The 'hongqi bucket' linux competition-Basic Knowledge-general Linux technology-Linux technology and application information. For more information, see the following. 1. What is the highest level domain division in the Internet management structure that represents a commercial organization:
* A. com B. GOV C. MIL D. ORG
2. The superuser password must be:
A. at least 4 bytes, And it is case sensitive * B. At least 6 bytes, and is case sensitive
C. It must contain at least 4 bytes and is case insensitive. D. It must contain at least 6 bytes and is case insensitive.
3. The statement for specifying the default domain name for the proxy server is:
A. ServerName * B. ProxyDomain C. ProxyPass D. AccessFileName
4. The file at the specified Domain Name Server location is:
A. etc/hosts B./etc/networks * C./etc/resolv. conf D./. profile
5. After the router selects the optimal path for a data packet, which of the following will it continue?
A. Broadcast B. store the data packet in the route selection Table C. Select A route from the selection Protocol * D. Exchange data packets
6. Which of the following protocols is used to transmit information between server-side E-mails.
A. TCP/IP B. POP * C. SMTP D. POP3
1. the/etc/hosts file contains at least one line, which is:
A. 127.1.1.1 localhost * B. 127.0.0.1 localhost C. 127.0.0.155 hostname D. 202.38.126.12 dns
2. To cancel unnecessary services, you must modify the ________ file and add ______ before unnecessary services.
A. Lan standards applicable to real-time systems * B. Lan standards using the carrier listener/conflict detection (CSMA/CD) protocol C. standards observed by the licensing Ring D. Optical Fiber Distribution Data interfaces
4. Under what circumstances will PPP be used by a local workstation to establish a connection to the Internet? C
A. the workstation is directly connected to the lan B. The workstation is directly connected to the router
* C. The workstation needs to establish a dial-up connection to the Internet. D. It will never be used by the workstation.
5. Route Selection protocols: B
A. IP protocol * B. RIP Protocol C. UDP protocol D. ARP Protocol
6. Which of the following is the feature of the differential segment?
A. Private path between the sending and receiving hosts B. Multi-traffic path in the switch
C. All traffic in the network segment is immediately visible * D. A and B
7. When all the routers in the network share the same understanding, which of the following is the network?
* A. Converged B. The formal C. reconfigurable D. None of them are
8. The subnet mask of the Class A address with A subnet number of 16 bits and the Class B address with A subnet number of 8 bits is:
* A. 11111111.111111.11111111.00000000 11111111.11111111.11111111.00000000
B. 11111111.20..11111111.00000000 11111111.11111111.11111111.00000000
C. 11111111.0000.00000000.000000000000 11111111.00000000.111111.00000000
D. 11111111.20.2.16.00000000.00000000 11111111.00000000.00000000.00000000
9. Generally, the SMTP server uses the _____ port to carry out the mail service.
A. 80 B. 23 C. 21 * D. 25
10. The file at the specified Domain Name Server location is:
A. etc/hosts B./etc/networks * C./etc/resolv. conf D./. profile
11. Undo an RPC program (stop the service) on the local host, such as mountd. Run the following command for Version 1:
A. #/usr/sbin/rpcinfo-B mountd 1 * B. #/usr/sbin/rpcinfo-d mountd 1
C. #/usr/sbin/rpcinfo-u mountd D. # kill-HUP pid-of-inetd
12. Which of the following are two basic types of dynamic routing?
A. Static and default B. TCP and UDP switching * C. Distance Vector and link status D. None of the above
14./etc/hosts. allow has the following line: "ALL: 166.111.138." Its meaning is:
A. Do not allow all machines on 166.111.138 to access this server
* B. Allow all machines on 166.111.138 to access this server
C. Allow the server on the 166.111.138 server to access the server
D. Allow 166.111.138.128 access to the server
15. What are ftp data transmission modes?
A. 1 * B. 2 C. 3 D. 4
16. Most TCP/IP implementations allocate the port number between _____ to the temporary port.
* A. 1024-5000 B. 0-1024 C. 5000 or above D. 0-128
17. To check whether an interface is working, we can use ____ software:
A. ifup B. alias C. netcfg * D. ifconfig
19. If Apache is used as the WWW server, which of the following is the most important configuration file:
A. access. conf B. srm. conf * C. httpd. conf D. mime. types
20. The mail service program used by Red Flag Linux Server2.0 is:
A. @ message B. mailserver * C. sendmail D. IIS
21. In general, when running the httpd service sub-process through the Web, We will select the ________ user permission method to ensure system security:
A. root B. httpd C. guest * D. nobody
22. Completing the SLIP connection includes:
A. Convert the parallel port into a slip device * B. The Modem connects to the host through dialing
* C. Set the hardware interface. * D. Set the route table.
23. Which of the following statements are true?
The A./var/run/wtmp file records the users currently logged on to the system. We can use the who command to view this file.
* The B./var/log/lastlog file records the last logon time of each user in the system. Each time a user logs on, the time displayed on the screen is obtained from the lastlog file.
The C./var/run/utmp file records the logon time and logout time of each user. You can use the last command to view the wtmp.
* D./var/log/pacct file records the information about the user's command execution (for example, who executes the command, the command execution time, and how long the command has been executed)
24. Common risks on the Internet include:
* A. network establishment lacks security measures and no protective equipment is installed * B. Incomplete security configurations of the system
* C. imperfect system management * D. Basic security issues on the communication protocol (IP, TCP, UDP, etc)
25. network access methods include:
* A. Simulation Terminal * B. SLIP/PPP mode * C. Lan mode D. World Wide Web (WWW)
26. The configuration of the Mail Server includes the following steps:
* A. Check whether/var/spool/mail is shared. Run the following command:
* B. Enter the server as a Super User * C. Edit the/etc/exports file and add records
* D. If the server is an NFS server, enter the command #/usr/sbin/exportfs-
27. Which are the parameters in dhcpd. conf:
* A. range * B. subnet * C. deny * D. allow
28. The following IP addresses belong to Class A addresses:
* A. 0.1.0.0 B. 166.111.172.1 * C. 126.0.0.0 D. 127.0.0.1
29. common types of domain name servers include:
* A. root server * B. Primary Domain Name Server (Primary Servers) * C. Secondary Domain Name Server (Secondary Servers)
* D. Dedicated Cache Domain Name Server (Cache-only servers)
30. Which of the following statements about DHCP is true:
* A. When started, dhcpd reads the content of the dhcpd. conf file and saves the list of available IP addresses on each subnet in the memory.
* B. Each address has a lease period. Before the lease period arrives, the customer can renew the lease to continue using the IP address.
* C. dchpd saves the lease information in the dchpd. lease file.
* D. To provide services to a subnet, dhcpd needs to know the subnet network number and subnet mask.
31. The mail distributor enables a large number of people to communicate via email, and the contact does not need to clearly specify all recipients at the time of sending.
* A. Correct B. Incorrect
32. crack is a password cracking program.
* A. Correct B. Incorrect
33. in the network management field, there is a basic principle: to manage an object, such as adding software and hardware to the object, however, this "add" must have minimal impact on the original object.
* A. Correct B. Incorrect
34. When you dial a node to establish a PPP connection, you are a server. The machine you connect to is a client. When you set up a Linux machine to receive and process incoming PPP connections, you are setting up a PPP client.
A. Correct * B. Incorrect
35. The procedure of Sendmail is as follows: parameter processing and address analysis, message collection, mail delivery, waiting in queue for resending, and return to the sender.
* A. Correct B. Incorrect
36. address Resolution should consider the following situations: before arriving at the final destination network, you should translate the IP destination address into the physical address of the next hop router and the last step of information transmission, translate the IP destination address into the physical address of the target computer.
* A. Correct B. Incorrect
37. In the client server structure, the client initiates a request and the server gives a response.
* A. Correct B. Incorrect
38. ip disguise refers to a mechanism in which a computer can disguise its ip address as another ip address when accessing resources on the Internet.
* A. Correct B. Incorrect
39. Before sending a group, the host must convert the binary data from its internal format to the standard byte sequence of the network.
* A. Correct B. Incorrect
40. the Apache server is set to run in standalone or inetd mode, which has little difference in the performance of the execution server. When an httpd process ends a service request, it will delay a period of time before it is aborted, requests sent during this period can continue to use this process.
A. Correct * B. Incorrect
41. Network Security should be strictly protected by technology, law, and management.
* A. Correct B. Incorrect
42. user passwords become more vulnerable as they become longer in use, and frequent changes to user passwords are conducive to system security.
* A. Correct B. Incorrect
43. run the ps-A command in the command line. We can see that the m I n g e t y task exists. In Red Flag Linux, in addition to controlling logon to the V g A console, m I n G e t y can also be used to manage PPP serial port tasks.
A. Correct * B. Incorrect
44. NFS uses TCP transmission packets to provide online shared file access.
A. Correct * B. Error (UDP)
45. SNMP implements basic management functions through interrupt operations.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.