Linux Questions and Answers

Source: Internet
Author: User
Tags domain server

First, single-choice:

1, add a static route to the network 196.199.3 through the Eth2 interface, with: A. Route Add-net 196.199.3.0 B. Route add-net 196.199.3.0 netmask 255.0.0.0 eth2 C . Route add 196.199.3.0 netmask 255.0.0.0 eth2 D. Route add-net 196.199.3.0 netmask 255.255.255.0 eth2 Answer: D

2, FTP data transfer mode There are several? A. 1 B. 2 c. 3 D. 4 Answer: b

3, the so-called virtual host refers to: A. A machine has multiple network interfaces B. One network interface has multiple IP addresses C. One application listens on multiple ports D. One host provides multiple network services answer: B

4, in the use of raid0+1 mode of operation, at least need to ________ block hard disk. A. 1 B. 2 c. 3 d. 4 Answer: D

5, the Lilo configuration file has the following line: append= "" mem=128m "", The meaning is: A. Set the physical memory used by the swap partition of Linux B. Setting the size of the Linux physical memory c. Setting the cache size D. Setting the disk buffer size answer: B

6, the command crontab can: A. Operation schedule for each user's daemon and execution of the process B. Setting the keyboard c. Setting the Print filter D. Setting the kernel run environment answer: A

7,/dev/hdb said: A. The first Master Drive B. Second master Drive C. second from drive D. First from drive answer: B

8. The instructions for checking whether the Apache software package is installed are: A. rpm-x Apache B. rpm-r Apache C. rpm-t Apache D. Rpm-q Apache Answer: D

9, the special goal rule reject says: A. Let data transparent through B. Discard data C. When the data is discarded, the sender data of the notification data is rejected by D. It is disguised as being sent from a local host, and the response data is automatically spoofed at the time of forwarding: C

10, we can check the _______ file, will not need to delete the service, so as to facilitate the security of the system. A./etc/yp.conf b./etc/services c./etc/pine.conf d./etc/inetd.conf Answer: D

11, command1&&command2| | The meaning of Command3 is: A. Command3 B is executed when Command1 succeeds and Command2 fails. Command3 C is executed when Command1 and Command2 are successful. Command3 D is executed when Command1 and Command2 fail. When Command1 fails, Command2 executes the command3 answer when it succeeds: A

12, the operating level of the Init is generally () a level. A 4 B. 5 C. 6 D. 3 Answer: C

13, in order to achieve "after three days 9 o'clock in the morning to perform the job in file files," The task requires () A. Super User executes at$at–f file 9am+3 days B. The general user executes at$at–f file 9am+3 days C. Super User executes at$at–f file 3+9am days D. General user execution at$at–f file 3+9am days Answer: A

14, Operator () allows the user to run commands in the background. A.! B & C. D @ Answer: B

15, in order to achieve the x desktop switch, you can modify () file. A $HOME/. Xresources B. /etc/sysconfig/desktop C. /usr/share/apps/switchdesk D. /usr/share/config/desktop Answer: B

16. Verify that NFS has an installed command line: A. Mount–t NFS Cuckoo:/home/users B. Killall–hup rcp.nfsd rpc.mouintd C. Cat/proc/filesystems D. These are not the answers: C

17. Verify that the kernel supports NFS when checking the file is: A. /etc/fstab B. /etc/exports C. /proc/filesystems D. These are not the answers: C

18, DirectoryIndex Specifies the default file returned by the server, the default value is (): A. Index.htm B. Index.html C. index.php D. Index.php3 Answer: B

19, the directory of the PPP module program is: A. /lib/modules/Core version number/NET/PPP.O B. /ETC/PPP/PPP.O C. /ETC/PPP.O D. None of the above is the answer: A

20. The upgrade version of the IPChains command is: A. Iptables B. Iproute C. Ipconfig D, the above is not the answer: A

21. The standard set of rules that SendMail first executes is: A. Set 3: Convert address to standard format B. Rule set 0: Determine what the target is and which postman program to use C. Rule set r=: Allows each postman to specify an additional set of rules to be used on the recipient's address, is a collection of rules representing the processing of recipient addresses D. Rule set 4: Specify the last name to apply to the message answer: A

22. When Linux is configured as a router, the () file is edited? A /etc/services B. /etc/inittab C. /etc/sysconfig/network D. /etc/inetd.conf Answer: C

23, the user login environment, contains the system environment description and startup program files are: A. /ETC/BASHRC B. /etc/profile C. /ETC/INPUTRC D. These are not the answers: B

24. Use the () command to view the files contained in the Myfile.tar. A Tar xvf myfile.tar B. Gzip–l Myfile.tar C. Tar TVF Myfile.tar D. Gzip–d Myfile.tar Answer: C

25. The key to move the cursor position to the first letter of the next word is: A. b b. S C. W D. A answer: C

26. If the sndconfig is not properly configured, you can start () to configure the sound card. A Klilo B. Netconf C. Userconf D. Alsaconf Answer: D

27. When using M g e t T y, if it detects the start of a P p p session, M G e t T y will use the EXEC () system call to derive the _________ process and then be authenticated by ________ to the user (through the system's password database or its own valid user database). and start the network connection after authorization. A. uugetty B. pppd c. pap-secrets D. Pap Answer: b

Second, multi-choice:

1, the following command #ls Test #chmod a+s test #cp/bin/bash Test "" is correct: a. may cause harm to the system B. must be a superuser to run C. Any user running test will have superuser privileges D. Line test requires Superuser's permission answer: AC

2, SendMail system configuration includes: A. Mail delivery Agent B. Macro c. Options D. Rule set answer: ABD

3. Which of the following suggestions can enhance the security of the system? A. Close unnecessary services as much as possible B. Revoke all default accounts c. Limit the number of times a user attempts to log in D. Encrypt answer: ACD

4, we have a very small data file at hand, we want to see the contents of the file on the terminal, we can through ________ A. Cat data B. VI data C. Man data D. Less data answer: ABD

5. The types of devices in a Linux system include: A. Block device B. Character device C. Streaming device D. Buffer Device Answer: AB

6, in the system partition, we must at least separate the ___ partition: A./B./usr C./swap D./proc Answer: AC

7, $TERM said: A. Environment variable, host name b. environment variable, storage terminal type C. Shell variable, store search path D. Shell variable, store shell type answer: BCD

8, in order to avoid the Linux Samba client in the network to find NT primary domain server, we can add _________ content in the/etc/smb.conf file. A. Domain Master=no b. Local master=no c. prefered Master=no D. Master level=0 answer: ABC

9, about the Linux kernel version is correct: A. Follow the major version number. The contract for the number of fixes B. 1.2.2.0 represents a stable release C. 2.2.6 represents the 6th amendment to Kernel 2.2 D. 1.3 For development version answer: ABCD

10. Which of the following commands will allow the program to run as Superuser? A. sudo B. Su c. Setting the program's suid bit D. Setting the program's sgid bit answer: ACD

11, Tcp-wrapper:a. Is the remote Access tool B. Has the ability to manage remote visitors C. The basic idea is to replace the inetd Super Server D. Introduction of stronger records and access control functions answer: BCD

12. The security levels provided by Samba include: A. Share B. User c. Server D. Domain Answer: ABCD

Third, the judgment question:

1, in the Linux system TCPD, can be set to allow the computer and not allowed to the list of personnel. Among them, allow the list of the machine to be set in/etc/hosts.allow, do not allow the list of the machine personnel in the/etc/hosts.deny set. After Setup is complete, it takes effect immediately. A. Correct B. Wrong answer: A

2. If you choose Apache to run the WWW service as the inetd process, specifying the service port in the httpd.conf file is useless, but it needs to be specified in the inetd configuration file/etc/services. A. Correct b. Wrong answer: b

3. SMB works by having the IP protocol and the SMB protocol running on top of the TCP/IP protocol, and using NetBIOS nameserver to allow Linux machines to be seen in the Windows Network Neighborhood, so that they can communicate with WIN95/NT hosts on the network, To share files with the print service. A. Correct b. Wrong answer: b

4, if the software executable file is installed directly, if the version of the runtime library and the author compiled the software version of the difference is too large, then an error will result in failure to execute. Compilation errors occur if the software is to be recompiled and the software uses some new versions of the available functions. Therefore, if you have this limitation, you only have to discard the software and upgrade the system two choices. A. Correct B. Wrong answer: A

5, in the shell command line mode, a line can only write one instruction, can only use one command at a time. A. Correct b. Wrong answer: b

6. Most analog modems, ISDN devices, and T1 modems are part of a block device. A. Correct b. Wrong answer: b

7, the Linux kernel is installed after compression, so the kernel load into memory after the first step of the task is to decompress itself. A. Correct B. Wrong answer: A

8. A process can be run either in the foreground or in the background, and a pending process can continue to run where it hangs. A. Correct B. Wrong answer: A

9, Samba can realize the Linux system and Windows file sharing, but does not provide printing services. A. Correct b. Wrong answer: b

Linux questions and Answers

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.