Linux Questions and answers (1)

Source: Internet
Author: User

I. multiple choice questions:

1. Add a static route to get to network 196.199.3 through the eth2 interface. Use. route add-net 196.199.3.0 B. route add-net 196.199.3.0 netmask route 0.0.0 eth2 C. route add 196.199.3.0 netmask 255.0.0.0 eth2 D. route add-net 196.199.3.0 netmask limit 255.0 eth2 answer: d

2. What are FTP data transmission modes? A. 1 B. 2 C. 3 D. 4 answer: B

3. The so-called virtual host refers to:. A machine has multiple network interfaces. A network interface has multiple IP addresses. one application listens to multiple ports D. A host provides multiple network services. Answer: B

4. Which of the following hard disks is required when raid0 + 1 is used. A. 1 B. 2 C. 3 D. 4 answer: d

5. The lilo configuration file contains the following line: append = "" mem = 128 M "", which means:. set the physical memory used by the Linux swap partition B. set the Linux physical memory size C. set the cache size. D. set the disk buffer size. Answer: B.

6. Run the crontab command: A. Operate the daemon of each user and the execution time of the process. B. Set the keyboard. C. Set the print filter. D. Set the kernel running environment. Answer:.

7./dev/HDB: A. The first master drive B. The second master drive C. The second slave drive D. The first slave drive B.

8. Check whether the Apache package is installed. The command is a. rpm-x Apache B. rpm-r Apache C. rpm-T Apache D. rpm-Q Apache. Answer: d

9. Special target rule reject:. make data transparent through B. discard data c. when the data is discarded, the sender data of the notification data is rejected. data is disguised as being sent from the local host, and the response data is automatically deprecated during forwarding. Answer: c

10. We can delete unnecessary services by checking the _______ file, which is conducive to system security. A./etc/yp. conf B./etc/services C./etc/pine. conf D./etc/inetd. conf answer: d

11. command1 & command2 | command3 indicates. command3 B is executed only when command1 is successful and command2 fails. command3 C is executed only when command1 and command2 are successful. command3 D is executed only when command1 and command2 fail. command3 is executed only when command1 fails and command2 succeeds. Answer:

12. The init running level generally has () levels. A. 4 B. 5 C. 6 D. 3 answer: c

13. To execute the job in file at nine o'clock A.M. after three days,. superuser execute at $ at-F file 9 AM + 3 days B. generally, the user executes at $ at-F file 9 AM + 3 days C. superuser executes at $ at-F file 3 + 9 am days D. generally, the user executes at $ at-F file 3 + 9 am days. Answer:

14. The operator () enables you to run commands in the background. A .! B. & C. % d. @ answer: B

15. To switch x Desktop, you can modify the () file. A. $ home/. Xresources B./etc/sysconfig/desktop C./usr/share/apps/switchdesk D./usr/share/config/desktop answer: B

16. Check whether the command line for NFS is. mount-t nfs cuckoo:/home/users B. killall-hup RCP. nfsd rpc. mouintd C. CAT/proc/filesystems D. none of the above is the answer: c

17. When checking whether the kernel supports NFS, check whether the file is A./etc/fstab B./etc/exports C./proc/filesystems D. The above is not the answer: c

18. directoryindex specifies the default file returned by the server. The default value is (): a.index.htm B .index.html C. index. php D. Index. php3. Answer: B

19. PPP ModuleProgramDirectory is:. /lib/modules/core version/NET/PPP. o B. /etc/PPP. o C. /etc/PPP. o d. none of the above is the answer:

20. The upgraded version of the ipchains command is a. iptables B. iproute C. ipconfig D. None of the above is the answer:

21. The set of standard rules first executed by Sendmail is:. set 3: Convert the address to the standard format B. rule Set 0: determines the target and the postman program c. rule Set R =: allows each postman to specify an additional rule set used on the recipient's address, which is a rule set for processing the recipient's address D. rule Set 4: specify the name of the last application to the message. Answer:

22. When Linux is configured as a router, is the () file edited? A./etc/services B./etc/inittab C./etc/sysconfig/network D./etc/inetd. conf

23. In the user login environment, the file containing the system environment description and Startup Program is:. /etc/bashrc B. /etc/profile C. /etc/inputrc D. none of the above is the answer: B

24. Use the command to upload files contained in myfile.tar. A. Tar xvf myfile.tar B. gzip-l myfile.tar C. Tar tvf myfile.tar D. gzip-D myfile.tar

25. The key for moving the cursor to the first letter of the next word is a. B. S C. W D. A. C.

26. If the sound card cannot be correctly configured in sndconfig, you can start () to configure it. A. klilo B. netconf C. userconf D. alsaconf answer: d

27. When m g e t y is used, if it detects the start of the p session, m g e t y will be called using the exec () system, which of the following processes are derived, and then the ________ authenticates the user (through the system password database or its own valid user database) and starts the network connection after authorization. A. uugetty B. pppd C. Pap-secrets D. Pap answer: B

Ii. Multiple answer questions:

1. Which of the following statements about the command # ls test # chmod A + s test # cp/bin/bash test "is true?. potential harm to the system B. c. any user running test will have Super User Permissions D. the Super User permission is required to execute test. Answer: AC

2. System Configurations of sendmail include: A. Mail delivery agent B. Macro C. Option D. Rule Set answer: Abd

3. Which of the following suggestions can enhance system security? A. disable unnecessary services as much as possible B. Abolish all default accounts C. restrict the number of user attempts to log on D. Encrypted answer: ACD

4. We have a small data file at hand. We hope to observe the file content on the terminal. Which of the following can we use. cat data B. VI data c. man data D. less data answer: Abd

5. The types of devices in Linux include: A. Block Device B. Character Device C. Stream Device D. Buffer Device answer: AB

6. When partitioning the system, we should at least split the ______ partition: A./B./usr C./swap D./proc. Answer: AC

7. $ term: A. environment variable, host name B. environment variable, terminal type C. Shell variable, search path D. Shell variable, and shell type. Answer: BCD

8. To avoid Linux Samba clients looking for an NT primary domain server in the network, which of the following content can be added to the/etc/smb. conf file. A. Domain Master = No B. Local Master = No C. prefered master = No D. Master level = 0 answer: ABC

9. Which of the following statements about the Linux kernel version are true?. follow the main version number. minor version number. conventions on the number of corrections B. 1.2.2.0 indicates a stable release C. 2.2.6 indicates 2.2 corrections to kernel 6th. D. 1.3 indicates the development version. Answer: ABCD

10. Which of the following commands can run the program as a Super User? A. sudo B. Su C. Set the SUID bit D of the program. Set the sgid bit of the program. Answer: ACD

11. TCP-wrapper:. yesremote access tool B. provides the ability to manage remote visitors. C. the basic idea is to replace the inetd super server D. enhanced record and access control functions are introduced. Answer: BCD

12. Samba provides the following security levels: A. Share B. User C. Server D. domain. Answer: ABCD

Iii. Answer questions:

1. In tcpd on Linux, you can set a list of persons allowed or not allowed on the computer. You can set the host personnel list in/etc/hosts. Allow. The host personnel list cannot be set in/etc/hosts. Deny. The setting takes effect immediately. A. Correct B. Incorrect answer:

2. If Apache is selected as the inetd process to run the WWW Service, it is useless to specify the service port in the httpd. conf file. Instead, it must be specified in the inetd configuration file/etc/services. A. Correct B. Incorrect answer: B

3. the working principle of SMB is that the IP protocol and SMB protocol run on the TCP/IP protocol, and the NetBIOS nameserver enables Linux machines to be seen in Windows Network neighbors, therefore, you can communicate with the Win95/NT host on the network to share files and print services. A. Correct B. Incorrect answer: B

4. If the executable file of the software is directly installed, if the version of the Runtime Library differs greatly from that of the software compiled by the author, errors may occur and the software cannot be executed. If you re-compile the software and the software uses functions provided by some new versions, a compilation error occurs. Therefore, if this restriction exists, you must discard the software or upgrade the system. A. Correct B. Incorrect answer:

5. In shell command line mode, only one command can be written in one line, and only one command can be used at a time. A. Correct B. Incorrect answer: B

6. Most analog modem, ISDN device, and T1 modem are Block devices. A. Correct B. Incorrect answer: B

7. the Linux kernel is compressed and installed, so the first step after the kernel is added to the memory is to decompress it. A. Correct B. Incorrect answer:

8. A process can run either in the front or in the background. A suspended process can continue to run in the place where it is suspended. A. Correct B. Incorrect answer:

9. Samba supports file sharing between Linux and Windows, but does not support printing. A. Correct B. Incorrect answer: B

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.