Linux MCQ-07: Documentation and Security

The assessment test is an excellent way to test yourself before starting to study. It gives you an idea of where you should start and why.

Table of Contents

In an assessment test, test your current skills from beginning to advance lever for any subject or topic to check “what do you know and from where you should start learning?”

Here I have put some basic questions for Linux assessment, so you can test your Linux skill and choose right path for Linux Learning.

Questions

1.    Which of the following statements is a fair comparison of HOWTO documentation to man pages?

  1. HOWTOs do not require Internet access to be read; man pages do.
  2. HOWTOs are a type of electronic documentation; man pages are printed.
  3. HOWTOs are programmer’s documents; man pages are printed
  4. HOWTOs are tutorial in nature; man pages are briefer reference documents.

2.    Which of the following are firewall tools that may be used with 2.6.x kernels? [Select all that apply.]

  1. ipfwadm
  2. ipfire
  3. ipchains
  4. iptables

3.    Which of the following commands searches the man page database for entries or descriptions that include a specified keyword?

  1. info
  2. apropos
  3. grep
  4. apackage

4.    A server/computer combination appears in both hosts.allow and hosts.deny. What’s the result of this configuration when TCP Wrappers runs?

  1. TCP Wrappers refuses to run and logs an error in /var/log/messages.
  2. The system’s administrator is paged to decide whether to allow access.
  3. hosts.deny takes precedence; the client is denied access to the server.
  4. hosts.allow takes precedence; the client is granted access to the server.

5.    What file would you edit to change the man path?

  1. /etc/man.conf
  2. /etc/conf.man
  3. /etc/paths.conf
  4. /etc/conf.paths

6.    When is the bind option of xinetd most useful?

  1. When you want to run two servers on one port
  2. When you want to specify computers by name rather than IP address
  3. When xinetd  is running on a system with two network interfaces
  4. When resolving conflicts between different servers

7.   Which of the following is a difference between man pages and info pages?

  1. man pages are designed to be translated by machine translation programs for reading is over a dozen languages; info pages lack this feature.
  2. man pages are the preferred documentation system of the Free Software Foundation; the FSF shuns the info page system.
  3. man pages are “flat” text files, much like ASCII text files; info pages are structured with hyperlinks, much like HTML documents.
  4. man pages describe only system calls and other programming tools; info pages describe only user programs and configuration files.

8.    What is the best way to remain abreast of security developments?

  1. Read the CERT/CC website on a regular basis.
  2. Subscriber to and read the Bugtraq mailing list.
  3. Check your distribution’s security web page on a regular basis.
  4. All of the above

9.    What information is certain to appear in a package’s /usr/share/doc subdirectory?

  1. A PDF reference manual.
  2. An HTML reference manual.
  3. A sample configuration file.
  4. None of the above is certain to appear.

10.    At what point during system installation should you configure Tripwire?

  1. Prior to installing major servers like Apache
  2. After installing major servers but before configuring them
  3. After installing and configuring major servers but before connecting the computer to the Internet.
  4. After connecting the computer to the Internet and running it for one to four weeks.

11.    What are the three main classes of documents hosted by the Linux Documentation Project?

  1. RFCs
  2. HOWTOs
  3. FAQs
  4. Guides

12.    Of the following, which is the best password?

  1. Odysseus
  2. iA710ci^My
  3. pickettomato
  4. Denver2Colorado

13.    What do you need to read Usenet newsgroups? [Select all that apply.]

  1. A newsreader
  2. A password to the Reuters website
  3. Access to a news server
  4. The Usenet network stack in your kernel

14.    Which of the following types of attacks involves sending bogus e-mail to lure unsuspecting individuals into divulging sensitive financial or other information?

  1. Phishing
  2. Script kiddies
  3. Spoofing
  4. Ensnaring

15.    You recently “chatted” with a group of people online to help fix a problem in real-time with the PatheticMail program. What type of Internet help resource did you use?

  1. A web forum
  2. IRC
  3. Usenet news
  4. A mailing list

16.    You want to configure a system so that e-mail addressed to root is sent to support@linuxconcept.com. Which file might you edit to accomplish this goal?

  1. /etc/mail/forwarding-rules
  2. /var/spool/mail/root
  3. /etc/aliases
  4. None of the above

17.    You want to deliver a message to would-be Telnet users that your system is for official use by employee of your company. What file would you edit to deliver this message before Telnet users see a login: prompt?

  1. /etc/profile.net
  2. /etc/profile
  3. /etc/issue.net
  4. /etc/issue

18.    You’ve discovered that your system is not using shadow passwords. What action should you take?

  1. Browbeat your users to get them to use shadow passwords.
  2. Run the Crack program to verify that your passwords are still good.
  3. Run the shadow-suite program to generate shadow password files.
  4. Run the pwconv and grpconv programs to generate shadow password files.

19.    In reviewing files in /etc, you find that /etc/motd is completely empty.  What does this mean?

  1. The system won’t display a message of the day after user’s log in.
  2. Morton’s Own Temporary Documentation is not installed on the system.
  3. The motd.conf file’s name has become corrupted and its contents lost.
  4. Users will see no witty aphorisms appear on the screen after logging in.\

20.    Your login server is using PAM and you want to limit users access to system resources. Which configuration file will you need to edit?

  1. /etc/limits.conf
  2. /etc/pam/limits.conf
  3. /etc/security/limits.conf
  4. /etc/security/pam/limits.conf

Answers

1.   d

2.   a

3.   d

4.   a, c

5.   c

6.   a, c, d

7.   c

8.   c

9.   a

10.   d

11.   b

12.   c

13.   b, c, d

14.   b

15.   a

16.   d

17.   d

18.   b

19.   c

20.   c

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Related Articles