Name:     ID: 
 
Email: 

CEN2514 Mid-Term

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

The booting option ____ boots the system installed on the hard disk.
a.
Installation
c.
Installation - ACPI Disabled
b.
Boot from Hard Disk
d.
Installation - Safe Settings
 

 2. 

If you use only primary partitions, you are limited to ____ partitions per hard disk.
a.
4
c.
7
b.
6
d.
8
 

 3. 

With RAID ____, two hard disks are pooled together.
a.
0
c.
2
b.
1
d.
5
 

 4. 

____ is the network adapter built into the system.
a.
Device
c.
Address
b.
Link
d.
Broadcast
 

 5. 

The term ____ refers to the IP address assigned to a device.
a.
broadcast
c.
device
b.
link
d.
address
 

 6. 

The term ____ refers to an entry in the routing table of the Linux kernel.
a.
broadcast
c.
route
b.
driver
d.
interface
 

 7. 

The configuration files for network devices are located in the directory ____.
a.
/var/sysconfig/network
c.
/local/sysconfig/network
b.
/usr/etc/sysconfig/network
d.
/etc/sysconfig/network
 

 8. 

The file ____ contains a template that you can use as a base for device configuration files.
a.
/doc/sysconfig/network/ifcfg.template
c.
/etc/sysconfig/network/ifcfg.template
b.
/local/sysconfig/network/ifcfg.template
d.
/var/network/ifcfg.template
 

 9. 

The name resolution is configured in the file ____.
a.
/var/resolv.conf
c.
/sys/resolv.conf
b.
/network/resolv.conf
d.
/etc/resolv.conf
 

 10. 

The diagnosis tool ____ is primarily used to check the routing between different networks.
a.
ping
c.
ip
b.
traceroute
d.
nstat
 

 11. 

____ is a distributed database system that allows local administration of areas and guarantees unique computer names worldwide.
a.
SMB
c.
Samba
b.
DNS
d.
LDAP
 

 12. 

There are over ____ computers worldwide that act as DNS root name servers.
a.
13
c.
33
b.
23
d.
43
 

 13. 

To define a mail server for the domain, a(n) ____ entry must be made in the DNS database file for forward resolution.
a.
MX
c.
NS
b.
SOA
d.
CNAME
 

 14. 

If you want a computer to be reached by more than one name, then corresponding aliases must be given using ____ entries.
a.
MX
c.
PTR
b.
SOA
d.
CNAME
 

 15. 

The ____ protocol is a network protocol that provides file and print services in a Windows network.
a.
SMB
c.
SSL
b.
DNS
d.
DN
 

 16. 

Authentication on a Linux system is based on ____.
a.
GRUB
c.
LDAP
b.
SMB
d.
PAM
 

 17. 

The ____ bit prevents users from deleting each others files that are stored in these directories.
a.
SUID
c.
sticky
b.
SGID
d.
SSID
 

 18. 

A(n) ____ ACL is a special kind of ACL that defines the access permissions that objects under the directory inherit when they are created.
a.
extended
c.
subdirectory
b.
default
d.
file
 

 19. 

____ represents the lowest level of local security. It should only be used on a home workstation that is not connected to any kind of network.
a.
Level 1 (Home Workstation)
c.
Level 3 (Network Server)
b.
Level 2 (Networked Workstation)
d.
Custom Settings
 

 20. 

To position the /dev/nst0 tape at the beginning of the next file, use the following command: ____.
a.
rsync /dev/nst0 -f 1
c.
pos /dev/nst0 --begin
b.
mt -f /dev/nst0 fsf 1
d.
pos /dev/nst0 --top
 

 21. 

Specifying which users can create cron jobs is done through the files /var/spool/cron/allow and ____, which are evaluated in this order.
a.
/etc/crontab/allow
c.
/root/cron/jobs
b.
/etc/crontab/deny
d.
/var/spool/cron/deny
 

 22. 

The files of the boot loader are located in the directory ____.
a.
/boot
c.
/usr
b.
/etc
d.
/root
 

 23. 

The ____ entry of the /boot/grub/menu.lst, sets the location of the initial ramdisk.
a.
kernel
c.
default
b.
initrd
d.
timeout
 

 24. 

The configuration files for OpenLDAP are located in the directory ____.
a.
/var/openldap/
c.
/sys/config/ldap/
b.
/etc/openldap/
d.
/openldap/config/
 

 25. 

The ____ determines what security demands are required for specific data and resources.
a.
security policy
c.
ROI analysis
b.
communication analysis
d.
barrier study
 

 26. 

The PAM modules are located in the directory ____.
a.
/etc/security
c.
/lib/security
b.
/usr/security
d.
/security/pam
 

 27. 

The disadvantage of the full backup method is the ____.
a.
backup network
c.
backup window
b.
backup media
d.
backup strategy
 

 28. 

The ____ format is a container format for files and directory structures. By convention, the extension of the archive files end in .tar.
a.
exe
c.
tar
b.
zip
d.
gz
 

Matching
 
 
Match each term with the correct statement below.
a.
The installation option Installation - ACPI Disabled
f.
A logical volume group
b.
Memory Test
g.
EVMS
c.
Partitions
h.
RAID 1
d.
Ext2
i.
The purpose of a CA
e.
FAT
 

 29. 

is an older file system used in DOS and Windows.
 

 30. 

is to guarantee a trust relationship among all network services that communicate with each other.
 

 31. 

starts the installation process with ACPI disabled.
 

 32. 

is an old and proven file system, but it does not include journaling.
 

 33. 

is a group of physical partitions.
 

 34. 

starts a memory testing program, which tests system RAM by using repeated read and write cycles.
 

 35. 

is also known as hard disk mirroring.
 

 36. 

is a similar approach to LVM.
 

 37. 

divide the available space of a hard drive into smaller portions.
 
 
Match each term with the correct statement below.
a.
Driver
f.
ping
b.
Route
g.
ping -l device_addr
c.
ip
h.
ping -i seconds
d.
ip link set eth0 down
i.
ping -b
e.
ip route delete 149.44.171.0/24 dev eth0
 

 38. 

software component that creates the interface to a physical device.
 

 39. 

changes the network card configuration quickly from the command line.
 

 40. 

specifies the number of seconds to wait between individual packet shipments.
 

 41. 

is the path an IP packet takes from the source to the destination host.
 

 42. 

specifies the network device to be used on a computer with several network devices.
 

 43. 

deletes the route to the network 149.44.171.0 assigned to the device eth0.
 

 44. 

sends packets to the broadcast address of the network.
 

 45. 

disables the eth0 network device.
 

 46. 

lets you check network connections in a simple way between two hosts.
 
 
Match each term with the correct statement below
a.
DNS
f.
OpenLDAP
b.
/etc/named.conf
g.
The Apache Web server
c.
/var/lib/named/master/
h.
/etc/apache2/default-server.conf
d.
/etc/nsswitch.conf
i.
smbpasswd -a tux
e.
dig command
 

 47. 

normally used to troubleshoot DNS problems.
 

 48. 

main Apache Web server configuration file.
 

 49. 

used for the database files of a DNS master server.
 

 50. 

sets an SMB password for the user tux.
 

 51. 

configures the name service switch, which is responsible for resolving host names, network names, users, and groups.
 

 52. 

the most popular open source LDAP suite.
 

 53. 

the DNS server configuration file.
 

 54. 

the leading Web server software.
 

 55. 

consists of several domains that can be divided into subdomains.
 
 
Match each item with a statement below.
a.
The expense of securing individual resources
f.
Level 2 (Networked Workstation)
b.
Modern BIOS versions
g.
www.suse.de/en/business/security.html
c.
insserv -r service_name
h.
www.securityfocus.com/
d.
pam_unix2.so module
i.
The YaST Online Update (YOU) module
e.
command getfacl
 

 56. 

have the option of protecting the boot process with a password.
 

 57. 

removes a service from its default run levels.
 

 58. 

determined by the amount of potential damage that could be caused by an attack, a faulty operation, or a natural catastrophe.
 

 59. 

provides an intermediate level of local security. It is suitable for workstations that are connected to a network.
 

 60. 

is necessary when changing a password.
 

 61. 

can be used to display the ACL of a file.
 

 62. 

downloads and installs software updates and security patches.
 

 63. 

is a Web site about general IT security.
 

 64. 

is the central security information site of SUSE.
 
 
Match each item with a statement below.
a.
Tape drives
f.
The Rescue System
b.
tar -tvf /backup/etc.tar
g.
mount -t reiserfs /dev/hda6 /mnt
c.
mt -f /dev/nst0 offline
h.
GRUB
d.
dd if=/dev/sda of=/tmp/mbr_copy bs=512 count=1
i.
The root= option of the /boot/grub/menu.lst file
e.
rsync
 

 65. 

displays the contents of the /backup/etc.tar file.
 

 66. 

ejects the tape from the drive.
 

 67. 

is a Linux system that can be booted directly from the installation media.
 

 68. 

mounts the partition /dev/hda6 into the directory /mnt.
 

 69. 

specifies the root partition of the system.
 

 70. 

can be used to access files by means of filenames even before the operating system is loaded.
 

 71. 

is the ideal tool to mirror the content of directories or to back up data across a network.
 

 72. 

creates a copy of the MBR from the hard disk /dev/sda and writes it to the file /tmp/mbr_copy.
 

 73. 

are used most often for backups because they still have the best price-to-capacity ratio.
 



 
         Start Over