Wa0002.
Wa0002.
distro?
● SuSE
2) _________ are typically a precompiled
software.
● Package
3) Which option of rpm command is used to
verbose the actions performed by rpm?
● "-v"
4) Which of the following is not an advantage
of open source?
● Poor code quality
5) _________ option of rpm command
upgrades or install the package currently
installed to newer versions.
● "--upgrade"
6) Packages in Debian have _____________
extension.
● .deb
7) Linux distributions are categorised as
________ and _________.
● Commercial and Noncommercial
8) _________ option of rpm command is used
to check whether installation would succeed
without performing an actual installation.
● "--test"
9) Software with Developer tools, editors ,
graphical user interfaces (GUIs), networking
tools etc collectively are called ________.
● Distribution
10) Which of the following is not a primary
function of RPM?
● Booting a system.
11) ____ is a highly regarded , sophisticated
toolset and a wrapper tool that interacts
directly with dpkg.
● apt
12) How many primary partitions can you have on
a hard disk?
●4
13) Which file contains the available shells for
the system?
● /etc/shells
14) The system structure of the Linux is
● Monolithic Kernel
15) Which packaging system does Red Hat use?
● rpm
16) Which command(s) is/are used to remove an
RPM package?
● rpm -e
17) Which command is used to install a Debian
package?
● dpkg –install
18) Which command would you use to see if a
package is already installed?
● rpm -qa package name
19) Which command removes a package named
editor-2.0.i386.rpm?
● rpm -e editor-2.0.i386.rpm
20) Which command will tell you which package
owns the file /etc/printcap?
● rpm -qf /etc/printcap
21) How to Upgrade a RPM ?
● rpm -Uvh packagename
22) What command is used to query for a
specific package with RPM?
● rpm -q
23) What is the command to determine when a
user needs to change the password?
● chage -l
24) Which command changes deepak's home
directory from its default location to
/usr/local directory
● usermod -d /usr/local deepak
25) How many fields are there in the
/etc/shadow file?
●8
26) The command to get more detailed
information about the bash package is
● dpkg --print-avail bash
27) Which fields are not present in the
/etc/passwd file?
● Minimum
28) Every field is separated by __________ .
● :(colon)
29) User's primary group id is listed in which
file at the time of creation of the user.
● /etc/passwd
30) User id 0 is
● The id of the root user id
31) _____ command is used for creating a new
group.
● groupadd
32) What is ”/bin/bash” field represented in the
following record of /etc/passwd file? pc2: x :
502: 1001: pc2pc2: /home/pc2: /bin/bash
● Shell assigned to user pc2
33) _________ command is used to create a
new group.
● groupadd
34) init uses __________ runlevel to shutdown
the system.
●0
35) In GRUB Legacy, the fourth partition on the
fifth hard disk (IDE) will be referred as
● (hd4,3)
36) ________ is a small data structure that
reveals several key pieces of information,
including the disk’s geometry, the amount of
available space on disk etc.
● Superblock
37) Choose the correct syntax of mount
command.
● mount [options] device directory
38) _________ is not the benefit of volume.
● No online resizing of volumes
39) The use of # usermod –L pc1 command is
___________
● To lock the account of user pc1
40) _________ file contains group related
information.
● /etc/group
41) ___________ runlevel of init is used to
reboot the system.
●6
42) Boot loaders reside in ___________ of the
disk.
● Master Boot Record (MBR)
43) init reads its configuration file
___________, and determines the runlevel
where it should start
● /etc/ inittab
44) What is ”/home/pc2” field represented in
the following record of /etc/passwd file?
pc2:x:502:1001:pc2pc2:/home/pc2:/bin/bash
● Home directory of user pc2
45) ________allows a program to be run with
permissions from the program’s owner, not the
user who is running it.
● SetUID bit
46) ___________ runlevel of init is used to
start the system as a single user without
networking facility and GUI.
●1
47) Which of the following statements is wrong
for fsck command?
● The file system must be mounted in order to
run fsck
48) Which of the following commands is right to
assign following permissions to file f1?
Permission: rw _ _wx_ _x
● chmod 631 f1
49) What is ”502” field represents in the
following record of /etc/passwd file?
pc2:x:502:1001:pc2pc2:/home/pc2:/bin/bash
● User id
50) ___________ runlevel of init is used for
full multiuser mode system.
●3
51) The init process has process ID
_________.
●0
52) "-t " option with mount command is used to
specify __________.
● File system
53) What is X stands for in rcX.d?
● Runlevel
54) usermod- U is used for?
● Unlock the user
55) _________________ is one of the more
popular packaging/updating tools for managing
software on Linux systems. It is basically a
wrapper program for RPM, with great
enhancements.
● Yum
56) What is wrong with the following
/etc/passwd file entry? 4satish:x:529:Satish
Kumar:/home/satish:/bin/passwd
● Either the UID or the GID field is missing.
57) Which command displays the settings for all
services at all runlevels?
● Chkconfig –list
58) The process of starting up a computer is
known as
● Boot Strapping
59) What is the full path for grub's
configuration file?
● /etc/grub/grub.conf
60) The last character of the "bash" prompt is
usually
●$
61) What access rights are required for the
/etc/shadow file?
● r——–
62) Which command would give the owner and
group of myfile the permissions of read and
execute while all others have read access?
● chmod 554 myfile
63) Which option with the useradd command
specifies that the home directory should be
created if it doesn't already exist?
● -m
64) The chkconfig utility is used for?
● Enable services, Disable services and Vew all
services
65) Options Available for the mount Command
is/are?
● noatime, noauto and nosuid
66) ____________ file contains the
filesystems to be automatically mounted
during boot.
● /etc/fstab
67) What is the basic purpose of the Address
Resolution Protocol (ARP)?Please select the
best answer.
● To resolve IP addresses to ethernet
addresses
68) What command allows a user to view the
ARP cache, and to add and delete entries?
● arp
69) Which one of the following is not a
predefined chain in Netfilter?
● Routing
70) The_____________ chain is invoked only
when a packet is destined for the host itself.
● Input
71) Which one of the following commands is
used for managing chains?
● iptables -t tables -A chain rule-spec [options]
72) The_________program can be used to scan
a host or a group of hosts to look for open
TCP and UDP ports.
● nmap
73) The__________chain is invoked when
packets are sent from applications running on
the host itself.
● Output
74) _________ option allows you to set the
counter values for a particular rule when
inserting, appending, or replacing a rule on a
chain.
● -c PKTS BYTES
75) ________ is a boot manager that allows you
to boot multiple operating systems, provided
each system exists on its own partition.
● LILO
76) __________command to find out the name
of the current kernel.
● uname -r
77) ____________ provides a way to map or
translate an unfriendly numerical IP address
into a people friendly format.
● Domain Name System (DNS)
78) In the FQDN “Pc1. example.org.” What is
the root domain?
● Rightmost .(Perdiod) character
79) By convention, the third level domain name
reflects the _________
● Host name
80) A __________ exhibits all the properties
of a domain, except that it has delegated a
subsection of the domain instead of all the
hosts at a site.
● Sub domain
81) ______________converts names into IP
addresses.
● Forward resolution
82) ARPA in addr.arpa domain stands for
______
● Address Routing and Parameters Area
83) ________ are resolved from right to left
under addr.arpa domain.
● Domain names
84) The _________record type of DNS is used
to provide a mapping from hostname to IP
address in IPV4.
●A
85) In the FQDN University. example.org."
What is the second level domain?
● example
86) In the FQDN University. example.org.”
What is the top level domain?
● org
87) __________ file of vsftpd contains a list
of allowed and denied access.
● /etc/ vsftpd/user_list
88) __________ is the main executable file in
vsftpd.
● /etc/ sbin/vsftpd
89) The _________record type of DNS is used
to provide a mapping from hostname to IP
address in IPV6.
● AAAA
90) Which of the following is not an option of
/etc/vsftpd/vsftpd.conf file?
● Permissions
91) _________ configuration option of Apache
is used to define the host name and port that
the server uses to identify itself.
● ServerName
92) __________ converts IP addresses into
hostnames.
● Reverse Resolution
93) Which of the following is not an advantage
of Apache Server Software?
● It is Closed source
94) _______ is server implementation and
________ are client implementation of HTTP.
● Apache, Browser
95) What service is used to translate domain
names to IP addresses?
● DNS
96) What does a DNS client call?
● DNS resolver
97) _____ is used to determine the IP address
of a computer from its FQDN
● Forward Lookup Zone
98) Which of the following accurately describes
a "ping"?
● sends ICMP packets to target device/server
to verify if it's online.
99) The entire hostname has a maximum of
● 255 characters
100) Servers handle requests for other
domains
● by contacting remote DNS server
101)Mapping a name to an address or an address
to a name is called
● Name-address Resolution