LinuxS2 exam questions (including answers)-Linux general technology-Linux technology and application information, the following is a detailed description. 1. in Linux, cannot the service network restart command restart the system environment? D
A. IP Address Settings
B. Gateway settings
C. subnet mask settings
D. DNS Client settings
2 what commands cannot stop the active network card eth0? B
A./etc/rc. d/init. d/network stop
B. ifconfig eth0 stop
C. ifconfig eth0 down
D. ifdown eth0
3. What is the purpose of the servicec network status command? C
A. Stop and then start the network environment.
B. Stop the Network Environment
C. view the current network status
D. Start the Network Environment
4 What parameter environments can be modified by the ifconfig command? D
A. IP Address
B. MAC address
C. Subnet Mask
D Gateway
5 in Linux, which configuration file should I modify if I want to configure the DNS client? A
A./etc/resolv. conf
B./etc/nsswitch. conf
C./etc/named. conf
D/etc/sysconfig/network-scripts/ifcfg-eth0
6 What are the functions of the route command in Linux? ABD
A. Add A local Gateway
B. Add a network route
C. view the current network connection status
D. view the current kernel route table
7 configure the mail server in Linux, so that the all@example.com can become the mail alias of all users in the current Linux, the need to modify that file? C
A./etc/passwd
B./etc/mail/aliases
C./etc/aliases
D/etc/sendmail/aliases
8 when running the sendmail service in Linux, which configuration file must be loaded when sendmail is started? C
A./etc/mail/sendmail. mc
B./etc/sendmail. mc
C./etc/mail/sendmail. cf
D/etc/sendmail. cf
9 in Linux, how does access. db generate the configuration file of the Sendmail server? C
A. The newaccessdb command
B. Run newaccess hash access. db> access
C. Command maemap hash access. db <access
D command newaccess hash access. db <access
10 what is the role of Sendmail server configuration file access in Linux? C
A. It can be used to enter information about the local machine, including the domain name and host name.
B. Used for the user's email alias
C. Restrict email acceptance or rejection
D. Set the mail queue.
11 That email proxy is responsible for mail transmission and processing C
A. MUA
B. MDA
C. MTA
D MBA
12 what types of DNS resolution are there? A
A. 2
B. 3
C. 4
D 5
13. query whether a domain name is successfully resolved. Which command C can not be used?
A. dig
B. nslookup
C. traceroute
D host
14 what is the command for handling static routes in LINUX? A
A. route
B. ping
C. nslookup
D gw
15. If LINUX and WINDOWS machines coexist in a LAN, which of the following services cannot be used for file sharing between them? BD
A. ftp
B. nfs
C. samba
D cifs
16 can I edit the configuration file to reject emails from a domain? B
A. aliases
B. access
C. local-host-name
D sendmail. mc
17 what is the start character of the SOA record in the domain name resolution configuration file? D
A .&
B. $
C ..
D @
18 In the FTP Client Program, to upload local files to A remote computer, the command is
A. put
B. get
C. cp
D copy
19 what is the service program used by the TCP Wrappers mechanism? B
A. tcp_wrappers
B. tcpd
C. TCP/IP
D xinetd
20 in the apache configuration file, what is the command to define the directory for storing web files? C
A. ServerRoot
B. ServerAdmin
C. DocumentRoot
D Index
21. Company A intends to establish its own website, so it needs to apply for its own domain name. According to the rules, what should be the domain name assigned to Company A by the domain name management agency? A
A. a.com.cn
B. a.net.cn
C.a.org.cn
D.a.gov.cn
22. Which client cannot access samba to share resources? A
A. dos
B. winows 95
C. UNIX
D FreeBSD
23 what is the root domain in the domain name resolution system? B
A ./
B ..
C .@
D SOA
24 in Linux, what is the device name of the first Nic? B
A. ppp0
B. eth0
C. ppp1
D eth1
25 what commands can be used to log on to the vsftpd server over ftp by default? BC
A. root
B. anonymous
C. guest
D ftp
26 in Linux, which file can I view if I want to view the port number used by a network service? A
A./etc/services
B./etc/service
C./etc/protocol
D/etc/protocols
27 which file do I need to modify if the system does not use/etc/hosts for domain name resolution but only uses DNS (bind) for domain name resolution? A
A./etc/resolv. conf
B./etc/hosts
C./etc/hoss. conf
D/etc/nsswitch. conf
28 what should I do to enable the routing function in Linux in real time? A
A. echo 1>/proc/sys/net/ipv4/ip_forward
B. echo 1>/proc/sys/net/ipv4/ip_route
C. echo 0>/proc/sys/net/ipv4/ip_forward
D echo 0>/proc/sys/net/ipv4/ip_route
29 what records do I need to add if I want to set forward resolution When configuring the DNS service? A
A. SOA
B.
C. PTR
D CNAME
30. To set the client to dynamically obtain the IP address, what is the command used on the command line? B
A. dhcpd
B. dhclient
C. dhcpclient
D dhcprelay
31. Which of the following services can encrypt the material user name and password during network transmission for secure communication between two hosts? B
A. samba
B. https
C. ftp
D telnet
32 in Linux, there are two methods for domain name resolution, one is to use the bind program, and the other is to use the system configuration file. What is the configuration file? D
A./etc/resolv. conf
B./etc/bind. conf
C./etc/nsswitch. conf
D/etc/hosts
33 In the configuration file of the bind program, if A zone Segment contains the type = hint, the Domain Name Server belongs to
A. root server
B. master server
C. Backup Server
D. Forwarding Server
34. The macro processing language used to create the configuration file of sendmail is C.
A. perl
B .C
C. M4
D java
35 in the DHCP service, to bind an IP address to a host, you can specify it in the dhcpd. conf file. This command is C
A. subnet
B. group
C. host
D hostname
36. For ssh service, the server configuration file is B.
A./etc/ssh/ssh_config
B./etc/ssh/sshd_config
C./etc/sshd/ssh_config
D/etc/sshd/sshd_config
37. Which command can be used to test whether the samba server configuration file is correct? B
A. testsmb
B. testparm
C. smbtest
D sambatest
38. How many authentication methods can be used on the smaba server? ABCD
A. user
B. share
C. server
D domain
39 what identity should the client access the server in the system during anonymous access on the NFS server? D
A. nobody
B. anonymous
C. guest
D nfsnobody
40. In the samba server, if you want to publish shared directories to allow anonymous access, which of the following parameters should be added? C
A. browseable = yes
B. writable = yes
C. public = yes
D valid users = nobody
41 what is the configuration file for the tcp_wrappers server? BC
A./etc/hosts. conf
B./etc/hosts. allow
C./etc/hosts. deny
D/etc/hosts
42 Internet makes computers in different regions on the earth connect to each other and facilitate communication. However, it is difficult to maintain time synchronization during communication, because computers in different locations may not be accurate in terms of reference and setup time. To solve this problem, Professor David L. Mills of Drava University proposed (C) to ensure the time synchronization of computers in different regions through a series of error compensation.
A. SNMP
B. POP
C. NTP
D. NCTP
43 When squid is used as the proxy server, if another service in the local LAN uses the default listening port 3128 of squid, you need to change squid to listen to the proxy request on port 3130, you must modify the entry (A) of the squid configuration file.
A. http_port 3130
B. http_access 3130
C. http_accel_port 3130
D. lisen 3130
44 scp command can copy files between remote hosts. Analyze the following command: C
A. copy the files in the remotehost/usr/local/src directory to the local device.
B. log on to the specified directory of the remote host remotehost.
C. copy the files in the specified local directory to the same directory on the remotehost host.
D. Copy files in the specified local directory to the same directory on the remotehost host, including subdirectories.
45. Figer's work involves the company's trade secrets. Therefore, he has an email address that needs to send and receive highly-encrypted files. Of course, these files are encrypted. But figer needs to be encrypted during the interaction of sending and receiving emails. Therefore, he installed the SSH software package on the mail server and locally. He first used the () command to generate an encrypted channel, you can use the local port 6867 to encrypt the sent mail, and then use a similar method to encrypt the received mail. B
A. ssh-L 25: mail.sec.com: 6867
B. ssh-f figer@mail.sec.com-L 6867: mail.sec.com: 25
C. ssh-f mail.sec.com-L 6867: mail.sec.com: 25: feiger
D. ssh-f figer@mail.sec.com-L 25: mail.sec.com: 6867
46. What should I do if I use the transparent proxy of the squid server to forcibly change the client's webpage access port to proxy port 3128? C
A. iptables? T nat? A postrouting? I eth0? P tcp -- dport 80? J MASQUERADE -- to-port 3128
B. iptables? T nat? A preroutgin? I eth0? P tcp -- dport 80? J MASQUERADE -- to-port 3128
C. iptables? T nat? A postrouting? I eth0? P tcp -- dport 80? J REDIRECT -- to-port 3128
D iptables? T nat? A prerouting? I eth0? P tcp -- dport 80? J REDIRECT -- to-port 3128
47. in a company's Lan, a Linux host has two NICs, the first of which has an external IP address 67.36.6.192, and the second has an internal IP address, the company's network management wants to set it as a gateway so that other machines inside the company can connect to the Internet through it. The feasible operation on the firewall is (CE ).
A. iptables-t nat-a routing-o eth0-j MASQUERADE
B. iptables-t nat-a prerouting-I eth0-j MASQUERADE
C. iptables-t nat-a postrouting-o eth0-j MASQUERADE
D. iptables-t nat-a postrouting-o eth1-j MASQUERADE
E. iptables-t nat-a postrouting-o eth0-j SNAT -- to 67.36.6.192
48. What chain can be used in the filter table in the Linux iptables command of kernel> 2.4.18? (ABC)
A. INPUT
B. OUTPUT
C. FORWARD
D. POSTROUTING
E. PREROUTING
49. What chain can be used in the NAT table in the Linux iptables command of kernel> 2.4.18? (DBE)
A. INPUT
B. OUTPUT
C. FORWARD
D. POSTROUTING
E. PREROUTING
50. What chain can be used in the mangle table in the Linux iptables command of kernel> 2.4.18? (ABCDE)
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.