1 - Linux All
1 - Linux All
1. What command is used to count the total number of lines, words, and characters contained in a
file?
A.countw
B.wcount
C.wc
D.count p
Answer: Option C
A.dm
B.rm
C.delete
D.erase
Answer: Option B
A.rdir
B.remove
C.rd
D.rmdir
Answer: Option D
4. What command is used with vi editor to delete a single character?
A.x
B.y
C.a
D.z
Answer: Option A
A.SPARC
B.IBM-compatible
C.Alpha
D.Macintosh
Answer: Option D
defines the electrical characteristics of signals passed between the computer and
C.
communication devices
D
All of the above
.
Answer: Option C
A.UDP
B.RARP
C.FTP
D
TELNET
.
Answer: Option D
8. How many networks and nodes per network, are allowed by the Class B network?
D
All of the above
.
Answer: Option B
A.NFS
B.SMB
C.NIS
D
DNS
.
Answer: Option D
10. Which of the following command is used to create a Linux installation boot floppy?
A. mkboot disk
B. bootfp disk
C. ww and rawwrite
D. dd and rawrite
Answer: Option D
A.Using useradd
B.Using adduser
C.Using linuxconf
D
All of the above
.
Answer: Option D
12. What file specifies the order in which to use specified name services?
A./etc/services
B./etc/nsorder
C./etc/nsswitch.conf
D
/etc/hosts
.
Answer: Option C
A.16
B.4
C.2
D
1
.
14. In which directory can you store system user default files used for creating user
directories?
A./usr/tmp
B./etc/default
C./etc/skel
D
/etc/users
.
Answer: Option C
Explanation:
The /etc/skel directory contains files and directories that are automatically copied over
to a new user's home directory when such user is created.
D
rpm -e ipchains-1.3.9-5.i386.rpm
.
Answer: Option C
Answer: Option D
Answer: Option D
Answer: Option B
19. Which of the following command can you execute to count the number of lines in a file?
A
lc
.
B.wc - l
C.cl
D
count
.
E. None of the above
Answer: Option B
Answer: Option B
22. What command is not used to list the files chap01, chap02 and chap04?
A.ls chap*
B.ls chap[124]
C.ls - x chap0[124]
D.ls chap0[124]
E. None of the above
Answer: Option B
23. What command is used with vi editor to replace text from cursor to right
A.S
B.s
C.R
D.r
E. None of the above
Answer: Option C
Answer: Option C
25. What sign is used to erase or kill an entire line you have typed and start you are on a
new line (but not display a new prompt)?
A.!
B.$
C.#
D.@
E. None of the above
Answer: Option D
26. What command is used to sort the lines of data in a file in alphabetical order?
A.sort - r
B.st
C.sh
D.sort
Answer: Option D
27. What command is used with vi editor to save file and remain in the editing mode?
A.x
B.q!
C.:w
D.:q
28. What command is used with vi editor to move back to the beginning of a word?
A.w
B.e
C.a
D.b
Answer: Option D
29. What command is used with vi editor to search a pattern in the forward direction?
A.??
B.//
C.?
D./
Answer: Option D
A.lpd
B.lpr
C.lpq
D.lpc
31. What protocol(s) is(are) allowed a user to retrieve her/his mail from the mail server to her/his
mail reader?
A.POP3
B.FTP
C.MAP
Answer: Option A
B.RHAD Labs
C.GNOME Project
Answer: Option A
A.XConfigurator
B.XF86Setup
C.xf86config
Answer: Option B
34. Which of the following server is used with the BIND package?
A.httpd
B.shttp
C.dns
D.named
Answer: Option D
A.4322
B.2314
C.7334
D.3128
Answer: Option D
A./etc/apache.conf
B./etc/httpd/config.ini
C./etc/httpd/conf/httpd.conf
D./etc/srm.conf
37. Which of the following command is used to access an SMB share on a Linux system?
A.NFS
B.SMD
C.smbclient
D.smbserver
Answer: Option C
38. Which of the following command is used to see the services running in NFS server?
A.rpcinfo
B.serverinfo
C.NFSinfo
D.infserv
Answer: Option A
39. In which tcp_wrappers file can you specify to allow all connections from all hosts?
A./etc/hosts.allow
B./etc/hosts.deny
C./etc/hosts
D./etc/tcp.conf
C.General Unix
Answer: Option A
41. What shell's wild-card is used to match any number of characters including none?
A.*
B.?
C.[!ijk]
D.[ijk]
Answer: Option A
A.tar
B.dir
C.lp
D.ls
Answer: Option D
43. What command is used with vi editor to append text at end of line?
A.I
B.i
C.a
D.A
Answer: Option D
A.copy
B.cp - p
C.cpio
D.cp
Answer: Option C
45. In OSI network architecture, the dialogue control and token management are responsible of
B.transport layer
C.network layer
D.session layer
A.network layer
B.transport layer
C.link layer
D.physical layer
Answer: Option D
47. What layer of OSI determines the interface of the system with the user?
A.Session
B.Data-link
C.Application
D.Network
Answer: Option C
A.lpq
B.lpr
C.lprm
D.lpc
A.Alt+Function Key
B.Ctrl+Function Key
C.Ctrl+Alt+Del
D.Alt+a+w+Function Key
Answer: Option A
50. Which of the following NIS clients, finds and stores information about an NIS domain and server?
A.ypwhich
B.ypbind
C.ypcat
D.yppoll
Answer: Option B
1. What command is used to count the total number of lines, words, and characters contained in a
file?
A.countw
B.wcount
C.wc
D.count p
Answer: Option C
A.dm
B.rm
C.delete
D.erase
Answer: Option B
A.rdir
B.remove
C.rd
D.rmdir
Answer: Option D
A.x
B.y
C.a
D.z
Answer: Option A
A.SPARC
B.IBM-compatible
C.Alpha
D.Macintosh
Answer: Option D
1. What command is used to save the standard output in a file, as well as display it on the terminal?
A.tee
B.grep
C.cat
D.more
Answer: Option A
2. What command is used to count just the number of lines contained in a file?
A.wc - r
B.wc - w
C.wc - c
D.wc - l
Answer: Option D
A.session layer
B.transport layer
D.network layer
Answer: Option D
4. The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted
decimal notation as
A.128.10.2.30
B.210.20.2.64
C.164.100.9.61
D.148.20.2.30
Answer: Option A
5. Which class network is used for a collection of a small number of networks with a large number of
nodes?
A.Class A
B.Class B
C.Class C
Answer: Option A
A.Net.Net.Net.Node
B.Net.Net.Node.Node
C.Net.Node.Net.Node
D.Net.Node.Node.Node
Answer: Option D
A.NFS
B.FTP
C.PCMCIA
Answer: Option D
8. RPM
Answer: Option A
A.rpm -q
B.rpm -a
C.rpm -d
D.rpm -1
Answer: Option A
10. What script is run for setting bash global defaults for all users?
A./etc/.profile
B./etc/.bashrc
C./etc/.log
D./etc/profile
Answer: Option D
A.Bill Gates
B.Ben Thomas
C.Richard Stallman
D.Linus Torvalds
Answer: Option D
12. Which of the following is not a part of default Red Hat Linux email system?
A.Pine
B.The MTA
C.The MUA
D.procmail
Answer: Option A
A.utilinux
B.cempre
C.switchdesk
D.window
Answer: Option C
14. In what file can you specify which users are not allowed to access a system via FTP?
A./etc/ftpusers
B./etc/hosts.deny
C./etc/ftpaccess
D.All of the above
Answer: Option A
15. Which program is used to schedule particular jobs or programs at particular times on the
system?
A.vi
B.Outlook
C.Scheduler
D.cron
Answer: Option D
A.save
B.sync
C.edbuff
D.flush
Answer: Option B
A.16
B.4
C.2
D.1
Answer: Option D
18. For you to create a swap partition by using fdisk, what must the partition's system ID type be?
A.83
B.82
C.5
D.4
Answer: Option B
19. What file contains the list of port numbers (and associated names) monitored by inetd?
A./etc/services
B./etc/nsorder
C./etc/nsswitch.conf/
D./etc/hosts
Answer: Option A
20. The location of some system configuration and system administrator executable files, is:
A./home
B./proc
C./var
D./sbin
Answer: Option D
21. The location for subdirectories for local programs and executables for user and administrative
commands, is:
A./usr
B./tmp
C./opt
D./mnt
Answer: Option A
A.sort
B.wc
C.grep
D.cat
Answer: Option D
B.of
C.od
D.cd
Answer: Option C
24. What command is used to assign executable permission to all of the files named "report"?
B.chmod u + x report
Answer: Option A
A.cdir
B.chdir
C.changedir
D.cd
Answer: Option D
26. What command is used to count the number of files in the current directory by using pipes?
A.ls | ws - c
B.ls | wc - w
C.ls | wc - l
D.ls | wc
Answer: Option C
A.wc - r
B.wc - w
C.wc - c
D.wc - 1
Answer: Option C
A.128
B.126
C.16,382
D.2,113,658
Answer: Option D
29. LILO
Answer: Option D
30. How can you rebuild the RPM file to include the new patches?
A.- - recompile
B.- - rebuild
C.- - generate
D.- - execute
Answer: Option A
A./sbin/usrquota
B./sbin/edquota
C./sbin/quotaon
D./sbin/quota
Answer: Option B
32. NIS
is a simple directory service whose main purpose is to allow remote authentication of systems
B.
on local network systems
Answer: Option A
33. In order to increase the amount of memory available for a system, what is the maximum size of a
swap partition (with kernel version 2.2.x)?
A.2GB
B.128MB
C.64MB
D.32MB
Answer: Option A
A./etc/mount.sys
B./etc/filesys
C./etc/sysconfig
D./etc/fstab
Answer: Option D
35. Who has developed the Linux?
A.Bob Young
B.Mark Eving
C.Richard Stallman
D.Linus Torvalds
Answer: Option D
Answer: Option C
A./dev
B./bin
C./etc
D./home
Answer: Option A
38. Which of the following subdirectory(ies) contains the system boot scripts.
A./dev
B./bin
C./etc
D./home
Answer: Option C
39. What of the following tool is used to check and repair Linux file systems?
A.mkfs
B.fdisk
C.fsck
D.mount
Answer: Option C
A.mkfs
B.fdisk
C.fsck
D.mount
Answer: Option B
41. Where can system and mail logs be found in Ret Hat Linux?
A./var/log
B./etc/log
C./mail
Answer: Option A
A.lyrix
B.ed
C.vi
D.cat
Answer: Option D
A.ren
B.mv
C.remove
D.change
Answer: Option B
44. What command is used to remove a file?
A.del
B.mv
C.rm
D.remove
Answer: Option C
A.grep
B.more
C.head
D.cat
Answer: Option C
A.which
B.pwd
C.i /4
D.who am i
47. What layer protocol is responsible for user and the application programme support such as
passwords, resource sharing, file transfer and network management?
A.Layer 4 protocols
B.Layer 5 protocols
C.Layer 6 protocols
D.Layer 7 protocols
Answer: Option D
48. What package group will you select during the custom configuration to enable the machine to
communicate with Windows clients?
B.IPX/NetWare Connectivity
C.Dial-up Workstation
Answer: Option A
49. Which of the following tool allows you to change your default X Window desktop?
A.switchdesk
B.intrc
C.xinitre
D.Xchange
A.httpd.conf
B.apache.con
C./etc/profile
D.system.ini
Answer: Option A
1. What command is used to sort the lines of data in a file in reverse order?
A.sort - r
B.st
C.sh
D.sort
Answer: Option A
A.lp
B.pg
C.prn
D.print
Answer: Option C
4. What command is used with vi editor to move forward to the end of a word?
A.c
B.d
C.b
D.e
Answer: Option D
A.16-bit addresses
B.32-bit addresses
C.64-bit addresses
D.8-bit addresses
6. What TCP/IP protocol is used for file transfer with minimal capability and minimal overhead?
A.TELNET
B.TFTP
C.FTP
D.RARP
Answer: Option B
7. What TCP/IP protocol is used for transferring electronic mail messages from one machine to
another?
A.FTP
B.SNMP
C.SMTP
D.RPC
Answer: Option C
A.init 0
B.Shutdown -t
C.Shutdown -g -y0
D.Ctrl+Alt+Del
A.apached
B.httpd
C.html
D.shttp
Answer: Option B
10. GNOME is based on
A.CORBA toolkit
B.COM/DCOM toolkit
C.ORE toolkit
D.OLE DB toolkit
Answer: Option A
A.netstat
B.route
C.trace
D.ipchains
12. Which program is used to automatically install Red Mat Linux on identical hardware?
A.bzimage.img
B.tar
C.ghost
D.mkkickstart
Answer: Option D
A.SSH
B.time
C.ntalk
D.finger
Answer: Option A
A.Linus Torvalds
B.Richard Stallman
C.Bob Young
Answer: Option B
15. What shell's wild-card is used to match a single character?
A.[!ijk]
B.[ijk]
C.?
D.*
Answer: Option C
A.tar
B.cpio
C.cp
D.copy
Answer: Option C
A.path
B.pwd
C.prompt $p$g
D.dir
Answer: Option B
18. What command is used with vi editor to move the cursor to the left?
A.h
B.k
C.j
D.i
Answer: Option A
A.addroute
B.route
C.netstat
D.net
Answer: Option B
A.nfsmount
B.knfsd
C.mount
Answer: Option C
21. To build a modularized kernel, the kernel-headers and kernel-source packages must first be
installed. Where will you find the kernel-headers and kernel-source?
A./usr/local
B./usr/src/linux
C./usr/sre/redhat
D./usr/bin
Answer: Option B
22. After you have compiled your kernel, what do you have to edit to boot your new kernel image?
A./boot/lilo.conf
B./etc/conf.modules
C./etc/named.boot
D./etc/lilo.conf
Answer: Option D
23. To create an installation boot floppy disk from Linux (or another Unix) machine, what command
could you use?
A.fdisk
B.fsck
C.dd
D.rawrite
24. You just added a new user, kara, to the system. What group is kara added to by default?
A.root
B.kara
C.group
D.user
Answer: Option B
25. What are the appropriate Hex codes for setting Linux swap and Linux native partition types in
fdisk?
A.82 and 83
B.92 and 93
C.63 and 64
D.82 and 85
Answer: Option A
A.rename
B.delete
C.rm
D.cp
Answer: Option C
27. Which of the following command lists the last 10 lines of a file?
A.grep
B.tail
C.head
D.cat
Answer: Option B
A.kill
B.cancel
C.haltsys
D.shutdown
Answer: Option A
A.3$d
B.3 dw
C.3 x
D.3 dd
Answer: Option B
30. What command is used to assign only read permission to all three categories of the file'letter'?
A.chmod u + r, g + r, o - x letter
D.chmod go + r letter
Answer: Option B
31. What command is used with file named 'letter' to remove the executable permission from the
user and assign read permission to the group and others?
A.chmod go + x, u - x letter
B.chmod g - x, uo + r letter
C.chmod go + r, u + x letter
D.chmod u - x, go + r letter
Answer: Option D
32. What command is used to assign executable permission to the owner of the file named "letter"?
B.chmod u + x letter
C.chmod u + w letter
D.chmod g + x letter
Answer: Option B
A.ccp
B.du
C.cmp
D.comp
E. None of the above
Answer: Option C
A.disk
B.du
C.fdisk
D.chkdsk
Answer: Option B
A.lpq
B.lpr
C.lprm
D.lpc
Answer: Option A
A.Linux
B.BSD
C.UnixWare
D.DOS
E. None of the above
Answer: Option D
37. Which of the following NIS clients returns the name of the NIS server used by the NIS client?
A.ypwhich
B.ypbind
C.ypcat
D.yppoll
Answer: Option A