. /etc/resolv.conf
B. /etc/hosts
C. /etc/default/names
D. /etc/nsswitch.conf
E. /etc/inet/hosts
Answer: A, B, D


QUESTION NO: 44
What is true about the root user and NFS?
A. NFS shares don't allow root access by default
B. NFS automatically masks out share permissions
C. NFS automatically maps all root UID's to the local user "rootsquash"
D. NFS ignores all users with a UID of 0 and a GID of 0
E. NFS pays no attention whatsoever to security
Answer: A


QUESTION NO: 45
Where are the default settings for the useradd command kept?
A. /etc/default/useradd
B. /etc/sysconfig/useradd.cfg
C. /etc/.useradd
D. /etc/defaults/useradd
E. /etc/login.defs
Answer: A


QUESTION NO: 46
What two files acting together make up the login environment for a user on a default install of Linux?
A. /etc/profile
B. /etc/bashrc
C. /etc/.login
D. ~/.bash_profile
E. /etc/.profile
Answer: A, D


QUESTION NO: 47
What protocol will allow you to keep accurate time on your hosts?
A. ntp
B. nntp
C. ncftp
D. inn
E. ntime
Answer: A


QUESTION NO: 48
What will the following line in the /etc/exports file do?
/data snowblower(rw) badhost (ro)
A. Give snowblower rw access to the data share, deny badhost any access, and allow ro for all other
hosts
B. Give snowblower rw access to the data share, give badhost ro access to share and deny all others
C. Give snowblower no access to the data share, give badhost rw access and set ro access for all others
D. Cause a syntax error
Answer: A


QUESTION NO: 49
You've just finished editing a new entry in the /etc/exports file. Which of the following will cause the
changes to take effect without interrupting current connected users or rebooting the machine?
Choose all that apply.
A. exportfs -a
B. /etc/rc.d/init.d/nfs restart
C. service nfs restart
D. kill -1 HUP nfs
E. init 1
Answer: A


QUESTION NO: 50
What system file contains definitions of well known ports, their associated services and protocols?
A. /etc/services
B. /etc/sysconfig/network-scripts
C. /etc/services.conf
D. /etc/inet/hosts
E. None of the choices
Answer: A


QUESTION NO: 51
What file should be edited to make the system aware of newly added library files?
A. /etc/modules.conf
B. /etc/conf.modules
C. /etc/ld.so.conf
D. /etc/ld.so.cache
E. /etc/LD_LIBRARY_PATH.conf
Answer: C


QUESTION NO: 52
What is the binary conversion of the IP address 192.168.1.10?
A. 11000000.10101000.00000001.00001010
B. 01101010.11000100.10101000.00000001
C. 00000001.00001010.11000000.10101000
D. 10101000.00000001.00001010.11000000
E. None of the choices
Answer: A


QUESTION NO: 53
Your investigation of a system turns up a file that contains the line below:
find /home -iname .rhosts -exec rm -f {} \;
What is the purpose of this script?
A. To enhance system security
B. To remove all program error dumps
C. To remove all temporary files in the user's home directories
D. To reset the configuration for the rsh and rexec utilities
Answer: A


QUESTION NO: 54
What command will convert your shadow password file to md5 compatible passwords?
A. passconv
B. pwconv
C. mdconv
D. mdsum
E. passwd --convert
Answer: B


QUESTION NO: 55
Your machine's IP address used to function, but it's only got the localhost "lo" entry now. What
three client-mode commands could you possibly use to get a new DHCP address?
A. dhcpd
B. ipconfig
C. dhclient
D. pump
E. dhcpcd
Answer: C, D, E


QUESTION NO: 56
Which two services resolve Netbios names to IP addresses?
A. WINS
B. NetbiosSVC
C. smbd
D. nmbd
E. DNS
Answer: A, D


QUESTION NO: 57
Which daemon allows Linux to share it's file systems and printers with unmodified Windows clients?
A. X Window
B. nmbd
C. smbd
D. WINS
E. NFS
Answer: C


QUESTION NO: 58
What configuration files on a Linux Server can be configured to share file systems with clients?
Choose Two.
A. /etc/nmbd
B. /etc/smbd
C. /etc/smb/samba.conf
D. /etc/smb.conf
E. /etc/samba/smb.conf
Answer: D, E


QUESTION NO: 59
What command is used to monitor connections to the SMB server?
A. smbclient
B. testparm
C. smbstatus
D. smbstat
Answer: C


QUESTION NO: 60
Which of the following will run a file named myscript every 23 minutes past midnight every two
hours?
A. 23 0-23/2 * * * /myscript
B. 23 */0-23 * * * /myscript
C. 23 @2 * * * /myscript
D. 11 2/0-23 * * * /myscript
Answer: A


QUESTION NO: 61
Which backup method resets the archive bit? Select all that apply.
A. Full
B. Incremental
C. Differential
D. Copy
E. DirTree
Answer: A, B


QUESTION NO: 62
Which backup method will require the minimum tapes to restore?
A. Full
B. Incremental
C. Differential
D. Copy
E. DirTree
Answer: A


QUESTION NO: 63
What is the command to map a Windows user ID to a Linux user ID for use with the Samba Server?
A. smbuser
B. smbpasswd
C. smbadduser
D. useraddsmb
E. useradd
Answer: C


QUESTION NO: 64
When using the PPP daemon make a connection, what option is set to configure it to use hardware
flow control?
A. crtscts
B. rsync
C. nsync
D. connect
Answer: A


QUESTION NO: 65
When using pppd which authentication protocol is the most secure?
A. clear text
B. PAP
C. CHAP
D. LAP
Answer: C


QUESTION NO: 66
Your DNS server needs to be configured for speed and security. Choose the best answer.
A. Disable inetd, run named standalone, only allow tcp on ports 25 and 53
B. Disable inetd, run named standalone, only allow tcp on ports 25 and 110
C. Enable inetd, run named as an inetd service, only allow tcp on ports 25 and 53
D. Disable inetd, run named as a standalone on the apache server.
Answer: A


QUESTION NO: 67
Shares can be configured for export via the NFS service by editing what file?
A. /etc/exports
B. /etc/export
C. /etc/exportfs
D. /etc/nfs/exports
Answer: A


QUESTION NO: 68
A file exists on a server, but has no content. Users cannot submit jobs to an attached printer. Choose
the correct file that must be edited to fix this problem.
A. /etc/hosts
B. /etc/hosts.allow
C. /etc/host.deny
D. /etc/hosts.lpd
E. /var/spool/hosts.lpd
Answer: D


QUESTION NO: 69
What does "make bzImage" do as opposed to "make zImage"?
A. makes a bz encrypted kernel
B. makes a kernel with a better compression ratio
C. makes a kernel with built in gzip application
D. nothing
Answer: B


QUESTION NO: 70
In the following output, which is representative of the host performing gateway functions?
Destination    Gateway    Genmask     Flags   Metric  Ref Use   Iface
10.3.3.0     192.168.1.1  255.255.255.255   UGH    0   0   0    eth0
192.168.1.0     *      255.255.255.0     U     0   0   0   eth0
192.168.77.0     *     255.255.255.0     U     0   0   0   vmnet1
127.0.0.0      *      255.0.0.0        U     0   0   0    lo
default     192.168.1.1   0.0.0.0       UG     0   0   0   eth0
A. The default gateway is on 192.168.77.0 network
B. The current host is the also the default gateway
C. Its eth0 interface is incorrectly configured
D. The 192.168.1.1 is the default gateway
Answer: B


QUESTION NO: 71
Select the files that are associated with TCP Wrappers. Choose all that apply.
A. /etc/hosts
B. /etc/hosts.allow
C. /etc/hosts.deny
D. /etc/allow.hosts
E. /etc/allow.deny
Answer: B, C


QUESTION NO: 72
Which file is responsible for configuring the inet daemon?
A. /etc/inetd.conf
B. /etc/xinetd.conf
C. /etc/tcpd.conf
D. /etc/inet.conf
Answer: A


QUESTION NO: 73
Which option in the /etc/fstab file causes all users IDs to be mapped to the system's anonymous ID
when mounting a NFS mounted file system?
A. no-root-squash
B. all-squash
C. all-id-squash
D. root-squash
Answer: B


QUESTION NO: 74
Which fstab option governs that all root ID are mapped to anonymous ID when mounting a NFS
mounted file system?
A. no-root-squash
B. root-squash
C. all-squash
D. squash-root
Answer: B


QUESTION NO: 75
What command would load the module msdos.o and all its dependancies?
A. modinfo -a msdos
B. lsmod -a msdos
C. modprobe msdos
D. insmod -d msdos
Answer: C


QUESTION NO: 76
You have just added new modules to your system. What command would you execute to rebuild the
modules.dep file?
A. depmod --rebuild
B. update-dependancies
C. depmod -a
D. insmod -dependancies
Answer: C


QUESTION NO: 77
Which port is used for DNS
A. 110
B. 21
C. 23
D. 52
E. 53
Answer: E


QUESTION NO: 78
Which ports are used for FTP data and control? Choose Two.
A. 20
B. 23
C. 22
D. 21
E. 25
Answer: A, D


QUESTION NO: 79
What command would rebuild the ld.so.cache file
A. ldd
B. ldconfig
C. ld.so.cache -rebuild
D. ld
Answer: B


QUESTION NO: 80
On a debian system which of the following would build a boot disk
A. mkboot /dev/floppy
B. makeboot --device /dev/fd0 2.4.18-12
C. mkboot --device /dev/fd0 2.4.18-12
D. mkboot /boot/vmlinux-2.4.18-12
E. mkbootdisk /boot/vmlinux-2.4.18-12
Answer: D


QUESTION NO: 81
What configuration file and directive will alter your apache server IP and or port that it listens to?
A. Port
B. IPAddress
C. Listen
D. MinSpareServers
Answer: C


QUESTION NO: 82
What Apache directive must you change when using inetd to control your Apache server?
A. ServerType
B. ServerInetd
C. InetServer
D. StartServer
E. ServerMethod
Answer: A


QUESTION NO: 83
Which Apache Directive specifies the location of the HTTP documents?
A. RootDocument
B. ServerRoot
C. DocumentRoot
D. RootServer
E. DocPath
Answer: C


QUESTION NO: 84
What command can be used to shut down the Apache server gracefully
A. apacheshut
B. apachectl
C. apachestop
D. apachestart
Answer: B


QUESTION NO: 85
What is the recommended setting for StartServers in a medium sized Apache installation?
A. 5
B. 10
C. 15
D. 20
Answer: B


QUESTION NO: 86
Your server logfile shows repeated connections to TCP port 143, What service is being accessed?
A. smtp
B. imap
C. pop3
D. pop2
E. nmbd
Answer: B


QUESTION NO: 87
To learn more about the management or ownership of a website, what's the best utility to use?
A. tracert
B. traceroute
C. whois
D. ping
E. telnet
Answer: C


QUESTION NO: 88
You have a Linux system routing 3 networks through 3 separate NICs and are having trouble with
your IP forwarding. What file would you check to ensure that IP forwarding is enabled?
A. /etc/defaultrouter
B. /proc/net/tcp
C. /proc/sys/net/ipv4/ip_forward
D. /var/log/messages
Answer: C


QUESTION NO: 89
What command would cause a print job to be printed next regardless of its current position in the
queue.
A. lpc topq
B. lpc -t
C. lpq -t
D. lpc move
E. lpq --next
Answer: A


QUESTION NO: 90
Which two files are responsible for allowing users to execute cron jobs?
A. /etc/cron.allow
B. /var/spool/cron.allow
C. /var/spool/cron.allow
D. /etc/cron.deny
Answer: A, D


QUESTION NO: 91
What file must you create in your home directory in order to enable mail forwarding?
A. .redirect
B. .forward
C. .plan
D. .mail
E. None of the choices
Answer: B


QUESTION NO: 92
What command will tell you which groups you belong to?
Answer: groups


QUESTION NO: 93
The correct crontab entry in the minutes column to create a command in cron that runs every two
minutes would be _____.
Answer: */2


QUESTION NO: 94
What is a filesystem type the dump utility can work with?
Answer: ext2


QUESTION NO: 95
What one filesystem should you never restore (and therefore not backup): _______.
Answer: swap


QUESTION NO: 96
You use the public NTP server time.nist.gov to make sure your system clock is accurate before using it
to adjust your hardware clock.
Complete the following command to accomplish this:
______ time.nist.gov
Answer: server


QUESTION NO: 97
To slave your NTP daemon to an external source, you need to modify the ______ variable in your
/etc/ntp.conf file.
Answer:


QUESTION NO: 98
NTP is used to synchronize the system ____ with a central system resource.
Answer: clock


QUESTION NO: 99
Which of the following IP networks does RFC1918 reserve for use on private intranets? (Choose two)
A. 10.0.0.0
B. 224.0.0.0
C. 199.14.0.0
D. 172.152.0.0
E. 192.168.0.0
Answer: A, E


QUESTION NO: 100
The _____ is used by the local host to determine which hosts are on the local subnet, and which hosts
are on remote networks.
A. DNS
B. ARP
C. gateway
D. netmask
E. routing protocol
Answer: D


QUESTION NO: 101
Which protocol is used by ping?
A. TCP
B. UDP
C. SMB
D. ICMP
E. OSPF
Answer: D


QUESTION NO: 102
What is the command most often used for configuring network interfaces?
Answer: ifconfig


QUESTION NO: 103
On a system using shadowed passwords, the correct permissions for /etc/passwd are ____- and the
correct permission for /etc/shadow are _______.
A. -rw-r-----, -r--------
B. -rw-r--r--, -r--r--r--
C. -rw-r--r--, -r--------
D. -rw-r--rw-, -r-----r--
E. -rw--------, -r-------
Answer: C


QUESTION NO: 104
Identify the statement that would create a default route using a gateway of 192.168.1.1
A. netstat-add default gw
B. route default 192.168.1.1
C. ip route default 192.168.1.1
D. route add default gw 192.168.1.1
E. ifconfig default gw 192.168.1.1 eth0
Answer: D


QUESTION NO: 105
If you suspect that a gateway machine on your network has failed but you are unsure which machine,
which command will help locate the problem?
A. ps
B. netstat
C. nsloopup
D. ifconfig
E. traceroute
Answer: E


QUESTION NO: 106
According to the PPP HOWTO which piece of software could help you test a modem?
A. chat
B. dhcpd
C. minicom
D. Hylafax
E. netconfig
Answer: C


QUESTION NO: 107
Suppose that the command netstat-a hangs for a long time without producing output.
You might suspect:
A. A problem with NFS
B. A problem with DNS.
C. A problem with NIS.
D. A problem with routing.
E. That the netstat daemon has crashed.
Answer: E


QUESTION NO: 108
You build and configured a bastion host to act as a router between two internal networks. Both eth0
and eth1 can see hosts on their respective networks, but the hosts on each network cannot see any
hosts on the other network. After verifying that the hosts have the correct gateway route, you decide
the bastion host does not have IP forwarding turned on.
To check this cat the file /proc/sys/net/ipv4/ _______ to ensure it has a 1.
Answer: ip_forward


QUESTION NO: 109
When using /etc/ppp/peers/* files, which of the following is true:
A. The /etc/ppp/options should be empty.
B. Any user can run pppd from the command line.
C. The dial-on-demand option cannot be used.
D. You must use chap authentication.
Answer: A


QUESTION NO: 110
You want a secure and fast DNS server that must also be quickly accessible remotely.
You should:
A. Reject all udp packets.
B. Reject all icmp packets.
C. Reject all icmp untrusted-host packets.
D. Disable inetd, run ssh and named as standalone daemons.
E. Use tcpwrappers to only allow connections to ports 22 and 53.
Answer: D, E


QUESTION NO: 111
To disable telnet service on a system, which action should you take?
A. Put NONE in /etc/telnet.allow
B. Remove the appropriate telnet init script.
C. Put a line ‘ALL:ALL’ in /etc/hosts.deny
D. Comment the telnet entry in /etc/inittab
E. Comment the telnet entry in /etc/inetd.conf
Answer: E


QUESTION NO: 112
In what file are the mail aliases kept for Sendmail? (Provide the complete path)
A. /etc/aliases
B. /etc/mailaliases
C. /etc/sendmail.aliases
D. /etc/sendmail/aliases
E. /var/spool/mail/aliases
Answer: A


QUESTION NO: 113
What directory be default contains the delivered mail for each user?
A. ~/mail/
B. /usr/mail/
C. /var/mail/
D. /var/mail/spool/
E. /var/spool/mail/
Answer: E


QUESTION NO: 114
Of the ways listed, which is the best way to temporarily suspend a user’s ability to interactively login?
A. Changing the user’s UID.
B. Changing the user’s password.
C. Changing the user’s shell to /bin/false.
D. Removing the user’s entry in /etc/passwd.
E. Placing the command logout in the user’s profile.
Answer: C


QUESTION NO: 115
How many spare server processes are required by Apache for the typical, low-to-moderate volume
website?
A. 1
B. 50
C. 10
D. 200
Answer: C


QUESTION NO: 116
Which of the following files typically are used to configure Apache? (Choose two)
A. srm.conf
B. www.conf
C. http.boot
D. httpd.conf
E. apache.conf
Answer: A, D


QUESTION NO: 117
What file contains a list of directories for an NFS daemon to server to other systems? (Provide the
complete answer)
Answer: /etc/exports


QUESTION NO: 118
What are reverse DNS entries used for?
A. Reverse DNS enable diagnostic commands like traceroute to work.
B. Reverse DNS gives you information about the owner of the DNS entry.
C. Reverse DNS provides the hostname for a particular numeric IP address.
D. Reverse DNS provides geographical information about the DNS net location.
Answer: C


QUESTION NO: 119
You decide to use xinetd instead of inetd.
What must be done in order to properly configure xinetd?
A. You must create a new configuration file for xinetd.
B. You must add xinetd to /etc/services.
C. You must add xinetd support to your tcpwrappers configuration files.
D. Nothing, xinetd uses the same configuration files as inetd.
Answer: D


QUESTION NO: 120
To avoid spammers using your mail server to relay their messages, you need to ________________.
A. Disable the relay control in /etc/aliases
B. Set up a ruleset for this in /etc/sendmail.cf
C. Set up relay control in your DNS’s MX record.
D. Recompile sendmail with the –NORELAY flag.
Answer: B


QUESTION NO: 121
You have a standard Apache web server installation and want to make it respond to requests on port
8088. To do this, what configuration file do you need to change?
A. None. This is the default port.
B. /etc/httpd/apache.conf
C. /etc/httpd/ports.conf
D. /etc/httpd/httpd.conf
E. /etc/httpd/access.conf
Answer: D

QUESTION NO: 122
This is a line from the file /etc/export:
/product testking(rw)
What does it mean?
A. Only user testking may access the filesystem /product when it is NFS mounted.
B. This computer will mount the filesystem /product on testking via NFS.
C. The filesystem /product is exported for NFS mount to computer testking.
D. All NFS access to /product will use suid testking.
Answer: C


QUESTION NO: 123
These lines are taken from /etc/smb.conf:
workgroup = group1
guest account = nobody
What else is needed for this to work?
A. nobody must be a valid group on the server.
B. nobody must be a user name listed in /etc/passwd.
C. group1 must be a valid group on the server.
D. workgroup must be a valid group on the server.
Answer: B


QUESTION NO: 124
What file determines the DNS servers used by your computer?
A. /etc/hosts
B. /etc/named.conf
C. /etc/nsswitch.conf
D. /etc/resolv.conf
Answer: D

QUESTION NO: 125
In what file do you change default shell variables for all users?
A. /etc/bashrc
B. /etc/profile
C. ~/.bash_profile
D. /etc/skel/.bashrc
E. /etc/skel/.bash_profile
Answer: A


QUESTION NO: 126
This is the file /etc/named.boot from the computer named tellus with IP address 128.66.12.10.
directory                           /etc
secondary      testking.com     128.66.12.      testking.com.hosts
secondary   66.128.IN-ADDR.ARPA    128.66.12.5      128.66.rev
primary    0.0.127.IN-ADDR.ARPA             named.local
cache                           named.ca
From this file, you know that:
A. tellus is the primary DNS server for domain testking.com.
B. There is a secondary DNS server for domain testking.com at the IP address 128.66.12.5.
C. tellus is a secondary DNS server for domain testking.com and it downloads the domain data from the
server at IP address 128.66.12.5.
D. The server at IP address 128.66.12.5 is allowed to download domain and reverse lookup data from
tellus.
Answer: B


QUESTION NO: 127
The files /etc/hosts.allow, /etc/hosts.deny and /etc/nologin all exist on your
computer, and the sshd daemon is running.
What will happen when users try to connect with ssh?
A. Only connections from computers specified in /etc/hosts.allow will be allowed to log in.
B. Only root will be allowed to log in.
C. All users not specified in /etc/hosts.deny will be allowed to log in.
D. No user will be allowed to log in.
Answer: B

6:57 AM  
Blogger stanley2 said...

/ \ / \
\o/
| \o__ __o o__ __o o__ __o
< > | |> /v |> /v |>
| / \ < > /> // /> //
o \o/ \o o/ \o o/
<| | v\ /v __o v\ /v __o
/ \ / \ <\/> __/> <\/> __/>

more figlet examples

7:26 AM


stanley2 said...
figlet examples
Stanford
____ _ __ _
/ ___|| |_ __ _ _ __ / _| ___ _ __ __| |
\___ \| __/ _ | '_ \| |_ / _ \| '__/ _ |
___) | || (_| | | | | _| (_) | | | (_| |
|____/ \__\__,_|_| |_|_| \___/|_| \__,_|

Stanford
_
() | | |
/\_|_ __, _ _ | | __ ,_ __|
/ \| / | / |/ | |/ / \_/ | / |
/(__/|_/\_/|_/ | |_/|__/\__/ |_/\_/|_/
|\
|/
Stanford

7:39 AM  

Post a Comment

<< Home