'Hongqi bucket' linux competition-Basic Knowledge

Source: Internet
Author: User
The 'hongqi bucket' linux competition-Basic Knowledge-general Linux technology-Linux technology and application information. For more information, see the following. 1. What is the highest level domain division in the Internet management structure that represents a commercial organization:

* A. com B. GOV C. MIL D. ORG

2. The superuser password must be:

A. at least 4 bytes, And it is case sensitive * B. At least 6 bytes, and is case sensitive

C. It must contain at least 4 bytes and is case insensitive. D. It must contain at least 6 bytes and is case insensitive.

3. The statement for specifying the default domain name for the proxy server is:

A. ServerName * B. ProxyDomain C. ProxyPass D. AccessFileName

4. The file at the specified Domain Name Server location is:

A. etc/hosts B./etc/networks * C./etc/resolv. conf D./. profile

5. After the router selects the optimal path for a data packet, which of the following will it continue?

A. Broadcast B. store the data packet in the route selection Table C. Select A route from the selection Protocol * D. Exchange data packets

6. Which of the following protocols is used to transmit information between server-side E-mails.

A. TCP/IP B. POP * C. SMTP D. POP3

1. the/etc/hosts file contains at least one line, which is:

A. 127.1.1.1 localhost * B. 127.0.0.1 localhost C. 127.0.0.155 hostname D. 202.38.126.12 dns

2. To cancel unnecessary services, you must modify the ________ file and add ______ before unnecessary services.

A./etc/. profile * B./etc/inetd. conf ** C./etc/inetd. conf # D./etc/. confige #

3. the IEEE 802.3 standard defines:

A. Lan standards applicable to real-time systems * B. Lan standards using the carrier listener/conflict detection (CSMA/CD) protocol C. standards observed by the licensing Ring D. Optical Fiber Distribution Data interfaces

4. Under what circumstances will PPP be used by a local workstation to establish a connection to the Internet? C

A. the workstation is directly connected to the lan B. The workstation is directly connected to the router

* C. The workstation needs to establish a dial-up connection to the Internet. D. It will never be used by the workstation.

5. Route Selection protocols: B

A. IP protocol * B. RIP Protocol C. UDP protocol D. ARP Protocol

6. Which of the following is the feature of the differential segment?

A. Private path between the sending and receiving hosts B. Multi-traffic path in the switch

C. All traffic in the network segment is immediately visible * D. A and B

7. When all the routers in the network share the same understanding, which of the following is the network?

* A. Converged B. The formal C. reconfigurable D. None of them are

8. The subnet mask of the Class A address with A subnet number of 16 bits and the Class B address with A subnet number of 8 bits is:

* A. 11111111.111111.11111111.00000000 11111111.11111111.11111111.00000000

B. 11111111.20..11111111.00000000 11111111.11111111.11111111.00000000

C. 11111111.0000.00000000.000000000000 11111111.00000000.111111.00000000

D. 11111111.20.2.16.00000000.00000000 11111111.00000000.00000000.00000000

9. Generally, the SMTP server uses the _____ port to carry out the mail service.

A. 80 B. 23 C. 21 * D. 25

10. The file at the specified Domain Name Server location is:

A. etc/hosts B./etc/networks * C./etc/resolv. conf D./. profile

11. Undo an RPC program (stop the service) on the local host, such as mountd. Run the following command for Version 1:

A. #/usr/sbin/rpcinfo-B mountd 1 * B. #/usr/sbin/rpcinfo-d mountd 1

C. #/usr/sbin/rpcinfo-u mountd D. # kill-HUP pid-of-inetd

12. Which of the following are two basic types of dynamic routing?

A. Static and default B. TCP and UDP switching * C. Distance Vector and link status D. None of the above

13. The command to start Sendmail is:

A./usr/bin/sendmail-bd-q1h B./usr/sbin/sendmail-B-q1h * C./usr/sbin/sendmail-bd-q1h

D./usr/sbin/sendmail-d-q1h

14./etc/hosts. allow has the following line: "ALL: 166.111.138." Its meaning is:

A. Do not allow all machines on 166.111.138 to access this server

* B. Allow all machines on 166.111.138 to access this server

C. Allow the server on the 166.111.138 server to access the server

D. Allow 166.111.138.128 access to the server

15. What are ftp data transmission modes?

A. 1 * B. 2 C. 3 D. 4

16. Most TCP/IP implementations allocate the port number between _____ to the temporary port.

* A. 1024-5000 B. 0-1024 C. 5000 or above D. 0-128

17. To check whether an interface is working, we can use ____ software:

A. ifup B. alias C. netcfg * D. ifconfig

19. If Apache is used as the WWW server, which of the following is the most important configuration file:

A. access. conf B. srm. conf * C. httpd. conf D. mime. types

20. The mail service program used by Red Flag Linux Server2.0 is:

A. @ message B. mailserver * C. sendmail D. IIS

21. In general, when running the httpd service sub-process through the Web, We will select the ________ user permission method to ensure system security:

A. root B. httpd C. guest * D. nobody

22. Completing the SLIP connection includes:

A. Convert the parallel port into a slip device * B. The Modem connects to the host through dialing

* C. Set the hardware interface. * D. Set the route table.

23. Which of the following statements are true?

The A./var/run/wtmp file records the users currently logged on to the system. We can use the who command to view this file.

* The B./var/log/lastlog file records the last logon time of each user in the system. Each time a user logs on, the time displayed on the screen is obtained from the lastlog file.

The C./var/run/utmp file records the logon time and logout time of each user. You can use the last command to view the wtmp.

* D./var/log/pacct file records the information about the user's command execution (for example, who executes the command, the command execution time, and how long the command has been executed)

24. Common risks on the Internet include:

* A. network establishment lacks security measures and no protective equipment is installed * B. Incomplete security configurations of the system

* C. imperfect system management * D. Basic security issues on the communication protocol (IP, TCP, UDP, etc)

25. network access methods include:

* A. Simulation Terminal * B. SLIP/PPP mode * C. Lan mode D. World Wide Web (WWW)

26. The configuration of the Mail Server includes the following steps:

* A. Check whether/var/spool/mail is shared. Run the following command:

* B. Enter the server as a Super User * C. Edit the/etc/exports file and add records

* D. If the server is an NFS server, enter the command #/usr/sbin/exportfs-

27. Which are the parameters in dhcpd. conf:

* A. range * B. subnet * C. deny * D. allow

28. The following IP addresses belong to Class A addresses:

* A. 0.1.0.0 B. 166.111.172.1 * C. 126.0.0.0 D. 127.0.0.1

29. common types of domain name servers include:

* A. root server * B. Primary Domain Name Server (Primary Servers) * C. Secondary Domain Name Server (Secondary Servers)

* D. Dedicated Cache Domain Name Server (Cache-only servers)

30. Which of the following statements about DHCP is true:

* A. When started, dhcpd reads the content of the dhcpd. conf file and saves the list of available IP addresses on each subnet in the memory.

* B. Each address has a lease period. Before the lease period arrives, the customer can renew the lease to continue using the IP address.

* C. dchpd saves the lease information in the dchpd. lease file.

* D. To provide services to a subnet, dhcpd needs to know the subnet network number and subnet mask.

31. The mail distributor enables a large number of people to communicate via email, and the contact does not need to clearly specify all recipients at the time of sending.

* A. Correct B. Incorrect

32. crack is a password cracking program.

* A. Correct B. Incorrect

33. in the network management field, there is a basic principle: to manage an object, such as adding software and hardware to the object, however, this "add" must have minimal impact on the original object.

* A. Correct B. Incorrect

34. When you dial a node to establish a PPP connection, you are a server. The machine you connect to is a client. When you set up a Linux machine to receive and process incoming PPP connections, you are setting up a PPP client.

A. Correct * B. Incorrect

35. The procedure of Sendmail is as follows: parameter processing and address analysis, message collection, mail delivery, waiting in queue for resending, and return to the sender.

* A. Correct B. Incorrect

36. address Resolution should consider the following situations: before arriving at the final destination network, you should translate the IP destination address into the physical address of the next hop router and the last step of information transmission, translate the IP destination address into the physical address of the target computer.

* A. Correct B. Incorrect

37. In the client server structure, the client initiates a request and the server gives a response.

* A. Correct B. Incorrect

38. ip disguise refers to a mechanism in which a computer can disguise its ip address as another ip address when accessing resources on the Internet.

* A. Correct B. Incorrect

39. Before sending a group, the host must convert the binary data from its internal format to the standard byte sequence of the network.

* A. Correct B. Incorrect

40. the Apache server is set to run in standalone or inetd mode, which has little difference in the performance of the execution server. When an httpd process ends a service request, it will delay a period of time before it is aborted, requests sent during this period can continue to use this process.

A. Correct * B. Incorrect

41. Network Security should be strictly protected by technology, law, and management.

* A. Correct B. Incorrect

42. user passwords become more vulnerable as they become longer in use, and frequent changes to user passwords are conducive to system security.

* A. Correct B. Incorrect

43. run the ps-A command in the command line. We can see that the m I n g e t y task exists. In Red Flag Linux, in addition to controlling logon to the V g A console, m I n G e t y can also be used to manage PPP serial port tasks.

A. Correct * B. Incorrect

44. NFS uses TCP transmission packets to provide online shared file access.

A. Correct * B. Error (UDP)

45. SNMP implements basic management functions through interrupt operations.

* A. Correct B. Incorrect
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.