Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
The booting option ____ boots the system installed on the hard
disk.
a. | Installation | c. | Installation - ACPI Disabled | b. | Boot from Hard
Disk | d. | Installation - Safe
Settings |
|
|
2.
|
If you use only primary partitions, you are limited to ____ partitions per hard
disk.
|
|
3.
|
With RAID ____, two hard disks are pooled together.
|
|
4.
|
____ is the network adapter built into the system.
a. | Device | c. | Address | b. | Link | d. | Broadcast |
|
|
5.
|
The term ____ refers to the IP address assigned to a device.
a. | broadcast | c. | device | b. | link | d. | address |
|
|
6.
|
The term ____ refers to an entry in the routing table of the Linux
kernel.
a. | broadcast | c. | route | b. | driver | d. | interface |
|
|
7.
|
The configuration files for network devices are located in the directory
____.
a. | /var/sysconfig/network | c. | /local/sysconfig/network | b. | /usr/etc/sysconfig/network | d. | /etc/sysconfig/network |
|
|
8.
|
The file ____ contains a template that you can use as a base for device
configuration files.
a. | /doc/sysconfig/network/ifcfg.template | c. | /etc/sysconfig/network/ifcfg.template | b. | /local/sysconfig/network/ifcfg.template | d. | /var/network/ifcfg.template |
|
|
9.
|
The name resolution is configured in the file ____.
a. | /var/resolv.conf | c. | /sys/resolv.conf | b. | /network/resolv.conf | d. | /etc/resolv.conf |
|
|
10.
|
The diagnosis tool ____ is primarily used to check the routing between different
networks.
a. | ping | c. | ip | b. | traceroute | d. | nstat |
|
|
11.
|
____ is a distributed database system that allows local administration of areas
and guarantees unique computer names worldwide.
|
|
12.
|
There are over ____ computers worldwide that act as DNS root name
servers.
|
|
13.
|
To define a mail server for the domain, a(n) ____ entry must be made in the DNS
database file for forward resolution.
|
|
14.
|
If you want a computer to be reached by more than one name, then corresponding
aliases must be given using ____ entries.
|
|
15.
|
The ____ protocol is a network protocol that provides file and print services in
a Windows network.
|
|
16.
|
Authentication on a Linux system is based on ____.
|
|
17.
|
The ____ bit prevents users from deleting each others files that are stored in
these directories.
a. | SUID | c. | sticky | b. | SGID | d. | SSID |
|
|
18.
|
A(n) ____ ACL is a special kind of ACL that defines the access permissions that
objects under the directory inherit when they are created.
a. | extended | c. | subdirectory | b. | default | d. | file |
|
|
19.
|
____ represents the lowest level of local security. It should only be used on a
home workstation that is not connected to any kind of network.
a. | Level 1 (Home Workstation) | c. | Level 3 (Network
Server) | b. | Level 2 (Networked Workstation) | d. | Custom Settings |
|
|
20.
|
To position the /dev/nst0 tape at the beginning of the next file, use the
following command: ____.
a. | rsync /dev/nst0 -f 1 | c. | pos /dev/nst0 --begin | b. | mt -f /dev/nst0 fsf
1 | d. | pos /dev/nst0
--top |
|
|
21.
|
Specifying which users can create cron jobs is done through the files
/var/spool/cron/allow and ____, which are evaluated in this order.
a. | /etc/crontab/allow | c. | /root/cron/jobs | b. | /etc/crontab/deny | d. | /var/spool/cron/deny |
|
|
22.
|
The files of the boot loader are located in the directory ____.
a. | /boot | c. | /usr | b. | /etc | d. | /root |
|
|
23.
|
The ____ entry of the /boot/grub/menu.lst, sets the location of the initial
ramdisk.
a. | kernel | c. | default | b. | initrd | d. | timeout |
|
|
24.
|
The configuration files for OpenLDAP are located in the directory ____.
a. | /var/openldap/ | c. | /sys/config/ldap/ | b. | /etc/openldap/ | d. | /openldap/config/ |
|
|
25.
|
The ____ determines what security demands are required for specific data and
resources.
a. | security policy | c. | ROI analysis | b. | communication analysis | d. | barrier study |
|
|
26.
|
The PAM modules are located in the directory ____.
a. | /etc/security | c. | /lib/security | b. | /usr/security | d. | /security/pam |
|
|
27.
|
The disadvantage of the full backup method is the ____.
a. | backup network | c. | backup window | b. | backup media | d. | backup strategy |
|
|
28.
|
The ____ format is a container format for files and directory structures. By
convention, the extension of the archive files end in .tar.
|
Matching
|
|
|
Match each term with the correct statement below. a. | The installation option Installation - ACPI Disabled | f. | A logical volume
group | b. | Memory Test | g. | EVMS | c. | Partitions | h. | RAID 1 | d. | Ext2 | i. | The
purpose of a CA | e. | FAT |
|
|
29.
|
is an older file system used in DOS and Windows.
|
|
30.
|
is to guarantee a trust relationship among all network services that
communicate with each other.
|
|
31.
|
starts the installation process with ACPI disabled.
|
|
32.
|
is an old and proven file system, but it does not include journaling.
|
|
33.
|
is a group of physical partitions.
|
|
34.
|
starts a memory testing program, which tests system RAM by using repeated read
and write cycles.
|
|
35.
|
is also known as hard disk mirroring.
|
|
36.
|
is a similar approach to LVM.
|
|
37.
|
divide the available space of a hard drive into smaller portions.
|
|
|
Match each term with the correct statement below. a. | Driver | f. | ping | b. | Route | g. | ping -l device_addr | c. | ip | h. | ping -i
seconds | d. | ip link set eth0 down | i. | ping -b | e. | ip route delete 149.44.171.0/24 dev
eth0 |
|
|
38.
|
software component that creates the interface to a physical device.
|
|
39.
|
changes the network card configuration quickly from the command line.
|
|
40.
|
specifies the number of seconds to wait between individual packet
shipments.
|
|
41.
|
is the path an IP packet takes from the source to the destination host.
|
|
42.
|
specifies the network device to be used on a computer with several network
devices.
|
|
43.
|
deletes the route to the network 149.44.171.0 assigned to the device
eth0.
|
|
44.
|
sends packets to the broadcast address of the network.
|
|
45.
|
disables the eth0 network device.
|
|
46.
|
lets you check network connections in a simple way between two hosts.
|
|
|
Match each term with the correct statement below a. | DNS | f. | OpenLDAP | b. | /etc/named.conf | g. | The Apache Web server | c. | /var/lib/named/master/ | h. | /etc/apache2/default-server.conf | d. | /etc/nsswitch.conf | i. | smbpasswd -a tux | e. | dig
command |
|
|
47.
|
normally used to troubleshoot DNS problems.
|
|
48.
|
main Apache Web server configuration file.
|
|
49.
|
used for the database files of a DNS master server.
|
|
50.
|
sets an SMB password for the user tux.
|
|
51.
|
configures the name service switch, which is responsible for resolving host
names, network names, users, and groups.
|
|
52.
|
the most popular open source LDAP suite.
|
|
53.
|
the DNS server configuration file.
|
|
54.
|
the leading Web server software.
|
|
55.
|
consists of several domains that can be divided into subdomains.
|
|
|
Match each item with a statement below. a. | The expense of securing individual
resources | f. | Level 2 (Networked Workstation) | b. | Modern BIOS versions | g. | www.suse.de/en/business/security.html | c. | insserv -r
service_name | h. | www.securityfocus.com/ | d. | pam_unix2.so module | i. | The YaST Online Update (YOU)
module | e. | command getfacl |
|
|
56.
|
have the option of protecting the boot process with a password.
|
|
57.
|
removes a service from its default run levels.
|
|
58.
|
determined by the amount of potential damage that could be caused by an attack,
a faulty operation, or a natural catastrophe.
|
|
59.
|
provides an intermediate level of local security. It is suitable for
workstations that are connected to a network.
|
|
60.
|
is necessary when changing a password.
|
|
61.
|
can be used to display the ACL of a file.
|
|
62.
|
downloads and installs software updates and security patches.
|
|
63.
|
is a Web site about general IT security.
|
|
64.
|
is the central security information site of SUSE.
|
|
|
Match each item with a statement below. a. | Tape drives | f. | The Rescue
System | b. | tar -tvf /backup/etc.tar | g. | mount -t reiserfs /dev/hda6 /mnt | c. | mt -f /dev/nst0 offline | h. | GRUB | d. | dd if=/dev/sda
of=/tmp/mbr_copy bs=512 count=1 | i. | The root= option of the /boot/grub/menu.lst file | e. | rsync |
|
|
65.
|
displays the contents of the /backup/etc.tar file.
|
|
66.
|
ejects the tape from the drive.
|
|
67.
|
is a Linux system that can be booted directly from the installation
media.
|
|
68.
|
mounts the partition /dev/hda6 into the directory /mnt.
|
|
69.
|
specifies the root partition of the system.
|
|
70.
|
can be used to access files by means of filenames even before the operating
system is loaded.
|
|
71.
|
is the ideal tool to mirror the content of directories or to back up data
across a network.
|
|
72.
|
creates a copy of the MBR from the hard disk /dev/sda and writes it to the file
/tmp/mbr_copy.
|
|
73.
|
are used most often for backups because they still have the best
price-to-capacity ratio.
|