LinuxS2 exam questions (including answers)

Source: Internet
Author: User
Tags what parameter ftp client nslookup scp command
LinuxS2 exam questions (including answers)-Linux general technology-Linux technology and application information, the following is a detailed description. 1. in Linux, cannot the service network restart command restart the system environment? D

A. IP Address Settings

B. Gateway settings

C. subnet mask settings

D. DNS Client settings



2 what commands cannot stop the active network card eth0? B

A./etc/rc. d/init. d/network stop

B. ifconfig eth0 stop

C. ifconfig eth0 down

D. ifdown eth0



3. What is the purpose of the servicec network status command? C

A. Stop and then start the network environment.

B. Stop the Network Environment

C. view the current network status

D. Start the Network Environment



4 What parameter environments can be modified by the ifconfig command? D

A. IP Address

B. MAC address

C. Subnet Mask

D Gateway



5 in Linux, which configuration file should I modify if I want to configure the DNS client? A

A./etc/resolv. conf

B./etc/nsswitch. conf

C./etc/named. conf

D/etc/sysconfig/network-scripts/ifcfg-eth0



6 What are the functions of the route command in Linux? ABD

A. Add A local Gateway

B. Add a network route

C. view the current network connection status

D. view the current kernel route table



7 configure the mail server in Linux, so that the all@example.com can become the mail alias of all users in the current Linux, the need to modify that file? C

A./etc/passwd

B./etc/mail/aliases

C./etc/aliases

D/etc/sendmail/aliases



8 when running the sendmail service in Linux, which configuration file must be loaded when sendmail is started? C

A./etc/mail/sendmail. mc

B./etc/sendmail. mc

C./etc/mail/sendmail. cf

D/etc/sendmail. cf



9 in Linux, how does access. db generate the configuration file of the Sendmail server? C

A. The newaccessdb command

B. Run newaccess hash access. db> access

C. Command maemap hash access. db <access

D command newaccess hash access. db <access



10 what is the role of Sendmail server configuration file access in Linux? C

A. It can be used to enter information about the local machine, including the domain name and host name.

B. Used for the user's email alias

C. Restrict email acceptance or rejection

D. Set the mail queue.



11 That email proxy is responsible for mail transmission and processing C

A. MUA

B. MDA

C. MTA

D MBA



12 what types of DNS resolution are there? A

A. 2

B. 3

C. 4

D 5



13. query whether a domain name is successfully resolved. Which command C can not be used?

A. dig

B. nslookup

C. traceroute

D host



14 what is the command for handling static routes in LINUX? A

A. route

B. ping

C. nslookup

D gw



15. If LINUX and WINDOWS machines coexist in a LAN, which of the following services cannot be used for file sharing between them? BD

A. ftp

B. nfs

C. samba

D cifs



16 can I edit the configuration file to reject emails from a domain? B

A. aliases

B. access

C. local-host-name

D sendmail. mc



17 what is the start character of the SOA record in the domain name resolution configuration file? D

A .&

B. $

C ..

D @



18 In the FTP Client Program, to upload local files to A remote computer, the command is

A. put

B. get

C. cp

D copy



19 what is the service program used by the TCP Wrappers mechanism? B

A. tcp_wrappers

B. tcpd

C. TCP/IP

D xinetd



20 in the apache configuration file, what is the command to define the directory for storing web files? C

A. ServerRoot

B. ServerAdmin

C. DocumentRoot

D Index



21. Company A intends to establish its own website, so it needs to apply for its own domain name. According to the rules, what should be the domain name assigned to Company A by the domain name management agency? A

A. a.com.cn

B. a.net.cn

C.a.org.cn

D.a.gov.cn



22. Which client cannot access samba to share resources? A

A. dos

B. winows 95

C. UNIX

D FreeBSD



23 what is the root domain in the domain name resolution system? B

A ./

B ..

C .@

D SOA



24 in Linux, what is the device name of the first Nic? B

A. ppp0

B. eth0

C. ppp1

D eth1



25 what commands can be used to log on to the vsftpd server over ftp by default? BC

A. root

B. anonymous

C. guest

D ftp



26 in Linux, which file can I view if I want to view the port number used by a network service? A

A./etc/services

B./etc/service

C./etc/protocol

D/etc/protocols



27 which file do I need to modify if the system does not use/etc/hosts for domain name resolution but only uses DNS (bind) for domain name resolution? A

A./etc/resolv. conf

B./etc/hosts

C./etc/hoss. conf

D/etc/nsswitch. conf



28 what should I do to enable the routing function in Linux in real time? A

A. echo 1>/proc/sys/net/ipv4/ip_forward

B. echo 1>/proc/sys/net/ipv4/ip_route

C. echo 0>/proc/sys/net/ipv4/ip_forward

D echo 0>/proc/sys/net/ipv4/ip_route



29 what records do I need to add if I want to set forward resolution When configuring the DNS service? A

A. SOA

B.

C. PTR

D CNAME



30. To set the client to dynamically obtain the IP address, what is the command used on the command line? B

A. dhcpd

B. dhclient

C. dhcpclient

D dhcprelay



31. Which of the following services can encrypt the material user name and password during network transmission for secure communication between two hosts? B

A. samba

B. https

C. ftp

D telnet



32 in Linux, there are two methods for domain name resolution, one is to use the bind program, and the other is to use the system configuration file. What is the configuration file? D

A./etc/resolv. conf

B./etc/bind. conf

C./etc/nsswitch. conf

D/etc/hosts



33 In the configuration file of the bind program, if A zone Segment contains the type = hint, the Domain Name Server belongs to

A. root server

B. master server

C. Backup Server

D. Forwarding Server



34. The macro processing language used to create the configuration file of sendmail is C.

A. perl

B .C

C. M4

D java



35 in the DHCP service, to bind an IP address to a host, you can specify it in the dhcpd. conf file. This command is C

A. subnet

B. group

C. host

D hostname



36. For ssh service, the server configuration file is B.

A./etc/ssh/ssh_config

B./etc/ssh/sshd_config

C./etc/sshd/ssh_config

D/etc/sshd/sshd_config



37. Which command can be used to test whether the samba server configuration file is correct? B

A. testsmb

B. testparm

C. smbtest

D sambatest



38. How many authentication methods can be used on the smaba server? ABCD

A. user

B. share

C. server

D domain



39 what identity should the client access the server in the system during anonymous access on the NFS server? D

A. nobody

B. anonymous

C. guest

D nfsnobody



40. In the samba server, if you want to publish shared directories to allow anonymous access, which of the following parameters should be added? C

A. browseable = yes

B. writable = yes

C. public = yes

D valid users = nobody



41 what is the configuration file for the tcp_wrappers server? BC

A./etc/hosts. conf

B./etc/hosts. allow

C./etc/hosts. deny

D/etc/hosts



42 Internet makes computers in different regions on the earth connect to each other and facilitate communication. However, it is difficult to maintain time synchronization during communication, because computers in different locations may not be accurate in terms of reference and setup time. To solve this problem, Professor David L. Mills of Drava University proposed (C) to ensure the time synchronization of computers in different regions through a series of error compensation.

A. SNMP

B. POP

C. NTP

D. NCTP



43 When squid is used as the proxy server, if another service in the local LAN uses the default listening port 3128 of squid, you need to change squid to listen to the proxy request on port 3130, you must modify the entry (A) of the squid configuration file.

A. http_port 3130

B. http_access 3130

C. http_accel_port 3130

D. lisen 3130



44 scp command can copy files between remote hosts. Analyze the following command: C

# Scp-p/usr/local/src/* cirr @ remotehost:/usr/local/src /*

The meaning of this command sequence is :(). "

A. copy the files in the remotehost/usr/local/src directory to the local device.

B. log on to the specified directory of the remote host remotehost.

C. copy the files in the specified local directory to the same directory on the remotehost host.

D. Copy files in the specified local directory to the same directory on the remotehost host, including subdirectories.



45. Figer's work involves the company's trade secrets. Therefore, he has an email address that needs to send and receive highly-encrypted files. Of course, these files are encrypted. But figer needs to be encrypted during the interaction of sending and receiving emails. Therefore, he installed the SSH software package on the mail server and locally. He first used the () command to generate an encrypted channel, you can use the local port 6867 to encrypt the sent mail, and then use a similar method to encrypt the received mail. B

A. ssh-L 25: mail.sec.com: 6867

B. ssh-f figer@mail.sec.com-L 6867: mail.sec.com: 25

C. ssh-f mail.sec.com-L 6867: mail.sec.com: 25: feiger

D. ssh-f figer@mail.sec.com-L 25: mail.sec.com: 6867



46. What should I do if I use the transparent proxy of the squid server to forcibly change the client's webpage access port to proxy port 3128? C

A. iptables? T nat? A postrouting? I eth0? P tcp -- dport 80? J MASQUERADE -- to-port 3128

B. iptables? T nat? A preroutgin? I eth0? P tcp -- dport 80? J MASQUERADE -- to-port 3128

C. iptables? T nat? A postrouting? I eth0? P tcp -- dport 80? J REDIRECT -- to-port 3128

D iptables? T nat? A prerouting? I eth0? P tcp -- dport 80? J REDIRECT -- to-port 3128



47. in a company's Lan, a Linux host has two NICs, the first of which has an external IP address 67.36.6.192, and the second has an internal IP address, the company's network management wants to set it as a gateway so that other machines inside the company can connect to the Internet through it. The feasible operation on the firewall is (CE ).

A. iptables-t nat-a routing-o eth0-j MASQUERADE

B. iptables-t nat-a prerouting-I eth0-j MASQUERADE

C. iptables-t nat-a postrouting-o eth0-j MASQUERADE

D. iptables-t nat-a postrouting-o eth1-j MASQUERADE

E. iptables-t nat-a postrouting-o eth0-j SNAT -- to 67.36.6.192



48. What chain can be used in the filter table in the Linux iptables command of kernel> 2.4.18? (ABC)

A. INPUT

B. OUTPUT

C. FORWARD

D. POSTROUTING

E. PREROUTING



49. What chain can be used in the NAT table in the Linux iptables command of kernel> 2.4.18? (DBE)

A. INPUT

B. OUTPUT

C. FORWARD

D. POSTROUTING

E. PREROUTING



50. What chain can be used in the mangle table in the Linux iptables command of kernel> 2.4.18? (ABCDE)

A. INPUT

B. OUTPUT

C. FORWARD

D. POSTROUTING

E. PREROUTING
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.