Penguin Test

|^|

Which of the following are daemons responsible for logging system events on a Linux machine.

Select the two possible answers.

glogd

klogd

logger

logsysd

syslogd

zlogd

Question 2 of 25

Which of the following files determines whether the computer will check locally for name resolution before querying a DNS server? Choose the most appropriate entry.

/etc/hosts

/etc/resolv.conf

/etc/nsswitch.conf

/etc/networks

Question 3 of 25

What configuration file is used to determine the addresses of the DNS servers to use on a client workstation? Include the full path./

Question 4 of 25

What is the command that can be used to change a users account settings (e.g. default shell), without editing the files by hand?

Enter the command only no path or options.

Question 5 of 25

What option to the netstat command will give the response as IP addresses without attempting to resolve to DNS names? Enter the option only (do not include the command or any ip addresses).

netstat

Question 6 of 25

What command, including options, will take the system time and store in it in the hardware clock?

Question 7 of 25

What is the port number normally used for a telnet connection?

Question 8 of 25

Which of the following is the configuration file used to determine who can use the sudo command?

/etc/sudo.cfg

/etc/sudoers

/etc/sudo/sodo.cfg

/etc/sudo/users

Question 9 of 25

Which is the CIDR netmask /27 in dotted decimal format?

Question 10 of 25

What command in a script would print on the screen the first variable passed to that script?

Question 11 of 25

On a SysVinit system what is the recommended alternative to cron if the system is not left running continuously?

Question 12 of 25

What is the file on a Linux machine that provides the list of known tcp/udp ports along with their respective services? Include the full path.

Question 13 of 25

Which of the following SQL statements would be used to retrieve all the columns in table - quiztable?

SELECT * IN quiztable;

SELECT * FROM quiztable;

SEARCH * IN quiztable;

SEARCH all from quiztable;

Question 14 of 25

What command is used to remove a variable from the bash shell?

Question 15 of 25

A host has the IP address 192.168.1.12 and a netmask of 255.255.255.0. What is the address of the network?

Question 16 of 25

Which of the following is valid syntax for the route command? Choose the most appropriate command.

/sbin/route -add -net 192.168.5.0 -gw 192.168.1.1 -netmask 255.255.255.0 -dev eth0

/sbin/route -add net 192.168.5.0 gw 192.168.1.1 netmask 255.255.255.0 dev eth0

/sbin/route add -net 192.168.5.0 gw 192.168.1.1 netmask 255.255.255.0 dev eth0

/sbin/route add -net 192.168.5.0 -gw 192.168.1.1 -netmask 255.255.255.0 -dev eth0

Question 16 of 25

Which of the following is valid syntax for the route command? Choose the most appropriate command.

/sbin/route -add -net 192.168.5.0 -gw 192.168.1.1 -netmask 255.255.255.0 -dev eth0

/sbin/route -add net 192.168.5.0 gw 192.168.1.1 netmask 255.255.255.0 dev eth0

/sbin/route add -net 192.168.5.0 gw 192.168.1.1 netmask 255.255.255.0 dev eth0

/sbin/route add -net 192.168.5.0 -gw 192.168.1.1 -netmask 255.255.255.0 -dev eth0

Question 17 of 25

Which of the following options can be added to an SQL select statement to sort the results?

SORT BY

LIST BY

ORDER BY

SORTED

Question 18 of 25

Which of the following lines at the top of a file will make it an executable shell script (assuming file permissions are correct)? Choose the most appropriate answer.

#/bin/bash

!#/bin/bash

#!/bin/bash

#!bash

!#bash

Question 19 of 25

What function does gdm / kdm perform on a Gnome / KDE system?

Login Screen

Replacement for X Windows

Defines what application windows look like

Provide 3D effects when changing virtual screen

Question 20 of 25

Which file normally holds the default values used when creating a new user?

/etc/default/useradd.conf

/etc/default/useradd

/etc/useradd/default

/etc/useradd/default.conf

/etc/useradd.conf

Question 21 of 25

Compose an entry for the /etc/syslog.conf file so that all debug messages go to a file "/var/log/debug". Use spaces instead of the tab key.

The following is currently in the file:

# Kernel messages kern.* -/var/log/kern.log # Emergencies sent to everybody that is logged in *.emerg *

Question 22 of 25

Which of the following will allow a computer to make connections to the local X server, only if its ip address is 192.168.3.4? Select the most appropriate answer.

xhost +

xhost 192.168.3.4

xhost -192.168.3.4

xhost --allow=192.168.3.4

Question 23 of 25

Which of the following commands is used to add a new user, and is available across different linux distributions. Select the most appropriate answer:

user --add

add --user

newuser

usernew

useradd

Question 24 of 25

You need to use tcpwrappers so that address 192.168.1.7 can access all the services. What entry should you put in the /etc/hosts.allow file to enable this?

Question 25 of 25

After adding a new user what command will allow you to set the users initial password? Enter the command only, no options.

Score

9 out of 25

36 %

Result breakdown

Click on the question below to see correct answer