The assessment test is an excellent way to test yourself before starting to study. It gives you an idea of where you should start and why.
In an assessment test, test your current skills from beginning to advance lever for any subject or topic to check “what do you know and from where you should start learning?”
Here I have put some basic questions for Linux assessment, so you can test your Linux skill and choose right path for Linux Learning.
1. Which of the following commands would you type to see if the mail service is functioning and view a backlog of old messages?
2. Joe is editing an smb.conf file and spots the line print ok = yes in a share definition. He changes this line to read printable = Yes. What effect will this change have on the operation of the share?
- It converts a printer share into a file share.
- It converts a file share into a printer share
- It makes Samba report errors correctly when they occur
- None of the above
3. What will be the effect of the following lines in a sendmail m4 configuration file?
- Mail addressed to users in the example.org domain will be hidden from view until the postmaster can examine it.
- The server will change all domain name references in all e-mail headers to example.org, for both incoming and outgoing e-mail.
- Mail sent through the server will be identified as coming from example.org, but only if the mail’s return address omits a domain name.
- Mail sent through the server will be identified as coming from example.org, even if the user has set another address in a mail client.
4. Why might you want to run SWAT?
- It provides name resolution using NetBIOS protocols.
- It provides Web-based GUI administration of a Samba server.
- It’s run from the inetd or xinetd super server, unlike many servers.
- It helps to find and correct bugs in a wide variety of servers.
5. Which file might you edit to have mail addressed to gertrude redirected to gerty? [Select all that apply.]
- newnames in /etc or /etc/mail
- aliases in /etc or /etc/mail
- .forward in gertrude’s home directory
6. How many individual queries are involved in a full recursive DNS lookup?
- A variable number
7. Your network’s Internet connection went down an hour ago and has only recently come back up. How would you check to see how many outgoing mail messages have been stuck on your local sendmail server because of this problem?
- Type sendmail –q.
- Type mailq.
- Type xmqueue and click the Queued Messages button.
- Log in as postmaster and type pqcheck.
8. You compare two /etc/named.conf files and find that they differ in only one line. The first includes a line in the options section that reads forward first;, while the second contains a line that reads forward only;. Assuming the rest of the forwarding name server configurations in these files are correct, what is the effect of this small difference?
- The forward first; configuration performs a forwarding lookup and then does a full recursive lookup if the forwarding lookup fails; the forward only; configuration performs a forwarding lookup but never attempts a full recursive lookup.
- The forward first; configuration forwards DNS information to client before logging the data; the forward only; configuration forwards DNS information to clients without logging information on the lookup.
- The forward first; configuration does a forwarding lookup and checks the results against a full recursive lookup; the forward only; configuration performs a forwarding lookup but never attempts a full recursive lookup.
- None of the above; neither configuration is valid.
9. What is the name of the protocol Apache uses to communicate with clients?
- The Patchy Server Protocol
- The Hypertext Transfer Protocol
- The file Transfer Protocol
- The Hypertext Markup Language
10. In what file would you enter the following line to use a forwarding DNS server you’ve set up on 192.168.1.1?
11. In what directory will you find the files delivered by an Apache server to its clients?
- The location is not consistent across systems
12. Under what circumstances should a forwarding-only name server be accessible to the Internet at large?
- Rarely on never
- Almost always
- Only when your domain already has two other DNS servers on the Internet
- Only when you use BIND 8.x or later
13. What port should you block with a firewall if you want to limit access to a web server running on its standard port?
- TCP port 22
- TCP port 25
- TCP port 80
- TCP port 901
14. Which servers might you consider retiring after activating an SSH server? [Select all that apply.]
15. How does an NFS server determine who may access files it’s exporting?
- It uses the local file ownership and permission in conjunction with the client’s user authentication and a list of trusted client computers.
- It uses a password that’s sent in unencrypted form across the network.
- It uses a password that’s sent in encrypted form across the network.
- It uses the contents of individual user’s .rlogin files to determine which client computers may access a share.
16. You find that the ssh_host_dsa_key file in /etc/ssh has 0666 (-rw-rw-rw) permissions. Your SSH server has been in operation for several months. Should you be concerned?
- Only if the ssh_host_dsa_key.pub file is also world-readable
- Only if you’re launching SSH from a super server
17. What is the effect of the following line in /etc/fstab?
Share: /server /mnt/samba nfs defaults 0 0
- It mounts the SMB/CIFS share called server from the server called share at /mnt/samba.
- It mounts the SMB/CIFS share called share from the server called server at /mnt/samba.
- It mounts the NFS export called share from the server called server at /mnt/samba.
- It mounts the NFS export called server from the server called share at /mnt/samba.
18. For best SSH server security, how should you set the Protocol option in /etc/ssh/sshd_config?
- Protocol 1
- Protocol 2
- Protocol 1,2
- Protocol 2,1
19. Which of the following parameters should you definitely check and, if necessary, adjust in the [global] secton of your smb.conf file when configuring Samba?
- write list
20. Why is it unwise to allow root to log on directly using SSH?
- Somebody with the root password but no other password could then break into the computer.
- The root password should never be sent over a network connection; allowing root logins in this way is inviting disaster.
- SSH stores all login information, including passwords, in a publicly readable file.
- When logged on using SSH, root’s commands can be easily intercepted and duplicated by undesirable elements.
2. c, d
9. b, c