Professional Documents
Culture Documents
Results All Answers, Submitted Answers, Correct Answers, Feedback, Incorrectly Answered
Displayed Questions
Which of the following incoming email checks is NOT a recommendation for email server operations to
improve email reliability and security?
Answers: A special part of the filesystem for storing large binary objects.
Selected Answer: Examines and manipulates the kernels hardware to logical address table.
Answers: Examines and manipulates the kernels hardware to logical address table.
Which of the following commands would you use to examine the routing tale on a Linux machine?
Answers: ifconfig -r
arp -a
mpstat -r
netstat -r
Selected
Answer: Caching name servers can be authoritative for their own sub domain but not for other
zones.
A client of a recursive name server must be prepared to accept and act on referrals.
Caching name servers can be authoritative for their own sub domain but not for other
zones.
The DNS specification requires at least two authoritative servers for each domain.
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 2/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
Selected
Answer: standard input (STDIN), standard output (STDOUT) and standard system (STDSYD)
standard input (STDIN), standard output (STDOUT), and standard error (STDERR)
standard input (STDIN), standard output (STDOUT) and standard system (STDSYD)
standard input (STDIN), standard output (STDOUT) and standard redirect (STDRED)
Answers: Date:
Return-Path:
Mime:
To:
Which of the following techniques can NOT be used to provide virtual web server interfaces?
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 3/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
Configure the web server to use name-based virtual hosts.
Both a) and b)
Answers: HELO
LOGOUT
EHLO
DATA
CGI, Common Gateway Interface, provides for dynamic HTTP content by:
Selected Specifying how HTTP servers can exchange information with other programs.
Answer:
Answers: Defining a programming language that a HTTP server can use to generate dynamic
content.
Specifying how HTTP servers can exchange information with other programs.
ps can be used to monitor a users processes, prstat must be used to monitor system
processes.
Selected
Answer: When a process is cloned, the original process is referred to as the parent, and the copy
is called the child.
Answers: When a process is created it is allocated the same process ID as it's parent.
When a process is cloned, the original process is referred to as the parent, and the copy
is called the child.
Which of the following contains which filesystems are exported and which clients can mount them?
Answers: /etc/fstab
/etc/mountd
/etc/chmod
/etc/exports
Selected Answer: Is readable only by the superuser and is used to store encrypted passwords.
Which file permissions will allow for owner - read, write and execute: group - read and write: other read
only?
Answers: rwxrw-r--
r-xrw-r--
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 5/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
r--rw-rwx
rwxrwxr--
Selected Answer: They allow communicaiton between two processes running on the same host.
They allow communicaiton between two processes running on the same host.
Selected Answer: You can use a software installer to install a precompiled software package.
Answers: You can use a software installer to install a precompiled software package.
You need to download the application source code and compile it.
You must obtain additional software from the same source as your Linux distribution.
Administrative shell scripts should emphasise programmer efficiency and code clarity
rather than computational efficiency.
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 6/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
Selected Answer: Absolute path names are limited for use by only the kernel.
Absolute path names are limited for use by only the kernel.
Which of the following is an advantage of using content distribution networks for serving web content?
Selected
Answer: It enhances web server security by providing a form of roled based HTTP acess control
lists.
Answers:
It locates copies of static content closer to the user - reducing network backbone traffic.
It enhances web server security by providing a form of roled based HTTP acess control
lists.
It minimises the number of web servers invovled in deliverying static web content.
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 7/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
Which of the following is NOT correct with regards to email Message Transfer Agents?
Selected Answer: MTA's use POP3 or IMAP4 to deliver messages to other MTA's
Which of the following explains the first step in the DHCP client/server interaction?
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 8/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
The server regularly broadcasts a "Who needs an address?" message.
The server regularly asks each client "Do you need an address?".
What is syslogd?
Selected Answer: A user level command that submits log entries from the shell.
Answers: A user level command that submits log entries from the shell.
Selected
Answer: NFS version 4 incorporates file locking into the core protocol, versions 2 and 3 rely on
external file locking services.
Answers: All versions of NFS (2, 3 and 4) have file locking in the core protocol.
NFS version 4 incorporates file locking into the core protocol, versions 2 and 3 rely on
external file locking services.
lockd and statd are required for NFS version 4 file locking.
Which file contains the DNS domains that should be searched to resolve names that are incomplete?
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&return… 9/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
Answers: name.d
arp
resolv.conf
search.conf
Selected
Answer: A distributed database of address and name mappings and associated information
across the Internet.
Answers: A central database of address and name mappings and associated information across
the Internet.
Answers: It usually has more options and is more powerful than a GUI
Answers: Yes, but you must install special router software first.
No
Which of the following are tools used to limit the amount of email spam?
Selected Answer: Allows filesystems and devices to be connected to the "file tree".
Gives access to the previous contents of the directory used by the "mount point".
Selected
Answer: Using Linux for servers is popular because all Linux distributions are free to install and
operate.
Answers: Using Linux for servers is popular because all Linux distributions are free to install and
operate.
The most viable Linux distributions are not necessarily the most commercial
distributions.
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 11/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
How is a new process created in Linux?
Which of the following new development in DNS can used to help detect spam e-mail?
Answers: DNSSEC
DKIM
IDN
IPv6
Answers: ICANN - the Internet Corporation for Assignmed Names and Numbers
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 12/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
Which command would you use to set a filed called 'scriptone' to have execute and read permissions for
the owner, execute permission for group, and no permissions for other.
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 13/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
Load balancing improves performance and redundancy
______ is a popular software package, available uner GNU Public license, that implements the server
side of Windows CIFS file sharing on Linux.
Answers: Wine
Samba
Cygwin
VNC
GID number
Group name
Which of the following are factors to consider in choosing web server software?
Selected
Answer: The ethtool command queries and sets kernel network configurations such as link speed
and route table.
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 14/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
Answers: The ethtool command queries and sets hardware addresses in the arp table.
The ethtool command queries and sets kernel network configurations such as link speed
and route table.
The ethtool command queries and sets a network interface's media-specific parameters
such as link speed and duplex.
Which of the following is the correct first line is a bash script, indicating that the script should be
interpreted by /bin/bash?
Answers: /bin/bash
#!bash
#!/bin
#!/bin/bash
Which command sends a signal to daemon with process ID 3345 to re-read it's configuration file.
hangup 3345
kill -1 3345
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 15/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
Selected Answer: logger, a user-level command that submits log entries from the shell
logger, a user-level command that submits log entries from the shell
A crontab file . . .
The /etc/passwd file contains a list of users recognised by the system.What fields are contained in
/etc/password for each user?
Selected
Answer: NFS version 2 uses TCP, version 3 uses UDP or TCP and version 4 uses UCP only.
Answers:
NFS version 2 uses UDP, version 3 uses UDP or TCP and version 4 uses TCP only.
NFS version 2 uses TCP, version 3 uses UDP or TCP and version 4 uses UCP only.
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 16/17
25/08/2017 Review Test Submission: Practice Quiz – S-ITC514_201760_...
NFS version 2 uses UDP, and versions 3 and 4 use TCP only.
NFS version 2 uses TCP, and versions 3 and 4 use UCP only.
Which of the following is NOT correct about the Unix/Linux root account?
The utility that you use to send ICMP echo packets is called ____.
Answers: tcpdump
netstat
ifconfig
ping
How does SSL secure communications between a web site and a client browser?
SSL is a variant of the HTML protocol adding encryption and authorisation extensions.
SSL combines PKI and DKSIM to provide secure and encrypted HTTP.
SSL runs as a layer below HTTP, providing security for the connection but not changing
the HTTP transaction inself.
← OK
https://interact2.csu.edu.au/webapps/assessment/review/review.jsp?attempt_id=_2768516_1&course_id=_27038_1&content_id=_1659201_1&retur… 17/17