You are on page 1of 17

25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

Review Test Submission: Practice Quiz

User Kiran Gautam


Course Linux Server Administration
Test Practice Quiz
Started 25/08/17 00:30
Submitted 25/08/17 00:58
Status Completed
Attempt Score 25 out of 60 points
Time Elapsed 27 minutes out of 1 hour
Instructions 60 Questions Quiz

Results All Answers, Submitted Answers, Correct Answers, Feedback, Incorrectly Answered
Displayed Questions

Question 1 0 out of 1 points

Which of the following incoming email checks is NOT a recommendation for email server operations to
improve email reliability and security?

Selected Answer: Check that the sender's SPF record is OK

Answers: Check that the received email is not unsolicited

Check that the sender's SPF record is OK

Check that a received email does not contain malware

Check that the email senders site is not on a blacklist

Question 2 0 out of 1 points

A DNS server configured to be recursive will . . .

Selected Answer: Return to the client a suggestion of where next to query.

Answers: Only return authoritative answers.

Query other servers on the clients behalf.

Return to the client a suggestion of where next to query.

Cache DNS server queries only.

Question 3 0 out of 1 points

What is the /proc directory?

Selected A pseudo fileystem used by the kernel to prioritise running processes.


Answer:
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 1/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

Answers: A special part of the filesystem for storing large binary objects.

A pseudo filesystem in which the kernel exposes a variety of interesting information


about he system's state.

A part of the fileystem used to provide printing services.

A pseudo fileystem used by the kernel to prioritise running processes.

Question 4 1 out of 1 points

The arp command . . . .

Selected Answer: Examines and manipulates the kernels hardware to logical address table.

Answers: Examines and manipulates the kernels hardware to logical address table.

Is used to discover a hardware address by sending out a broadcast frame.

Is used to configure system routing information.

Is used to configure a systems IP address.

Question 5 0 out of 1 points

Which of the following commands would you use to examine the routing tale on a Linux machine?

Selected Answer: ifconfig -r

Answers: ifconfig -r

arp -a

mpstat -r

netstat -r

Question 6 0 out of 1 points

Which of the following statements is correct?

Selected
Answer: Caching name servers can be authoritative for their own sub domain but not for other
zones.

Answers: Only the master DNS server is authorative.

A client of a recursive name server must be prepared to accept and act on referrals.

Caching name servers can be authoritative for their own sub domain but not for other
zones.

The DNS specification requires at least two authoritative servers for each domain.

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 2/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

Question 7 0 out of 1 points

Linux processes have which communication channels available to use?

Selected
Answer: standard input (STDIN), standard output (STDOUT) and standard system (STDSYD)

Answers: standard input (STDIN), and standard output (STDOUT) only

standard input (STDIN), standard output (STDOUT), and standard error (STDERR)

standard input (STDIN), standard output (STDOUT) and standard system (STDSYD)

standard input (STDIN), standard output (STDOUT) and standard redirect (STDRED)

Question 8 0 out of 1 points

An RFC (requests for comments) . . .

Selected Answer: Is a request for change to a feature in a Linux distribution.

Answers: Is a request for change to a feature in a Linux distribution.

Are reviewed and updated on a bi-annual basis.

Are protocol standards, proposed changes and information buttetins.

Are only reponded to by the Internet Society (ISOC)

Question 9 1 out of 1 points

Which of the following is NOT a valid email header property?

Selected Answer: Mime:

Answers: Date:

Return-Path:

Mime:

To:

Question 10 1 out of 1 points

Which of the following techniques can NOT be used to provide virtual web server interfaces?

Selected Use cookies to manage web server multiple virtual interfaces.


Answer:
Answers: Configure the physical server and web server to use multiple virtual network
interfaces.

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 3/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
Configure the web server to use name-based virtual hosts.

Use cookies to manage web server multiple virtual interfaces.

Both a) and b)

Question 11 0 out of 1 points

Which of the following is NOT a valid SMTP command?

Selected Answer: EHLO

Answers: HELO

LOGOUT

EHLO

DATA

Question 12 1 out of 1 points

CGI, Common Gateway Interface, provides for dynamic HTTP content by:

Selected Specifying how HTTP servers can exchange information with other programs.
Answer:
Answers: Defining a programming language that a HTTP server can use to generate dynamic
content.

Specifying how HTTP servers can exchange information with other programs.

Defining direct database connections that provide dynamic content delivery.

Specifying the formal of dynamic content delivery to the web client.

Question 13 0 out of 1 points

When monitoring processes on a Linux system . . .

Selected top is more accurate than ps for process monitoring


Answer:
Answers: ps can be used to monitor basic process information, but top must be used to obtain
detailed process information.

ps can be used to monitor a users processes, prstat must be used to monitor system
processes.

ps can be used to identify processes that use excessive CPU time

top is more accurate than ps for process monitoring

Question 14 1 out of 1 points


https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 4/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

In Linux process management . . .

Selected
Answer: When a process is cloned, the original process is referred to as the parent, and the copy
is called the child.

Answers: When a process is created it is allocated the same process ID as it's parent.

When a process is cloned, the original process is referred to as the parent, and the copy
is called the child.

A process is allocated an ID each time it enters a running state.

User allocated process ID's can be used to manage process states.

Question 15 1 out of 1 points

Which of the following contains which filesystems are exported and which clients can mount them?

Selected Answer: /etc/exports

Answers: /etc/fstab

/etc/mountd

/etc/chmod

/etc/exports

Question 16 1 out of 1 points

The /etc/shadow file . . . .

Selected Answer: Is readable only by the superuser and is used to store encrypted passwords.

Answers: Contains a copy of a users environment variables and configuration

Is used for process management.

Is used to configure a users shell environment.

Is readable only by the superuser and is used to store encrypted passwords.

Question 17 0 out of 1 points

Which file permissions will allow for owner - read, write and execute: group - read and write: other read
only?

Selected Answer: r--rw-rwx

Answers: rwxrw-r--

r-xrw-r--

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 5/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

r--rw-rwx

rwxrwxr--

Question 18 1 out of 1 points

What is the purpose of Named Pipes?

Selected Answer: They allow communicaiton between two processes running on the same host.

Answers: They are symbolic links to files on the filesystem.

They provide communication through to logging services.

They build binary objects on the filesystem.

They allow communicaiton between two processes running on the same host.

Question 19 1 out of 1 points

To add new software to a Linux system . . .

Selected Answer: You can use a software installer to install a precompiled software package.

Answers: You can use a software installer to install a precompiled software package.

You need to download the application source code and compile it.

You first need to purchase a license for the software.

You must obtain additional software from the same source as your Linux distribution.

Question 20 0 out of 1 points

Which of the following statements is correct?

Selected All shell scripts use the bash shell.


Answer:
Answers: All shell scripts use the bash shell.

Shell scripts can only be used to automate simple administrative tasks.

Administrative shell scripts should emphasise programmer efficiency and code clarity
rather than computational efficiency.

Scripting can only occur using shell scripts.

Question 21 0 out of 1 points

What is the Start of Authority (SOA ) record for in DNS?

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 6/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

Selected Answer: It is used to configure DNS Security

Answers: It marks the end of a DNS zone file.

It marks the beginning of a DNS zone.

It is used to configure a DNS Cache

It is used to configure DNS Security

Question 22 0 out of 1 points

Which of the following statements is correct?

Selected Answer: Absolute path names are limited for use by only the kernel.

Answers: Relative path names start at the root /

Relative path names are interpreted starting at the current directory.

Absolute path names are interpreted starting at the current directory.

Absolute path names are limited for use by only the kernel.

Question 23 0 out of 1 points

Which of the following is a correct statement?

Selected Answer: HTTP is an unreliable client/server protocol.

Answers: HTTP is a stateless, unreliable protocol.

HTTP is an unreliable client/server protocol.

HTTP is a stateless, client/server protocol.

HTTP is a reliable, statefull protocol.

Question 24 0 out of 1 points

Which of the following is an advantage of using content distribution networks for serving web content?

Selected
Answer: It enhances web server security by providing a form of roled based HTTP acess control
lists.

Answers:
It locates copies of static content closer to the user - reducing network backbone traffic.

It supports multicasting of streaming audio and video content.

It enhances web server security by providing a form of roled based HTTP acess control
lists.

It minimises the number of web servers invovled in deliverying static web content.

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 7/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

Question 25 0 out of 1 points

In which of the following states can a Linux process exist?

Selected Answer: Runnable, Sleeping, Zombie, Dead

Answers: Runnable, Sleeping, Zombie, Dead

Executing, Hybernated, Stopped

Executing, Runnable, Zombie

Runnable, Sleeping, Zombie, Stopped

Question 26 0 out of 1 points

What are the benefits of using a reverse proxy server?

Selected Answer: Improved redundancy and simpler dynamic content delivery.

Answers: Improved security and browser compatibility

Improved security and performance

Improved performance and protocol compliance

Improved redundancy and simpler dynamic content delivery.

Question 27 1 out of 1 points

Which of the following is NOT correct with regards to email Message Transfer Agents?

Selected Answer: MTA's use POP3 or IMAP4 to deliver messages to other MTA's

Answers: MTA's receive email messages from remote mail servers

MTA's use SMTP or ESMTP to communicate with other MTA's

MTA's accept mail from a user agent or submission agent

MTA's use POP3 or IMAP4 to deliver messages to other MTA's

Question 28 1 out of 1 points

Which of the following explains the first step in the DHCP client/server interaction?

Selected Answer: The client broadcasts a "Who am I?" message.

Answers: The client broadcasts a "Who am I?" message.

The client sends a "I need an address" to the nearest server.

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 8/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
The server regularly broadcasts a "Who needs an address?" message.

The server regularly asks each client "Do you need an address?".

Question 29 0 out of 1 points

What is syslogd?

Selected Answer: A user level command that submits log entries from the shell.

Answers: A user level command that submits log entries from the shell.

A record of users logins and logouts.

A logging daemon for the syslog logging system.

A log file rotation policy.

Question 30 1 out of 1 points

Which of the following is correct with regard to NFS file locking?

Selected
Answer: NFS version 4 incorporates file locking into the core protocol, versions 2 and 3 rely on
external file locking services.

Answers: All versions of NFS (2, 3 and 4) have file locking in the core protocol.

NFS version 4 incorporates file locking into the core protocol, versions 2 and 3 rely on
external file locking services.

lockd and statd are required for NFS version 4 file locking.

None of the above.

Question 31 1 out of 1 points

Which of the following are Linux file types?

Selected Answer: Regular files, directories, named pipes, symbolic links

Answers: Regular files, directories, named pipes, process containers

Regular files, directories, character device files, memory buffers

Regular files, directories, process containers, memory buffers

Regular files, directories, named pipes, symbolic links

Question 32 1 out of 1 points

Which file contains the DNS domains that should be searched to resolve names that are incomplete?
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 9/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

Selected Answer: resolv.conf

Answers: name.d

arp

resolv.conf

search.conf

Question 33 1 out of 1 points

The Domain Name System (DNS) is . . .

Selected
Answer: A distributed database of address and name mappings and associated information
across the Internet.

Answers: A central database of address and name mappings and associated information across
the Internet.

A central database of address and name mappings managed by ICANN.

A distributed database of address and name mappings and associated information


across the Internet.

A distributed database of hardware to logical address mappings and associated


information across the Internet.

Question 34 0 out of 1 points

An advantage of using the command line is . . .

Selected Answer: It is faster to use than a GUI

Answers: It usually has more options and is more powerful than a GUI

It is easier to use than a GUI

It is faster to use than a GUI

It has better help facilities

Question 35 1 out of 1 points

Can a Linux system be used to perform network routing?

Selected Answer: Yes, by enabling IP forwarding.

Answers: Yes, but you must install special router software first.

Yes, by enabling IP forwarding.

Yes, but only with IPv4


https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 10/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

No

Question 36 0 out of 1 points

Which of the following are tools used to limit the amount of email spam?

Selected Answer: SSH, Blacklisting, IPSec and SpamAssassin

Answers: Greylisting, blacklisting, SpamAssassin and DKIM

Blacklisting, SpamAssassin, DKIM and SSH

DKIM, Blacklisting, SSH and SpamAssassin

SSH, Blacklisting, IPSec and SpamAssassin

Question 37 1 out of 1 points

What is the purpose of a mount point?

Selected Answer: Allows filesystems and devices to be connected to the "file tree".

Answers: Allows filesystems and devices to be connected to the "file tree".

Allows file and directories to be connected to the "file tree".

Allows many filesystems and devices to be connected at the one point.

Gives access to the previous contents of the directory used by the "mount point".

Question 38 0 out of 1 points

Which of the following is is an accurate statement about Linux distributions?

Selected
Answer: Using Linux for servers is popular because all Linux distributions are free to install and
operate.

Answers: Using Linux for servers is popular because all Linux distributions are free to install and
operate.

Commercialisation of Linux distributions is not allowed under the Linux license


agreement.

All Linux distributions have the same patching release cycles.

The most viable Linux distributions are not necessarily the most commercial
distributions.

Question 39 0 out of 1 points

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 11/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
How is a new process created in Linux?

Selected Answer: The 'init' command is used to create a new process.

Answers: The 'ps -new' command is used to create a new process.

An existing process copies itself with the 'fork' system call.

The 'exec' command creates a new process.

The 'init' command is used to create a new process.

Question 40 0 out of 1 points

Which of the following is a correct statment about signals.

Selected Answer: Signals are user-level system requests.

Answers: Signals are process-level interupt requests.

Signals are process-level system requests.

Signals are user-level system requests.

Signals are user-level interupt requests.

Question 41 1 out of 1 points

Which of the following new development in DNS can used to help detect spam e-mail?

Selected Answer: DKIM

Answers: DNSSEC

DKIM

IDN

IPv6

Question 42 0 out of 1 points

IP Address allocation is governed by . . .

Selected Answer: ISOC - the Internet Society

Answers: ICANN - the Internet Corporation for Assignmed Names and Numbers

ISOC - the Internet Society

IGF - the Internet Governance Forum

AUSCERT - Australian Cyber Management

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 12/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

Question 43 1 out of 1 points

Which of the following statements is correct?

Selected Answer: UDP is an unreliable, connectionless protocol.

Answers: The IP protocol defines ethernet addressing and framing standards.

UDP is an unreliable, connectionless protocol.

TCP translates IP addresses to hardware addresses

ICMP is used to route data packets

Question 44 0 out of 1 points

Which command would you use to set a filed called 'scriptone' to have execute and read permissions for
the owner, execute permission for group, and no permissions for other.

Selected Answer: chmod 750 scriptsone

Answers: chmod 015 scriptsone

chmod 057 scriptsone

chmod 750 scriptsone

chmod 510 scriptsone

Question 45 0 out of 1 points

Which of the following is NOT a consideration in implementing email content scanning?

Selected Answer: Where to scan content: in a DMZ or on the internal network.

Answers: Headers: Which email header fields to scan.

Where to scan content: in a DMZ or on the internal network.

Where to scan: at the intiial connection or after a message is accepted.

What to do with the viruses and spam messages identified by scanning.

Question 46 0 out of 1 points

What are the benefits of using web server load balancing?

Selected Answer: Load balancing improves performance and security

Answers: Load balancing improves security and redundancy

Load balancing improves performance and security

Load balancing improves redundancy and precision

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 13/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
Load balancing improves performance and redundancy

Question 47 1 out of 1 points

______ is a popular software package, available uner GNU Public license, that implements the server
side of Windows CIFS file sharing on Linux.

Selected Answer: Samba

Answers: Wine

Samba

Cygwin

VNC

Question 48 0 out of 1 points

Which of the following is NOT a valid field in the /etc/group file?

Selected Answer: GID number

Answers: Group permissions

GID number

List of members, separated by commas

Group name

Question 49 0 out of 1 points

Which of the following are factors to consider in choosing web server software?

Selected Answer: Level of support, cost and browser compatibility.

Answers: Robustness, performance and security.

Level of support, cost and browser compatibility.

Timeliness of updates, ability to customise, ability to handle encryption.

All of the above

Question 50 0 out of 1 points

Which of the following statements is correct?

Selected
Answer: The ethtool command queries and sets kernel network configurations such as link speed
and route table.

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 14/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

Answers: The ethtool command queries and sets hardware addresses in the arp table.

The ethtool command queries and sets kernel network configurations such as link speed
and route table.

The ethtool command queries and sets a network interface's IP address.

The ethtool command queries and sets a network interface's media-specific parameters
such as link speed and duplex.

Question 51 1 out of 1 points

Which of the following is the correct first line is a bash script, indicating that the script should be
interpreted by /bin/bash?

Selected Answer: #!/bin/bash

Answers: /bin/bash

#!bash

#!/bin

#!/bin/bash

Question 52 0 out of 1 points

Man pages provide consise descriptions for what?

Selected Answer: commands only

Answers: commands only

commands and file formats only

commands and library routines only

commands, drivers, file formats and library routines.

Question 53 1 out of 1 points

Which command sends a signal to daemon with process ID 3345 to re-read it's configuration file.

Selected Answer: kill -1 3345

Answers: kill -9 3345

hangup 3345

signal TERM 3345

kill -1 3345

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 15/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...

Question 54 0 out of 1 points

Which of the following is NOT a component of the Syslog architecture?

Selected Answer: logger, a user-level command that submits log entries from the shell

Answers: syslogd, the logging daemon

openlog, library routines that submit messages to syslogd

logm, message processing for daemons

logger, a user-level command that submits log entries from the shell

Question 55 1 out of 1 points

A crontab file . . .

Selected Answer: Is a configuration file for running commands on a predetermined schedule.

Answers: Is used for schell scripting.

Is a configuration file for running commands on a predetermined schedule.

Maintains user process state information.

Stores user shell variables.

Question 56 1 out of 1 points

The /etc/passwd file contains a list of users recognised by the system.What fields are contained in
/etc/password for each user?

Selected Answer: Login name, UID, login shell, home directory

Answers: Login name, UID, GID, password, login shell

Login name, UID, encrypted password, home directory

Login name, UID, login shell, home directory

Login name, UID, encrypted password, GID

Question 57 0 out of 1 points

Which of the following is a correct comparison of versions of NFS?

Selected
Answer: NFS version 2 uses TCP, version 3 uses UDP or TCP and version 4 uses UCP only.

Answers:
NFS version 2 uses UDP, version 3 uses UDP or TCP and version 4 uses TCP only.

NFS version 2 uses TCP, version 3 uses UDP or TCP and version 4 uses UCP only.

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 16/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
NFS version 2 uses UDP, and versions 3 and 4 use TCP only.

NFS version 2 uses TCP, and versions 3 and 4 use UCP only.

Question 58 0 out of 1 points

Which of the following is NOT correct about the Unix/Linux root account?

Selected Answer: It can be changed to have a different name

Answers: It has a UID of 0

It is allowed to perform any valid file or process operation

It can be changed to have a different name

It can only be used at the systems console

Question 59 1 out of 1 points

The utility that you use to send ICMP echo packets is called ____.

Selected Answer: ping

Answers: tcpdump

netstat

ifconfig

ping

Question 60 0 out of 1 points

How does SSL secure communications between a web site and a client browser?

Selected SSL applies IPSec encryption and authentication to HTML.


Answer:
Answers: SSL applies IPSec encryption and authentication to HTML.

SSL is a variant of the HTML protocol adding encryption and authorisation extensions.

SSL combines PKI and DKSIM to provide secure and encrypted HTTP.

SSL runs as a layer below HTTP, providing security for the connection but not changing
the HTTP transaction inself.

Friday, 25 August 2017 00:58:17 o'clock AEST

← OK

https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 17/17

You might also like