GHORI LX0-104/ 102-400

Which command can be used to add or remove a CUPS printer?
A. lpadmin
B. lpstat
C. cups
D. cupscon

A

The size of an IPv6 packet is smaller than that of an IPv4. True or False?

False

What would echo $? do?
A. Echo the character ?
B. Display the message "command not found"
C. Display total number of command line arguments specified at the last executed command
D. Display the exit code of the last command executed

tzselect

Type the name of the command that a user may run to determine the time zone that they can use in their shell startup file.

B

What is the default CUPS server configuration file?
A. /etc/cups/printers.conf
B. /etc/cupsd.conf
C. /etc/cups/cups.conf
D. /etc/cups/cupsd.conf

D

Which TWO of the following can be used to remove a submitted at job with ID# 4?
A. at -d 4
B. at -l 4
C. atrm 4
D. atrm -q 4

AC

What is the significance of using two @ signs in syslog client configuration file?
A. They signify the use of the IP protocol
B. They signify the use of the TCP protocol
C. They signify the use of the UDP protocol
D. They signify the use of the ICMP proto

B

The setuid bit on an executable file gives regular users the ability to run that executable with the owner's privileges. True or False?

True

Depending on the Linux distribution and version, which TWO are valid configuration files to enable or disable a display manager?
A. /etc/X11/default-display-manager
B. /etc/inittab
C. /etc/sysconfig/desktop
D. /etc/X11/default-display-login

BD

The following is an example of command substitution. Select TWO.
A. echo "The hostname of the system is $(hostname)"
B. echo "The hostname of the system is (hostname)"
C. echo "The hostname of the system is $hostname"
D. echo "The hostname of the system i

AD

What does a system logging service do? Select THREE.
A. Forwards alerts and messages to remote logging servers
B. Deletes forwarded alerts and messages
C. Logs alerts and messages to appropriate local destinations
D. Captures alerts and messages

ACD

Which TWO of the following files does the groupdel command update?
A. /etc/user
B. /etc/profile
C. /etc/group
D. /etc/gshadow

CD

Which of the following would you use to enable file overwriting in output
redirection?
A. set +o noclobber
B. set -a noclobber
C. set +a noclobber
D. set -o noclobber

D

What would the command seq 5 15 print on the screen?
A. Prints numbers 5 and 15
B. Prints numbers 5 to 15
C. Prints numbers 1 to 5 and 15
D. Prints numbers 1 to 15 with number 5 skipped

B

How would you generate a GnuPG revocation certificate for a user called user7?
A. By running gpg2 --gen-revoke user7
B. By running gpg2 --gen-key user7
C. By running gpg2 --gen-key --revoke user7
D. By running gpg2 --gen-key2 user7

A

Depending on the Linux distribution and version, which TWO files should be modified to enable or disable all network services that the xinetd or the inetd daemon control?
A. /etc/inetd.conf
B. /etc/network.conf
C. /etc/xinetd.conf
D. /etc/inetd.cf

AC

What is the command to search for files with suid/sgid bits enabled?
A. which
B. whereis
C. find
D. locate

C

Which of the TWO are correct syntaxes to change date and time on the system?
A. hwclock set-time 11:44 2017-12-12
B. timedatectl -d "2017-12-12 11:44"
C. timedatectl set-time 11:44 2017-12-12
D. date --set "2017-12-12 11:44

CD

What would the command xhost + do?
A. Execute the xhost command on the local system
B. Disable remote X access on the local system
C. Enable remote X access on the local system
D. Execute the xhost command on the local system for a regular user

C

Depending on the Linux distribution and version, which THREE commands can be used to display hostname of the system? Select THREE.
A. hostname
B. uname
C. hostnamectl
D. host

ABC

Which TWO commands can be used to list submitted email messages in a mail queue before they are transmitted?
A. mail
B. sendmail -bp
C. sendmail without any options
D. mailq

BD

Which of the following SQL statements is correct to insert a record in table "ex102t"?
A. insert into ex102t values('FirstName','LastName')
B. select * from ex102t insert FirstName=Albert, LastName=Einstein;
C. insert ex102t set FirstName=Albert, LastName

D

Which of the following can be defined in shell startup files? Select TWO.
A. Email addresses
B. Variables
C. Functions
D. Address

BC

Why do we use NTP?
A. For administering file timestamps
B. For local clock synchronization with a more reliable time source
C. For sending packets to test remote connectivity
D. All of the above with proper options and arguments

B

Which TWO files in the /etc/ directory control user access to the at service?
A. at.deny
B. at.conf
C. at.ctrl
D. at.allow

AD

Which file does TCP Wrappers log messages to?
A. /var/log/wrappers
B. /var/log/secure
C. /var/log/su
D. /var/log/tcp

B

Depending on the Linux distribution and version, which THREE commands can be used to activate or deactivate a network interface?
A. ifconfig
B. ip
C. ifcli
D. nmcli

ABD

How would the condition COUNT=$((COUNT + 1)) cause a for loop to behave when the initial value of the COUNT variable is set to 0?
A. Add "1" to the counter at each loop iteration
B. Subtract "0" from the counter at each loop iteration
C. Subtract "1" from

A

Select a benefit of using the CIDR notation in IP addresses.
A. More usable IP addresses
B. Less usable IP addresses
C. Shorter IP addresses
D. Less entries in routing tables

D

What would the command useradd -D do?
A. Display the range of values used at the time of user creation or modification
B. Display the default values used at the time of user creation or modification
C. Suggest values that cannot be used for new users
D. S

B

Which command is used to unset an alias?
A. unsetalias
B. unalias
C. alias rm
D. unset alias

B

An alias hostname is just another name for a host. True or false?

True

Which THREE of the following are true for the nmap command?
A. It can be used to discover open ports on remote systems
B. It can detect the type and version of operating system running on remote systems
C. It can detect the commands that users running on

ABE

How many bits does an IPv6 address contain?
A. 64
B. 96
C. 128
D. 160 E. 192

C

What would the command find /usr -perm /2000 -type f do?
A. Search for files and directories under /usr with sgid bit enabled
B. Search for files under /usr with sgid bit enabled
C. Search for files under /usr with suid and sgid bits enabled
D. Search for

B

Which command can be used to print geometrical information of an X terminal window including the window id and terminal's location and appearance data?
A. xterm
B. xwininfo
C. display
D. xdpyinfo

B

Which protocol is used by an MTA?
A. SNMP
B. LDAP
C. DNS
D. SMTP

D

Which command executes another program without invoking a sub-shell for it?
A. bash
B. source
C. exec
D. invoke

C

The adaptability of Linux to a wide variety of languages, cultural settings, and time zones is referred to as:
A. Internationalization
B. Regionalization
C. Globalization
D. Localization

A

What needs to be done to update the aliases.db database after updating the /etc/aliases file?
A. Restart Sendmail daemon
B. Run the newaliases command
C. Run the aliases command
D. Reboot the system

B

Name the default configuration file for LightDM that is located in the /etc/lightdm directory and can be used to enable or disable guest logins and show or hide user list.

lightdm.conf

What are the benefits of using the OpenSSH utilities?
A. Use encryption during data transfer
B. Use hidden keys during data transfer
C. Log audit trail
D. Both A and B

A

Depending on the Linux distribution and version, static and default routes can be defined in network interface configuration files. True or False?

True

Which sequence of commands is appropriate to offline a printer for maintenance, and then back online?
A. cupsreject, cupsenable, cupsaccept, cupsdisable
B. cupsenable, cupsaccept, cupsdisable, cupsreject
C. cupsreject, cupsdisable, cupsenable, cupsaccept

C

How many address bits do IPv4 and IPv6 addresses contain?
A. 16/64
B. 64/256
C. 32/64
D. 32/128

D

Type the name of the configuration file for the anacron service.

/et/anacrontab

Which THREE tools can be used for DNS queries?
A. dig
B. nslookup
C. nsswitch
D. host

ABD

Which command is used to cancel a print request?
A. lpalt
B. lpcancel
C. cancel
D. lpadmin

C

Write an SQL query to display all records stored in a table called ex102t matching the name "Abraham".
A. select * from ex102t where name='Abraham'
B. select all from ex102t where name='Abraham';
C. select all in ex102t where name='Abraham';
D. select * f

D

Which THREE commands can be used to display network interface statistics and routing table?
A. netstat
B. ifconfig
C. ip
D. ss

ACD

Type the default netmask address for a class B network?

255.255.0.0

Which file documents the well-known network port numbers, along with service names and protocols they are associated to use?
A. /usr/bin/protocols
B. /etc/protocols
C. /etc/services
D. Both B and C

C

Type the name of the file that must be edited to disallow a user from scheduling an at job.

/etc/at.deny

OpenSSH host key files are located in the /etc/ssh directory. True or False?

True

What would the command useradd user500 do?
A. It will display an error message
B. It will create user500 using the default values
C. It will create user500 with all custom values
D. It will create user500 without using the default values

B

Which file is consulted in Ubuntu at system boot to activate network interfaces and apply IP addresses to the interfaces?
A. /etc/network/interfaces
B. /etc/network/networks
C. /etc/sysconfig/interfaces
D. /etc/sysconfig/network-scripts/ifcfg-eth0

A

Type the name of the primary syslog service configuration file.

/etc/rsyslog.conf

Which file contains the IP address to hostname mapping?
A. /etc/hosts
B. /etc/sysconfig/hosts
C. /etc/hostnames
D. /etc/hosts.map

A

Which command is used to lookup matching entries in administrative databases such as /etc/passwd and /etc/group?
A. grep
B. getent
C. getadm
D. egrep

B

Which TWO of the following are the IPv4 versions of the tracepath6 and traceroute6 commands?
A. traceroute4
B. tracepath4
C. traceroute
D. tracepath

CD

What would having the entry sshd:ALL in the /etc/hosts.deny file mean?
A. Remote login access via the secure shell service is enabled
B. Remote login access through all services on the system are enabled
C. Remote login access through all services on the

D

Which THREE commands can be used to display and modify network interface configuration?
A. nmcli
B. ifconfig
C. nm
D. ip

ABD

Which TWO commands can be used to check connectivity between two network nodes using the ICMP protocol?
A. ping6
B. netstat
C. ping
D. linkstatus

AC

Which command can be used to convert text from one character encoding to another?
A. iconv
B. convert
C. enconvert
D. txtconvert

A

Which file is referenced by the date and hwclock command to determine the current time zone?
A. /usr/share/zoneinfo
B. /etc/localtime
C. /etc/timezone
D. /var/time

B

To configure trusted login for OpenSSH, which command would you use to generate a private/public keypair?
A. ssh
B. ssh-keygen
C. ssh.key.gen
D. ssh.keygen

B

Type the well-known port that the OpenSSH service uses?

22

Which of the TWO time sources can be used to sync time of your Linux system?
A. An internet-based time server
B. A wall clock
C. A watch
D. The local system clock

AD

Which TWO shell built-in commands would run a program in the current
shell?
A. program.sh
B. source
C. . (dot)
D. sh

BC

Which TWO commands can be used to discover open ports on a system?
A. netstat
B. mapper
C. probe
D. nmap

AD

Type the name of the file that stores a user's RSA identity for use with
OpenSSH.

~/.ssh/id_rsa

When two time servers work at the same stratum level, they are called peers. True or False?

True

Which of the following shows the correct syntax of entries in the /etc/hosts file?
A. hostname alias1 alias2 IP
B. IP alias1 alias2 hostname
C. IP hostname alias1 alias2
D. alias1 alias2 hostname IP

C

Depending on the Linux distribution and version, which TWO files are used to store a system's hostname?
A. /etc/hosts.conf
B. /etc/sysconfig/network
C. /etc/hostname
D. /etc/default/network

BC

Which command can be used to check the status of NTP associations?
A. ntpdd
B. xntpd
C. ntptrace
D. ntpq

D

Which TWO commands can be used to display environment variables and their values?
A. print
B. env
C. unset
D. export

BD

What would the command ssh-add -l do?
A. Add user's public and private keys to authentication agent's cache
B. Add a user's public key to authentication agent's cache
C. Add a user's private key to authentication agent's cache
D. List authentication agent

D

Which TWO of the following show the correct syntax to remove a static route to a network non-persistently?
A. ip route del 192.168.2.0/24
B. ifconfig route del 192.168.2.0/24
C. ip route 192.168.2.0/24 del
D. route del -net 192.168.2.0/24

AD

Which looping construct can be used to perform an action on listed items?
A. while-do-done
B. until-do-done
C. if-then-fi
D. for-do-done

D

Normal users do not have access to list, create, or cd into the /var/spool/cron directory that stores crontab files. True or False?

True

Which is the de facto service used on the Internet for hostname resolution?
A. DNS
B. NetworkManager
C. NIS
D. LDAP

A

Type the command to terminate all processes using a mounted file system.

fuser

On a small network with a few Linux systems, which hostname resolution
method can be used?
A. LDAP
B. DNS
C. NetworkManager
D. /etc/hosts

D

Any user on the system can modify the /etc/shadow and /etc/passwd files. True or False?

False

Which of the following is not included in the /etc/passwd file?
A. GID
B. Home directory
C. Shell
D. Comments
E. UID
F. User's secondary group

F

Type the name of the journald configuration file that is located in the /etc/systemd directory.

journald.conf

Select FOUR of the following that are valid for group accounts.
A. A user can be a member of multiple groups at a time
B. A user can have only one group as their primary group at a time
C. Every group on the system must have a unique GID
D. A user can swi

ABDE

Which THREE of the following are included in the /etc/group file?
A. GID
B. Group members
C. Shell
D. Group name

ABD

What would happen to an incoming email if the recipient user has a .forward file in their home directory containing email address user25@server25.example.com?
A. The first 25 emails received will be redirected to user25
B. Any email received by user25@ser

C

What is the well-known port number used for the HTTP service?
A. 8080
B. 80
C. 443
D. 880

B

Which of the following is not included in the /etc/shadow file?
A. Username
B. GID
C. Encrypted password
D. Aging information

B

What is the name of the X11 configuration file?
A. xorg.conf
B. x11.conf
C. xorgx11.conf
D. x11org.conf

A

What daemon must run on DNS clients to enable hostname resolution?
A. named
B. name
C. dnsd
D. None

D

Select the name of the file that, if created in the /etc directory, would disallow normal users from being able to log on to the system.
A. nologin
B. nousers
C. nouserlogins
D. nologins

A

Type the well-known port number for the LDAP service.

389

The primary use of the ICMP protocol is in testing and diagnosing network
connections. True or False?

True

What would the command lpadmin -d prn1 do?
A. Print the /etc/hosts file on prn1 printer
B. Set prn1 as the default printer and prints a test page
C. Set prn1 as the default printer
D. Print a test page on the default printer and deletes it

C

The new syslog service combines the functionalities of both syslogd and klogd services. True or False?

True

Identify TWO differences between TCP and UDP protocols.
A. TCP does not guarantee packet delivery; UDP does
B. TCP is reliable; UDP is not
C. TCP is connectionless; UDP is connection-oriented
D. TCP is point-to-point; UDP is not

BD

What would the command lp -d prn1 /etc/hosts do?
A. Prints the /etc/hosts file on prn1 printer
B. Sets prn1 as the default printer
C. Sets prn1 as the default printer and prints the /etc/hosts file
D. Prints the /etc/hosts file on the default printer and

A

Define NTP stratum levels. Select TWO.
A. They determine the reliability of time sources
B. They determine the proximity of time sources
C. They determine the accuracy of time sources
D. They determine the availability of time sources

AC

What would the command ping -c3 192.168.0.2 do?
A. Send packets of size 3KB to the IP
B. Send three packets to the IP and continue if there is no response
C. Send packets to the IP every third second
D. Send three packets to the IP and quit

D

The ability of Linux to adapt itself to a specific language and cultural requirement is referred to as:
A. Internationalization
B. Regionalization
C. Globalization
D. Localization

D

Which TWO of the following show the correct syntax for adding a static route non-persistently?
A. ifconfig route add 192.168.4.0/24 via 192.168.0.1 dev eth1
B. ip route add 192.168.4.0/24 via 192.168.0.1 dev eth1
C. route add -net 192.168.4.0/24 gw 192.16

BC

What is the function of the shift command?
A. To switch the positions of two arguments
B. To move all arguments to the left
C. To move all arguments to the right
D. To move only the last argument to the left

B

GDM is faster than LightDM. True or False?

False

OpenSSH enables:
A. Authentication based on standard 128-bit encryption
B. Authentication based on standard mode security extension
C. Authentication based on hidden keys
D. Authentication based on trusted mode security

C

Which of the following DNS query tools can also be used for DNS
troubleshooting?
A. dig
B. host
C. nslookup
D. nsswitch

A

Depending on the Linux distribution and version, which FOUR tools can be used to set or modify the time zone on the system?
A. dpkg-reconfigure tzdata
B. timeconfig
C. timedatectl
D. tzconfig
E. hostnamectl

ABCD

Which pair of commands can be used to activate and deactivate shadow password mechanism for users?
A. pwconv/pwunconv
B. shconv/shunconv
C. passconv/passunconv
D. conv/unconv

A

Select THREE accessibility features that are available in GDM and Unity for users with disability.
A. Contrast setting
B. Screen size setting
C. Visual alert setting
D. AccessX

ACD

The ulimit command can be used to display and place user limits on computing resources, such as processors, memory, and files. True or False?

True

Which command can be used to determine the route a packet would take to reach the destination system?
A. tracert
B. traceroute
C. route find
D. findroute

B

The OpenSSH toolset provides a non-secure network tunnel for accessing a Linux system. True or False?

False

Which command can be used to update system time instantly?
A. xntpd
B. ntpdate
C. chdatentp
D. hostnamectl

B

The w command shows the following pieces of information in its output. Select THREE.
A. System uptime information
B. List of logged-in users and what they're doing
C. The logout time of a user
D. The length of time a user has been idle for

ABD

The equivalent for the mailq command is:
A. mail
B. mailx
C. sendmail --mail
D. sendmail -bp

D

Write an SQL query to display all records stored in a table called ex102t and sort the output by city name.
A. select * from ex102t order by city;
B. select all from ex102t order by city;
C. select all in ex102t order by city;
D. select * from ex102t orde

A

What is the purpose of subnetting?
A. To create multiple smaller networks out of an IP
B. To divide the network portion of an IP into multiple addresses
C. To create larger networks
D. To concatenate multiple IP addresses to form large networks

A

The X font server may be configured on older Linux versions to provide a
central location to store and access fonts. True or False?

True

Which THREE of the following are list operators?
A. &
B. &&
C. |
D. ||
E. ;
F. ;;

BDE

The break command terminates the execution of a loop and returns the control to the command immediately after it. True or False?

True

What is the minimum number of nodes required to form a network?
A. 1
B. 2
C. 3
D. 0

B

How many layers are in there in the OSI reference networking model?
A. 8
B. 9
C. 7
D. 5

C

What is the term used for adding a header message at each layer of the OSI reference model?
A. De-encapsulation
B. Encapsulation
C. Packet-forming
D. Peer-to-peer

B

Which directory is used to store a user's authentication files by default?
A. /etc/ssh
B. ~/.ssh
C. ~/ssh
D. /etc/.ssh

B

Type the name of the command that is used to modify a group account.

groupmod

What signifies the end of an "if" statement in a shell script?
A. endif
B. if
C. }
D. fi

D

Select TWO from the following to print two copies of /tmp/file1 to prn1 printer and send an email when printing is complete.
A. lpr -dprn1 -#2 -m /tmp/file1
B. lpr -Pprn1 -#2 -m /tmp/file1
C. lp -dprn1 -nm2 /tmp/file1
D. lp -dprn1 -n2 -m /tmp/file1

BD

Type the name of the command that is used to convert input text from one
character encoding into another.

iconv

A relational database has two or more tables linked by a common key. True or False?

True

What TWO components must be defined at a minimum for every cron job in a crontable?
A. Schedule
B. Group name
C. Username
D. Command

AD

How would you capture the result of the who command in a variable called WHO?
A. WHO=$(who)
B. who=$(WHO)
C. WHO=who
D. who>WHO

A

Which of the following is the correct syntax in the /etc/aliases file to forward emails received by user30 to root and ab@ab.com?
A. root,ab@ab.com: user30
B. user30 root ab@ab.com
C. user30: root,ab@ab.com
D. user30,root,ab@ab.com

C

Which command can be used to make a printer to disallow new print requests from queuing?
A. cupsstop
B. cupsdisallow
C. cupsdisable
D. cupsreject

D

Which of the following would print the contents of the /etc/profile file on printer prn3?
A. lp -p prn3 /etc/profile
B. lp -dprn3 /etc/profile
C. lp -a prn3 /etc/profile
D. lp -pprn3 /etc/profile

B

OSI layers provide a set of rules for data transmission. True or False?

True

The lpadmin command is used to display the health of configured printers. True or False?

False

Which file would you modify to add the following default gateway information persistently on RHEL and spinoffs? GATEWAY=<IP> GATEWAYDEV=eth2
A. /etc/network.conf
B. /etc/sysconfig/network
C. /etc/default/network
D. /etc/network/interfaces

B

At what layers the TCP and IP protocols are defined? Choose TWO.
A. Data link layer
B. Application layer
C. Transport layer
D. Network layer

CD

Which directory is the default location for storing log files?
A. /tmp/log
B. /etc/log
C. /var/log
D. /usr/log

C

Locale settings may be configured at per-user and system-wide levels. True or False?

True

What is the default subnet mask for a class B IP address?
A. 255.255.255.0
B. 255.255.0.0
C. 255.0.0.0
D. 0.0.0.255

B

Which is not another name for MAC address?
A. IP address
B. Hardware address
C. Station address
D. Ethernet address

A

Where do the at and cron scheduling daemons store history of executed jobs?
A. /etc/cron
B. /etc/log/cron
C. /var/log/cron/cron
D. /var/log/cron

D

What is the term "journal" refers to on systems running systemd?
A. A journal is a file under /var/log/journal directory that stores alerts captured by the syslog service
B. A journal is a file under /var/log/journal directory that stores alerts captured

D

Which TWO of the following can be used to set or change password aging attributes on a user account?
A. chattr
B. passwd
C. set
D. chage

BD

Which THREE of the following can be used to view routing table information?
A. netstat -r
B. ip route
C. ifconfig -a
D. route

ABD

Which TWO of the following have syntax problems?
A. mail -s "Hello, This is me." user20
B. echo "Hello, This is me." | mail user20
C. mail "Hello, This is me." user20
D. echo user20 | mail "Hello, This is me.

CD

Which file is referenced to determine sources to look up hostname information?
A. /etc/network.conf
B. /etc/nsswitch.conf
C. /etc/resolv.conf
D. /etc/sysconfig/network

C

Type the name of the legacy command that is still used to submit print requests.

lpr

What would the command usermod -aG nixadm user10 do?
A. Add user10 to group nixadm without affecting user10's current group memberships
B. Replace user10's current group memberships with group nixadm
C. Change user10's primary group to nixadm
D. Replace u

A

What would the command ssh-keygen -f ~/.ssh/id_rsa -N "" -q do?
A. Generate OpenSSH DSA keys with all the defaults
B. Generate OpenSSH RSA keys quietly with a null passphrase and store them in ~/.ssh/id_rsa file
C. Generate OpenSSH RSA keys with all the d

B

Type the name of the command to list available devices on the system that can be used to set up a printer.

lpinfo

Which FOUR of the following components can be parts of a shell script?
A. Conditional statements
B. Comments
C. Loops
D. Commands E. Location

ABCD

Which TWO of the following can be used to set or change some password aging attributes for a user account?
A. useradd
B. usermod
C. groupadd
D. groupmod

AB

The Neighbor Discovery Protocol (NDP) is used for the following TWO purposes.
A. To probe an IPv4 network
B. To discover IPv6 devices
C. To probe an IPv6 network
D. To discover IPv4 and IPv6 devices

BC

Which command can be used to determine a time zone value that an individual user can set for themselves?
A. tzconfig
B. tzselect
C. echo $TZ
D. timedatectl

B

What does the echo command do without any arguments?
A. Removes an empty line
B. Adds a comments line
C. Cleans comments
D. Adds an empty line

D

Which THREE are valid keywords for the /etc/resolv.conf file?
A. Nameserver
B. Domain
C. Search
D. Hostname

ABC

The until-do-done loop continues to run until the specified condition becomes false. True or False?

False

POP3 and IMAP4 use the following port numbers.
A. 100/200
B. 995/993
C. 110/143
D. 25/28

C

What would the test condition [ $1 -ge 0 ] do in an if-then-fi statement?
A. Test whether an integer value supplied as the first argument is less than 0
B. Test whether an integer value supplied as the first argument is greater than 0
C. Test whether an i

D

The tracepath and traceroute commands may be used to troubleshoot a network connection when a ping test has failed. True or False?

True

Which command can be used for both composing and reading email messages?
A. mailq
B. mail
C. mailx
D. postfix

B

What are TWO good reasons to use exit codes in a shell script?
A. To determine where exactly a script concluded execution
B. To help debug a script
C. To help determine how to write a new script
D. To help understand how a script works

AB

What is the name of the command that can be used to run the anacron service manually?
A. cron
B. anac
C. anacron
D. anacrontab

C

Type another name used for the default gateway.

default route

What is the unicode standard?
A. It consists of various standards to support users
B. It helps translate code mappings into character definitions
C. It transforms character mappings and store them in a character database
D. It comprises code mappings, cha

D

Which TWO files the useradd command consults to get default user attributes?
A. /etc/default/useradd
B. /etc/default/logins
C. /etc/sysconfig/useradd
D. /etc/login.defs

AD

What is the impact of the setuid bit on directories?
A. Directories cannot be shared with other users
B. Directories will allow only setuid-enabled files to be stored in them
C. No impact
D. Directories can be shared among group members

C

What could the command Xorg -configure be used for? Select TWO.
A. To configure remote X access
B. To view current X configuration settings
C. To invoke the X tool
D. To modify X configuration settings

BD

What is the advantage of using port tunneling (port forwarding)? Select TWO.
A. It allows only encrypted protocols to use this feature
B. It allows data transmission via unencrypted protocols over ssh-encrypted channels
C. X11 can take advantage of this f

BC

What would the following function called funtest do? funtest () { echo "There are $# args"; echo "They are: $@"; }
A. There is a syntax error in the function
B. Display a list and count of arguments
C. Display a count and list of arguments, and then delet

D

Which TWO of the following can be used to restart the syslog service?
A. systemctl restart rsyslog
B. systemctl restart rsyslogd
C. service rsyslog restart
D. service rsyslogd restart

AC

Depending on the Linux distribution and version, which TWO directories store files to enable or disable individual network service?
A. /etc/inetd.conf.d
B. /etc/networkd.d
C. /etc/xinetd.d
D. /etc/inetd.d

CD

Write an SQL query to display all records stored in a table called ex102t with a common last name.
A. select * from ex102t where lastname='LN" group by lastname;
B. select * from ex102t where lastname='LN" sort by lastname;
C. select * from ex102t where l

A

Which command is used to write interactive scripts?
A. interact
B. tellme
C. read
D. write

C

What are THREE possible benefits of writing shell scripts?
A. To automate lengthy tasks
B. To simplify the performance of Linux administration tasks
C. To automate repetitive tasks
D. To complicate Linux administration tasks

ABC

A database is a non-structured collection of data. True or False?

False

The CUPS printing system uses files to store configuration information. What is the name of the directory where these files are stored?
A. /usr/cups
B. /etc/cups
C. /usr/print
D. /etc/print

B

What are THREE major components of a database table?
A. Column
B. Value
C. Sort
D. Row

ABD

A subnet mask is used to identify the start and end of the network and node portion of an IP address. True or False?

True

What are TWO fundamental types of logical constructs used in shell scripting?
A. for-do-done
B. case
C. if-then-elif-fi
D. if-then-fi

BD

Which of the following would run an at job 6 hours from now?
A. at + 6 hours
B. at 6 pm
C. atd now + 6 hours
D. at now + 6 hours

D

Select FOUR Mail Transfer Agent (MTA) program names from the following.
A. Sendmail
B. Postfix
C. Evolution
D. Mutt
E. Exim
F. Qmail

ABEF

Which of the THREE commands can be used to work with variables?
A. var
B. env
C. set
D. export

BCD

What is the difference between a primary key and a foreign key in database terminology?
A. A primary key is used within a table to uniquely identify a record; a foreign key is used to relate two or more tables
B. A primary key is used to relate two or mor

A

How can we determine which processes are using a mounted file system or a network port?
A. With the help of the ps command
B. With the help of the top command
C. With the help of the lsof command
D. With the help of the fuser command

C

Why do we usually define multiple NTP servers on the NTP client for time maintenance? Select TWO.
A. To improve time precision
B. To improve efficiency
C. To increase availability
D. To expand network efficiency

C

Which command shows a list of users who are currently logged on to the system?
A. 'who am i'
B. who
C. login
D. whoami

B

What information does the lastb command display?
A. It reports the history of successful user login attempts
B. It reports the history of successful and unsuccessful user login attempts
C. It reports the history of superuser login attempts
D. It reports t

D

What does the "x" in the second field of the /etc/passwd file imply?
A. It implies that the encrypted password is stored in the /etc/gshadow file
B. It implies that the encrypted password is stored in the /etc/shadow file
C. It implies that the shadow pas

B

The journald service records alerts in a non-legible format. Which command do we use to read them?
A. syslog
B. journalctl
C. journal
D. strings

B

Write the SQL command to create a database called exam102.
A. create database exam102;
B. create exam102 database;
C. create database exam102
D. create database db exam102;

A

What would the command ssh-copy-id -i ~/.ssh/id_rsa.pub 192.168.0.20 do?
A. Copy file ~/.ssh/id_rsa.pub to 192.168.0.20 using the sftp command under the same directory location
B. Copy file ~/.ssh/id_rsa.pub to 192.168.0.20 using the ssh command under /et

C

Select the FOUR local user authentication files that are affected when a user or group account is created, modified, or removed.
A. passwd
B. fstab
C. gshadow
D. resolv.conf
E. group
F. shadow

ACEF

Type the name of the sudo configuration file that is located in the /etc directory.

sudoers

What are the TWO types of shell startup files?
A. Per-user
B. Normal-user
C. Service-wide
D. System-wide

AD

Write an SQL statement to update the field "FirstName" with value "Abraham" matching serial number "Sno" to "1" in table "ex102t".
A. update ex102t set FirstName=Abraham where Sno=1;
B. update ex102t update FirstName=Abraham where Sno=1;
C. update ex102t

A

What would the command passwd -l user10 do?
A. Change aging for user10
B. Unlock user10
C. Lock user10
D. Delete user10

C

Which THREE network classes are used on public networks?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E

ADC

What is the first UID assigned to a regular user on newer Linux distributions?
A. 500
B. 100
C. 900
D. 1000

D

What is the impact of the sticky bit on files?
A. No impact
B. Normal users will not be able to delete the files
C. The root user will be able to delete or modify the files
D. Files cannot be shared with other users

A

Which TWO of the following can be used to search for files with suid bit set?
A. find / -perm /u+s -type f
B. find / -perm -4000
C. find / -type f -perm /o+s
D. find / -perm /o+t

AB

Every user in Linux gets a private group by default. True or False?

True

The selector field in the rsyslog.conf file is segregated into three sub-fields called facility, priority, and action. True or False?

False

Which TWO commands can be used to display queued print requests?
A. lpq -o
B. lpq
C. lpadmin -o
D. lpstat -o

BD

The last command is used to report successful user login attempts and system reboot history. True or False?

True

Depending on the Linux distribution and version, which THREE files store system-wide locale information?
A. /etc/default/locale
B. /etc/sysconfig/L10n
C. /etc/locale.conf
D. /etc/sysconfig/i18n

ACD

What would the userdel command do if it is run with the -r option?
A. Delete a user along with their home directory
B. Delete a user without touching their home directory
C. Delete home directory of a user
D. Delete a user along with their system-wide she

A

Which directory stores time zone information for various cities, countries, and regions?
A. /etc/timezones
B. /usr/zonefiles
C. /etc/zoneinfo
D. /usr/share/zoneinfo

D

Which command can be used to start the X server manually?
A. start
B. startx
C. X
D. xstart

B

Type the name of the command that is used to enable or disable remote X access on the local system.

xhost

What is the first GID assigned to a group on newer Linux distributions?
A. 500
B. 100
C. 1000
D. 900

C

ALL and LOCAL are valid keywords that can be used in TCP Wrappers configuration files hosts.deny and hosts.allow to represent every host and hosts on the local network, respectively. True or False?

True

What is the name of the default backup file for /etc/shadow?
A. /etc/shadow.sh
B. /etc/shadowC. /etc/shadow.bak
D. /etc/shadow.old

B

Linux allows us to use the same number as both UID and GID. True or False?

True

What would the command chage -E 2018-12-31 user20 do?
A. Set December 31, 2018 as the account expiry date for user10
B. Set December 31, 2018 as the account deletion date for user10
C. Set December 31, 2018 as a reminder to recreate user10 account
D. Run

A

Which TWO of the following show the correct syntax to remove an IP nonpersistently from the system?
A. ip a del 192.168.2.20/24 dev eth1
B. ifconfig del 192.168.2.20/24 dev eth1
C. ip dev eth1 del 192.168.2.20/24
D. ifconfig eth1 del 192.168.2.20/24

AD

What would the command chage -l user5 do?
A. List user5 account information
B. Lock user5 account
C. Unlock user5 account
D. Display aging attributes for user5

D

Rotating log files on a regular basis is a valuable feature to ensure availability of enough free space. Which command does the system use for log file rotation and subsequent compression and mailing out?
A. rotate
B. rotatelog
C. logrotate
D. rotation

C

Which command can be used to print detailed information about X server and its capabilities?
A. xterm
B. xdpyinfo
C. display
D. xwininfo

B

Which TWO statements are correct for using the hyphen character with the su command?
A. The su command does not process the specified user's shell startup files
B. The su command processes the specified user's shell startup files
C. The su command process

BC

What is the well-known port number associated with the secure HTTP service?
A. 80
B. 143
C. 993
D. 443

D

Which TWO of the following are correct to list GnuPG keys?
A. gpg2 --list-keys
B. gpg2 --show-keys
C. gpg --list-keys
D. gpg --show-keys

AC

What is the significance of the -o option with the groupadd and groupmod commands?
A. It allows the commands to allocate an in-use GID to other groups
B. It prevents the commands from allocating an in-use GID to other groups
C. It instructs the commands t

A

Type the name of the command that is used to change a user's primary group temporarily.

newgrp

What would the command iconv /tmp/testcode -t EBCDIC-JP-E -o /tmp/testcode.out do?
A. Translate the content of /tmp/testcode into Japanese and record output in /tmp/testcode.out
B. Translate the content of /tmp/testcode into Japanese language
C. Convert t

C

The /etc/bashrc file contains shell scripts that are executed at user login. True or False?

False

What would the command chage -d 0 user60 do?
A. Disable password aging for user60
B. Disable user60's ability to change password
C. Force user60 to change password right now
D. Force user60 to change password at next login

A

Which user does not need to be defined in
.allow or
.deny file to run the at and cron jobs?
A. The bin user
B. The root user
C. user1
D. All service user accounts

B

Depending on the Linux distribution and version, which TWO of the following could be the directory locations where user crontab files are stored?
A. /etc/spool/cron/crontabs
B. /etc/spool/cron
C. /var/spool/cron/crontabs
D. /var/spool/cron

CD

By default the *.allow files for at and cron exist. True or False?

False

Which languages does the ISO-8859 standard support?
A. East Asian
B. European
C. African
D. South Asian

B

Which TWO of the following are true for a subnet mask?
A. It increases the number of usable IP addresses
B. Subnets require a router in between in order to communicate with one another
C. Each network node within a subnet will have a unique subnet address

BE

Which option with the crontab command would allow a user to modify their crontables?
A. -l
B. -a
C. -m
D. -e

D

Which file stores default password aging attributes?
A. /etc/login.defs
B. /etc/default/logins
C. /etc/sysconfig/logins
D. /etc/logins

A

Which class of IP addresses has the least number of node addresses?
A. Class A
B. Class B
C. Class C
D. All three classes have the same number of node addresses

C

Which command would display the status of all configured print queues?
A. lpadmin -d
B. lp -t
C. lpadmin -t
D. lpstat -t

D

What are the uses of the ifup and ifdown commands?
A. To activate and deactivate the NTP service
B. To activate and deactivate the HTTP service
C. To remove and redefine a network interface
D. To activate and deactivate a network interface

D

Individual users may set a different time zone for themselves using the TZ environment variable in a per-user shell startup file. True or False?

True

The passwd file stores secondary user group information. True or False?

False

alias rm="rm -i" is an example of:
A. Filename completion
B. Alias substitution
C. Tilde substitution
D. Command substitution

B

Which THREE of the following methods can be used to share GnuPG keys with intended recipients?
A. As an email attachment
B. Via a keyserver
C. By running gpg --send-keys user@email
D. Via a USB key

ABD

Which TWO commands can be used to display the hardware address of a network interface?
A. ping
B. netstat
C. ifconfig
D. ip

CD

Select FOUR facilities that the syslog service recognizes.
A. cron
B. user
C. rsyslog
D. daemon E. auth

ABDE

Which file defines the protocols in the system?
A. /etc/protocols/protocols
B. /etc/protocols
C. /etc/services
D. /etc/tcp

B

What is the purpose of the ONBOOT directive in the interface configuration file in RHEL and derivatives?
A. Whether to activate an interface at system boot
B. Whether to perform a ping test at system boot
C. Whether to allow the system to boot up
D. Wheth

A

List THREE benefits of subnetting.
A. Better management
B. Smaller networks
C. More usable IP addresses
D. Less traffic

ABD

What would the command passwd -n 7 -x 15 -w 3 user6 do?
A. Set warndays to 7, maxdays to 15, and mindays to 3 for user6
B. Set mindays to 7, warndays to 15, and maxdays to 3 for user6
C. Set maxdays to 7, mindays to 15, and warndays to 3 for user6
D. Set

D

Which TWO files in the /etc/ directory control user access to the cron service?
A. cron.allow
B. crontab
C. anacron
D. cron.deny

AD

What is the function of the default gateway?
A. It is used only in the presence of static routes
B. It is used only in the absence of static routes
C. It is used when the system is unable to find an appropriate route to a destination
D. It is always used

C

What is the range of a class B network?
A. 128 to 191
B. 127 to 192
C. 193 to 223
D. 224 to 240

A

Which file or directory stores network interface configuration on Debian and derivatives?
A. /etc/network
B. /etc/network/interfaces
C. /etc/sysconfig/network-scripts
D. /var/network/interfaces

B

Which environment variable must be set appropriately to work with X applications?
A. XHOST
B. DISPLAY
C. X11
D. SHOW

B

CUPS printing system is a replacement for the LPD print service. True or False?

True

What is the default NTP polling interval, in seconds?
A. 128
B. 32
C. 256
D. 64

D

Which of the following is correct to view a list of current NTP time sources?
A. ntpq -p
B. ntpq -q
C. ntpstat -p
D. ntpstat -q

B

What port and protocol does NTP use?
A. 321/UDP
B. 124/UDP
C. 123/UDP
D. 123/ICMP

C

Which of the following is not a syslog priority?
A. emerg
B. warn
C. log
D. debug

C

What is the purpose of the NTP drift file /var/lib/ntp/drift?
A. NTP uses it to keep track of remote clock accuracy
B. NTP uses it to keep track of hardware clock accuracy
C. NTP uses it to keep track of Windows clock accuracy
D. NTP uses it to keep track

D

Depending on the Linux distribution and version, static and/or default routes can be defined persistently in THREE of the following files?
A. The /etc/sysconfig/network file
B. Interface-specific route configuration files under /etc/sysconfig/networkscrip

ABC

What is the name of the system-wide shell startup file that defines shell variables for all users?
A. /etc/profile
B. ~/profile
C. /etc/.profile
D. /etc/profile.sh

A

Which environment variable overrides the values of all individual locale environment variables?
A. LC_ALL
B. LC_*
C. LOCALE_ALL
D. LANG

A

What would the command ntpdate 0.server.centos.ntp.org do?
A. It will start the local clock synchronization process with the specified NTP server
B. It will instantly synchronize the local system clock with the specified NTP server
C. It will instantly bi

B

What THREE would the command ip addr show in the output?
A. Display MAC address for all network interfaces
B. Display DNS assignments for all network interfaces
C. Display IPv6 assignments for all network interfaces
D. Display IPv4 assignments for all net

ACD

Which TWO of the following can be used to list submitted at jobs?
A. atq -e
B. at -l
C. atq
D. at -q

BC

Write an SQL query to display all records stored in tables ex101t and ex102t with matching key Sno. Select TWO correct answers.
A. select all in ex101t join ex102t on ex101t.sno = ex102t.sno;
B. select * from ex101t,ex102t where ex101t.sno = ex102t.sno;
C

BD

What would the entry "hosts: files dns" mean in the /etc/nsswitch.conf file?
A. To consult the /etc/hosts file and then DNS
B. To consult the /etc/hosts file and then time out
C. To consult the /etc/hosts file only
D. To consult the DNS and then the /etc/

A

The journald service is available on systems that run either SysVinit or systemd. True or False?

False

What would the command host 10.22.112.22 do? Select TWO.
A. Query the specified IP for a DNS server
B. Provide a hostname associated with the specified IP
C. Query available name resolution sources for the specified IP
D. There is a syntax problem

C

Is the DNS name space hierarchical, flat, or winding? Type your answer in the space provided.

Hierarchical

Which directory contains the default user startup template files that are copied to the home directory of a user account at the time of creation?
A. /etc/skeleton
B. /etc/default/user
C. /etc/default
D. /etc/skel

D

What is the well-known port number for the DNS service?
A. 51
B. 52
C. 53
D. 54

C

Which THREE of the following are true for an MTA?
A. It is responsible for downloading email messages to a recipient's inbox
B. It is responsible for transporting email messages between mail servers
C. It uses the POP and IMAP protocols over port 25
D. It

BDE

Type the name of the file that defines the mapping between users and email addresses.

/etc/aliases

What is the secure equivalent that OpenSSH provides for the rcp command?
A. scp
B. cp
C. ftp
D. No equivalent, use rcp

A

What is the significance of the character combination (#!) at the beginning of a shell script?
A. It outlines the absolute path of the Bash shell file to be used to run the script
B. It outlines the absolute path of the shell to be used to run the script

B

Select TWO of the following that can be used to redirect incoming user email to one or more recipients.
A. By using the ~/.forward file
B. By using the /etc/aliases file
C. By using the /etc/forward file
D. By using the mail command

AB

Which of the following correctly lists the features included in assistive technologies?
A. Text size adjustments
B. Audible and visual alerts
C. Onscreen virtual keyboards
D. Mouse gestures
E. Screen resolution adjustments
F. All of the above

F

Which of the following should be run after making changes to the rsyslog.conf file to check for any errors?
A. service rsyslog restart
B. rsyslogd
C. systemctl rsyslog restart
D. rsyslogd -N 1

D

Which TWO of the following commands can be used for tracing flow of network traffic?
A. route
B. tracepath
C. netstat
D. traceroute

BD

Type the name of the OpenSSH client configuration file located in the /etc/ssh directory.

ssh_config

Depending on the Linux distribution and version, which TWO are valid configuration files to store the default display manager?
A. /etc/default/display
B. /etc/X11/desktop
C. /etc/sysconfig/desktop
D. /etc/X11/default-display-manager

CD

What would the command groupadd -g 4000 dba do? Select TWO.
A. Create a group called dba with GID 4000
B. Create a group called 4000 with GID dba
C. Update the /etc/group and /etc/gshadow files
D. Add a group called dba using the next available GID

A

How many characters does the ASCII character set comprises of?
A. 64
B. 128
C. 256
D. 512

B

Which directory stores the user SSH keys?
A. /tmp/ssh
B. /etc/ssh
C. ~/.ssh
D. /etc/.ssh

C

Which directory stores the interface configuration files in RHEL and derivatives?
A. /var/lib/interfaces
B. /etc/network
C. /usr/local/network
D. /etc/sysconfig/network-scripts

D

Which command can be used to define VAR as an environment variable so that programs running in subshells also see and use it?
A. echo
B. set
C. env
D. export

D

What would the command ssh-copy-id do?
A. Install private and public keys on a remote system
B. Install public key on a remote system
C. Install private key on a remote system
D. Copy public key to a different directory

B

What is the OpenSSH equivalent for the telnet command?
A. scp
B. openssh
C. ssh
D. sftp

C

Type the name of the TCP Wrappers daemon that controls access to the system via the /etc/hosts.allow and /etc/hosts.deny files.

tcpd

What is the use of the ssh-keygen command?
A. To replace authentication keys
B. To copy authentication keys
C. To delete authentication keys
D. To generate authentication keys

D

What is the name of the configuration file in Debian and derivatives that stores syslog rules?
A. 50-default.conf
B. rsyslog.conf
C. syslog.conf
D. klogd.conf

A

Select TWO common encryption techniques.
A. Symmetric
B. Cryptography
C. Secret key
D. Asymmetric

AD

Which file in the /etc directory do we modify to enter NTP server names or IP addresses?
A. ntp.sh
B. ntp.conf
C. ntpserver.conf
D. ntpclient.conf

B

Which log file stores authentication messages?
A. /var/log/auth
B. /etc/log/secure
C. /var/log/secure
D. /etc/log/auth

C

Which THREE of the following are per-user shell startup files?
A. /etc/bashrc
B. ~/.bashrc
C. ~/.bash_profile
D. ~/.profile

BCD

The groupmod and usermod commands may be used to perform the following. Select THREE.
A. Modify group and user account attributes
B. Change GID and UID
C. Set group and user passwords
D. Change group name and user name

ABD

What can we achieve by executing the command ulimit -f 2048?
A. Set a minimum file size to 2MB for a user
B. Set a maximum file size to 2MB for a user
C. Set a maximum number of files to 2048 that a user can create
D. Set a minimum number of files to 2048

B

What does the entry hosts: dns [TRYAGAIN=return] files mean in the /etc/nsswitch.conf file?
A. Terminate a name lookup attempt even if DNS server is not busy
B. Jump to the /etc/hosts file for lookup if DNS server is busy
C. Terminate a name lookup attemp

C

Write an SQL query to show only the count of records stored in a table called ex102t matching the name "Abraham".
A. select
from ex102t where name='Abraham' count(
);
B. select count(*) from ex102t where name='Abraham';
C. select count(*) in ex102t where

B

How can we identify the files that are in use of running processes?
A. With the help of the ps command
B. With the help of the pgrep command
C. With the help of the fuser command
D. With the help of the lsof command

D

Which command can be used to print monitor settings, such as screen size, orientation, and reflection?
A. xrandr
B. xwininfo
C. display
D. xdpyinfo

A

Which of the following can be used to log a message to the default system log file?
A. write -i System Rebooted by $USER
B. log -i System Rebooted by $USER
C. logger -i System Rebooted by $USER
D. logger System Rebooted by $USER

C

Which command can be used to update the computer's hardware clock with the Linux system clock?
A. clock
B. date
C. time
D. hwclock

D

CUPS is not an implementation of the Internet Printing Protocol (IPP). True or False?

False

The selector field is divided into facility and priority in syslog configuration. What are their uses? Select TWO.
A. A facility represents process groups that generate messages
B. A priority identifies the severity associated with a facility
C. A priorit

AB

The setgid bit should/need not be enabled on TWO of the following.
A. Shared libraries
B. Executable files
C. Shell scripts
D. Directories

AC

Which THREE statements are true about the arp command?
A. It can be used to ascertain a hardware address associated with an IP address
B. It can be used to determine duplicate MAC addresses active on the network
C. It may be used to identify duplicate IP

ACD

The OpenSSH private key must be shared with remote systems for user authentication. True or False?

False

Depending on the Linux distribution and version, which THREE commands can be used to change the system time zone to America/Toronto.
A. hostnamectl set-timezone America/Toronto
B. cp /usr/share/zoneinfo/America/Toronto /etc/localtime
C. ln -s /usr/share/z

BCD

Which entry can be placed in user2's crontable to run script2.sh at 5 minutes past 1 a.m. and 1 p.m. on every Tuesday and redirect the output to /tmp/script2.out file?
A. 5 1,13
2 /home/user2/script2.sh > /tmp/script2.out
B. 5 1-13
2 /home/user2/script2.s

A

Which character appears just before the encrypted password in the /etc/shadow file to identify a locked user account?
A. ?
B. !
C. *
D. #

B

Which THREE statements are true about login/display manager programs?
A. They are responsible for graphical user logins
B. Unity and GNOME are two common login/display manager programs
C. They start an appropriate desktop environment manager program for t

ACD

Toggle keys is an assistive technologies feature that sound an alert when keys such as NumLock and CapsLock are pressed. True or False?

True

Which THREE of the following can be used to search for directories with sticky bit on?
A. find / -perm /o+t -type d
B. find / -perm -1000 -type d
C. find / -type f -perm /o+t
D. find / -type d -perm /o+t

ABD

Which is the correct CIDR representation for an IP 192.168.30.40 using the default class C netmask?
A. 192.168.30.40/16
B. 192.168.30.40/24
C. 192.168.30.40/32
D. 192.168.30.40/40

B

An MUA is used to read and write email messages. True or False?

True

Type the name of the service that runs after each system reboot and executes any missed cron and at jobs that were supposed to run during the time when the system was down.

anacron

Depending on the Linux distribution and version, which TWO are valid configuration file names for turning network services on or off?
A. /etc/inetd.conf
B. /etc/networkd.conf
C. /etc/network.conf
D. /etc/xinetd.conf

AD

Which of the following can be used to establish a client/server netcat command connection on port 6000 on localhost? Select TWO answers, one to allow incoming connections and another to connect to it.
A. nc -l 6000
B. nc localhost 6000
C. ncat 6000 -e
D.

AB

It is highly recommended to enable suid-rights on shell scripts so that any user on the system can execute them successfully as and when required. True or False?

False

Which of the following is not a pre-defined environment variable?
A. HOME
B. LOGNAME
C. NAME
D. TZ

C

What is the alias command used for?
A. To create nick names for users
B. To create nick names for groups
C. To create shortcuts to commands
D. To setup cron jobs

C

Which TWO of the following show the correct syntax to add a default route non-persistently?
A. ifconfig route add default via 19.168.0.2 dev eth2
B. ip route add default via 19.168.0.2 dev eth2
C. ip route add gw via 192.168.0.2 dev eth2
D. route add defa

BD

Which of the following would allow members of the group dba to run any administrative command on the system without being prompted for a password?
A. %dba ALL=(ALL)
B. %dba ALL=(ALL) NOPASSWD: ALL
C. dba ALL=(ALL)
D. dba ALL=(ALL) NOPASSWD: ALL

B

Log files are rotated based on a schedule. Which file stores the schedule and which command rotates the files?
A. File: /etc/default/logrotate.conf, Command: rotate
B. File: /etc/logrotate, Command: logrotate
C. File: /etc/sysconfig/logrotate.conf, Comman

D

Which THREE statements are true for command date2 && hostname?
A. The && characters are list operators
B. The && characters are used to perform a logical AND operation on given commands
C. The hostname command will be executed and its result will be displ

ABD

What would the command cupsreject -r "prn1 is unavailable" prn1 do?
A. Reject a submitted print job and return the message "prn1 is unavailable"
B. Show the message "prn1 is unavailable" to the user and print a submitted job
C. Disable the prn1 printer fo

A

The test command is used to perform tests in conditional statements. What would the -lt operation on integer values A and B, and -e operation on a file do?
A. Test whether integer B is less than integer A, and whether a file exists
B. Test whether integer

B

Which of the following is not a valid environment variable in the output of the locale command?
A. LANG
B. LC_MESSAGES
C. LC_NAME
D. LC_ADDRESS
E. LC_DATE
F. LC_MEASUREMENT

E

What would the command useradd -s /sbin/nologin user2 do?
A. Add a user account called user2 who will be able to log in to the system once a day only
B. Add a user account called user2 without login capability
C. Create a user account called user2 with ho

B

What would the command lpadmin -x prn1 do?
A. Remove the prn1 printer
B. Add the prn1 printer
C. Remove queued jobs from the printer
D. List print jobs queued on the prn1 printer

A

Write an SQL statement to delete all records stored from a database table called ex101t at Sno 2 and 7.
A. delete from ex101t where Sno=2 or Sno=7
B. delete from ex101t where Sno='2' or Sno='7';
C. delete Sno='2' or 'Sno='7' from ex101t;
D. select * from

B

The behavior of a looping construct can be controlled via the following commands. Select THREE.
A. break
B. sleep
C. continue
D. exit

ABC

What is the DNS resolver file name?
A. /etc/dns.conf
B. /etc/nsswitch.conf
C. /etc/name.conf
D. /etc/resolv.conf

D

Which TWO of the following are the correct command syntaxes to run an at job on December 1, 2018 at 11:59 p.m.?
A. at 11:59pm 12/1/18
B. at 11:59 1/12/18
C. at 23:59 12/1/18
D. at 23:59 1/12/18

AC

The netcat (a.k.a. nc or ncat) command can be used to explore, monitor, and debug network connections. True or False?

True

Which of the following would list the contents of a user crontable?
A. crontab -x
B. crontab -a
C. crontable -l
D. crontab -l

D

Depending on the Linux distribution and version, which TWO files store the time zone information in legible format?
A. /etc/default/timezone
B. /etc/default/clock
C. /etc/sysconfig/clock
D. /etc/timezone

CD

Which TWO of the following can be used instead of the command find /usr -perm /2000 -type f?
A. find / -perm -g+s
B. find / -perm -g+s -type f
C. find /usr -perm -g+s -type f
D. find /usr -type f -perm -g+s

CD

The ping and ping6 commands send RARP packets to remote systems for testing network connectivity. True or False?

False

Which TWO of the following show the correct syntax to add an IP nonpersistently to a network interface?
A. ip add eth1 192.168.3.20/24 broadcast 192.168.3.255
B. ifconfig eth1 192.168.3.20/24 broadcast 192.168.3.255
C. ifconfig 192.168.3.20/24 broadcast 1

BD

Which of the following can be invoked to generate GnuPG keys?
A. gpg2 -q --gen-key
B. gpg --show-keys --gen-key
C. gpg2 --gen-key --list-keys
D. gpg2 --gen-key --show-keys

A

Which TWO of the following logging services are alternatives to the syslog service?
A. syslogd-ng
B. rsyslog
C. syslog-ng
D. syslogd

BC

The default network port that the syslog service use for its network operation is 514. True or False?

True

Which of the following can be used to view the current locale setting?
A. echo $LANG
B. echo $LOCALE
C. echo $GLOBAL
D. echo $LC

A

Which TWO are valid IPv6 addresses?
A. 192.168.3.25
B. fe80::a00:27ff:feae:f35b/64
C. 140:add:34a:ab7:5d2:4ae:5de:c2
D. 1204:bab1:21d1:bb43:23a1:9bde:87df:bac9

BD

The OpenSSH server configuration file is sshd_config. True or False?

True

UTF-8 and UTF-16 are character encoding schemes based on the unicode character set. True or False?

True

Which of the following commands can be used to examine, list, and set the locale setting on systems running systemd?
A. locale-update
B. localectl
C. modlocale
D. locale-info

B

Why do we use the su command?
A. To log out of the system
B. To shut down the system
C. To switch user id
D. To display a list of logged in users

C

Which TWO commands can be used to display a user's current group memberships?
A. groups
B. id
C. who
D. whoami

AB

The command to submit a cron job is?
A. cronfile
B. crontab
C. cron.allow
D. /usr/sbin/cron

B

A user password is case-insensitive. True or False?

False

Can a normal user change other users' passwords?
A. Yes
B. No

B

Which command is used to change a user password?
A. passwd
B. password
C. pass
D. chpasswd

A

Which command only displays a user's group memberships?
A. id
B. newgrp
C. groups
D. usermod

C

What is the default location for user home directories?
A. /export/home
B. /usr/home
C. /usr
D. /home

D

Which THREE of the following commands are used for user account management?
A. useradd
B. usermod
C. adduser
D. userdel
E. deluser
F. moduser

ABD

What are the default permissions on the /etc/passwd file?
A. 655
B. 666
C. 644
D. 640

C

What does the following crontab entry do? 20 12 1-15
find / -name core -exec rm {} \;
A. Runs the find command at 20:12 the first fifteen days of each month
B. Runs the find command at 12:20 the first fifteen days of each month
C. Runs the find command at

B

What is the impact of using the -o option with the useradd command?
A. Disallows the allocation of non-unique GIDs
B. Allows the use of non-unique GIDs
C. Disallows the allocation of non-unique UIDs
D. Allows the use of non-unique UIDs

D

What is the name of the system-wide user initialization file for Bash shell users?
A. /etc/profile
B. $HOME/profile
C. /etc/.profile
D. /etc/swprofile

A

Which of the following will create a user account called user5 with UID 1005, primary group dba, and secondary group linuxadm (assuming that dba and linuxadm groups already exist).
A. useradd -u 1005 -g dba -G linuxadm user5
B. useradd -u 1005 -g dba,linu

A

Which option with the crontab command would allow you to modify your crontab file?
A. -e
B. -a
C. -m
D. -r

A

What is the purpose of the cron daemon?
A. To run scheduled jobs every hour
B. To run all scheduled jobs at their specified times
C. To run all scheduled jobs simultaneously
D. To run all scheduled jobs every hour

B

Type the name of the file in the /etc directory that stores the primary group for a user.

passwd

What happens when neither the cron.allow nor the cron.deny file exists?
A. All users excluding root can schedule a job
B. All users including root can schedule a job
C. No users excluding root can schedule a job
D. No users including root can schedule a j

C

Which is the log file for the cron daemon?
A. cron has no log file
B. /var/log/crontab
C. /var/log/cron
D. /var/adm/cron

C

What would the following at command do if executed at 6pm? # at 11pm find / -name core -exec rm {} \;
A. Executes the find command at 11pm next week
B. Executes the find command after 5 hours
C. Executes the find command every night at 11pm
D. All of the

B

Which directory contains default user startup template files?
A. /etc/skeleton
B. /etc/default/user
C. /etc/default
D. /etc/skel

D

What would mailx user1 < $HOME/.bash_profile do?
A. Mail the contents of the sending user's .bash_profile file to user1
B. Mail the sending user's .bash_profile file as an attachment to user1
C. Mail user1's .bash_profile file from their home directory to

A

To remove a user account called user1 along with home directory, which TWO of the following can you use?
A. userdel user1
B. userdel -r user1
C. userdel user1 -r
D. userrem -r user1

BC

Which command can be used to add or remove a CUPS printer?
A. lpadmin
B. lpstat
C. cups
D. cupscon

A

The size of an IPv6 packet is smaller than that of an IPv4. True or False?

False

What would echo $? do?
A. Echo the character ?
B. Display the message "command not found"
C. Display total number of command line arguments specified at the last executed command
D. Display the exit code of the last command executed

tzselect

Type the name of the command that a user may run to determine the time zone that they can use in their shell startup file.

B

What is the default CUPS server configuration file?
A. /etc/cups/printers.conf
B. /etc/cupsd.conf
C. /etc/cups/cups.conf
D. /etc/cups/cupsd.conf

D

Which TWO of the following can be used to remove a submitted at job with ID# 4?
A. at -d 4
B. at -l 4
C. atrm 4
D. atrm -q 4

AC

What is the significance of using two @ signs in syslog client configuration file?
A. They signify the use of the IP protocol
B. They signify the use of the TCP protocol
C. They signify the use of the UDP protocol
D. They signify the use of the ICMP proto

B

The setuid bit on an executable file gives regular users the ability to run that executable with the owner's privileges. True or False?

True

Depending on the Linux distribution and version, which TWO are valid configuration files to enable or disable a display manager?
A. /etc/X11/default-display-manager
B. /etc/inittab
C. /etc/sysconfig/desktop
D. /etc/X11/default-display-login

BD

The following is an example of command substitution. Select TWO.
A. echo "The hostname of the system is $(hostname)"
B. echo "The hostname of the system is (hostname)"
C. echo "The hostname of the system is $hostname"
D. echo "The hostname of the system i

AD

What does a system logging service do? Select THREE.
A. Forwards alerts and messages to remote logging servers
B. Deletes forwarded alerts and messages
C. Logs alerts and messages to appropriate local destinations
D. Captures alerts and messages

ACD

Which TWO of the following files does the groupdel command update?
A. /etc/user
B. /etc/profile
C. /etc/group
D. /etc/gshadow

CD

Which of the following would you use to enable file overwriting in output
redirection?
A. set +o noclobber
B. set -a noclobber
C. set +a noclobber
D. set -o noclobber

D

What would the command seq 5 15 print on the screen?
A. Prints numbers 5 and 15
B. Prints numbers 5 to 15
C. Prints numbers 1 to 5 and 15
D. Prints numbers 1 to 15 with number 5 skipped

B

How would you generate a GnuPG revocation certificate for a user called user7?
A. By running gpg2 --gen-revoke user7
B. By running gpg2 --gen-key user7
C. By running gpg2 --gen-key --revoke user7
D. By running gpg2 --gen-key2 user7

A

Depending on the Linux distribution and version, which TWO files should be modified to enable or disable all network services that the xinetd or the inetd daemon control?
A. /etc/inetd.conf
B. /etc/network.conf
C. /etc/xinetd.conf
D. /etc/inetd.cf

AC

What is the command to search for files with suid/sgid bits enabled?
A. which
B. whereis
C. find
D. locate

C

Which of the TWO are correct syntaxes to change date and time on the system?
A. hwclock set-time 11:44 2017-12-12
B. timedatectl -d "2017-12-12 11:44"
C. timedatectl set-time 11:44 2017-12-12
D. date --set "2017-12-12 11:44

CD

What would the command xhost + do?
A. Execute the xhost command on the local system
B. Disable remote X access on the local system
C. Enable remote X access on the local system
D. Execute the xhost command on the local system for a regular user

C

Depending on the Linux distribution and version, which THREE commands can be used to display hostname of the system? Select THREE.
A. hostname
B. uname
C. hostnamectl
D. host

ABC

Which TWO commands can be used to list submitted email messages in a mail queue before they are transmitted?
A. mail
B. sendmail -bp
C. sendmail without any options
D. mailq

BD

Which of the following SQL statements is correct to insert a record in table "ex102t"?
A. insert into ex102t values('FirstName','LastName')
B. select * from ex102t insert FirstName=Albert, LastName=Einstein;
C. insert ex102t set FirstName=Albert, LastName

D

Which of the following can be defined in shell startup files? Select TWO.
A. Email addresses
B. Variables
C. Functions
D. Address

BC

Why do we use NTP?
A. For administering file timestamps
B. For local clock synchronization with a more reliable time source
C. For sending packets to test remote connectivity
D. All of the above with proper options and arguments

B

Which TWO files in the /etc/ directory control user access to the at service?
A. at.deny
B. at.conf
C. at.ctrl
D. at.allow

AD

Which file does TCP Wrappers log messages to?
A. /var/log/wrappers
B. /var/log/secure
C. /var/log/su
D. /var/log/tcp

B

Depending on the Linux distribution and version, which THREE commands can be used to activate or deactivate a network interface?
A. ifconfig
B. ip
C. ifcli
D. nmcli

ABD

How would the condition COUNT=$((COUNT + 1)) cause a for loop to behave when the initial value of the COUNT variable is set to 0?
A. Add "1" to the counter at each loop iteration
B. Subtract "0" from the counter at each loop iteration
C. Subtract "1" from

A

Select a benefit of using the CIDR notation in IP addresses.
A. More usable IP addresses
B. Less usable IP addresses
C. Shorter IP addresses
D. Less entries in routing tables

D

What would the command useradd -D do?
A. Display the range of values used at the time of user creation or modification
B. Display the default values used at the time of user creation or modification
C. Suggest values that cannot be used for new users
D. S

B

Which command is used to unset an alias?
A. unsetalias
B. unalias
C. alias rm
D. unset alias

B

An alias hostname is just another name for a host. True or false?

True

Which THREE of the following are true for the nmap command?
A. It can be used to discover open ports on remote systems
B. It can detect the type and version of operating system running on remote systems
C. It can detect the commands that users running on

ABE

How many bits does an IPv6 address contain?
A. 64
B. 96
C. 128
D. 160 E. 192

C

What would the command find /usr -perm /2000 -type f do?
A. Search for files and directories under /usr with sgid bit enabled
B. Search for files under /usr with sgid bit enabled
C. Search for files under /usr with suid and sgid bits enabled
D. Search for

B

Which command can be used to print geometrical information of an X terminal window including the window id and terminal's location and appearance data?
A. xterm
B. xwininfo
C. display
D. xdpyinfo

B

Which protocol is used by an MTA?
A. SNMP
B. LDAP
C. DNS
D. SMTP

D

Which command executes another program without invoking a sub-shell for it?
A. bash
B. source
C. exec
D. invoke

C

The adaptability of Linux to a wide variety of languages, cultural settings, and time zones is referred to as:
A. Internationalization
B. Regionalization
C. Globalization
D. Localization

A

What needs to be done to update the aliases.db database after updating the /etc/aliases file?
A. Restart Sendmail daemon
B. Run the newaliases command
C. Run the aliases command
D. Reboot the system

B

Name the default configuration file for LightDM that is located in the /etc/lightdm directory and can be used to enable or disable guest logins and show or hide user list.

lightdm.conf

What are the benefits of using the OpenSSH utilities?
A. Use encryption during data transfer
B. Use hidden keys during data transfer
C. Log audit trail
D. Both A and B

A

Depending on the Linux distribution and version, static and default routes can be defined in network interface configuration files. True or False?

True

Which sequence of commands is appropriate to offline a printer for maintenance, and then back online?
A. cupsreject, cupsenable, cupsaccept, cupsdisable
B. cupsenable, cupsaccept, cupsdisable, cupsreject
C. cupsreject, cupsdisable, cupsenable, cupsaccept

C

How many address bits do IPv4 and IPv6 addresses contain?
A. 16/64
B. 64/256
C. 32/64
D. 32/128

D

Type the name of the configuration file for the anacron service.

/et/anacrontab

Which THREE tools can be used for DNS queries?
A. dig
B. nslookup
C. nsswitch
D. host

ABD

Which command is used to cancel a print request?
A. lpalt
B. lpcancel
C. cancel
D. lpadmin

C

Write an SQL query to display all records stored in a table called ex102t matching the name "Abraham".
A. select * from ex102t where name='Abraham'
B. select all from ex102t where name='Abraham';
C. select all in ex102t where name='Abraham';
D. select * f

D

Which THREE commands can be used to display network interface statistics and routing table?
A. netstat
B. ifconfig
C. ip
D. ss

ACD

Type the default netmask address for a class B network?

255.255.0.0

Which file documents the well-known network port numbers, along with service names and protocols they are associated to use?
A. /usr/bin/protocols
B. /etc/protocols
C. /etc/services
D. Both B and C

C

Type the name of the file that must be edited to disallow a user from scheduling an at job.

/etc/at.deny

OpenSSH host key files are located in the /etc/ssh directory. True or False?

True

What would the command useradd user500 do?
A. It will display an error message
B. It will create user500 using the default values
C. It will create user500 with all custom values
D. It will create user500 without using the default values

B

Which file is consulted in Ubuntu at system boot to activate network interfaces and apply IP addresses to the interfaces?
A. /etc/network/interfaces
B. /etc/network/networks
C. /etc/sysconfig/interfaces
D. /etc/sysconfig/network-scripts/ifcfg-eth0

A

Type the name of the primary syslog service configuration file.

/etc/rsyslog.conf

Which file contains the IP address to hostname mapping?
A. /etc/hosts
B. /etc/sysconfig/hosts
C. /etc/hostnames
D. /etc/hosts.map

A

Which command is used to lookup matching entries in administrative databases such as /etc/passwd and /etc/group?
A. grep
B. getent
C. getadm
D. egrep

B

Which TWO of the following are the IPv4 versions of the tracepath6 and traceroute6 commands?
A. traceroute4
B. tracepath4
C. traceroute
D. tracepath

CD

What would having the entry sshd:ALL in the /etc/hosts.deny file mean?
A. Remote login access via the secure shell service is enabled
B. Remote login access through all services on the system are enabled
C. Remote login access through all services on the

D

Which THREE commands can be used to display and modify network interface configuration?
A. nmcli
B. ifconfig
C. nm
D. ip

ABD

Which TWO commands can be used to check connectivity between two network nodes using the ICMP protocol?
A. ping6
B. netstat
C. ping
D. linkstatus

AC

Which command can be used to convert text from one character encoding to another?
A. iconv
B. convert
C. enconvert
D. txtconvert

A

Which file is referenced by the date and hwclock command to determine the current time zone?
A. /usr/share/zoneinfo
B. /etc/localtime
C. /etc/timezone
D. /var/time

B

To configure trusted login for OpenSSH, which command would you use to generate a private/public keypair?
A. ssh
B. ssh-keygen
C. ssh.key.gen
D. ssh.keygen

B

Type the well-known port that the OpenSSH service uses?

22

Which of the TWO time sources can be used to sync time of your Linux system?
A. An internet-based time server
B. A wall clock
C. A watch
D. The local system clock

AD

Which TWO shell built-in commands would run a program in the current
shell?
A. program.sh
B. source
C. . (dot)
D. sh

BC

Which TWO commands can be used to discover open ports on a system?
A. netstat
B. mapper
C. probe
D. nmap

AD

Type the name of the file that stores a user's RSA identity for use with
OpenSSH.

~/.ssh/id_rsa

When two time servers work at the same stratum level, they are called peers. True or False?

True

Which of the following shows the correct syntax of entries in the /etc/hosts file?
A. hostname alias1 alias2 IP
B. IP alias1 alias2 hostname
C. IP hostname alias1 alias2
D. alias1 alias2 hostname IP

C

Depending on the Linux distribution and version, which TWO files are used to store a system's hostname?
A. /etc/hosts.conf
B. /etc/sysconfig/network
C. /etc/hostname
D. /etc/default/network

BC

Which command can be used to check the status of NTP associations?
A. ntpdd
B. xntpd
C. ntptrace
D. ntpq

D

Which TWO commands can be used to display environment variables and their values?
A. print
B. env
C. unset
D. export

BD

What would the command ssh-add -l do?
A. Add user's public and private keys to authentication agent's cache
B. Add a user's public key to authentication agent's cache
C. Add a user's private key to authentication agent's cache
D. List authentication agent

D

Which TWO of the following show the correct syntax to remove a static route to a network non-persistently?
A. ip route del 192.168.2.0/24
B. ifconfig route del 192.168.2.0/24
C. ip route 192.168.2.0/24 del
D. route del -net 192.168.2.0/24

AD

Which looping construct can be used to perform an action on listed items?
A. while-do-done
B. until-do-done
C. if-then-fi
D. for-do-done

D

Normal users do not have access to list, create, or cd into the /var/spool/cron directory that stores crontab files. True or False?

True

Which is the de facto service used on the Internet for hostname resolution?
A. DNS
B. NetworkManager
C. NIS
D. LDAP

A

Type the command to terminate all processes using a mounted file system.

fuser

On a small network with a few Linux systems, which hostname resolution
method can be used?
A. LDAP
B. DNS
C. NetworkManager
D. /etc/hosts

D

Any user on the system can modify the /etc/shadow and /etc/passwd files. True or False?

False

Which of the following is not included in the /etc/passwd file?
A. GID
B. Home directory
C. Shell
D. Comments
E. UID
F. User's secondary group

F

Type the name of the journald configuration file that is located in the /etc/systemd directory.

journald.conf

Select FOUR of the following that are valid for group accounts.
A. A user can be a member of multiple groups at a time
B. A user can have only one group as their primary group at a time
C. Every group on the system must have a unique GID
D. A user can swi

ABDE

Which THREE of the following are included in the /etc/group file?
A. GID
B. Group members
C. Shell
D. Group name

ABD

What would happen to an incoming email if the recipient user has a .forward file in their home directory containing email address user25@server25.example.com?
A. The first 25 emails received will be redirected to user25
B. Any email received by user25@ser

C

What is the well-known port number used for the HTTP service?
A. 8080
B. 80
C. 443
D. 880

B

Which of the following is not included in the /etc/shadow file?
A. Username
B. GID
C. Encrypted password
D. Aging information

B

What is the name of the X11 configuration file?
A. xorg.conf
B. x11.conf
C. xorgx11.conf
D. x11org.conf

A

What daemon must run on DNS clients to enable hostname resolution?
A. named
B. name
C. dnsd
D. None

D

Select the name of the file that, if created in the /etc directory, would disallow normal users from being able to log on to the system.
A. nologin
B. nousers
C. nouserlogins
D. nologins

A

Type the well-known port number for the LDAP service.

389

The primary use of the ICMP protocol is in testing and diagnosing network
connections. True or False?

True

What would the command lpadmin -d prn1 do?
A. Print the /etc/hosts file on prn1 printer
B. Set prn1 as the default printer and prints a test page
C. Set prn1 as the default printer
D. Print a test page on the default printer and deletes it

C

The new syslog service combines the functionalities of both syslogd and klogd services. True or False?

True

Identify TWO differences between TCP and UDP protocols.
A. TCP does not guarantee packet delivery; UDP does
B. TCP is reliable; UDP is not
C. TCP is connectionless; UDP is connection-oriented
D. TCP is point-to-point; UDP is not

BD

What would the command lp -d prn1 /etc/hosts do?
A. Prints the /etc/hosts file on prn1 printer
B. Sets prn1 as the default printer
C. Sets prn1 as the default printer and prints the /etc/hosts file
D. Prints the /etc/hosts file on the default printer and

A

Define NTP stratum levels. Select TWO.
A. They determine the reliability of time sources
B. They determine the proximity of time sources
C. They determine the accuracy of time sources
D. They determine the availability of time sources

AC

What would the command ping -c3 192.168.0.2 do?
A. Send packets of size 3KB to the IP
B. Send three packets to the IP and continue if there is no response
C. Send packets to the IP every third second
D. Send three packets to the IP and quit

D

The ability of Linux to adapt itself to a specific language and cultural requirement is referred to as:
A. Internationalization
B. Regionalization
C. Globalization
D. Localization

D

Which TWO of the following show the correct syntax for adding a static route non-persistently?
A. ifconfig route add 192.168.4.0/24 via 192.168.0.1 dev eth1
B. ip route add 192.168.4.0/24 via 192.168.0.1 dev eth1
C. route add -net 192.168.4.0/24 gw 192.16

BC

What is the function of the shift command?
A. To switch the positions of two arguments
B. To move all arguments to the left
C. To move all arguments to the right
D. To move only the last argument to the left

B

GDM is faster than LightDM. True or False?

False

OpenSSH enables:
A. Authentication based on standard 128-bit encryption
B. Authentication based on standard mode security extension
C. Authentication based on hidden keys
D. Authentication based on trusted mode security

C

Which of the following DNS query tools can also be used for DNS
troubleshooting?
A. dig
B. host
C. nslookup
D. nsswitch

A

Depending on the Linux distribution and version, which FOUR tools can be used to set or modify the time zone on the system?
A. dpkg-reconfigure tzdata
B. timeconfig
C. timedatectl
D. tzconfig
E. hostnamectl

ABCD

Which pair of commands can be used to activate and deactivate shadow password mechanism for users?
A. pwconv/pwunconv
B. shconv/shunconv
C. passconv/passunconv
D. conv/unconv

A

Select THREE accessibility features that are available in GDM and Unity for users with disability.
A. Contrast setting
B. Screen size setting
C. Visual alert setting
D. AccessX

ACD

The ulimit command can be used to display and place user limits on computing resources, such as processors, memory, and files. True or False?

True

Which command can be used to determine the route a packet would take to reach the destination system?
A. tracert
B. traceroute
C. route find
D. findroute

B

The OpenSSH toolset provides a non-secure network tunnel for accessing a Linux system. True or False?

False

Which command can be used to update system time instantly?
A. xntpd
B. ntpdate
C. chdatentp
D. hostnamectl

B

The w command shows the following pieces of information in its output. Select THREE.
A. System uptime information
B. List of logged-in users and what they're doing
C. The logout time of a user
D. The length of time a user has been idle for

ABD

The equivalent for the mailq command is:
A. mail
B. mailx
C. sendmail --mail
D. sendmail -bp

D

Write an SQL query to display all records stored in a table called ex102t and sort the output by city name.
A. select * from ex102t order by city;
B. select all from ex102t order by city;
C. select all in ex102t order by city;
D. select * from ex102t orde

A

What is the purpose of subnetting?
A. To create multiple smaller networks out of an IP
B. To divide the network portion of an IP into multiple addresses
C. To create larger networks
D. To concatenate multiple IP addresses to form large networks

A

The X font server may be configured on older Linux versions to provide a
central location to store and access fonts. True or False?

True

Which THREE of the following are list operators?
A. &
B. &&
C. |
D. ||
E. ;
F. ;;

BDE

The break command terminates the execution of a loop and returns the control to the command immediately after it. True or False?

True

What is the minimum number of nodes required to form a network?
A. 1
B. 2
C. 3
D. 0

B

How many layers are in there in the OSI reference networking model?
A. 8
B. 9
C. 7
D. 5

C

What is the term used for adding a header message at each layer of the OSI reference model?
A. De-encapsulation
B. Encapsulation
C. Packet-forming
D. Peer-to-peer

B

Which directory is used to store a user's authentication files by default?
A. /etc/ssh
B. ~/.ssh
C. ~/ssh
D. /etc/.ssh

B

Type the name of the command that is used to modify a group account.

groupmod

What signifies the end of an "if" statement in a shell script?
A. endif
B. if
C. }
D. fi

D

Select TWO from the following to print two copies of /tmp/file1 to prn1 printer and send an email when printing is complete.
A. lpr -dprn1 -#2 -m /tmp/file1
B. lpr -Pprn1 -#2 -m /tmp/file1
C. lp -dprn1 -nm2 /tmp/file1
D. lp -dprn1 -n2 -m /tmp/file1

BD

Type the name of the command that is used to convert input text from one
character encoding into another.

iconv

A relational database has two or more tables linked by a common key. True or False?

True

What TWO components must be defined at a minimum for every cron job in a crontable?
A. Schedule
B. Group name
C. Username
D. Command

AD

How would you capture the result of the who command in a variable called WHO?
A. WHO=$(who)
B. who=$(WHO)
C. WHO=who
D. who>WHO

A

Which of the following is the correct syntax in the /etc/aliases file to forward emails received by user30 to root and ab@ab.com?
A. root,ab@ab.com: user30
B. user30 root ab@ab.com
C. user30: root,ab@ab.com
D. user30,root,ab@ab.com

C

Which command can be used to make a printer to disallow new print requests from queuing?
A. cupsstop
B. cupsdisallow
C. cupsdisable
D. cupsreject

D

Which of the following would print the contents of the /etc/profile file on printer prn3?
A. lp -p prn3 /etc/profile
B. lp -dprn3 /etc/profile
C. lp -a prn3 /etc/profile
D. lp -pprn3 /etc/profile

B

OSI layers provide a set of rules for data transmission. True or False?

True

The lpadmin command is used to display the health of configured printers. True or False?

False

Which file would you modify to add the following default gateway information persistently on RHEL and spinoffs? GATEWAY=<IP> GATEWAYDEV=eth2
A. /etc/network.conf
B. /etc/sysconfig/network
C. /etc/default/network
D. /etc/network/interfaces

B

At what layers the TCP and IP protocols are defined? Choose TWO.
A. Data link layer
B. Application layer
C. Transport layer
D. Network layer

CD

Which directory is the default location for storing log files?
A. /tmp/log
B. /etc/log
C. /var/log
D. /usr/log

C

Locale settings may be configured at per-user and system-wide levels. True or False?

True

What is the default subnet mask for a class B IP address?
A. 255.255.255.0
B. 255.255.0.0
C. 255.0.0.0
D. 0.0.0.255

B

Which is not another name for MAC address?
A. IP address
B. Hardware address
C. Station address
D. Ethernet address

A

Where do the at and cron scheduling daemons store history of executed jobs?
A. /etc/cron
B. /etc/log/cron
C. /var/log/cron/cron
D. /var/log/cron

D

What is the term "journal" refers to on systems running systemd?
A. A journal is a file under /var/log/journal directory that stores alerts captured by the syslog service
B. A journal is a file under /var/log/journal directory that stores alerts captured

D

Which TWO of the following can be used to set or change password aging attributes on a user account?
A. chattr
B. passwd
C. set
D. chage

BD

Which THREE of the following can be used to view routing table information?
A. netstat -r
B. ip route
C. ifconfig -a
D. route

ABD

Which TWO of the following have syntax problems?
A. mail -s "Hello, This is me." user20
B. echo "Hello, This is me." | mail user20
C. mail "Hello, This is me." user20
D. echo user20 | mail "Hello, This is me.

CD

Which file is referenced to determine sources to look up hostname information?
A. /etc/network.conf
B. /etc/nsswitch.conf
C. /etc/resolv.conf
D. /etc/sysconfig/network

C

Type the name of the legacy command that is still used to submit print requests.

lpr

What would the command usermod -aG nixadm user10 do?
A. Add user10 to group nixadm without affecting user10's current group memberships
B. Replace user10's current group memberships with group nixadm
C. Change user10's primary group to nixadm
D. Replace u

A

What would the command ssh-keygen -f ~/.ssh/id_rsa -N "" -q do?
A. Generate OpenSSH DSA keys with all the defaults
B. Generate OpenSSH RSA keys quietly with a null passphrase and store them in ~/.ssh/id_rsa file
C. Generate OpenSSH RSA keys with all the d

B

Type the name of the command to list available devices on the system that can be used to set up a printer.

lpinfo

Which FOUR of the following components can be parts of a shell script?
A. Conditional statements
B. Comments
C. Loops
D. Commands E. Location

ABCD

Which TWO of the following can be used to set or change some password aging attributes for a user account?
A. useradd
B. usermod
C. groupadd
D. groupmod

AB

The Neighbor Discovery Protocol (NDP) is used for the following TWO purposes.
A. To probe an IPv4 network
B. To discover IPv6 devices
C. To probe an IPv6 network
D. To discover IPv4 and IPv6 devices

BC

Which command can be used to determine a time zone value that an individual user can set for themselves?
A. tzconfig
B. tzselect
C. echo $TZ
D. timedatectl

B

What does the echo command do without any arguments?
A. Removes an empty line
B. Adds a comments line
C. Cleans comments
D. Adds an empty line

D

Which THREE are valid keywords for the /etc/resolv.conf file?
A. Nameserver
B. Domain
C. Search
D. Hostname

ABC

The until-do-done loop continues to run until the specified condition becomes false. True or False?

False

POP3 and IMAP4 use the following port numbers.
A. 100/200
B. 995/993
C. 110/143
D. 25/28

C

What would the test condition [ $1 -ge 0 ] do in an if-then-fi statement?
A. Test whether an integer value supplied as the first argument is less than 0
B. Test whether an integer value supplied as the first argument is greater than 0
C. Test whether an i

D

The tracepath and traceroute commands may be used to troubleshoot a network connection when a ping test has failed. True or False?

True

Which command can be used for both composing and reading email messages?
A. mailq
B. mail
C. mailx
D. postfix

B

What are TWO good reasons to use exit codes in a shell script?
A. To determine where exactly a script concluded execution
B. To help debug a script
C. To help determine how to write a new script
D. To help understand how a script works

AB

What is the name of the command that can be used to run the anacron service manually?
A. cron
B. anac
C. anacron
D. anacrontab

C

Type another name used for the default gateway.

default route

What is the unicode standard?
A. It consists of various standards to support users
B. It helps translate code mappings into character definitions
C. It transforms character mappings and store them in a character database
D. It comprises code mappings, cha

D

Which TWO files the useradd command consults to get default user attributes?
A. /etc/default/useradd
B. /etc/default/logins
C. /etc/sysconfig/useradd
D. /etc/login.defs

AD

What is the impact of the setuid bit on directories?
A. Directories cannot be shared with other users
B. Directories will allow only setuid-enabled files to be stored in them
C. No impact
D. Directories can be shared among group members

C

What could the command Xorg -configure be used for? Select TWO.
A. To configure remote X access
B. To view current X configuration settings
C. To invoke the X tool
D. To modify X configuration settings

BD

What is the advantage of using port tunneling (port forwarding)? Select TWO.
A. It allows only encrypted protocols to use this feature
B. It allows data transmission via unencrypted protocols over ssh-encrypted channels
C. X11 can take advantage of this f

BC

What would the following function called funtest do? funtest () { echo "There are $# args"; echo "They are: $@"; }
A. There is a syntax error in the function
B. Display a list and count of arguments
C. Display a count and list of arguments, and then delet

D

Which TWO of the following can be used to restart the syslog service?
A. systemctl restart rsyslog
B. systemctl restart rsyslogd
C. service rsyslog restart
D. service rsyslogd restart

AC

Depending on the Linux distribution and version, which TWO directories store files to enable or disable individual network service?
A. /etc/inetd.conf.d
B. /etc/networkd.d
C. /etc/xinetd.d
D. /etc/inetd.d

CD

Write an SQL query to display all records stored in a table called ex102t with a common last name.
A. select * from ex102t where lastname='LN" group by lastname;
B. select * from ex102t where lastname='LN" sort by lastname;
C. select * from ex102t where l

A

Which command is used to write interactive scripts?
A. interact
B. tellme
C. read
D. write

C

What are THREE possible benefits of writing shell scripts?
A. To automate lengthy tasks
B. To simplify the performance of Linux administration tasks
C. To automate repetitive tasks
D. To complicate Linux administration tasks

ABC

A database is a non-structured collection of data. True or False?

False

The CUPS printing system uses files to store configuration information. What is the name of the directory where these files are stored?
A. /usr/cups
B. /etc/cups
C. /usr/print
D. /etc/print

B

What are THREE major components of a database table?
A. Column
B. Value
C. Sort
D. Row

ABD

A subnet mask is used to identify the start and end of the network and node portion of an IP address. True or False?

True

What are TWO fundamental types of logical constructs used in shell scripting?
A. for-do-done
B. case
C. if-then-elif-fi
D. if-then-fi

BD

Which of the following would run an at job 6 hours from now?
A. at + 6 hours
B. at 6 pm
C. atd now + 6 hours
D. at now + 6 hours

D

Select FOUR Mail Transfer Agent (MTA) program names from the following.
A. Sendmail
B. Postfix
C. Evolution
D. Mutt
E. Exim
F. Qmail

ABEF

Which of the THREE commands can be used to work with variables?
A. var
B. env
C. set
D. export

BCD

What is the difference between a primary key and a foreign key in database terminology?
A. A primary key is used within a table to uniquely identify a record; a foreign key is used to relate two or more tables
B. A primary key is used to relate two or mor

A

How can we determine which processes are using a mounted file system or a network port?
A. With the help of the ps command
B. With the help of the top command
C. With the help of the lsof command
D. With the help of the fuser command

C

Why do we usually define multiple NTP servers on the NTP client for time maintenance? Select TWO.
A. To improve time precision
B. To improve efficiency
C. To increase availability
D. To expand network efficiency

C

Which command shows a list of users who are currently logged on to the system?
A. 'who am i'
B. who
C. login
D. whoami

B

What information does the lastb command display?
A. It reports the history of successful user login attempts
B. It reports the history of successful and unsuccessful user login attempts
C. It reports the history of superuser login attempts
D. It reports t

D

What does the "x" in the second field of the /etc/passwd file imply?
A. It implies that the encrypted password is stored in the /etc/gshadow file
B. It implies that the encrypted password is stored in the /etc/shadow file
C. It implies that the shadow pas

B

The journald service records alerts in a non-legible format. Which command do we use to read them?
A. syslog
B. journalctl
C. journal
D. strings

B

Write the SQL command to create a database called exam102.
A. create database exam102;
B. create exam102 database;
C. create database exam102
D. create database db exam102;

A

What would the command ssh-copy-id -i ~/.ssh/id_rsa.pub 192.168.0.20 do?
A. Copy file ~/.ssh/id_rsa.pub to 192.168.0.20 using the sftp command under the same directory location
B. Copy file ~/.ssh/id_rsa.pub to 192.168.0.20 using the ssh command under /et

C

Select the FOUR local user authentication files that are affected when a user or group account is created, modified, or removed.
A. passwd
B. fstab
C. gshadow
D. resolv.conf
E. group
F. shadow

ACEF

Type the name of the sudo configuration file that is located in the /etc directory.

sudoers

What are the TWO types of shell startup files?
A. Per-user
B. Normal-user
C. Service-wide
D. System-wide

AD

Write an SQL statement to update the field "FirstName" with value "Abraham" matching serial number "Sno" to "1" in table "ex102t".
A. update ex102t set FirstName=Abraham where Sno=1;
B. update ex102t update FirstName=Abraham where Sno=1;
C. update ex102t

A

What would the command passwd -l user10 do?
A. Change aging for user10
B. Unlock user10
C. Lock user10
D. Delete user10

C

Which THREE network classes are used on public networks?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E

ADC

What is the first UID assigned to a regular user on newer Linux distributions?
A. 500
B. 100
C. 900
D. 1000

D

What is the impact of the sticky bit on files?
A. No impact
B. Normal users will not be able to delete the files
C. The root user will be able to delete or modify the files
D. Files cannot be shared with other users

A

Which TWO of the following can be used to search for files with suid bit set?
A. find / -perm /u+s -type f
B. find / -perm -4000
C. find / -type f -perm /o+s
D. find / -perm /o+t

AB

Every user in Linux gets a private group by default. True or False?

True

The selector field in the rsyslog.conf file is segregated into three sub-fields called facility, priority, and action. True or False?

False

Which TWO commands can be used to display queued print requests?
A. lpq -o
B. lpq
C. lpadmin -o
D. lpstat -o

BD

The last command is used to report successful user login attempts and system reboot history. True or False?

True

Depending on the Linux distribution and version, which THREE files store system-wide locale information?
A. /etc/default/locale
B. /etc/sysconfig/L10n
C. /etc/locale.conf
D. /etc/sysconfig/i18n

ACD

What would the userdel command do if it is run with the -r option?
A. Delete a user along with their home directory
B. Delete a user without touching their home directory
C. Delete home directory of a user
D. Delete a user along with their system-wide she

A

Which directory stores time zone information for various cities, countries, and regions?
A. /etc/timezones
B. /usr/zonefiles
C. /etc/zoneinfo
D. /usr/share/zoneinfo

D

Which command can be used to start the X server manually?
A. start
B. startx
C. X
D. xstart

B

Type the name of the command that is used to enable or disable remote X access on the local system.

xhost

What is the first GID assigned to a group on newer Linux distributions?
A. 500
B. 100
C. 1000
D. 900

C

ALL and LOCAL are valid keywords that can be used in TCP Wrappers configuration files hosts.deny and hosts.allow to represent every host and hosts on the local network, respectively. True or False?

True

What is the name of the default backup file for /etc/shadow?
A. /etc/shadow.sh
B. /etc/shadowC. /etc/shadow.bak
D. /etc/shadow.old

B

Linux allows us to use the same number as both UID and GID. True or False?

True

What would the command chage -E 2018-12-31 user20 do?
A. Set December 31, 2018 as the account expiry date for user10
B. Set December 31, 2018 as the account deletion date for user10
C. Set December 31, 2018 as a reminder to recreate user10 account
D. Run

A

Which TWO of the following show the correct syntax to remove an IP nonpersistently from the system?
A. ip a del 192.168.2.20/24 dev eth1
B. ifconfig del 192.168.2.20/24 dev eth1
C. ip dev eth1 del 192.168.2.20/24
D. ifconfig eth1 del 192.168.2.20/24

AD

What would the command chage -l user5 do?
A. List user5 account information
B. Lock user5 account
C. Unlock user5 account
D. Display aging attributes for user5

D

Rotating log files on a regular basis is a valuable feature to ensure availability of enough free space. Which command does the system use for log file rotation and subsequent compression and mailing out?
A. rotate
B. rotatelog
C. logrotate
D. rotation

C

Which command can be used to print detailed information about X server and its capabilities?
A. xterm
B. xdpyinfo
C. display
D. xwininfo

B

Which TWO statements are correct for using the hyphen character with the su command?
A. The su command does not process the specified user's shell startup files
B. The su command processes the specified user's shell startup files
C. The su command process

BC

What is the well-known port number associated with the secure HTTP service?
A. 80
B. 143
C. 993
D. 443

D

Which TWO of the following are correct to list GnuPG keys?
A. gpg2 --list-keys
B. gpg2 --show-keys
C. gpg --list-keys
D. gpg --show-keys

AC

What is the significance of the -o option with the groupadd and groupmod commands?
A. It allows the commands to allocate an in-use GID to other groups
B. It prevents the commands from allocating an in-use GID to other groups
C. It instructs the commands t

A

Type the name of the command that is used to change a user's primary group temporarily.

newgrp

What would the command iconv /tmp/testcode -t EBCDIC-JP-E -o /tmp/testcode.out do?
A. Translate the content of /tmp/testcode into Japanese and record output in /tmp/testcode.out
B. Translate the content of /tmp/testcode into Japanese language
C. Convert t

C

The /etc/bashrc file contains shell scripts that are executed at user login. True or False?

False

What would the command chage -d 0 user60 do?
A. Disable password aging for user60
B. Disable user60's ability to change password
C. Force user60 to change password right now
D. Force user60 to change password at next login

A

Which user does not need to be defined in
.allow or
.deny file to run the at and cron jobs?
A. The bin user
B. The root user
C. user1
D. All service user accounts

B

Depending on the Linux distribution and version, which TWO of the following could be the directory locations where user crontab files are stored?
A. /etc/spool/cron/crontabs
B. /etc/spool/cron
C. /var/spool/cron/crontabs
D. /var/spool/cron

CD

By default the *.allow files for at and cron exist. True or False?

False

Which languages does the ISO-8859 standard support?
A. East Asian
B. European
C. African
D. South Asian

B

Which TWO of the following are true for a subnet mask?
A. It increases the number of usable IP addresses
B. Subnets require a router in between in order to communicate with one another
C. Each network node within a subnet will have a unique subnet address

BE

Which option with the crontab command would allow a user to modify their crontables?
A. -l
B. -a
C. -m
D. -e

D

Which file stores default password aging attributes?
A. /etc/login.defs
B. /etc/default/logins
C. /etc/sysconfig/logins
D. /etc/logins

A

Which class of IP addresses has the least number of node addresses?
A. Class A
B. Class B
C. Class C
D. All three classes have the same number of node addresses

C

Which command would display the status of all configured print queues?
A. lpadmin -d
B. lp -t
C. lpadmin -t
D. lpstat -t

D

What are the uses of the ifup and ifdown commands?
A. To activate and deactivate the NTP service
B. To activate and deactivate the HTTP service
C. To remove and redefine a network interface
D. To activate and deactivate a network interface

D

Individual users may set a different time zone for themselves using the TZ environment variable in a per-user shell startup file. True or False?

True

The passwd file stores secondary user group information. True or False?

False

alias rm="rm -i" is an example of:
A. Filename completion
B. Alias substitution
C. Tilde substitution
D. Command substitution

B

Which THREE of the following methods can be used to share GnuPG keys with intended recipients?
A. As an email attachment
B. Via a keyserver
C. By running gpg --send-keys user@email
D. Via a USB key

ABD

Which TWO commands can be used to display the hardware address of a network interface?
A. ping
B. netstat
C. ifconfig
D. ip

CD

Select FOUR facilities that the syslog service recognizes.
A. cron
B. user
C. rsyslog
D. daemon E. auth

ABDE

Which file defines the protocols in the system?
A. /etc/protocols/protocols
B. /etc/protocols
C. /etc/services
D. /etc/tcp

B

What is the purpose of the ONBOOT directive in the interface configuration file in RHEL and derivatives?
A. Whether to activate an interface at system boot
B. Whether to perform a ping test at system boot
C. Whether to allow the system to boot up
D. Wheth

A

List THREE benefits of subnetting.
A. Better management
B. Smaller networks
C. More usable IP addresses
D. Less traffic

ABD

What would the command passwd -n 7 -x 15 -w 3 user6 do?
A. Set warndays to 7, maxdays to 15, and mindays to 3 for user6
B. Set mindays to 7, warndays to 15, and maxdays to 3 for user6
C. Set maxdays to 7, mindays to 15, and warndays to 3 for user6
D. Set

D

Which TWO files in the /etc/ directory control user access to the cron service?
A. cron.allow
B. crontab
C. anacron
D. cron.deny

AD

What is the function of the default gateway?
A. It is used only in the presence of static routes
B. It is used only in the absence of static routes
C. It is used when the system is unable to find an appropriate route to a destination
D. It is always used

C

What is the range of a class B network?
A. 128 to 191
B. 127 to 192
C. 193 to 223
D. 224 to 240

A

Which file or directory stores network interface configuration on Debian and derivatives?
A. /etc/network
B. /etc/network/interfaces
C. /etc/sysconfig/network-scripts
D. /var/network/interfaces

B

Which environment variable must be set appropriately to work with X applications?
A. XHOST
B. DISPLAY
C. X11
D. SHOW

B

CUPS printing system is a replacement for the LPD print service. True or False?

True

What is the default NTP polling interval, in seconds?
A. 128
B. 32
C. 256
D. 64

D

Which of the following is correct to view a list of current NTP time sources?
A. ntpq -p
B. ntpq -q
C. ntpstat -p
D. ntpstat -q

B

What port and protocol does NTP use?
A. 321/UDP
B. 124/UDP
C. 123/UDP
D. 123/ICMP

C

Which of the following is not a syslog priority?
A. emerg
B. warn
C. log
D. debug

C

What is the purpose of the NTP drift file /var/lib/ntp/drift?
A. NTP uses it to keep track of remote clock accuracy
B. NTP uses it to keep track of hardware clock accuracy
C. NTP uses it to keep track of Windows clock accuracy
D. NTP uses it to keep track

D

Depending on the Linux distribution and version, static and/or default routes can be defined persistently in THREE of the following files?
A. The /etc/sysconfig/network file
B. Interface-specific route configuration files under /etc/sysconfig/networkscrip

ABC

What is the name of the system-wide shell startup file that defines shell variables for all users?
A. /etc/profile
B. ~/profile
C. /etc/.profile
D. /etc/profile.sh

A

Which environment variable overrides the values of all individual locale environment variables?
A. LC_ALL
B. LC_*
C. LOCALE_ALL
D. LANG

A

What would the command ntpdate 0.server.centos.ntp.org do?
A. It will start the local clock synchronization process with the specified NTP server
B. It will instantly synchronize the local system clock with the specified NTP server
C. It will instantly bi

B

What THREE would the command ip addr show in the output?
A. Display MAC address for all network interfaces
B. Display DNS assignments for all network interfaces
C. Display IPv6 assignments for all network interfaces
D. Display IPv4 assignments for all net

ACD

Which TWO of the following can be used to list submitted at jobs?
A. atq -e
B. at -l
C. atq
D. at -q

BC

Write an SQL query to display all records stored in tables ex101t and ex102t with matching key Sno. Select TWO correct answers.
A. select all in ex101t join ex102t on ex101t.sno = ex102t.sno;
B. select * from ex101t,ex102t where ex101t.sno = ex102t.sno;
C

BD

What would the entry "hosts: files dns" mean in the /etc/nsswitch.conf file?
A. To consult the /etc/hosts file and then DNS
B. To consult the /etc/hosts file and then time out
C. To consult the /etc/hosts file only
D. To consult the DNS and then the /etc/

A

The journald service is available on systems that run either SysVinit or systemd. True or False?

False

What would the command host 10.22.112.22 do? Select TWO.
A. Query the specified IP for a DNS server
B. Provide a hostname associated with the specified IP
C. Query available name resolution sources for the specified IP
D. There is a syntax problem

C

Is the DNS name space hierarchical, flat, or winding? Type your answer in the space provided.

Hierarchical

Which directory contains the default user startup template files that are copied to the home directory of a user account at the time of creation?
A. /etc/skeleton
B. /etc/default/user
C. /etc/default
D. /etc/skel

D

What is the well-known port number for the DNS service?
A. 51
B. 52
C. 53
D. 54

C

Which THREE of the following are true for an MTA?
A. It is responsible for downloading email messages to a recipient's inbox
B. It is responsible for transporting email messages between mail servers
C. It uses the POP and IMAP protocols over port 25
D. It

BDE

Type the name of the file that defines the mapping between users and email addresses.

/etc/aliases

What is the secure equivalent that OpenSSH provides for the rcp command?
A. scp
B. cp
C. ftp
D. No equivalent, use rcp

A

What is the significance of the character combination (#!) at the beginning of a shell script?
A. It outlines the absolute path of the Bash shell file to be used to run the script
B. It outlines the absolute path of the shell to be used to run the script

B

Select TWO of the following that can be used to redirect incoming user email to one or more recipients.
A. By using the ~/.forward file
B. By using the /etc/aliases file
C. By using the /etc/forward file
D. By using the mail command

AB

Which of the following correctly lists the features included in assistive technologies?
A. Text size adjustments
B. Audible and visual alerts
C. Onscreen virtual keyboards
D. Mouse gestures
E. Screen resolution adjustments
F. All of the above

F

Which of the following should be run after making changes to the rsyslog.conf file to check for any errors?
A. service rsyslog restart
B. rsyslogd
C. systemctl rsyslog restart
D. rsyslogd -N 1

D

Which TWO of the following commands can be used for tracing flow of network traffic?
A. route
B. tracepath
C. netstat
D. traceroute

BD

Type the name of the OpenSSH client configuration file located in the /etc/ssh directory.

ssh_config

Depending on the Linux distribution and version, which TWO are valid configuration files to store the default display manager?
A. /etc/default/display
B. /etc/X11/desktop
C. /etc/sysconfig/desktop
D. /etc/X11/default-display-manager

CD

What would the command groupadd -g 4000 dba do? Select TWO.
A. Create a group called dba with GID 4000
B. Create a group called 4000 with GID dba
C. Update the /etc/group and /etc/gshadow files
D. Add a group called dba using the next available GID

A

How many characters does the ASCII character set comprises of?
A. 64
B. 128
C. 256
D. 512

B

Which directory stores the user SSH keys?
A. /tmp/ssh
B. /etc/ssh
C. ~/.ssh
D. /etc/.ssh

C

Which directory stores the interface configuration files in RHEL and derivatives?
A. /var/lib/interfaces
B. /etc/network
C. /usr/local/network
D. /etc/sysconfig/network-scripts

D

Which command can be used to define VAR as an environment variable so that programs running in subshells also see and use it?
A. echo
B. set
C. env
D. export

D

What would the command ssh-copy-id do?
A. Install private and public keys on a remote system
B. Install public key on a remote system
C. Install private key on a remote system
D. Copy public key to a different directory

B

What is the OpenSSH equivalent for the telnet command?
A. scp
B. openssh
C. ssh
D. sftp

C

Type the name of the TCP Wrappers daemon that controls access to the system via the /etc/hosts.allow and /etc/hosts.deny files.

tcpd

What is the use of the ssh-keygen command?
A. To replace authentication keys
B. To copy authentication keys
C. To delete authentication keys
D. To generate authentication keys

D

What is the name of the configuration file in Debian and derivatives that stores syslog rules?
A. 50-default.conf
B. rsyslog.conf
C. syslog.conf
D. klogd.conf

A

Select TWO common encryption techniques.
A. Symmetric
B. Cryptography
C. Secret key
D. Asymmetric

AD

Which file in the /etc directory do we modify to enter NTP server names or IP addresses?
A. ntp.sh
B. ntp.conf
C. ntpserver.conf
D. ntpclient.conf

B

Which log file stores authentication messages?
A. /var/log/auth
B. /etc/log/secure
C. /var/log/secure
D. /etc/log/auth

C

Which THREE of the following are per-user shell startup files?
A. /etc/bashrc
B. ~/.bashrc
C. ~/.bash_profile
D. ~/.profile

BCD

The groupmod and usermod commands may be used to perform the following. Select THREE.
A. Modify group and user account attributes
B. Change GID and UID
C. Set group and user passwords
D. Change group name and user name

ABD

What can we achieve by executing the command ulimit -f 2048?
A. Set a minimum file size to 2MB for a user
B. Set a maximum file size to 2MB for a user
C. Set a maximum number of files to 2048 that a user can create
D. Set a minimum number of files to 2048

B

What does the entry hosts: dns [TRYAGAIN=return] files mean in the /etc/nsswitch.conf file?
A. Terminate a name lookup attempt even if DNS server is not busy
B. Jump to the /etc/hosts file for lookup if DNS server is busy
C. Terminate a name lookup attemp

C

Write an SQL query to show only the count of records stored in a table called ex102t matching the name "Abraham".
A. select
from ex102t where name='Abraham' count(
);
B. select count(*) from ex102t where name='Abraham';
C. select count(*) in ex102t where

B

How can we identify the files that are in use of running processes?
A. With the help of the ps command
B. With the help of the pgrep command
C. With the help of the fuser command
D. With the help of the lsof command

D

Which command can be used to print monitor settings, such as screen size, orientation, and reflection?
A. xrandr
B. xwininfo
C. display
D. xdpyinfo

A

Which of the following can be used to log a message to the default system log file?
A. write -i System Rebooted by $USER
B. log -i System Rebooted by $USER
C. logger -i System Rebooted by $USER
D. logger System Rebooted by $USER

C

Which command can be used to update the computer's hardware clock with the Linux system clock?
A. clock
B. date
C. time
D. hwclock

D

CUPS is not an implementation of the Internet Printing Protocol (IPP). True or False?

False

The selector field is divided into facility and priority in syslog configuration. What are their uses? Select TWO.
A. A facility represents process groups that generate messages
B. A priority identifies the severity associated with a facility
C. A priorit

AB

The setgid bit should/need not be enabled on TWO of the following.
A. Shared libraries
B. Executable files
C. Shell scripts
D. Directories

AC

Which THREE statements are true about the arp command?
A. It can be used to ascertain a hardware address associated with an IP address
B. It can be used to determine duplicate MAC addresses active on the network
C. It may be used to identify duplicate IP

ACD

The OpenSSH private key must be shared with remote systems for user authentication. True or False?

False

Depending on the Linux distribution and version, which THREE commands can be used to change the system time zone to America/Toronto.
A. hostnamectl set-timezone America/Toronto
B. cp /usr/share/zoneinfo/America/Toronto /etc/localtime
C. ln -s /usr/share/z

BCD

Which entry can be placed in user2's crontable to run script2.sh at 5 minutes past 1 a.m. and 1 p.m. on every Tuesday and redirect the output to /tmp/script2.out file?
A. 5 1,13
2 /home/user2/script2.sh > /tmp/script2.out
B. 5 1-13
2 /home/user2/script2.s

A

Which character appears just before the encrypted password in the /etc/shadow file to identify a locked user account?
A. ?
B. !
C. *
D. #

B

Which THREE statements are true about login/display manager programs?
A. They are responsible for graphical user logins
B. Unity and GNOME are two common login/display manager programs
C. They start an appropriate desktop environment manager program for t

ACD

Toggle keys is an assistive technologies feature that sound an alert when keys such as NumLock and CapsLock are pressed. True or False?

True

Which THREE of the following can be used to search for directories with sticky bit on?
A. find / -perm /o+t -type d
B. find / -perm -1000 -type d
C. find / -type f -perm /o+t
D. find / -type d -perm /o+t

ABD

Which is the correct CIDR representation for an IP 192.168.30.40 using the default class C netmask?
A. 192.168.30.40/16
B. 192.168.30.40/24
C. 192.168.30.40/32
D. 192.168.30.40/40

B

An MUA is used to read and write email messages. True or False?

True

Type the name of the service that runs after each system reboot and executes any missed cron and at jobs that were supposed to run during the time when the system was down.

anacron

Depending on the Linux distribution and version, which TWO are valid configuration file names for turning network services on or off?
A. /etc/inetd.conf
B. /etc/networkd.conf
C. /etc/network.conf
D. /etc/xinetd.conf

AD

Which of the following can be used to establish a client/server netcat command connection on port 6000 on localhost? Select TWO answers, one to allow incoming connections and another to connect to it.
A. nc -l 6000
B. nc localhost 6000
C. ncat 6000 -e
D.

AB

It is highly recommended to enable suid-rights on shell scripts so that any user on the system can execute them successfully as and when required. True or False?

False

Which of the following is not a pre-defined environment variable?
A. HOME
B. LOGNAME
C. NAME
D. TZ

C

What is the alias command used for?
A. To create nick names for users
B. To create nick names for groups
C. To create shortcuts to commands
D. To setup cron jobs

C

Which TWO of the following show the correct syntax to add a default route non-persistently?
A. ifconfig route add default via 19.168.0.2 dev eth2
B. ip route add default via 19.168.0.2 dev eth2
C. ip route add gw via 192.168.0.2 dev eth2
D. route add defa

BD

Which of the following would allow members of the group dba to run any administrative command on the system without being prompted for a password?
A. %dba ALL=(ALL)
B. %dba ALL=(ALL) NOPASSWD: ALL
C. dba ALL=(ALL)
D. dba ALL=(ALL) NOPASSWD: ALL

B

Log files are rotated based on a schedule. Which file stores the schedule and which command rotates the files?
A. File: /etc/default/logrotate.conf, Command: rotate
B. File: /etc/logrotate, Command: logrotate
C. File: /etc/sysconfig/logrotate.conf, Comman

D

Which THREE statements are true for command date2 && hostname?
A. The && characters are list operators
B. The && characters are used to perform a logical AND operation on given commands
C. The hostname command will be executed and its result will be displ

ABD

What would the command cupsreject -r "prn1 is unavailable" prn1 do?
A. Reject a submitted print job and return the message "prn1 is unavailable"
B. Show the message "prn1 is unavailable" to the user and print a submitted job
C. Disable the prn1 printer fo

A

The test command is used to perform tests in conditional statements. What would the -lt operation on integer values A and B, and -e operation on a file do?
A. Test whether integer B is less than integer A, and whether a file exists
B. Test whether integer

B

Which of the following is not a valid environment variable in the output of the locale command?
A. LANG
B. LC_MESSAGES
C. LC_NAME
D. LC_ADDRESS
E. LC_DATE
F. LC_MEASUREMENT

E

What would the command useradd -s /sbin/nologin user2 do?
A. Add a user account called user2 who will be able to log in to the system once a day only
B. Add a user account called user2 without login capability
C. Create a user account called user2 with ho

B

What would the command lpadmin -x prn1 do?
A. Remove the prn1 printer
B. Add the prn1 printer
C. Remove queued jobs from the printer
D. List print jobs queued on the prn1 printer

A

Write an SQL statement to delete all records stored from a database table called ex101t at Sno 2 and 7.
A. delete from ex101t where Sno=2 or Sno=7
B. delete from ex101t where Sno='2' or Sno='7';
C. delete Sno='2' or 'Sno='7' from ex101t;
D. select * from

B

The behavior of a looping construct can be controlled via the following commands. Select THREE.
A. break
B. sleep
C. continue
D. exit

ABC

What is the DNS resolver file name?
A. /etc/dns.conf
B. /etc/nsswitch.conf
C. /etc/name.conf
D. /etc/resolv.conf

D

Which TWO of the following are the correct command syntaxes to run an at job on December 1, 2018 at 11:59 p.m.?
A. at 11:59pm 12/1/18
B. at 11:59 1/12/18
C. at 23:59 12/1/18
D. at 23:59 1/12/18

AC

The netcat (a.k.a. nc or ncat) command can be used to explore, monitor, and debug network connections. True or False?

True

Which of the following would list the contents of a user crontable?
A. crontab -x
B. crontab -a
C. crontable -l
D. crontab -l

D

Depending on the Linux distribution and version, which TWO files store the time zone information in legible format?
A. /etc/default/timezone
B. /etc/default/clock
C. /etc/sysconfig/clock
D. /etc/timezone

CD

Which TWO of the following can be used instead of the command find /usr -perm /2000 -type f?
A. find / -perm -g+s
B. find / -perm -g+s -type f
C. find /usr -perm -g+s -type f
D. find /usr -type f -perm -g+s

CD

The ping and ping6 commands send RARP packets to remote systems for testing network connectivity. True or False?

False

Which TWO of the following show the correct syntax to add an IP nonpersistently to a network interface?
A. ip add eth1 192.168.3.20/24 broadcast 192.168.3.255
B. ifconfig eth1 192.168.3.20/24 broadcast 192.168.3.255
C. ifconfig 192.168.3.20/24 broadcast 1

BD

Which of the following can be invoked to generate GnuPG keys?
A. gpg2 -q --gen-key
B. gpg --show-keys --gen-key
C. gpg2 --gen-key --list-keys
D. gpg2 --gen-key --show-keys

A

Which TWO of the following logging services are alternatives to the syslog service?
A. syslogd-ng
B. rsyslog
C. syslog-ng
D. syslogd

BC

The default network port that the syslog service use for its network operation is 514. True or False?

True

Which of the following can be used to view the current locale setting?
A. echo $LANG
B. echo $LOCALE
C. echo $GLOBAL
D. echo $LC

A

Which TWO are valid IPv6 addresses?
A. 192.168.3.25
B. fe80::a00:27ff:feae:f35b/64
C. 140:add:34a:ab7:5d2:4ae:5de:c2
D. 1204:bab1:21d1:bb43:23a1:9bde:87df:bac9

BD

The OpenSSH server configuration file is sshd_config. True or False?

True

UTF-8 and UTF-16 are character encoding schemes based on the unicode character set. True or False?

True

Which of the following commands can be used to examine, list, and set the locale setting on systems running systemd?
A. locale-update
B. localectl
C. modlocale
D. locale-info

B

Why do we use the su command?
A. To log out of the system
B. To shut down the system
C. To switch user id
D. To display a list of logged in users

C

Which TWO commands can be used to display a user's current group memberships?
A. groups
B. id
C. who
D. whoami

AB

The command to submit a cron job is?
A. cronfile
B. crontab
C. cron.allow
D. /usr/sbin/cron

B

A user password is case-insensitive. True or False?

False

Can a normal user change other users' passwords?
A. Yes
B. No

B

Which command is used to change a user password?
A. passwd
B. password
C. pass
D. chpasswd

A

Which command only displays a user's group memberships?
A. id
B. newgrp
C. groups
D. usermod

C

What is the default location for user home directories?
A. /export/home
B. /usr/home
C. /usr
D. /home

D

Which THREE of the following commands are used for user account management?
A. useradd
B. usermod
C. adduser
D. userdel
E. deluser
F. moduser

ABD

What are the default permissions on the /etc/passwd file?
A. 655
B. 666
C. 644
D. 640

C

What does the following crontab entry do? 20 12 1-15
find / -name core -exec rm {} \;
A. Runs the find command at 20:12 the first fifteen days of each month
B. Runs the find command at 12:20 the first fifteen days of each month
C. Runs the find command at

B

What is the impact of using the -o option with the useradd command?
A. Disallows the allocation of non-unique GIDs
B. Allows the use of non-unique GIDs
C. Disallows the allocation of non-unique UIDs
D. Allows the use of non-unique UIDs

D

What is the name of the system-wide user initialization file for Bash shell users?
A. /etc/profile
B. $HOME/profile
C. /etc/.profile
D. /etc/swprofile

A

Which of the following will create a user account called user5 with UID 1005, primary group dba, and secondary group linuxadm (assuming that dba and linuxadm groups already exist).
A. useradd -u 1005 -g dba -G linuxadm user5
B. useradd -u 1005 -g dba,linu

A

Which option with the crontab command would allow you to modify your crontab file?
A. -e
B. -a
C. -m
D. -r

A

What is the purpose of the cron daemon?
A. To run scheduled jobs every hour
B. To run all scheduled jobs at their specified times
C. To run all scheduled jobs simultaneously
D. To run all scheduled jobs every hour

B

Type the name of the file in the /etc directory that stores the primary group for a user.

passwd

What happens when neither the cron.allow nor the cron.deny file exists?
A. All users excluding root can schedule a job
B. All users including root can schedule a job
C. No users excluding root can schedule a job
D. No users including root can schedule a j

C

Which is the log file for the cron daemon?
A. cron has no log file
B. /var/log/crontab
C. /var/log/cron
D. /var/adm/cron

C

What would the following at command do if executed at 6pm? # at 11pm find / -name core -exec rm {} \;
A. Executes the find command at 11pm next week
B. Executes the find command after 5 hours
C. Executes the find command every night at 11pm
D. All of the

B

Which directory contains default user startup template files?
A. /etc/skeleton
B. /etc/default/user
C. /etc/default
D. /etc/skel

D

What would mailx user1 < $HOME/.bash_profile do?
A. Mail the contents of the sending user's .bash_profile file to user1
B. Mail the sending user's .bash_profile file as an attachment to user1
C. Mail user1's .bash_profile file from their home directory to

A

To remove a user account called user1 along with home directory, which TWO of the following can you use?
A. userdel user1
B. userdel -r user1
C. userdel user1 -r
D. userrem -r user1

BC