Professional Documents
Culture Documents
Q.9) After _______ the repositories, you can install, query, update, and remove
software with the meta package handler yum.
A) Updating
B) Deleting
C) Configuring
D) Managing
Answer:- C) configuring
Q.13) How much minimum hard disk size is required to install Linux OS on system?
A) 40 GB
B) 50GB
C) 30GB
D) 100GB
Answer:- A) 40GB
Q.14) The first version of the Linux kernel was released to internet in?
A) September 1991
B) September 1993
C) September 1997
D) October 1992
Answer:- A) September 1991
Q.17) The command you use to create linux file system is?
A. fsck
B. mkfs
C. Mount
D. None of the above
Answer:- B) mkfs
Answer:- C) crontab–e
Q.19) What allows automatic rotation, compression, removal, and mailing of log
files?
A) syslog
B) cron
C) Logrotate
D) uucp
Answer:- C) Logrotate
Q.22) A server is basically a ______ that facilitate the same computer or other
computer by providing services to them.
A) Computer code
B) Computer instruction
C) Computer program
D) Computer signal
Answer:- C) Computer Program
Q.27) Which command is used to find out whether there are any partitions on the
device?
A) fdisk –cul
B) symhosts.
C) Lpstat
D) syslog.conf
Q.28) Which command is used to move cursor to end of the command line?
A. Ctrl-f
B. Ctrl-b
C. Ctrl-a
D. Ctrl-e
Answer:- D) Ctrl-e
Q.4) Following which command is used to gives status information about current jobs
and printers?
A) Lpr command
B) Lpq command
C) Lpstat command
D) Lprm command
Ans. C) Lpstat command
Q.5) Rotating a log file means:
A) The old log file is closed and a new log file is opened.
B) Only works on old file.
C) Make a changes in old file.
D) Keep focus on file.
Ans. A) The old log file is closed and a new log file is opened.
Q.7) Which of the following command is used to send the signal processes?
A) ps
B) kill
C) pstree
D) killall
Ans. B)kill
Q.8) By using what you can change the priority of the process?
A)dev
B)sdb
C)nice
D)All of them
Ans. C) nice
Q.9) PID is long for _______.
A)Percentage Identification of CPU life cycles
B)Percentage Identification of Memory used by a process
C)Process Identification of CPU used by processor
D)Process Identification number.
Ans. D) Process Identification number
Q.10) The only way to clean up your zombie current process is by ________.
A) HIBERNATE the server
B) KILLING the process
C) REBOOTING the server
D)None of the above
Ans. C) REBOOTING the server
Q.11) Which runlevel is used to define a mode where the runlevel starts with a
graphical interface.?
A) runlevel 3
B) runlevel 6
C) runlevel 5
D) runlevel 7
Ans: C) runlevel 5
Q.12) Which parameter is used to specifies the MAC address to be used, and it can
be changed using this parameter
A) DEVICE
B) HWADDR
C) TYPE
D) IPADDR
Ans: B) HWADDR
Q.13) The command used by the server administrator occasionally to set a route
from command line is _______.
A)ip link
B) ipaddr
C)ipconfig
D) ip route
Ans: D) ip route
Q.14) The SSH client can be specified to connect as a different user by using__
A) sshusername@ipadddr
B) sshusername@servername
C) sshservername@username
D) sshipadddr@servername
Ans: B) sshusername@servername
Q.16) Which standard TCP port is assigned for contacting SSH server
A) port 22
B) port 23
C) port 25
D) port 20
Ans: A) port 22
Q.17) By default graphical programs over an SSH session cannot be used, to use
them which of the following command is use?
A) assh
B) ssh-Q
C) ssh-X
D) sshX11
Ans: C)ssh-X
Q.18) Whichpackege must be install on Red Hat Enterprise Linux to configure VNC
A) vnc
B) vncserver
C) vncpackage
D) tigervnc
Ans: D) tigervnc
Q.19)To set X-Forwarding for all users which file should modified?
A) /etc/ssh_config
B) /etc/ssh/ssh_config
C) /ssh/etc
D) /ssh/etc_config
Ans: B) /etc/ssh/ssh_config
Q.20)Which parameter indicates that this device is started when the server boots
A) ONBOOT
B) BOOTPROTO
C) DEFROUTE
D) UUID
Ans: A) ONBOOT
Q.21) _______ service provides information about all available authenticate
sources.
A) sddd
B) sssd
C) ssd
D) None of the above
Ans. B) sssd
Q.26) What is the name of the graphical tool for user and group management?
A) system-config-group
B) system-config-users
C) user-config-group
D) system-manage-user
Ans. B) system-config-users
Q.30) Access Control List (ACL) gives permission to how many users or group to
work on same file
A) Infinite
B) One
C) Three
D) Two
Ans. B) One
Q.31) When a user requests file from a disk in which manner it process?
A) it is read from a disk
B) Copied to the RAM
C) Open from a disk
D) A & B both
Ans: D) A & B both
Q.32) In Configuring Logging to switch back to the graphical user interface using
__________.
A) Alt + Ctrl + F1
B) F1
C) Shift + F1
D) Ctrl + F1
Ans: C) vncpasswd
Q.35) ________ permission allow you to modify contents of the existing file
A) modify
B) write
C) read
D) execute
Ans: B) write
UNIT 3
Q.4) Which command is used to configure Netfilter on Red Hat Linux using
graphical interface?
a) config-system-firewall
b) config-system-firewall-gui
c) system-config-firewall-tui
d) system-config-firewall
Ans:- d) system-config-firewall
Q.5) Which of the following is the major benefit of using masquerading?
a) one public IP address can’t be used to connect one device on public
network to Internet.
b) one public IP address can’t be used to connect many devices on public
network to Internet.
c) one public IP address can be used to connect many devices on private
network to Internet.
d) one private IP address can be used to connect one device on private
network to Internet.
Ans:- b) iptables
Ans:- c) Modules
Ans:- b) BACKWARD
Q.9) ________ is used to protect server from over logging.
a) NAT configuration
b) Protocol
c) LOG target
d) Limit module
Ans:- a) certs
Ans:- b) /etc/pki/openssl.cnf
Q.16) What is the command to extract the contents of an encrypted file named
‘myfile.gpg’ to ‘myfile’ ?
A) gpg --export > /myfile/myfile.key
B) gpg -d myfile.gpg>myfile
C) gpg --gen-myfile.gpg
D) None of the above.
Q.17) Once public/private key pair is created, signing request is also asked by
_______.
A) admin
B) GNU
C) genkey
D) file sender
Ans:- C) genkey
Q.18) If ‘Bob’ wants to sends an encrypted message to ‘Alice’, what command is
needed to export the Bob’s private key to a temp directory?
A) gpg --export -a > /temp/Bob.key
B) gpg --import -a < /temp/Bob.key
C) gpg -d Bob.key
D) gpg -d Bob.key>temp
Q.19) To protect files on web server, ________ and ______ are used along with
GPG.
A) TCP , UDP
B) PKI certificate , SSL
C) Public key , Private key
D) None of the above.
Q.20) New certificates are kept in ‘newcerts’ until they have been _______.
a) unsigned
b) signed
c) rejected
d) None of the above.
Ans:- b) signed
Ans:- b) Automount
Q.23) After successful start of NFS server, __________ can be used to check
that the shares are available.
a) #showmount –e localhost
b) #automount –v localhost
c) #dispmount –e localhost
d) #showmount –v localhost
Ans:- a) /etc/auto.master *
Q.25) _____ is a very versatile service that can be used for different purpose on
your network.
a) SSH
b) samba
c) FTP
d) Both a and b
Ans- b) samba
Q.26) To list the Samba shares that are offered by a specific server, one can use
_____.
a) smbclient-L
b) ftp directory
c) vsftpd
d) smb.conf
Ans- a) smbclient-L
Q.27) Which of the following options makes Samba a member in a Windows
Active Directory domain
a) security = user
b) security = server
c) security = ads
d) security = domain
Ans:- a) /etc/fstab
Q.29) To make anonymous users to access files using FTP service, create
______ subdirectory within _______ directory.
a) /user , /var
b) /pub , /var/smtp
c) /pub , /var/ftp
d) /sub , /etc/vsftpd
a) REROUTING
b) PREROUTING
c) POSTROUTING
d) OUTPUT
Ans:- a) REROUTING
Q.32) Which of the following is the default location of configuration files, in which
commands executed using ‘system-config-firewall’ are saved?
a) /etc/sysconfig
b) /root
c) /usr/bin
d) /dev
Ans:- a) /etc/sysconfig
Q.33) If no specific rule is found in the chain that matches the incoming packet,
______ is applied.
a) Policy
b) Interface
c) Target
d) Protocol
Ans:- a) Policy
Q.34) What is the GPG command for the receiver to decrypt the file?
A) gpg -d
B) gpg --list-secret-keys
C) gpg --import < /directory/keyfile.key
D) gpg --export –a
Ans:- a) gpg –d
Q.35) If the receiver has the public key of the sender in their GPG ring this proves
that, ______?
Q.7) DHCP uses UDP port _____ for sending data to server.
A. 66
B. 67
C. 68
D. 69
Answer:- B) 67
Q.8) Top-level-Domains has number of _____ servers.
A. Root
B. Name
C. Zone
D. Address
Answer:- B) Name
Q.14) If you have to send multimedia data over SMTP it has to be encoded in which
code?
a) Single
b) Binary
c) ASCII
d) Hash
Answer: c) ASCII
Q.15) Mutt is-
a) text-based email client for Unix- like system.
b) Process control system
c) Device manipulation system
d) Information maintenance system
Answer: a) text-based email client for Unix- like system.
Q.22) The authentication setting in a block always open & close with?
a) <files>&</files>
b) <VirtualHost>&</VirtualHost>
c) <IfModule>&</IfModule>
d) <Directory>&</Directory>
Answer: d) <Directory>&</Directory>*
Q.23) What is .htpasswd?
a) It creates a new user
b) None of these
c) Asks to specify a password for that user
d) Both it creates a new user and ask to specify a password for that user
Answer: d) Both it creates a new user and ask to specify a password for
that user
Q.24) In apache which directive is used to find user account & password?
a) AuthUserFile
b) AuthName
c) AuthType
d) Auth User File
Answer: a) AuthUserFile
Q.28) _____ is one of the most used services on Red Hat Enterprise Linux.
a) PHP
b) Apache
c) virtual hosts
d) None of the above.
Answer: b) Apache
Q.30) The default document root is set to _______ on Red Hat Enterprise linux
server.
a) /var/www/html
b)/www/root/html
c)/var/root/www
d)None of the above
Answer: a)/var/www/html
Q.31) Apache server is in the _____directory.
a) /root/https
b) /etc/http
c) /etc/httpd
d) /root/httpd
Answer: c) /etc/httpd
Q.2) To check whether the script name exist or not, one can use ______ Command.
A. check
B. scriptname
C. which
D. chmod
Ans- C) which
Q.4) When a variable is defined then its scope is limited for the _______ Shell only.
A. global
B. outside the shell
C. current
D. dictionary
Ans- C) current
Q.5) If we want a variable in globally throughout the shell then which of the following
keyword is used?
A. global
B. export
C. globalvar
D. bash
Ans- B) export
Q.6) While giving the command line argument we need to remember that the first
argument is denoted by?
A. $first
B. $
C. #one
D. $0
Ans- D) $0
Q.8) We can take the input from the user by simply asking them for it by using
______ in the script
A. input
B. read
C. echo
D. None of the above
Ans - B) read
Q.9) Which keyword is to perform calculations?
A. calculation
B. grep
C. touch
D. let
Ans- D) let
Q.14) Which is a logical device that groups at least two network cards?
A) Enter bond
B) Ethernet bond
C) intra bond.
D) Bonding device
Ans: B). Ethernet bond
Q.18) which is the management interface that is used to create and manage cluster?
A) Rgmanager
B) Pacemaker
C)Conga
D) Clustermanager
Ans: C). Conga
Q.23) __________ is what you need to maintain the integrity of the cluster.
A) Fencing
B) Rgmanager
C) Quorum disks
D) none of the above
Ans: A). Fencing
Q.31) To count the number of argument provided with a script which symbol is
used?
A. $#
B. #count
C. $@
D. $count
Ans- A) $#