1.
The ____ name is the complete path to an object in the directory.
Correct Answer
B. Distinguished
Explanation
The distinguished name is the complete path to an object in the directory. It uniquely identifies the object within the directory structure and includes all the necessary information to locate the object, such as the names of the parent containers and the object itself. This distinguishes it from other objects in the directory and ensures its uniqueness.
2.
You cannot view e-mail without using POP3 or IMAP.
Correct Answer
B. False
Explanation
The statement is false because there are other ways to view emails without using POP3 or IMAP. For example, web-based email services like Gmail and Yahoo allow users to access their emails through a web browser without the need for POP3 or IMAP protocols. Additionally, some email clients offer alternative methods such as Exchange ActiveSync or proprietary protocols to access emails. Therefore, it is not necessary to use POP3 or IMAP to view emails.
3.
To go to a link displayed by the Lynx text-based browser, use the ____ arrow key.
Correct Answer
D. Right
Explanation
To go to a link displayed by the Lynx text-based browser, the user should use the right arrow key. This is because the right arrow key is typically used to navigate forward or to the next element on a webpage. In the context of the Lynx browser, pressing the right arrow key would allow the user to select and access the link that is currently highlighted or focused on the screen.
4.
There can only be one domain statement in the resolv.conf file.
Correct Answer
A. True
Explanation
The statement is true because the resolv.conf file is a configuration file for DNS resolution on Unix-like systems. It contains information about the domain name servers that the system should use to resolve domain names to IP addresses. Since the file is used for configuring DNS settings, it makes sense that there can only be one domain statement in the file. Having multiple domain statements would create ambiguity and could lead to conflicts in resolving domain names. Therefore, it is correct to say that there can only be one domain statement in the resolv.conf file.
5.
To use mail to send a message from the command line, use the
____ option to indicate a subject, followed by the e-mail address of
the recipient.
Correct Answer
D. -s
Explanation
The correct answer is "-s". This option is used to indicate the subject of the email when sending a message from the command line. After specifying the subject using this option, the email address of the recipient should be provided. This allows the user to send a message with a specific subject to a specific recipient using the command line.
6.
The ____ program lets a dial-up connection remain active only when
needed, disconnects after a specified period of inactivity, and
automatically reconnects when anyone makes a request to an Internet
site.
Correct Answer
C. Diald
Explanation
The diald program is designed to manage dial-up connections by keeping them active only when necessary, disconnecting after a period of inactivity, and automatically reconnecting when a request is made to an Internet site. It provides efficient and automated management of dial-up connections, ensuring that resources are not wasted by keeping the connection active when not in use.
7.
In the context of the X Window System, the program running on a host is the X client.
Correct Answer
A. True
Explanation
In the X Window System, the program that is being executed on a host is referred to as the X client. This means that the program is requesting services from the X server, which is responsible for managing the display and input devices. The X client is responsible for generating the graphical user interface and sending the necessary commands and requests to the X server for rendering on the display. Therefore, the statement "the program running on a host is the X client" is true.
8.
Which portion of the domain name www.course.com refers to the third-level?
Correct Answer
D. Www
Explanation
The portion of the domain name "www.course.com" that refers to the third-level is "www". The third-level domain is the subdomain that appears directly to the left of the second-level domain (in this case, "course.com"). In this case, "www" is the third-level domain, while "course" is the second-level domain and "com" is the top-level domain.
9.
To have a graphical logon display appear on an X server, you must configure the display manager control protocol, ____.
Correct Answer
C. XDMCP
Explanation
To have a graphical logon display appear on an X server, you must configure the display manager control protocol, XDMCP. XDMCP stands for X Display Manager Control Protocol, which is a network protocol that allows remote graphical login to a computer running the X Window System. It enables the X server to display a graphical login screen on a remote client machine, allowing users to log in and access the system remotely.
10.
____ processes e-mail placed in your inbox file based on characteristics that you define.
Correct Answer
B. Procmail
Explanation
Procmail is a program that processes email based on user-defined characteristics. It is commonly used in Unix-like operating systems to filter and sort incoming mail into different mailboxes or folders. With Procmail, users can define rules and conditions to automatically handle incoming emails, such as forwarding, sorting, deleting, or responding to specific messages. This makes it a suitable choice for managing and organizing emails in an inbox file. IMAP, POP3, and SMTP are all email protocols used for sending, receiving, and accessing email, but they do not specifically handle the processing of emails based on user-defined characteristics like Procmail does.
11.
Links, a text-based browser, can be configured to invoke a graphical viewer when you ask it to display an image.
Correct Answer
A. True
Explanation
The statement suggests that the text-based browser, Links, has the capability to be configured in such a way that when a user requests to display an image, it can invoke a graphical viewer to display the image instead. This implies that Links has the ability to handle both text and image content, making the statement true.
12.
The earliest graphical Web browser, NCSA Mosaic, displayed Web pages with text and graphics described by ____ codes.
Correct Answer
B. HTML
Explanation
The earliest graphical Web browser, NCSA Mosaic, displayed Web pages with text and graphics described by HTML codes. HTML (Hypertext Markup Language) is the standard markup language for creating web pages and it allows for the structuring of content on the internet. NCSA Mosaic was one of the first web browsers to support HTML, making it possible to view web pages with both text and graphics.
13.
Fedora Core includes the DHCP client program called ____.
Correct Answer
A. Dhclient
Explanation
Fedora Core includes the DHCP client program called "dhclient". DHCP (Dynamic Host Configuration Protocol) is a network protocol used to automatically assign IP addresses and other network configuration settings to devices on a network. The dhclient program is responsible for requesting and obtaining network configuration information from a DHCP server, allowing the device to connect to the network and communicate with other devices.
14.
A Linux DHCP server may only be used by a Linux DHCP client.
Correct Answer
B. False
Explanation
This statement is false because a Linux DHCP server can be used by any DHCP client, regardless of the operating system. DHCP (Dynamic Host Configuration Protocol) is a network protocol that allows devices to automatically obtain IP addresses and other network configuration settings. As long as the DHCP client supports the DHCP protocol, it can communicate with a Linux DHCP server. The operating system of the client does not restrict its ability to use a Linux DHCP server.
15.
To use Procmail effectively, you should be quite familiar with using regular ____.
Correct Answer
A. Expressions
Explanation
To use Procmail effectively, you should be quite familiar with using regular expressions. Regular expressions are a powerful tool for pattern matching and manipulating text. They allow you to define complex search patterns and perform actions based on those patterns. In Procmail, regular expressions are commonly used for filtering and sorting incoming email messages based on specific criteria. By understanding and using regular expressions effectively, you can customize and automate your email management tasks in Procmail.
16.
A name service is a(n) ____ -layer program that lets a computer provide a name and receive back information about that name.
Correct Answer
C. Application
Explanation
A name service is a program that allows a computer to provide a name and receive information about that name. This type of program operates at the application layer of the network protocol stack.
17.
Each object created in a directory tree is based on a(n) ____.
Correct Answer
D. Class
Explanation
Each object created in a directory tree is based on a class. A class is a blueprint or template for creating objects. It defines the properties and behaviors that objects of that class will have. In a directory tree, each object represents a file or folder, and these objects are created based on the class that defines their structure and functionality.
18.
Which of the following xauth commands can be used to create a token for your local host?
Correct Answer
B. Generate
Explanation
The xauth command "generate" can be used to create a token for the local host. This command generates a new authorization token that can be used to authenticate the local host with other hosts or services.
19.
The protocol by which e-mail is transferred on the Internet is called ____.
Correct Answer
B. SMTP
Explanation
SMTP stands for Simple Mail Transfer Protocol, which is the protocol used for transferring email messages on the Internet. It is responsible for sending and receiving emails between mail servers. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are transport layer protocols that are used for different purposes, such as establishing connections and transmitting data packets. IP (Internet Protocol) is a network layer protocol that is responsible for addressing and routing data packets across networks. However, none of these protocols specifically handle email transfer like SMTP does.
20.
To configure the /etc/resolv.conf file using the Network Administration Tool, choose the ____ tab.
Correct Answer
D. DNS
Explanation
To configure the /etc/resolv.conf file using the Network Administration Tool, you would choose the DNS tab. The /etc/resolv.conf file is responsible for DNS (Domain Name System) resolution, which is used to translate domain names into IP addresses. Therefore, selecting the DNS tab would allow you to configure the DNS settings for the system.
21.
In the start-up command gimp --display "rome.mynet.com:0.0" &, the --display option ____ the DISPLAY environment variable.
Correct Answer
C. Overrides
Explanation
The --display option in the start-up command overrides the DISPLAY environment variable. This means that the value specified in the --display option will be used instead of the value in the DISPLAY environment variable. This allows the user to specify a different display server to use for running the GIMP application.
22.
An X server program such as ____ allows an X client running on a remote
Linux system to be displayed on a Windows desktop and to collect its
keyboard and mouse input from that system.
Correct Answer
D. X-Win32
Explanation
X-Win32 is a program that allows an X client running on a remote Linux system to be displayed on a Windows desktop and to collect its keyboard and mouse input from that system.
23.
Each system uses an environment variable called ____ that contains a host name and a screen number to define where each X client should display its windows and collect its input.
Correct Answer
D. DISPLAY
Explanation
Each system uses an environment variable called DISPLAY that contains a host name and a screen number to define where each X client should display its windows and collect its input. This variable helps in determining the location and screen number for the X client to display its windows and receive user input.
24.
You can include up to ____ DNS servers in resolv.conf, each on a separate line.
Correct Answer
B. Three
Explanation
In the resolv.conf file, multiple DNS servers can be included, with each server listed on a separate line. The question is asking how many DNS servers can be included in this file. The correct answer is "three", meaning that up to three DNS servers can be listed in the resolv.conf file.
25.
When you use ____ to view e-mail messages on the remote e-mail server, no storage space is required on your local computer.
Correct Answer
C. IMAP
Explanation
IMAP (Internet Message Access Protocol) allows users to remotely access and manage their email messages stored on a mail server. Unlike POP3 (Post Office Protocol version 3), which downloads emails to the local device, IMAP allows users to view and manipulate emails directly on the server without requiring storage space on the local computer. This makes IMAP a convenient option for users who want to access their emails from multiple devices without worrying about storage limitations. SSH (Secure Shell) and Telnet are protocols used for secure remote access to servers, but they do not specifically deal with email storage and retrieval.
26.
Allow's
you to access remote hosts to run programs, transfer files, or perform
other functions within a trusted network environment.
Correct Answer
A. R-utilities
Explanation
r-utilities is the correct answer because it is a set of tools or software that allows users to access remote hosts and perform various functions within a trusted network environment. These utilities may include programs for running remote programs, transferring files, managing network connections, and more. The other options mentioned (Gecko engine, MAILDIR environment variable, pine program, xauth system) do not specifically relate to accessing remote hosts or performing functions within a trusted network environment.
27.
Third-level domain name referring to a computer or host.
Correct Answer
C. Host name
Explanation
A host name is a third-level domain name that refers to a specific computer or host. It is used to identify and locate a specific device within a larger domain or network. This name is typically assigned to a computer or host to make it easier to remember and access. It is an essential component of networking and is used in various protocols and systems to establish connections and communicate between devices.
28.
Basis for many open source Web browsers that run on Linux.
Correct Answer
B. Gecko engine
Explanation
Gecko engine is the correct answer because it is the basis for many open source web browsers that run on Linux. The Gecko engine is developed by Mozilla and is used in popular browsers such as Firefox. It provides the rendering capabilities for these browsers, allowing them to display web pages and execute web technologies.
29.
Collection of computers that can be accessed using a common name such as a company or school name.
Correct Answer
A. Domain
Explanation
A domain is a collection of computers that can be accessed using a common name such as a company or school name. It is a way to organize and manage a large network of computers, allowing users to easily identify and connect to specific resources within the network. A domain provides a centralized system for user authentication, security, and resource sharing, making it easier for administrators to manage and control access to the network.
30.
Specifies the order in which names are resolved.
Correct Answer
A. /etc/host.conf file
Explanation
The /etc/host.conf file specifies the order in which names are resolved. This means that when a hostname needs to be resolved to an IP address, the system will consult the /etc/host.conf file to determine the order in which it should look for the resolution. The file may contain directives such as "order" which specifies the order of resolution methods, such as DNS, NIS, or files. By configuring the /etc/host.conf file, administrators can control the name resolution process on the system.
31.
Program that sends characters over the modem to be interpreted by the Telnet server on the remote computer.
Correct Answer
D. Minicom program
Explanation
The correct answer is "minicom program" because it is a program that allows the user to send characters over the modem to be interpreted by the Telnet server on the remote computer. It is commonly used for configuring and managing remote devices or systems. The other options mentioned, such as "windows config," "ipconfig," and "route," are unrelated to sending characters over a modem for interpretation by a Telnet server.
32.
Requires that an X client present a specific token (a long number) to the X server to be granted access to use that X server.
Correct Answer
C. Xauth system
Explanation
The xauth system is a mechanism that requires an X client to present a specific token (a long number) to the X server in order to gain access and use that X server. This token serves as a form of authentication and ensures that only authorized clients are granted access to the X server. By requiring this token, the xauth system helps to enhance the security of the X server and prevent unauthorized access.
33.
Used to specify a working directory for Procmail.
Correct Answer
B. MAILDIR environment variable
Explanation
The MAILDIR environment variable is used to specify a working directory for Procmail. This variable allows Procmail to determine the location where incoming mail should be stored. By setting the MAILDIR variable, the user can define a specific directory or folder where Procmail will deliver the incoming mail. This allows for better organization and management of email files within the user's system.
34.
Text-based e-mail client.
Correct Answer
A. Pine program
Explanation
The correct answer is "pine program" because pine is a text-based e-mail client that allows users to send, receive, and manage emails using a command-line interface. It is commonly used in Unix-like operating systems and provides a simple and efficient way to access emails without the need for a graphical user interface.