Penguin Test
|^|
Which of the following are daemons responsible for logging system events on a Linux machine.
Select the two possible answers.
glogd
klogd
logger
logsysd
syslogd
zlogd
Question 2 of 25
Which of the following files determines whether the computer will check locally for name resolution before querying a DNS server? Choose the most appropriate entry.
/etc/hosts
/etc/resolv.conf
/etc/nsswitch.conf
/etc/networks
Question 3 of 25
What configuration file is used to determine the addresses of the DNS servers to use on a client workstation? Include the full path./
Question 4 of 25
What is the command that can be used to change a users account settings (e.g. default shell), without editing the files by hand?
Enter the command only no path or options.
Question 5 of 25
What option to the netstat command will give the response as IP addresses without attempting to resolve to DNS names? Enter the option only (do not include the command or any ip addresses).
netstat
Question 6 of 25
What command, including options, will take the system time and store in it in the hardware clock?
Question 7 of 25
What is the port number normally used for a telnet connection?
Question 8 of 25
Which of the following is the configuration file used to determine who can use the sudo command?
/etc/sudo.cfg
/etc/sudoers
/etc/sudo/sodo.cfg
/etc/sudo/users
Question 9 of 25
Which is the CIDR netmask /27 in dotted decimal format?
Question 10 of 25
What command in a script would print on the screen the first variable passed to that script?
Question 11 of 25
On a SysVinit system what is the recommended alternative to cron if the system is not left running continuously?
Question 12 of 25
What is the file on a Linux machine that provides the list of known tcp/udp ports along with their respective services? Include the full path.
Question 13 of 25
Which of the following SQL statements would be used to retrieve all the columns in table - quiztable?
SELECT * IN quiztable;
SELECT * FROM quiztable;
SEARCH * IN quiztable;
SEARCH all from quiztable;
Question 14 of 25
What command is used to remove a variable from the bash shell?
Question 15 of 25
A host has the IP address 192.168.1.12 and a netmask of 255.255.255.0. What is the address of the network?
Question 16 of 25
Which of the following is valid syntax for the route command? Choose the most appropriate command.
/sbin/route -add -net 192.168.5.0 -gw 192.168.1.1 -netmask 255.255.255.0 -dev eth0
/sbin/route -add net 192.168.5.0 gw 192.168.1.1 netmask 255.255.255.0 dev eth0
/sbin/route add -net 192.168.5.0 gw 192.168.1.1 netmask 255.255.255.0 dev eth0
/sbin/route add -net 192.168.5.0 -gw 192.168.1.1 -netmask 255.255.255.0 -dev eth0
Question 16 of 25
Which of the following is valid syntax for the route command? Choose the most appropriate command.
/sbin/route -add -net 192.168.5.0 -gw 192.168.1.1 -netmask 255.255.255.0 -dev eth0
/sbin/route -add net 192.168.5.0 gw 192.168.1.1 netmask 255.255.255.0 dev eth0
/sbin/route add -net 192.168.5.0 gw 192.168.1.1 netmask 255.255.255.0 dev eth0
/sbin/route add -net 192.168.5.0 -gw 192.168.1.1 -netmask 255.255.255.0 -dev eth0
Question 17 of 25
Which of the following options can be added to an SQL select statement to sort the results?
SORT BY
LIST BY
ORDER BY
SORTED
Question 18 of 25
Which of the following lines at the top of a file will make it an executable shell script (assuming file permissions are correct)? Choose the most appropriate answer.
#/bin/bash
!#/bin/bash
#!/bin/bash
#!bash
!#bash
Question 19 of 25
What function does gdm / kdm perform on a Gnome / KDE system?
Login Screen
Replacement for X Windows
Defines what application windows look like
Provide 3D effects when changing virtual screen
Question 20 of 25
Which file normally holds the default values used when creating a new user?
/etc/default/useradd.conf
/etc/default/useradd
/etc/useradd/default
/etc/useradd/default.conf
/etc/useradd.conf
Question 21 of 25
Compose an entry for the /etc/syslog.conf file so that all debug messages go to a file "/var/log/debug". Use spaces instead of the tab key.
The following is currently in the file:
# Kernel messages kern.* -/var/log/kern.log # Emergencies sent to everybody that is logged in *.emerg *
Question 22 of 25
Which of the following will allow a computer to make connections to the local X server, only if its ip address is 192.168.3.4? Select the most appropriate answer.
xhost +
xhost 192.168.3.4
xhost -192.168.3.4
xhost --allow=192.168.3.4
Question 23 of 25
Which of the following commands is used to add a new user, and is available across different linux distributions. Select the most appropriate answer:
user --add
add --user
newuser
usernew
useradd
Question 24 of 25
You need to use tcpwrappers so that address 192.168.1.7 can access all the services. What entry should you put in the /etc/hosts.allow file to enable this?
Question 25 of 25
After adding a new user what command will allow you to set the users initial password? Enter the command only, no options.
Score
9 out of 25
36 %
Result breakdown
Click on the question below to see correct answer