1.
A(n) ____ in the password field in the file /etc/passwd means that the password is stored in the file /etc/shadow.
Correct Answer
C. X
Explanation
In the file /etc/passwd, the presence of "x" in the password field indicates that the actual password is stored in the file /etc/shadow. This is a security measure as the /etc/shadow file is only accessible to the root user, preventing unauthorized access to the password information. The "x" in the password field acts as a placeholder to indicate that the password is stored elsewhere.
2.
To remove /etc/shadow and convert your user accounts to /etc/passwd only, you should use the command ____.
Correct Answer
B. Pwunconv
Explanation
To remove /etc/shadow and convert user accounts to /etc/passwd only, the command "pwunconv" should be used. This command is specifically designed to undo the changes made by the "pwconv" command, which is used to convert user accounts from /etc/passwd to /etc/shadow. By running "pwunconv", the system will remove the /etc/shadow file and revert back to using the /etc/passwd file for user authentication. The "pwck" command is used to check the integrity of password files, and "pwd" is used to print the current working directory.
3.
____ prevents individual users from using system resources excessively at the expense of other users.
Correct Answer
B. Ulimit
Explanation
The ulimit command is used to set limits on system resources for individual users. It prevents users from using system resources excessively, ensuring that resources are fairly distributed among all users. By setting limits on parameters such as CPU usage, memory allocation, and file size, ulimit helps maintain system stability and prevents any single user from monopolizing system resources at the expense of others.
4.
A ____ is a process that is started by another process.
Correct Answer
D. Child process
Explanation
A child process is a process that is started by another process. When a parent process creates a new process, the newly created process is called a child process. The child process inherits certain characteristics from its parent, such as file descriptors and memory space. The parent process can also communicate with the child process and manage its execution. Therefore, a child process is a suitable explanation for a process that is started by another process.
5.
The ____ is the process ID of the parent process that created the current process.
Correct Answer
C. PPID
Explanation
The PPID (Parent Process ID) is the process ID of the parent process that created the current process. It is a unique identifier assigned to each process and helps in tracking the relationship between parent and child processes. By knowing the PPID, it is possible to determine which process spawned the current process and understand the hierarchy of processes in the system.
6.
The ____ option of the ps command is used to list terminal-independent processes.
Correct Answer
A. X
Explanation
The "x" option of the ps command is used to list terminal-independent processes. This means that it will display processes that are not associated with any specific terminal or session. These processes are usually system processes or daemons that run in the background and do not require user interaction. By using the "x" option, the ps command can provide a comprehensive list of all running processes on the system, regardless of their terminal association.
7.
The ____ option of the ps command is used to list terminal-independent processes, including those of other users.
Correct Answer
B. A
Explanation
The "a" option of the ps command is used to list terminal-independent processes, including those of other users. This option displays information about all processes on the system, regardless of their association with a terminal. It allows users to view the processes of other users as well, providing a comprehensive overview of all running processes on the system.
8.
The ____ option of the ps command is used to list processes hierarchically.
Correct Answer
B. F
Explanation
The "f" option of the ps command is used to list processes hierarchically. This option displays the processes in a tree-like structure, showing the parent-child relationships between processes. This can be useful for understanding the process hierarchy and how processes are related to each other.
9.
The signal ____ is used to end a process immediately.
Correct Answer
D. 15
Explanation
The signal "15" is used to end a process immediately.
10.
Runlevel ____ is the single-user mode.
Correct Answer
A. 1
Explanation
Runlevel 1 is the single-user mode. In Linux, runlevels are different operating modes that determine which services and processes are running. Runlevel 1 is also known as the "rescue mode" or "emergency mode" and it is used for troubleshooting and system maintenance. In this mode, only essential services are started, and the system boots into a minimal environment with a root shell prompt. It allows the user to perform tasks such as repairing the file system, resetting passwords, or fixing system configuration issues.
11.
In a class B address, the first byte is in the ____ range.
Correct Answer
B. 128 to 191
Explanation
In a class B address, the first byte is in the range of 128 to 191. This is because class B addresses are used for medium-sized networks and have a subnet mask of 255.255.0.0. The first byte, also known as the network identifier, is used to identify the network portion of the address. In class B addresses, the first two bits of the first byte are always set to 1 0, which fall in the range of 128 to 191.
12.
In a class D address, the first byte is in the ____ range.
Correct Answer
D. 224 to 239
Explanation
In a class D address, the first byte is in the range of 224 to 239. Class D addresses are used for multicast purposes, where data is sent to a group of devices simultaneously. These addresses are reserved for multicast groups and cannot be assigned to individual devices.
13.
Class ____ addresses are typically used for broadcasts.
Correct Answer
D. E
Explanation
Class E addresses are typically used for broadcasts. This is because Class E addresses, which range from 240.0.0.0 to 255.255.255.254, are reserved for experimental purposes and not meant to be used for normal network communication. Therefore, they are commonly used for broadcasting messages to multiple devices on a network.
14.
A ____ route defines the path a data packet can take for an entire destination network.
Correct Answer
B. Network
Explanation
A network route defines the path a data packet can take for an entire destination network. It specifies the network address and the next hop or gateway to reach that network. This route is used by routers to determine the best path for forwarding the packet to its destination network.
15.
The ____ TLD is used for noncommercial institutions.
Correct Answer
D. .org
Explanation
The .org TLD (Top-Level Domain) is commonly used for noncommercial institutions such as nonprofit organizations, charities, and educational institutions. This domain is often chosen to indicate that the website or organization is dedicated to a cause or purpose rather than being driven by commercial interests. Examples of websites that typically use the .org TLD include Wikipedia, Greenpeace, and the Red Cross.
16.
Use ____ to start the DNS sever.
Correct Answer
A. Rcnamed start
Explanation
The correct answer is "rcnamed start". This is because "rcnamed" is the command used to start the DNS server in this particular context. The other options, "bind start", "dns start", and "ns start", are not valid commands for starting the DNS server.
17.
NFS is frequently used together with ____ to provide centralized user management on a network.
Correct Answer
C. NIS
Explanation
NFS (Network File System) is often used in conjunction with NIS (Network Information Service) to offer centralized user management on a network. NIS allows for the central administration of user accounts, passwords, and other authentication information, making it easier to manage user access across multiple systems. By integrating NFS with NIS, administrators can ensure that users have consistent access to shared files and resources while maintaining a centralized user management system.
18.
To start the services required for Samba, enter: ____.
Correct Answer
C. Rcnmb start && rcsmb start
Explanation
The correct answer is "rcnmb start && rcsmb start". This command starts the services required for Samba by using the "start" option for both "rcnmb" and "rcsmb" commands. The "&&" operator is used to execute the second command only if the first command is successful.
19.
You can enter the ____ command to display the registered local or remote names of a host,regardless of the operating system with which NetBIOS is run.
Correct Answer
C. Nmblookup
Explanation
The nmblookup command can be used to display the registered local or remote names of a host, regardless of the operating system with which NetBIOS is run. This command helps in querying NetBIOS names and obtaining information about the name registrations on a network. It is commonly used in Windows environments to troubleshoot NetBIOS name resolution issues and to verify the availability of NetBIOS services.
20.
You can use the ____ command to list all currently existing connections to the Samba server.
Correct Answer
B. Smbstatus
Explanation
The correct answer is smbstatus. The smbstatus command is used to list all currently existing connections to the Samba server. It provides information about the connected clients, their IP addresses, the files they have open, and other relevant details. By running smbstatus, administrators can monitor the active connections and troubleshoot any issues related to Samba server connectivity.