Читать книгу CompTIA Linux+ Powered by Linux Professional Institute Study Guide - Richard Blum - Страница 6
Assessment Test
Оглавление1. Which section in the X server configuration file defines the combination of monitors and video cards that you're using on your Linux system?
A.
Monitor
B.
Screen
C.
Modeline
D.
Device
E.
Module
2. How can you tell whether your system is using inetd
or xinetd
as a super server? (Select two.)
A. Type ps ax | grep inetd, and examine the output for signs of
inetd
orxinetd
.B. Type superserver to see a report on which super server is running.
C. Look for the
/etc/inetd.conf
file or/etc/xinetd.d
subdirectory, which are signs ofinetd
orxinetd
, respectively.D. Examine the
/etc/inittab
file to see which super server is launched byinit
, which is responsible for this task.E. Type netstat – a | grep inet and examine the output for signs of
inetd
orxinetd
.
3. How does the lpc
utility for CUPS differ from its counterpart in BSD LPD and LPRng?
A. The
lpc
utility is unique to CUPS; it doesn't ship with BSD LPD or LPRng.B. CUPS doesn't ship with an
lpc
command, but BSD LPD and LPRng do.C. CUPS's
lpc
is much more complex than its counterpart in BSD LPD and LPRng.D. CUPS's
lpc
is much simpler than its counterpart in BSD LPD and LPRng.E. The
lpc
utility is identical in all three of these printing systems.
4. What file would you edit to restrict the number of simultaneous logins a user can employ?
A.
/etc/pam.d/login-limits
B.
/etc/bashrc
C.
/etc/security/limits.conf
D.
/etc/inittab
E.
/etc/passwd
5. Which of the following are required when configuring a computer to use a static IP address? (Select two.)
A. The IP address of the DHCP server
B. The hostname of the NBNS server
C. The computer's IP address
D. The network mask
E. The IP address of the NTP server
6. What does the following command accomplish?
A. It launches the
wc
editor on both thereport.txt
andwc.txt
files; each file opens in its own window.B. It displays a count of the windows in which the
report.txt
file is displayed and shows that information in a new window calledwc
.C. It creates a count of newlines, words, and bytes in the
report.txt
file and then displays a count of these statistics about the report it just generated.D. It cleans up any memory leaks associated with the
tee
program's use of thereport.txt
file.E. It displays a count of newlines, words, and bytes in the
report.txt
file and copies that output to thewc
file.
7. Which of the following characters defines the end of an OS or kernel definition in /boot/grub/grub.cfg
?
A. ;
B.
)
C.
}
D.
*/
E. None of the above; the definition ends with the
title
line beginning the next entry.
8. What does the number 703
represent in the following /etc/passwd
entry?
A. The account's human ID (HID) number
B. The account's process ID (PID) number
C. The account's group ID (GID) number
D. The account's globally unique ID (GUID) number
E. The account's user ID (UID) number
9. What does the grep
command accomplish?
A. It creates a pipeline between two programs.
B. It searches files' contents for a pattern.
C. It concatenates two or more files.
D. It displays the last several lines of a file.
E. It locates files on the hard disk.
10. Which of the following are journaling filesystems for Linux? (Select three.)
A. vfat
B. ReiserFS
C. Ext2fs
D. Ext3fs
E. XFS
11. You've configured your computer to use SMTP and IMAP via a tunneled SSH connection to your ISP's email server for improved security. Why might you still want to use GPG encryption for your emails on top of the encryption provided by SSH?
A. The SSH tunnel reaches only as far as the first email server; GPG encrypts data on all of the computers all the way to or from your email correspondents.
B. SSH encryption is notoriously poor for email, although it's perfectly adequate for login sessions; thus, adding GPG encryption improves security.
C. SSH doesn't encrypt the headers of the email messages; GPG encrypts the headers to keep snoopers from learning your correspondents' identities.
D. Using GPG guarantees that your email messages won't contain unwanted viruses or worms that might infect your correspondents' computers.
E. Configured in this way, SSH will encrypt the email headers and bodies but not any attachments to your email.
12. Which of the following ports are commonly used to retrieve email from an email server computer? (Select two.)
A. 110
B. 119
C. 139
D. 143
E. 443
13. You're experiencing sporadic problems with a Secure Shell (SSH) login server – sometimes users can log in and sometimes they can't. What might you try immediately after a failure to help diagnose this problem?
A. On the server computer, type http://localhost:631 into a web browser to access the SSH configuration page and check its error subpage for error messages.
B. Type diagnose sshd to run a diagnostic on the SSH server daemon (
sshd
).C. Type tail /var/log/messages to look for error messages from the server.
D. Examine the
/dev/ssh
device file to look for error messages from the server.E. On the server computer, type sshd to view SSH's diagnostic messages.
14. What is the function of the ∼/.profile
file?
A. It's the user configuration file for the ProFTP server.
B. It's one of a user's
bash
startup scripts.C. It's the user configuration file for the ProFile file manager.
D. Its presence tells
tcsh
to ignore file modes.E. It holds the user's encrypted password.
15. You want your computer to remind you to get your car inspected in two years. What is the best way to do this among the specified options?
A. Create a program that repeatedly checks the time and, when two years have passed, displays a message to get your car inspected.
B. Type cal day month year, where day, month, and year specify the date of the future inspection, to have Linux run a program that you then specify on that date.
C. Create a
cron
job that runs hourly. This job should check the date and, when the correct date comes up, useD. Use the NTP GUI calendar program to create an alarm for the specified date. The program will then display the message you enter at the specified date and time.
E. Type at date, where date is a date specification. You can then specify a command, such as
16. How would you configure a computer to use the computer whose IP address is 172.24.21.1 as a gateway for all network traffic that's not otherwise configured?
A. gateway default 172.24.21.1
B. gateway 172.24.21.1
C. route gateway 172.24.21.1
D. route add default gw 172.24.21.1
E. gw 172.24.21.1
17. What software can you use to drive a Braille display device? (Select two.)
A. Emacspeak
B. BRLTTY
C. A 2.6.26 or later kernel
D. GOK
E. A framebuffer driver
18. Which is true of source RPM packages?
A. They consist of three files: an original source tarball, a patch file of changes, and a PGP signature indicating the authenticity of the package.
B. They require programming knowledge to rebuild.
C. They can sometimes be used to work around dependency problems with a binary package.
D. They are necessary to compile software for RPM-based distributions.
E. They always contain software that's licensed under terms of the GPL.
19. Which utility should you use by itself to rename the file pumpkin.txt
to lantern.txt
?
A.
dd
B.
rm
C.
cp
D.
mv
E.
ln
20. You want to run a lengthy scientific simulation program, called simbigbang
, which doesn't require any user interaction; the program operates solely on disk files. If you don't want to tie up the shell from which you run the program, what should you type to run simbigbang
in the background?
A. start simbigbang
B. simbigbang &
C. bg simbigbang
D. background simbigbang
E. nice simbigbang
21. Which of the following commands will install an RPM package file called theprogram-1.2.3-4.i386.rpm
on a computer? (Select two.)
A. rpm – Uvh theprogram-1.2.3-4.i386.rpm
B. rpm – i theprogram-1.2.3-4.i386.rpm
C. rpm – U theprogram
D. rpm – e theprogram-1.2.3-4.i386.rpm
E. rpm – Vp theprogram-1.2.3-4.i386.rpm
22. What tool can diagnose and fix many common Linux filesystem problems?
A.
mkfs
B.
fsck
C.
chkdsk
D.
scandisk
E.
fdisk
23. You've just installed MySQL, and you intend to use it to store information about the animals in a zoo, from the anteaters to the zebras. What command are you likely to use first, once you start MySQL?
A. CREATE DATABASE animals;
B. USE animals;
C. CREATE TABLE animals;
D. INSERT INTO animals;
E. UPDATE animals;
24. Which of the following commands displays help on topic, when typed in a Linux shell? (Select two.)
A. manual topic
B. man topic
C. ? topic
D. info topic
E. hint topic
25. A computer's hardware clock keeps track of the time while the computer is powered off. In what formats may this time be stored on an x86 Linux system? (Select two.)
A. Coordinated Universal Time (UTC)
B. Internet Time
C. Local time
D. 12-hour time
E. Mars time
26. You want to know what kernel modules are currently loaded. What command would you type to learn this information?
A. insmod
B. depmod
C. modprobe
D. lsmod
E. modinfo
27. You want to enable all members of the music
group to read the instruments.txt
file, which currently has 0640 (-rw-r–
) permissions, ownership by root
, and group ownership by root
. How might you accomplish this goal? (Select two.)
A. Type chown music instruments.txt in the file's directory.
B. Type chgrp music instruments.txt in the file's directory.
C. Type chgroup music instruments.txt in the file's directory.
D. Type chmod 0600 instruments.txt in the file's directory.
E. Type chown :music instruments.txt in the file's directory.
28. You want to create a link to the /usr/local/bin
directory in another location. Which of the following statements is true?
A. You can do this only if
/usr/local/bin
is on a journaling filesystem.B. You must own
/usr/local/bin
to create the link.C. You can create the link only if the link's location is on the same filesystem as the original directory.
D. Only the system administrator can do this.
E. The link will probably have to be a symbolic link.
29. Which of the following, when typed in vi's command mode, saves a file and quits the program? (Select two.)
A. :rq
B. :wq
C. :re
D. :we
E. ZZ
30. A user's home directory includes a file called ∼/.forward
that consists of one line: |∼/junkme
. What is the effect of this configuration?
A. The user's incoming mail is forwarded to the
junkme
user on the same system.B. The user's incoming mail is stored in the
∼/junkme
file.C. The user's incoming mail is sent through the
∼/junkme
program file.D. The user's incoming mail is flagged as spam and deleted.
E. The user's incoming mail is forwarded to the same user on the
junkme
computer.