Читать книгу CompTIA Linux+ Powered by Linux Professional Institute Study Guide - Richard Blum - Страница 6

Assessment Test

Оглавление

1. Which section in the X server configuration file defines the combination of monitors and video cards that you're using on your Linux system?

A. Monitor

B. Screen

C. Modeline

D. Device

E. Module

2. How can you tell whether your system is using inetd or xinetd as a super server? (Select two.)

A. Type ps ax | grep inetd, and examine the output for signs of inetd or xinetd.

B. Type superserver to see a report on which super server is running.

C. Look for the /etc/inetd.conf file or /etc/xinetd.d subdirectory, which are signs of inetd or xinetd, respectively.

D. Examine the /etc/inittab file to see which super server is launched by init, which is responsible for this task.

E. Type netstat – a | grep inet and examine the output for signs of inetd or xinetd.

3. How does the lpc utility for CUPS differ from its counterpart in BSD LPD and LPRng?

A. The lpc utility is unique to CUPS; it doesn't ship with BSD LPD or LPRng.

B. CUPS doesn't ship with an lpc command, but BSD LPD and LPRng do.

C. CUPS's lpc is much more complex than its counterpart in BSD LPD and LPRng.

D. CUPS's lpc is much simpler than its counterpart in BSD LPD and LPRng.

E. The lpc utility is identical in all three of these printing systems.

4. What file would you edit to restrict the number of simultaneous logins a user can employ?

A. /etc/pam.d/login-limits

B. /etc/bashrc

C. /etc/security/limits.conf

D. /etc/inittab

E. /etc/passwd

5. Which of the following are required when configuring a computer to use a static IP address? (Select two.)

A. The IP address of the DHCP server

B. The hostname of the NBNS server

C. The computer's IP address

D. The network mask

E. The IP address of the NTP server

6. What does the following command accomplish?


A. It launches the wc editor on both the report.txt and wc.txt files; each file opens in its own window.

B. It displays a count of the windows in which the report.txt file is displayed and shows that information in a new window called wc.

C. It creates a count of newlines, words, and bytes in the report.txt file and then displays a count of these statistics about the report it just generated.

D. It cleans up any memory leaks associated with the tee program's use of the report.txt file.

E. It displays a count of newlines, words, and bytes in the report.txt file and copies that output to the wc file.

7. Which of the following characters defines the end of an OS or kernel definition in /boot/grub/grub.cfg?

A. ;

B. )

C. }

D. */

E. None of the above; the definition ends with the title line beginning the next entry.

8. What does the number 703 represent in the following /etc/passwd entry?


A. The account's human ID (HID) number

B. The account's process ID (PID) number

C. The account's group ID (GID) number

D. The account's globally unique ID (GUID) number

E. The account's user ID (UID) number

9. What does the grep command accomplish?

A. It creates a pipeline between two programs.

B. It searches files' contents for a pattern.

C. It concatenates two or more files.

D. It displays the last several lines of a file.

E. It locates files on the hard disk.

10. Which of the following are journaling filesystems for Linux? (Select three.)

A. vfat

B. ReiserFS

C. Ext2fs

D. Ext3fs

E. XFS

11. You've configured your computer to use SMTP and IMAP via a tunneled SSH connection to your ISP's email server for improved security. Why might you still want to use GPG encryption for your emails on top of the encryption provided by SSH?

A. The SSH tunnel reaches only as far as the first email server; GPG encrypts data on all of the computers all the way to or from your email correspondents.

B. SSH encryption is notoriously poor for email, although it's perfectly adequate for login sessions; thus, adding GPG encryption improves security.

C. SSH doesn't encrypt the headers of the email messages; GPG encrypts the headers to keep snoopers from learning your correspondents' identities.

D. Using GPG guarantees that your email messages won't contain unwanted viruses or worms that might infect your correspondents' computers.

E. Configured in this way, SSH will encrypt the email headers and bodies but not any attachments to your email.

12. Which of the following ports are commonly used to retrieve email from an email server computer? (Select two.)

A. 110

B. 119

C. 139

D. 143

E. 443

13. You're experiencing sporadic problems with a Secure Shell (SSH) login server – sometimes users can log in and sometimes they can't. What might you try immediately after a failure to help diagnose this problem?

A. On the server computer, type http://localhost:631 into a web browser to access the SSH configuration page and check its error subpage for error messages.

B. Type diagnose sshd to run a diagnostic on the SSH server daemon (sshd).

C. Type tail /var/log/messages to look for error messages from the server.

D. Examine the /dev/ssh device file to look for error messages from the server.

E. On the server computer, type sshd to view SSH's diagnostic messages.

14. What is the function of the ∼/.profile file?

A. It's the user configuration file for the ProFTP server.

B. It's one of a user's bash startup scripts.

C. It's the user configuration file for the ProFile file manager.

D. Its presence tells tcsh to ignore file modes.

E. It holds the user's encrypted password.

15. You want your computer to remind you to get your car inspected in two years. What is the best way to do this among the specified options?

A. Create a program that repeatedly checks the time and, when two years have passed, displays a message to get your car inspected.

B. Type cal day month year, where day, month, and year specify the date of the future inspection, to have Linux run a program that you then specify on that date.

C. Create a cron job that runs hourly. This job should check the date and, when the correct date comes up, use mail to notify you of the need for a car inspection.

D. Use the NTP GUI calendar program to create an alarm for the specified date. The program will then display the message you enter at the specified date and time.

E. Type at date, where date is a date specification. You can then specify a command, such as mail with appropriate options, to notify you of the need to get your car inspected.

16. How would you configure a computer to use the computer whose IP address is 172.24.21.1 as a gateway for all network traffic that's not otherwise configured?

A. gateway default 172.24.21.1

B. gateway 172.24.21.1

C. route gateway 172.24.21.1

D. route add default gw 172.24.21.1

E. gw 172.24.21.1

17. What software can you use to drive a Braille display device? (Select two.)

A. Emacspeak

B. BRLTTY

C. A 2.6.26 or later kernel

D. GOK

E. A framebuffer driver

18. Which is true of source RPM packages?

A. They consist of three files: an original source tarball, a patch file of changes, and a PGP signature indicating the authenticity of the package.

B. They require programming knowledge to rebuild.

C. They can sometimes be used to work around dependency problems with a binary package.

D. They are necessary to compile software for RPM-based distributions.

E. They always contain software that's licensed under terms of the GPL.

19. Which utility should you use by itself to rename the file pumpkin.txt to lantern.txt?

A. dd

B. rm

C. cp

D. mv

E. ln

20. You want to run a lengthy scientific simulation program, called simbigbang, which doesn't require any user interaction; the program operates solely on disk files. If you don't want to tie up the shell from which you run the program, what should you type to run simbigbang in the background?

A. start simbigbang

B. simbigbang &

C. bg simbigbang

D. background simbigbang

E. nice simbigbang

21. Which of the following commands will install an RPM package file called theprogram-1.2.3-4.i386.rpm on a computer? (Select two.)

A. rpm – Uvh theprogram-1.2.3-4.i386.rpm

B. rpm – i theprogram-1.2.3-4.i386.rpm

C. rpm – U theprogram

D. rpm – e theprogram-1.2.3-4.i386.rpm

E. rpm – Vp theprogram-1.2.3-4.i386.rpm

22. What tool can diagnose and fix many common Linux filesystem problems?

A. mkfs

B. fsck

C. chkdsk

D. scandisk

E. fdisk

23. You've just installed MySQL, and you intend to use it to store information about the animals in a zoo, from the anteaters to the zebras. What command are you likely to use first, once you start MySQL?

A. CREATE DATABASE animals;

B. USE animals;

C. CREATE TABLE animals;

D. INSERT INTO animals;

E. UPDATE animals;

24. Which of the following commands displays help on topic, when typed in a Linux shell? (Select two.)

A. manual topic

B. man topic

C. ? topic

D. info topic

E. hint topic

25. A computer's hardware clock keeps track of the time while the computer is powered off. In what formats may this time be stored on an x86 Linux system? (Select two.)

A. Coordinated Universal Time (UTC)

B. Internet Time

C. Local time

D. 12-hour time

E. Mars time

26. You want to know what kernel modules are currently loaded. What command would you type to learn this information?

A. insmod

B. depmod

C. modprobe

D. lsmod

E. modinfo

27. You want to enable all members of the music group to read the instruments.txt file, which currently has 0640 (-rw-r–) permissions, ownership by root, and group ownership by root. How might you accomplish this goal? (Select two.)

A. Type chown music instruments.txt in the file's directory.

B. Type chgrp music instruments.txt in the file's directory.

C. Type chgroup music instruments.txt in the file's directory.

D. Type chmod 0600 instruments.txt in the file's directory.

E. Type chown :music instruments.txt in the file's directory.

28. You want to create a link to the /usr/local/bin directory in another location. Which of the following statements is true?

A. You can do this only if /usr/local/bin is on a journaling filesystem.

B. You must own /usr/local/bin to create the link.

C. You can create the link only if the link's location is on the same filesystem as the original directory.

D. Only the system administrator can do this.

E. The link will probably have to be a symbolic link.

29. Which of the following, when typed in vi's command mode, saves a file and quits the program? (Select two.)

A. :rq

B. :wq

C. :re

D. :we

E. ZZ

30. A user's home directory includes a file called ∼/.forward that consists of one line: |∼/junkme. What is the effect of this configuration?

A. The user's incoming mail is forwarded to the junkme user on the same system.

B. The user's incoming mail is stored in the ∼/junkme file.

C. The user's incoming mail is sent through the ∼/junkme program file.

D. The user's incoming mail is flagged as spam and deleted.

E. The user's incoming mail is forwarded to the same user on the junkme computer.

CompTIA Linux+ Powered by Linux Professional Institute Study Guide

Подняться наверх