Sie sind auf Seite 1von 3

Q1. The Linux kernel is mostly written in... a. Basic b. C c. Fortran d. C++ Q2.

The sticky bit is set for a directory... a. b. c. d. so files in that directory may only be unlinked or renamed by root so files in that directory may only be unlinked or renamed by their owner so files in that directory may only be unlinked or renamed by root or their owner so files in that directory are safe

Q3. What command brings the system down in a secure way? a. b. c. d. shutup exit shutdown down

Q4.It copies a file from standard input to standard output with a changeable I/O block size. a. b. c. d. rm mv dd od

Q5. chmod 755 file a. b. c. d. Everyone can read and write. Only owner can execute. Nobody can read and execute. Only owner can write. Everyone can read and execute. Only owner can write. Everyone can read and execute. Only group can write.

Q6. touch a. Locates a program and its man pages. b. Changes the access and modification times of each file to the current time. c. Summarizes disk usage of files and directories. d. Shows the last argument of the previous command. Q7. what command will you use to find PID of Apache process ? a. b. c. d. ps -ef|more httpd ps -aux|httpd ps -ef|grep httpd ps -ax|httpd

Q8. In BIND, the terminology which involves resolving a domain name to an IP address is known as

a. faster lookup b. forward lookup c. reverse lookup d. final lookup Q9. In Mysql DB, Replication enables data from one MySQL database server (called the master) to be replicated to one or more MySQL database servers (slaves). This type of replication is called a. synchronous b. asynchronous c. continuous d. non-continuous Q10. In Apache, authentication, authorization and access Control can be achieved by a. using iptables b. .htaccess and .htpasswd to protect data in that directory c. .access and .pwd to protect data in that directory d. using firewall Q11. Iptables can be used to protect a. hardware devices b. Operating System and Network Services c. against power surge d. nothing Q12. What parameters can be used to view contents of an RPM package a. rpm -vl /path/to/file.rpm b. rpm -qlp /path/to/file.rpm c. rpm -ivh /path/to/file.rpm d. rpm -Uh /path/to/file.rpm Q13. What command will be used for re-starting MySQL daemon on remote Server using SSH a. ssh root@www1.rhel5.com '/etc/init.d/mysql start' b. ssh patel@www1.rhel5.com '/etc/init.d/mysql restart'' c. ssh cynthia@www1.rhel5.com '/etc/init.d/mysql start d. ssh root@www1.rhel5.com '/etc/init.d/mysql restart' Q14. Which parameter is used for setting up a smarthost relay in postfix a. DS b. relayhost c. smarthost d. mxrelay Q15. Which is not one of the opensource Linux OS virtualization

a. b. c. d.

KVM Xen lvs OpenVZ

Q16. This is a popular and freely-available Linux package that that uses the Linux kernel and other program components obtained from the GNU project. a. Lynx b. Debian c. OASIS d. Fizt e. CORBA Q17. This is a script language and interpreter that is freely available and used primarily on Linux Web servers as an alternative to Microsoft's Active Server Page (ASP)technology. a. PHP b. ActionScript c. AUP d. OpenGL e. CRON script Q18. This technology is used to measure and analyze human body characteristics for authentication purposes. a. footprinting b. biometrics c. JBOD d. anthropomorphism e. optical character recognition Q19. This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides. a. bit robbing b. Web services description language (WSDL) c. jabber d. port scan e. service profile identifier Q20. Which runlevel means REBOOT for a Linux system? a. runlevel 1 b. runlevel 0 c. runlevel 4 d. runlevel 6

Das könnte Ihnen auch gefallen