1. Which two Linux commands can be used to display currently active processes? (Choose
two answers)
a. netstat
b. tcpdump
c. top
d. ifconfig
e. proc
2. What command can you use to determine the MAC address of a Linux-based machine?
(Choose one answer)
a. ipconfig
b. ifconfig
c. getmac
d. intmac
3. What three are valid permissions under Linux? (Choose three answers)
a. read
b. shared
c. execute
d. no permissions
e. full control.
4. What two Linux commands can be used for pattern matching and filtering of output?
(Choose two answers)
a. cat
b. echo
c. find
d. grep
e. more
5. What is the
purpose of the 'sudo' command in Linux? (Choose one answer)
a. Provides a stateful 'undue' of the previous command.
b. Enters the administrator or superuser command mode.
c. Configures the pseudowire interface on Linux machines.
d. Allows a logged in user to run Linux commands as the administrator.
6. Where are user-specific passwords stored in a Linux OS? (Choose one answer)
a. /etc/password
b. /etc/shadow
c. /usr/local
d. /usr/password
7. What command is used to verify disk capacity of Linux hosts? (Choose one answer)
a. chkdsk
b. df
c. du
d. hwinfo
8. What does the linux command 'tar -cvf' do? (Choose one answer)
a. Activates task management and recovery tools.
b. Terminates active running processes specificed by the user.
c. Creates an archive from a set of files without verification.
d. Mounts terminal access ports for use by the Linux kernel.
09. Which command is used to view the contents of a directory within Linux? (Choose one
answer)
a. cat
b. df
c. dir
d. ls
d. hwinfo
8. What does the linux command 'tar -cvf' do? (Choose one answer)
a. Activates task management and recovery tools.
b. Terminates active running processes specificed by the user.
c. Creates an archive from a set of files without verification.
d. Mounts terminal access ports for use by the Linux kernel.
09. Which command is used to view the contents of a directory within Linux? (Choose one
answer)
a. cat
b. df
c. dir
d. ls
10. What Linux command is used to verify the host network configuration? (Choose one
answer)
a. biff
b. cat /etc/hosts
c. ifconfig
d. netconf
11. What three are
characteristics of MAC addresses? (Choose three answers)
a. MAC addresses are used to forward frame in LAN switches.
b. MAC addresses are used by routers to build routing tables and make routing decisions.
c. The first three byes are the OUI which identifies the manufacturer of the network interface card.
d. Dynamic MAC addresses are assigned by DHCP.
e. MAC addresses are unique across the global internet.
b. MAC addresses are used by routers to build routing tables and make routing decisions.
c. The first three byes are the OUI which identifies the manufacturer of the network interface card.
d. Dynamic MAC addresses are assigned by DHCP.
e. MAC addresses are unique across the global internet.
12. What function does
Snort perform on Linux machines? (Choose one answer)
a. File scanning for malware and virus infections.
b. Simple Network Object management.
c. Real-time traffic analysis and packet logging in IP networks.
b. Simple Network Object management.
c. Real-time traffic analysis and packet logging in IP networks.
d. Simple messaging system for Linux system alerts.
ANSWER:
1=a,c.
2=a.
3=a,c,d.
4=d,e
5=d
6=b
6=b
7=b
8=c
9=d
10=c
11=a,c,e
12=c
No comments:
Post a Comment