1.
The .nofinger file created to hide user activities should not be visible to the finger daemon.
Correct Answer
B. False
Explanation
The .nofinger file created to hide user activities should be visible to the finger daemon. This is because the finger daemon is responsible for providing information about users on a system, and if the .nofinger file is hidden from it, it would defeat the purpose of hiding user activities. Therefore, the correct answer is False.
2.
The term ____ refers to sending an e-mail message to an e-mail list.
Correct Answer
D. Posting
Explanation
The term "posting" refers to sending an e-mail message to an e-mail list. When someone posts an e-mail, they are sending it to a specific group of recipients who have subscribed to that particular e-mail list. This allows for efficient and targeted communication, as the message will only be received by those who have expressed interest in the topic or content of the e-mail list.
3.
By default, the syslogd daemon supports the remote transfer of log messages.
Correct Answer
A. True
Explanation
The syslogd daemon is a system utility that collects and manages log messages on a Unix or Unix-like operating system. By default, it is configured to support the remote transfer of log messages. This means that log messages can be sent from one system to another over a network, allowing for centralized logging and analysis of logs from multiple systems. Therefore, the statement "By default, the syslogd daemon supports the remote transfer of log messages" is true.
4.
If the finger program is enabled, the superserver watches for incoming finger queries on port 79 and sends them to the ____ daemon.
Correct Answer
A. In.fingerd
Explanation
The superserver watches for incoming finger queries on port 79 and sends them to the in.fingerd daemon. The in.fingerd daemon is responsible for handling finger requests and providing information about users on the system.
5.
The most common way to set time at boot-up is to use the ____ program.
Correct Answer
C. Ntpdate
Explanation
The correct answer is "ntpdate". Ntpdate is a program that is commonly used to set the time at boot-up. It is a utility that allows the system clock to be set using the Network Time Protocol (NTP). Ntpdate queries NTP servers and adjusts the system time accordingly, ensuring accurate time synchronization.
6.
For best accuracy, you should include at least ____ servers in the ntpd configuration file.
Correct Answer
D. 5
Explanation
For best accuracy, it is recommended to include at least 5 servers in the ntpd configuration file. This is because having multiple servers helps to ensure a more reliable and accurate time synchronization. By including multiple servers, the ntpd daemon can compare the time reported by each server and choose the most accurate one. This redundancy also helps to mitigate the impact of any server failures or network issues, ensuring that the system can still synchronize time effectively.
7.
The ntpd daemon will refuse to synchronize to other time sources
if its local time is off by more than 1000 seconds from the other
servers.
Correct Answer
A. True
Explanation
The ntpd daemon is a time synchronization program that ensures the accuracy of the system time by synchronizing with other time sources. If the local time of the ntpd daemon is off by more than 1000 seconds from the other servers, it will refuse to synchronize with them. This is because such a significant time difference indicates a potential error or inconsistency in the time source, and synchronizing with it could result in inaccurate timekeeping. Therefore, the statement "The ntpd daemon will refuse to synchronize to other time sources if its local time is off by more than 1000 seconds from the other servers" is true.
8.
Which of the following programs enables you to add a time server in Windows XP?
Correct Answer
A. Regedit
Explanation
The correct answer is "regedit". Regedit is a program in Windows XP that allows users to edit the registry, which contains configuration settings for the operating system. By using regedit, users can add a time server to Windows XP by modifying the appropriate registry keys. This enables the computer to synchronize its time with the designated time server.
9.
Daemons that bind to ports higher than ____ may be run by other users.
Correct Answer
D. 1023
Explanation
Daemons that bind to ports higher than 1023 may be run by other users because ports below 1024 are considered privileged ports and can only be bound by processes running with administrative privileges. Ports above 1023 are considered unprivileged ports and can be bound by regular user processes. Therefore, other users can run daemons on ports higher than 1023.
10.
The default action of tcpd (TCP Wrappers) is to allow incoming connections.
Correct Answer
A. True
Explanation
The default action of tcpd (TCP Wrappers) is to allow incoming connections. This means that if no specific rules or restrictions are set, tcpd will allow all incoming connections by default.
11.
You can use that whois server in another whois command with the ____ option to get further details about a specific domain.
Correct Answer
A. -h
Explanation
The correct answer is -h. By using the -h option in another whois command, you can connect to a specific whois server and retrieve additional details about a particular domain. This option allows you to gather more specific information by querying a specific whois server instead of relying on a default server.
12.
Linux master control program used to manage the getty program.
Correct Answer
A. Init program
Explanation
The init program in Linux is responsible for managing the system initialization process. It is the first process that is started when the computer boots up and it is responsible for starting and stopping other processes and services. The init program also manages the getty program, which is responsible for displaying the login prompt on virtual terminals. Therefore, the init program is the correct answer as it is the Linux master control program used to manage the getty program.
13.
_____ supports the Internet Printing Protocol (IPP).
Correct Answer
C. Common Unix Printing System (CUPS)
Explanation
Common Unix Printing System (CUPS) is the correct answer because it is a printing system that supports the Internet Printing Protocol (IPP). CUPS is a widely used printing system in Unix-like operating systems, including Linux and macOS. It provides a way to print documents over a network using the IPP protocol, which is a standard for printing over the internet. CUPS allows users to easily configure and manage printers, and it provides a consistent printing experience across different platforms. Therefore, CUPS is the most suitable option among the given choices for supporting the Internet Printing Protocol (IPP).
14.
_____ controlled by the two daemons klogd and syslogd (for kernel messages and all other messages, respectively).
Correct Answer
E. Linux logging facility
Explanation
The Linux logging facility is controlled by the two daemons klogd and syslogd. These daemons handle kernel messages and all other messages respectively. They are responsible for capturing and storing log information from various sources within the Linux system. The logging facility plays a crucial role in monitoring system events, troubleshooting issues, and maintaining system security.
15.
_____ used by peer servers in the NTP hierarchy to determine which servers are keeping accurate time.
Correct Answer
B. Correctness Principle
Explanation
The Correctness Principle is used by peer servers in the NTP hierarchy to determine which servers are keeping accurate time. This principle ensures that the time synchronization process is reliable and consistent across the network. It involves comparing the time reported by different servers and selecting the most accurate and reliable sources as references for time synchronization. By following the Correctness Principle, NTP servers can maintain accurate timekeeping and ensure the integrity of time-sensitive operations within the network.
16.
_____ queries the database maintained by a domain registrar to learn about a specific domain.
Correct Answer
B. Whois utility
Explanation
The correct answer is the "whois utility". The whois utility is used to query the database maintained by a domain registrar in order to obtain information about a specific domain. It allows users to retrieve details such as the domain owner, registration date, expiration date, and name servers associated with the domain. This information is useful for various purposes, including investigating domain ownership, checking domain availability, and resolving technical issues related to a domain.
17.
_____ automates
subscribing, unsubscribing, and sending all the messages so an
individual doesn’t have to spend the time to manage a (sometimes) huge
list of users.
Correct Answer
B. Mailing-list software
Explanation
Mailing-list software automates the process of subscribing, unsubscribing, and sending messages to a large list of users. This eliminates the need for individuals to manually manage the list, saving them time and effort.
18.
_____ programs that are typically started by the system and are not associated with a user’s terminal.
Correct Answer
A. Daemons
Explanation
Daemons are programs that are typically started by the system and are not associated with a user's terminal. They run in the background and perform various tasks, such as managing system services or performing scheduled tasks. Unlike user programs, daemons do not require user interaction or a terminal to function. They are essential for the smooth operation of the system and often run continuously, waiting for specific events or requests to occur. Examples of daemons include web servers, database servers, and network services.
19.
_____ most widely used text-mode reader in Linux systems.
Correct Answer
D. Trn program
Explanation
The trn program is the most widely used text-mode reader in Linux systems.
20.
_____ is designed to give you feedback about how the components of your network are functioning.
Correct Answer
E. Simple Network Management Protocol (SNMP)
Explanation
SNMP is designed to give feedback about how the components of a network are functioning. It is a protocol that allows network administrators to monitor and manage network devices, such as routers, switches, and servers. SNMP collects and organizes information from these devices, providing valuable insights into the performance and health of the network. This feedback helps administrators identify and troubleshoot issues, optimize network performance, and ensure the smooth operation of the network.
21.
Sending the word ____ as the body of an e-mail message to [email protected] causes majordomo to send back a list of all the mailing lists being hosted on that server.
Correct Answer
C. List
ExplanationSending the word "list" as the body of an e-mail message to
[email protected] causes majordomo to send back a list of all the mailing lists being hosted on that server.
22.
The ____ program, which is based on the Line Printer Daemon Protocol, controls the line printer daemon.
Correct Answer
B. Lpd
Explanation
The correct answer is "lpd". The explanation is that the "lpd" program, which is based on the Line Printer Daemon Protocol, is responsible for controlling the line printer daemon. The line printer daemon is a program that manages and controls the printing process on a network printer. Therefore, "lpd" is the correct program to control the line printer daemon.
23.
The ____ service on UDP or TCP port 7 repeats back to you whatever you type.
Correct Answer
C. Echo
Explanation
The correct answer is "echo." The echo service on UDP or TCP port 7 repeats back to you whatever you type. This means that any input sent to this service will be returned as output.
24.
A full news feed can consume 250 GB of storage each day.
Correct Answer
A. True
Explanation
A full news feed can consume 250 GB of storage each day because news feeds often consist of various types of media such as images, videos, and articles. These media files can take up a significant amount of storage space, especially if the news feed is constantly updated with new content throughout the day. Additionally, news feeds may include high-resolution images or videos, which can further increase the storage requirements. Therefore, it is plausible that a full news feed can consume 250 GB of storage each day.
25.
The finger program provides the user’s public encryption key using the ____ file.
Correct Answer
B. .pgp
Explanation
The finger program provides the user's public encryption key using the .pgp file. This file extension is commonly associated with Pretty Good Privacy (PGP), a data encryption and decryption program used for secure communication. The .pgp file contains the user's public key, which can be used to encrypt messages and verify the authenticity of the sender.
26.
The talkd daemon uses UDP on port ____ to communicate with remote hosts.
Correct Answer
C. 517
Explanation
The correct answer is 517. The talkd daemon is a program that allows users on different computers to communicate with each other through text-based messages. It uses UDP (User Datagram Protocol) as the transport protocol for communication. UDP uses port numbers to identify different services, and in this case, the talkd daemon uses port 517 to communicate with remote hosts.
27.
To restart xinetd you must send a ____ signal.
Correct Answer
A. SIGUSR2
Explanation
To restart xinetd, you need to send a SIGUSR2 signal. This signal is used to instruct the xinetd service to reload its configuration files and restart any services that have been modified. Sending a SIGUSR2 signal allows for a graceful restart of xinetd without interrupting any active connections or services.
28.
Each level in an NTP server hierarchy is called a(n) ____.
Correct Answer
A. Stratum
Explanation
In an NTP (Network Time Protocol) server hierarchy, each level is referred to as a "stratum". Stratum refers to the distance or number of hops away from a reference clock source. The lower the stratum number, the closer the server is to the reference clock and the more accurate the time synchronization.
29.
Newsgroup postings are passed around the Internet using ____.
Correct Answer
B. NNTP
Explanation
Newsgroup postings are passed around the Internet using NNTP (Network News Transfer Protocol). NNTP is a protocol specifically designed for the distribution, retrieval, and posting of news articles in Usenet newsgroups. It allows users to access and participate in discussions by sending and receiving messages to and from news servers. SMTP (Simple Mail Transfer Protocol) is used for sending email, SNMP (Simple Network Management Protocol) is used for network management, and SNTP (Simple Network Time Protocol) is used for time synchronization.
30.
The 32-bit number that NTP uses to measure seconds will reach its upper
bounds (all ones) in the year ____ and roll over to all zeros, bringing
us back to the beginning of NTP time—midnight, January 1, 1900.
Correct Answer
B. 2036
Explanation
The 32-bit number used by NTP to measure seconds will reach its upper limit (all ones) in the year 2036. At this point, it will roll over to all zeros, resetting the time back to the beginning of NTP time, which is midnight, January 1, 1900.
31.
The ____ option for syslogd lets you specify domain names to be stripped off before logging an event.
Correct Answer
C. -s
Explanation
The "-s" option for syslogd allows you to specify domain names that should be stripped off before logging an event. This means that if a domain name is included in the log message, it will be removed before the event is logged. This can be useful in situations where the domain name is not relevant or necessary for the logging purposes.
32.
The daytime service on UDP and TCP port ____ returns the current date and time in human-readable form, then closes the connection.
Correct Answer
B. 13
Explanation
The correct answer is 13 because port 13 is commonly used for the daytime service on both UDP and TCP protocols. The daytime service allows clients to retrieve the current date and time from a server in a human-readable format. Once the server sends the date and time information, it closes the connection.