You are on page 1of 43

UNIT 1

Q.1) What is the full form of yum?


A) Yellow update manager
B) Yellowdog Update Manager
C) Yellowdog Ultra Manager
D) None of above
Answer:-:- B) Yellowdog Update Manager

Q.2) Which command can be used to create repositories?


A) createrepo
B) create_repo
C) yum grouplist
D) yum groupinstall
Answer:- A) createrepo

Q.3) yumgroupinfo Virtualization _______.


A) deletes list of all packages
B) updates list of all packages
C) displays list of all packages
D) none of above
Answer:- C) displays list of all packages

Q.4) Which command install packages from repositories?


A) yum install[packagename]
B) yum update[packagename]
C) yum remove[pachagename]
D) yum grouplist
Answer:- A) yum install[packagename]

Q.5) What is full form of RPM?


A) Revolution per minute
B) Red-Hat package manager
C) Red-Hat package manage
D) Red-Hat manager
Answer:- B) Red-Hat package manager
Q.6) _______ package handler in Red Hat is known as yum.
A) Data
B) Bit
C) Meta
D) Byte
Answer:- C) Meta

Q.7) To update a kernel use:


A) yumupdatekernel
B) yum update kernel
C) Yum update
D) Yum update_kernal
Answer:- B) yum update kernel

Q.8) Type ______ to gain root privilege.


A) su
B) ls
C) myrepo
D) none
Answer:- A) su

Q.9) After _______ the repositories, you can install, query, update, and remove
software with the meta package handler yum.
A) Updating
B) Deleting
C) Configuring
D) Managing
Answer:- C) configuring

Q.10) Which is default package manager for Linux?


A) YUM
B) APT
C) DNF
D) RPM
Answer:- D) RPM
Q.11) Which is front end for Linux distributions that utilize the RPM package format
A) YUM
B) APT
C) RPM
D) DNF
Answer:- A) YUM

Q.12) What is Linux repository?


A) Program location
B) Storage location
C) Command
D) All of above
Answer:- B) Storage location

Q.13) How much minimum hard disk size is required to install Linux OS on system?
A) 40 GB
B) 50GB
C) 30GB
D) 100GB
Answer:- A) 40GB

Q.14) The first version of the Linux kernel was released to internet in?
A) September 1991
B) September 1993
C) September 1997
D) October 1992
Answer:- A) September 1991

Q.15) SuSE is a …….. Linux distribution provider.


A) Russian
B) Italian
C) German
D) American
Answer:- C) German
Q.16) Linux was originally developed for personal computers based on the _______
architecture.
A) Intel
B) Intel x86
C) Intel xtu
D) Intel xe
Answer:- B) intel x86

Q.17) The command you use to create linux file system is?
A. fsck
B. mkfs
C. Mount
D. None of the above
Answer:- B) mkfs

Q.18) To open the crontab editor which command is used?


A) cron -s
B) cron.daily
C) crontab -e
D) crontab –r

Answer:- C) crontab–e

Q.19) What allows automatic rotation, compression, removal, and mailing of log
files?
A) syslog
B) cron
C) Logrotate
D) uucp

Answer:- C) Logrotate

Q.20) Linux is ________ Software.


A) Closed source
B) Open source
C) Closed and open source
D) None
Answer:- B) Open Source
Q.21) It is duty of _______ to prevent unauthorised use of his system.
A) Administrator
B) Developer
C) Debugger
D) Computer user
Answer:- A) Administrator

Q.22) A server is basically a ______ that facilitate the same computer or other
computer by providing services to them.
A) Computer code
B) Computer instruction
C) Computer program
D) Computer signal
Answer:- C) Computer Program

Q.23) Unix 6 distributed with its?


A) Source code
B) Package code
C) Program code
D) A&B
Answer:- A) Source code

Q.24) Which type of Linux support provided by Red Hat?


A) Hardware Support
B) Software Support
C) Hands-on Support
D) All of the above
Answer:- D) All of the above

Q.25) Which of this is used to start a paused job as a foreground job?


A) fg
B) bg
C) ps
D) None of the above.
Answer:- A) fg
Q.26) The soft link in linux is also called as.
A) symbolic link
B) Links
C) Mount
D) tar

Answer:- A) symbolic link

Q.27) Which command is used to find out whether there are any partitions on the
device?
A) fdisk –cul
B) symhosts.
C) Lpstat
D) syslog.conf

Answer:- A) fdisk –cul

Q.28) Which command is used to move cursor to end of the command line?
A. Ctrl-f
B. Ctrl-b
C. Ctrl-a
D. Ctrl-e
Answer:- D) Ctrl-e

Q.29) Who has root access?


A) Linux system administrator
B) Program developer
C) Linux user
D) Debugger
Answer:- A) Linux system administrator

Q.30) The Lprm Command is used to.


A) Used to remove print jobs from the print queue.
B) Used to send a file directly to a printer.
C) Logs messages related to the cron scheduler.
D) The total amount of memory that is available for star ting new processes.

Answer:- A) Used to remove print jobs from the print queue.


Q31) UNIX is a power full operating system originally developed at?
A) Encore Lab
B) Relia Screen Lab
C) Nexium Lab
D) AT & T Bell Labs
Answer:- D) AT & T Bell Labs

Q.32) The UNIX System is mainly composed of three different parts.


A) Power supply, CPU fan & Motherboard
B) Kernel, File System &Shell
C) Memory, Modem & Mouse
D) Sound card, Speakers & Zip drive
Answer:- B) Kernel, File System & Shell

Q.33) Which Command is used to change the priority of a process?


A) fg
B) Mem
C) jobs
D) nice
Answer:- D) nice

Q.34) The Mem command is used for.s


A) The total amount of memory that currently is used.
B) The total amount of memory that is available to the Linux kernel.
C) The number of active processes in the last polling loop.
D) The percentage of time your system is spending in user space.

Answer:- B) The total amount of memory that is available to the Linux


kernel.

Q.35) Which symbol is used for output(STDOUT)?


A) >
B) <
C) >>
D) <<
Answer: A) >
UNIT 2

Q.1) Who is the administration of file?


A) Link
B) inode
C) metadata
D) directory
Ans. B) inode

Q.2) Which of the following tasks perform by tar command?


A) Creating an archive
B) Verifying the contents of an archive
C) Extracting an archive
D) All of the above
Ans. D) All of the above

Q.3) CUPS stands for:


A) Common UNIX Print System
B) Capitalization, Usage, Punctuation, and Spelling
C) Control User Plane Separation
D) Circle, Underline, Paraphrase, Star
Ans. A) Common UNIX Print System

Q.4) Following which command is used to gives status information about current jobs
and printers?
A) Lpr command
B) Lpq command
C) Lpstat command
D) Lprm command
Ans. C) Lpstat command
Q.5) Rotating a log file means:
A) The old log file is closed and a new log file is opened.
B) Only works on old file.
C) Make a changes in old file.
D) Keep focus on file.
Ans. A) The old log file is closed and a new log file is opened.

Q.6) Following which are the types of links in Linux?


A) A symbolic link
B) A hard link
C) Both A and B
D) None of the above
Ans. C) Both A and B

Q.7) Which of the following command is used to send the signal processes?
A) ps
B) kill
C) pstree
D) killall
Ans. B)kill

Q.8) By using what you can change the priority of the process?
A)dev
B)sdb
C)nice
D)All of them
Ans. C) nice
Q.9) PID is long for _______.
A)Percentage Identification of CPU life cycles
B)Percentage Identification of Memory used by a process
C)Process Identification of CPU used by processor
D)Process Identification number.
Ans. D) Process Identification number

Q.10) The only way to clean up your zombie current process is by ________.
A) HIBERNATE the server
B) KILLING the process
C) REBOOTING the server
D)None of the above
Ans. C) REBOOTING the server

Q.11) Which runlevel is used to define a mode where the runlevel starts with a
graphical interface.?
A) runlevel 3
B) runlevel 6
C) runlevel 5
D) runlevel 7
Ans: C) runlevel 5

Q.12) Which parameter is used to specifies the MAC address to be used, and it can
be changed using this parameter
A) DEVICE
B) HWADDR
C) TYPE
D) IPADDR
Ans: B) HWADDR
Q.13) The command used by the server administrator occasionally to set a route
from command line is _______.
A)ip link
B) ipaddr
C)ipconfig
D) ip route
Ans: D) ip route

Q.14) The SSH client can be specified to connect as a different user by using__
A) sshusername@ipadddr
B) sshusername@servername
C) sshservername@username
D) sshipadddr@servername

Ans: B) sshusername@servername

Q.15) SSH can be enstablished on windows environment by using_____


A) KiTTY
B) ZOC
C) XSHELL
D) putty
Ans: D) puTTY

Q.16) Which standard TCP port is assigned for contacting SSH server
A) port 22
B) port 23
C) port 25
D) port 20
Ans: A) port 22
Q.17) By default graphical programs over an SSH session cannot be used, to use
them which of the following command is use?
A) assh
B) ssh-Q
C) ssh-X
D) sshX11
Ans: C)ssh-X

Q.18) Whichpackege must be install on Red Hat Enterprise Linux to configure VNC
A) vnc
B) vncserver
C) vncpackage
D) tigervnc
Ans: D) tigervnc

Q.19)To set X-Forwarding for all users which file should modified?
A) /etc/ssh_config
B) /etc/ssh/ssh_config
C) /ssh/etc
D) /ssh/etc_config

Ans: B) /etc/ssh/ssh_config

Q.20)Which parameter indicates that this device is started when the server boots
A) ONBOOT
B) BOOTPROTO
C) DEFROUTE
D) UUID

Ans: A) ONBOOT
Q.21) _______ service provides information about all available authenticate
sources.
A) sddd
B) sssd
C) ssd
D) None of the above
Ans. B) sssd

Q.22) Which of the following is advanced file permission?


A) set user ID
B) set group ID
C) sticky bit
D) All of the Above
Ans. D) All of the Above

Q.23) GECOS stands for


A) General Electric Computer Operating System
B)Group Electric Computer Operating System
C) General Electric Comprehensive Operating System
D) None of the Above
Ans. C) General Electric Comprehensive Operating System

Q.24) Which UID is typically reserved for the user root


A) UID 0
B) UID 1
C) Both A and B
D) UID 2
Ans. A) UID 0
Q.25) The encrypted user password are stored in _______.
A) /etc/shadow
B) /etc/login
C) /etc/user
D) Both A and C
Ans. A) /etc/shadow

Q.26) What is the name of the graphical tool for user and group management?
A) system-config-group
B) system-config-users
C) user-config-group
D) system-manage-user
Ans. B) system-config-users

Q.27) Which type of data is stored in /etc/passwd configuration file?


A) user related information
B)system related information
C)both A and B
D) None of the Above
Ans. A) user related information

Q.28) _______ option allow you to authenticate on windows network.


A) Local Accounts only
B) LDAP
C) NIS
D) Windbind
Ans. D) Windbind
Q.29) Which command is used to change ownership of a file?
A) su
B) chown
C) chgrp
D) chmod
Ans. B) chown

Q.30) Access Control List (ACL) gives permission to how many users or group to
work on same file
A) Infinite
B) One
C) Three
D) Two
Ans. B) One

Q.31) When a user requests file from a disk in which manner it process?
A) it is read from a disk
B) Copied to the RAM
C) Open from a disk
D) A & B both
Ans: D) A & B both

Q.32) In Configuring Logging to switch back to the graphical user interface using
__________.
A) Alt + Ctrl + F1
B) F1
C) Shift + F1
D) Ctrl + F1

Ans. A) Alt + Ctrl + F1


Q.33) CIDR stands for _________.
A) Classless Inter Domain Routing
B) Class In Domain Range
C) Classless In Domain Range
D) None of the above
Ans: A) Classless Inter Domain Routing

Q.34) Which command is used to set password in VNC server?


A) vncp
B) vncpass
C) vncpasswd
D) vncpassword

Ans: C) vncpasswd

Q.35) ________ permission allow you to modify contents of the existing file
A) modify
B) write
C) read
D) execute
Ans: B) write
UNIT 3

Q.1) Firewall works through _______.


a) Packet inspection
b) Packet sending
c) Packet leading
d) Packet delivering

Ans:- a) Packet inspection

Q.2) Linux Kernal provides default firewall named as ______.


a) iptables
b) Netfilter
c) Packet inspection
d) system-config-firewall tool
Ans:- b) Netfilter

Q.3) IP masquerading is also refered as :


a) Network Acceleration Table
b) Port forwarding
c) Network Address Translation
d) Internet Control Message Protocol

Ans:- c) Network Address Translation

Q.4) Which command is used to configure Netfilter on Red Hat Linux using
graphical interface?
a) config-system-firewall
b) config-system-firewall-gui
c) system-config-firewall-tui
d) system-config-firewall
Ans:- d) system-config-firewall
Q.5) Which of the following is the major benefit of using masquerading?
a) one public IP address can’t be used to connect one device on public
network to Internet.
b) one public IP address can’t be used to connect many devices on public
network to Internet.
c) one public IP address can be used to connect many devices on private
network to Internet.
d) one private IP address can be used to connect one device on private
network to Internet.

Ans:- c) one public IP address can be used to connect many devices on


private network to Internet.

Q.6) Rules added to the firewall are found in _____.


a) logcat
b) iptables
c) configuration table
d) None of the above.

Ans:- b) iptables

Q.7) ______ offers enhancements to Netfilter firewall.


a) Protocol
b) Target
c) Modules
d) Interface

Ans:- c) Modules

Q.8) Which of the following chains is not used in filter table?


a) FORWARD
b) BACKWARD
c) INPUT
d) OUTPUT

Ans:- b) BACKWARD
Q.9) ________ is used to protect server from over logging.
a) NAT configuration
b) Protocol
c) LOG target
d) Limit module

Ans:- d) Limit module

Q.10) By default, Linux kernel doesn’t allow _____________.


a) port forwarding
b) port tracing
c) packet forwarding
d) use of TCP/UDP protocols

Ans:- c) packet forwarding

Q.11) All signed PKI certificates are stored at ______ directory.


a) certs
b) newcerts
c) private
d) crl

Ans:- a) certs

Q.12) ‘crl’ stands for:


a) certificate relocation list.
b) certified relocation list.
c) certified revocation list.
d) certificate revocation list.

Ans:- d) certificate revocation list.

Q.13) The term ‘CA’ is referred as:


a) Critical Authentication.
b) Certified Access.
c) Certificate of Authentication.
d) Certificate Authority.

Ans:- d) Certificate Authority.


Q.14) Which of the following configuration file contains default setting used to
facilitate creation of new certificates?
a) /etc/pki/openssh.cnf
b) /etc/pki/openssl.cnf
c) /bin/pki/openssl.config
d) /bin/pki/openssh.config

Ans:- b) /etc/pki/openssl.cnf

Q.15) What is the GPG command to encrypt a file?


A) gpg -d file.gpg>myfile
B) gpg -d
C) gpg -e yourfile
D) None of the above.

Ans:- C) gpg -e yourfile

Q.16) What is the command to extract the contents of an encrypted file named
‘myfile.gpg’ to ‘myfile’ ?
A) gpg --export > /myfile/myfile.key
B) gpg -d myfile.gpg>myfile
C) gpg --gen-myfile.gpg
D) None of the above.

Ans:- B) gpg -d myfile.gpg>myfile

Q.17) Once public/private key pair is created, signing request is also asked by
_______.
A) admin
B) GNU
C) genkey
D) file sender

Ans:- C) genkey
Q.18) If ‘Bob’ wants to sends an encrypted message to ‘Alice’, what command is
needed to export the Bob’s private key to a temp directory?
A) gpg --export -a > /temp/Bob.key
B) gpg --import -a < /temp/Bob.key
C) gpg -d Bob.key
D) gpg -d Bob.key>temp

Ans:- A) gpg --export -a > /temp/Bob.key

Q.19) To protect files on web server, ________ and ______ are used along with
GPG.
A) TCP , UDP
B) PKI certificate , SSL
C) Public key , Private key
D) None of the above.

Ans:- B) PKI certificate , SSL

Q.20) New certificates are kept in ‘newcerts’ until they have been _______.
a) unsigned
b) signed
c) rejected
d) None of the above.

Ans:- b) signed

Q.21) What does NFS stands for?


a) Network File Server.
b) Network For System.
c) Network File System.
d) Network For Services.

Ans:- c) Network File System.

Q.22) Which service is used to mount NFS shares automatically?


a) Selfmount
b) Automount
c) iptables
d) Showmounting

Ans:- b) Automount
Q.23) After successful start of NFS server, __________ can be used to check
that the shares are available.
a) #showmount –e localhost
b) #automount –v localhost
c) #dispmount –e localhost
d) #showmount –v localhost

Ans:- a) #showmount –e localhost

Q.24) The central configuration file in Automount is ___________.


a) /etc/auto.master
b) /etc/show.master
c) /etc/vsftpd.conf
d) /etc/exports

Ans:- a) /etc/auto.master *

Q.25) _____ is a very versatile service that can be used for different purpose on
your network.
a) SSH
b) samba
c) FTP
d) Both a and b

Ans- b) samba

Q.26) To list the Samba shares that are offered by a specific server, one can use
_____.
a) smbclient-L
b) ftp directory
c) vsftpd
d) smb.conf

Ans- a) smbclient-L
Q.27) Which of the following options makes Samba a member in a Windows
Active Directory domain
a) security = user
b) security = server
c) security = ads
d) security = domain

Ans- c) security = ads

Q.28) To mount the NFS shares automatically, insert a line in ___________.


a) /etc/fstab
b) /etc/vsftpd.conf
c) /etc/exports
d) /etc/auto.master

Ans:- a) /etc/fstab

Q.29) To make anonymous users to access files using FTP service, create
______ subdirectory within _______ directory.
a) /user , /var
b) /pub , /var/smtp
c) /pub , /var/ftp
d) /sub , /etc/vsftpd

Ans:- c) /pub, /var/ftp

Q.30) Which option uses an external server to handle Samba authentication


requests?
a) security = share
b) security = user
c) security = server
d) security = local

Ans:- c) security = server


Q.31) Which of the following does not belong to chain of NAT table?

a) REROUTING
b) PREROUTING
c) POSTROUTING
d) OUTPUT

Ans:- a) REROUTING

Q.32) Which of the following is the default location of configuration files, in which
commands executed using ‘system-config-firewall’ are saved?

a) /etc/sysconfig
b) /root
c) /usr/bin
d) /dev

Ans:- a) /etc/sysconfig

Q.33) If no specific rule is found in the chain that matches the incoming packet,
______ is applied.

a) Policy
b) Interface
c) Target
d) Protocol

Ans:- a) Policy

Q.34) What is the GPG command for the receiver to decrypt the file?

A) gpg -d
B) gpg --list-secret-keys
C) gpg --import < /directory/keyfile.key
D) gpg --export –a

Ans:- a) gpg –d
Q.35) If the receiver has the public key of the sender in their GPG ring this proves
that, ______?

A) the message has come from the intended sender.


B) the message has not come from the intended sender.
C) Both A and B
D) None of the above.

Ans:- a) The message has come from the intended sender.


UNIT 4
Q.1) DHCP provides ______ to the client.
A. IP address
B. MAC address
C. URL
D. None of the above
Answer:- A) IP address

Q.2) DHCP is used for _____.


A. IPv6
B. IPV4
C. Only IPv4
D. Both A & B
Answer:- D) Both A & B

Q.3) What is DHCP?


A. Creates IP pools to conserve address
B. Used to configure PCs over network
C. Assigns configuration info dynamically
D. All of the above
Answer:- D) All of the above

Q.4) DNS, allows domains to be divided further into _____.


A. Large-Domains
B. Down-Domains
C. Super-Domains
D. Sub-Domains
Answer:- D) Sub-Domain

Q.5) There are two types of records in _____.


A. SMTP
B. ICMP
C. DNS
D. IP
Answer:- C) DNS
Q.6) In domain name, a full domain name is a sequence of labels separated by
____.
A. Dots
B. Colons
C. Semicolons
D. Question mark
Answer:- A) Dots

Q.7) DHCP uses UDP port _____ for sending data to server.
A. 66
B. 67
C. 68
D. 69
Answer:- B) 67
Q.8) Top-level-Domains has number of _____ servers.
A. Root
B. Name
C. Zone
D. Address
Answer:- B) Name

Q.9) Which record resource Matches an IP address to a name in reverse DNS?


A. SRV
B. IANA
C. PTR
D. MX
Answer:- C) PTR

Q.10) What do IANA stands for?


A. .Internet Assigned Numbers Administrators
B. Internet Associate Numbers Authority
C. Internet Assigned Network Authority
D. Internet Assigned Numbers Authority
Answer:- D) Internet Assigned Numbers Authority
Q.11) Which of the following component is plays an important role in the process of
‘Internet Mail’?
a) Simple Mail Transfer Protocol
b) Internet Access Control
c) Post Office Protocol
d) All of the above
Answer: d) All of the above

Q.12) SMTP defines-


a) Message Transport
b) Message Encryption
c) Message Content
d) Message Password
Answer: a) Message Transport

Q.13) inet_interfaces parameter specifies-


a) The network address from MTA.
b) The IP address of the mail server to which it binds.
c) The domain of this host.
d) The name of this host.
Answer: b) The IP address of the mail server to which it binds.

Q.14) If you have to send multimedia data over SMTP it has to be encoded in which
code?
a) Single
b) Binary
c) ASCII
d) Hash
Answer: c) ASCII
Q.15) Mutt is-
a) text-based email client for Unix- like system.
b) Process control system
c) Device manipulation system
d) Information maintenance system
Answer: a) text-based email client for Unix- like system.

Q.16) Which parameter is used to quit the Mutt?


a) exit
b) q
c) quit
d) none of these
Answer: b) q

Q.17) MUA used for-


a) delete the email messages.
b) write, send and read email messages.
c) check the email message.
d) all of the above
Answer: b) write, send and read email messages.

Q.18) What is expansion of MTA-


a) Message Transfer Agent
b) Mobile Task Automation
c) Multiple Terminal Access
d) Media Termination Adapter
Answer: a) Message Transfer Agent
Q.19) Which command is used to install the mutt package?
a) su-lisa
b) yum-y install mutt
c) su -l inda
d) yum-y install
Answer: b) yum-y install mutt

Q.20) ‘Postconf’ command is used to-


a) monitor and set parameter
b) specify name of the host
c) delete the parameter
d) none of these
Answer: a) monitor and set parameter

Q.21) To use the TLS in Apache environment what is needed?


a) Modssl
b) .htpasswd
c) mod_ssl
d) config
Answer: c) mod_ssl

Q.22) The authentication setting in a block always open & close with?
a) <files>&</files>
b) <VirtualHost>&</VirtualHost>
c) <IfModule>&</IfModule>
d) <Directory>&</Directory>
Answer: d) <Directory>&</Directory>*
Q.23) What is .htpasswd?
a) It creates a new user
b) None of these
c) Asks to specify a password for that user
d) Both it creates a new user and ask to specify a password for that user
Answer: d) Both it creates a new user and ask to specify a password for
that user

Q.24) In apache which directive is used to find user account & password?
a) AuthUserFile
b) AuthName
c) AuthType
d) Auth User File
Answer: a) AuthUserFile

Q.25) _____ use to install the apache web server.


a)yum-y install https
b)yum-b install http
c)yum-a install https
d) yum-y install httpd
Answer: d) yum-y install httpd

Q.26) What is the full form of LDAP?


a) lightweight directory access protocol
b) Large directory access protocol
c) language directory access protocol
d) large direct access protocol
Answer: a) lightweight directory access protocol
Q.27) Which configuration file is required for LDAP clients?
a) httpd.conf
b) Idap.conf
c) .org
d) none of these
Answer: b) Idap.conf

Q.28) _____ is one of the most used services on Red Hat Enterprise Linux.

a) PHP
b) Apache
c) virtual hosts
d) None of the above.
Answer: b) Apache

Q.29) LAMP stands for _______


a)Linux, Apache, Mysql and web server
b) Linux, Apache, PHP and web server
c)Apache, Mysql, Web server and PHP
d) Linux, Apache, Mysql and PHP
Answer: d) Linux, Apache, Mysql and PHP

Q.30) The default document root is set to _______ on Red Hat Enterprise linux
server.
a) /var/www/html
b)/www/root/html
c)/var/root/www
d)None of the above
Answer: a)/var/www/html
Q.31) Apache server is in the _____directory.
a) /root/https
b) /etc/http
c) /etc/httpd
d) /root/httpd
Answer: c) /etc/httpd

Q.32) Among them which are correct Full Form of BIND.


A. Berkeley Internet Name Domain
B. Berkeley Information Name Domain
C. Berkeley Internet Name Dynamic
D. Berkeley Intern Name Domain
Answer: A- Berkeley Internet Name Domain

Q.33) What are TLS certificates?


a) Security protocol
b) Secure protocol
c) Transfer protocol
d) service protocol
Answer: a) Security protocol

Q.34) What is the default extension of Apache configuration file?


a) .con
b) .txt
c) .config
d) .conf
Answer: d) .conf
Q.35) Which are the two types of virtual hosting?
a) Named- based and IP- based
b) IP-based and Port based
c) a& b both
d) None of them
Answer: a) Named- based and IP- based
UNIT 5
Q.1) Which of the following symbol is used for “shebang” in shell scripting?
A. #!
B. !#
C. @!
D. !@
Ans- A) #!

Q.2) To check whether the script name exist or not, one can use ______ Command.
A. check
B. scriptname
C. which
D. chmod
Ans- C) which

Q.3) What is a shell scripting?


A. It’s a value which keeps on changing
B. It’s a sequence of commands writtern in text file which can be used in
future for execution
C. It is a doman which is reserved as a private
D.It’s a one of the most widely used web server
Ans- B) It’s a sequence of commands writtern in text file which can be
used in future for execution

Q.4) When a variable is defined then its scope is limited for the _______ Shell only.
A. global
B. outside the shell
C. current
D. dictionary
Ans- C) current
Q.5) If we want a variable in globally throughout the shell then which of the following
keyword is used?
A. global
B. export
C. globalvar
D. bash
Ans- B) export

Q.6) While giving the command line argument we need to remember that the first
argument is denoted by?
A. $first
B. $
C. #one
D. $0
Ans- D) $0

Q.7) Chose the write option for the following


A. $@ refers to a collection of all arguments that is treated as all individual
elements.
B. $* refers to a collection of all arguments, but it cannot distinguish between
the individual argument that are used.
C. None of the above.
D. both A and B
Ans- D) both A and B

Q.8) We can take the input from the user by simply asking them for it by using
______ in the script
A. input
B. read
C. echo
D. None of the above
Ans - B) read
Q.9) Which keyword is to perform calculations?
A. calculation
B. grep
C. touch
D. let
Ans- D) let

Q.10) The execution of command can be made conditional in shell scripts by


implementing technique known as ___________.
A. implement
B. flow control
C. execute cmd
D. none of the above
Ans- B) flow control

Q.11) To change the permission of file we use which command?


A. chper
B. chmod
C. chfile
D. chcmd
Ans- B) chmod

Q.12) Server is basically designed for offering _________ to the users.


A) Response.
B) Request.
C) Services
D) None of the above
Ans. C). Services
Q.13) HA clusters keep continuos track of the services involved in the cluster for
________ availability of the seservices.
A) Non stop
B) Continuous
C) Uninterrupted
D) interrupted
Ans: C). Uninterrupted

Q.14) Which is a logical device that groups at least two network cards?
A) Enter bond
B) Ethernet bond
C) intra bond.
D) Bonding device
Ans: B). Ethernet bond

Q.15) SAN is known as _________.


A) Storage area node
B) Structure area node
C) Storage area network
D) Storage architecture network
Ans: C). Storage area network

Q.16) Fencing is also referred to as STONITH which is known as…


A) Shoot the other network in the head
B) Shape the other node in the head
C) none of the above
D) Shoot the other node in the head
Ans: D). Shoot the other node in the head.
Q.17) Corosync take care of the lower layer of the cluster by using the ______
protocol to ensure that all nodes in the cluster are still available.
A) sync manager
B) FTP
C) sync
D) totem
Ans: D) totem

Q.18) which is the management interface that is used to create and manage cluster?
A) Rgmanager
B) Pacemaker
C)Conga
D) Clustermanager
Ans: C). Conga

Q.19) Luci offer its services on which HTTPS port number?


A) 8080
B) 53
C) 8084
D) 80
Ans: C). 8084

Q.20) ______ is the traditional Redhat HA cluster stack.


A) Rgmanager
B) Pacemaker
C) Conga
D) none of the above
Ans: A). Rgmanager
Q.21) ISCSI stands for?
A) internet small command system interface
B) internet small computer system interface
C) intranet small computer system interface
D) None of the above.
Ans: B). Internet small computer system interface

Q.22) what is motto of HA?


A) reducing amount of time
B) increasing performance
C) increasing amount of time
D) decreasing delay
Ans: A). Reducing amount of time

Q.23) __________ is what you need to maintain the integrity of the cluster.
A) Fencing
B) Rgmanager
C) Quorum disks
D) none of the above
Ans: A). Fencing

Q.24) cluster consists of two parts :


A) ricci and luci
B) succi and cuci
C) log and fog
D) cluster1 and cluster1
Ans: A) ricci and luci
Q.25) What is the role of a PXE server?
A. To deploy the content to the server.
B. To maintain relationship between clients.
C. To deliver boot image to the client.
D. Using internet protocol delivering messages.
Ans: C). To deliver boot image to the client.

Q.26) What is the full form of PXE ?


A. Boot Execution Environment.
B. Preboot Execution Environment.
C. Peripheral Execution Environment.
D. Postboot Execution Environment.
Ans: B). Preboot Execution Environment.

Q.27) KICKSTART file is used to ___________.


A. To delete contents from a folder.
B. To install taking input from you.
C. To perform a completely automated installation.
D. To perform operations on a file.
Ans: C). To perform a completely automated installation.

Q.28) Full form of TFTP is _______.


A. Trivial file transfer protocol.
B. Travel file transfer protocol.
C. Travel file transport protocol.
D. File transfer protocol.
Ans: A). Trivial file transfer protocol.
Q.29) To use a kickstart file,addition of the kickstart file in the section of ________
is needed.
A. FTP file.
B. PXE default file.
C. TFTP default file.
D. DHCP file.
Ans: C). TFTP default file.

Q.30) The full form of RHEL server is __________.


A.Real Hat Enironment Linux .
B.Red Hat Enironment Linux .
C.Real Hat Enterprise Linux .
D.Red Hat Enterprise Linux .
Ans: D). Red Hat Enterprise Linux .

Q.31) To count the number of argument provided with a script which symbol is
used?
A. $#
B. #count
C. $@
D. $count
Ans- A) $#

Q.32) Variable text can be put in a script by using which command?


A. substitution
B. addition
C. put
D. putvariable.
Ans- A) substitution
Q.33) Which operator syntax is used for multiplication while performing
calculations?
A. *
B. **
C. \*
D. mul
Ans- C) \*

Q.34) Which is the correct path for hosts file?


A) /etc/hosts
B) /bin/hosts
C) /usr/share/hosts
D) ~/hosts
Ans- A) /etc/hosts

Q.35) which of the following is not used in high-availability requirement?


A) Multiple node
B) Fence device
C) Ethernet bonding
D) Rgmanager
Ans- D) Rgmanager

You might also like