1.
John works as
a Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. He is working as a root user on the Linux operating
system. He wants to add a soft limit quota warning for the users, in which,
after exceeding the quota value, a user will receive e-mail warnings about
being over quotA. Which of the following commands will John use to accomplish his
task? Each correct answer represents a complete solution. Choose all that
apply.
A)
repquota
B)
quotaon
C)
warnquota
D)
edquota
E)
quotaoff
Answer: C,D
2.
Which of the
following commands will you run to list all files that have been modified
within the last 60 minutes?
A)
find /etc
-name *.txt
B)
find start
-dir -min -60
C)
find start
-dir -cmin -60
D)
find start
-cmin -60
Answer: C
3.
You
work as a System Administrator for McNeil Inc. The company has a Linux based
network. You are a root user on Red Hat operating system. You have upgraded the
amount of RAM in your system from 256 MB to 512 MB, but there is only 512 MB of
swap space. Therefore, you want to add more swap space to /dev/hdb2 hard drive
to run the applications that require a large amount of memory. Which of the
following commands should you run to accomplish this task? Each correct answer
represents a complete solution. Choose all that apply.
A)
mkswap
/dev/hdb2
B)
swapon
/dev/hdb2
C)
mount
D)
parted
Answer: A,B,D
4.
You work as a
Linux Technician for Tech Perfect Inc. The company has a Linux-based network .You
have configured a database server in the network. Users complain that the
server has become remarkably slow. However, the previous day, the server was
performing well. You know what some of the processes may be the cause of the
issue. You run the PS command on the server. In the result set, which
information will you look at that suggests the problematic process?
A)
A high load
average
B)
A high
process ID
C)
A low load
average
D)
A low CPU
time
E)
A high CPU
time
Answer: E
5.
You want only
the root access in a Linux computer for maintenance purposes. Which of the following
runlevels will you use to boot the computer?
A)
2
B)
0
C)
1
D)
3
Answer: C
6.
Which of the
following commands can be used to compress a file? Each correct answer
represents a complete solution. Choose all that apply.
A)
gzip
B)
compress
C)
tar
D)
zip
Answer: A,B,D
7.
You work as a
Network Administrator for Rick Inc. The company has a Linux-based network. You are
configuring a Linux server. Which of the following boot loaders does not
require to be rewritten after the configuration of the kernel has been changed?
A)
GRUB
B)
BOOTP
C)
LILO
D)
ELILO
Answer: A
8.
Which of the
following fsck commands will you use to check all filesystems listed in
/etc/fstab?
A)
fsck -P
B)
fsck -f
C)
fsck -A
D)
fsck -y
Answer: C
9.
After
enabling shadowed passwords in a Linux server, where does Linux keep the
passwords?
A)
/usr/shadow
B)
/etc/passwd
C)
/usr/passwd
D)
/etc/shadow
Answer: D
10.
You
work as a Software Engineer for McNiel Inc. The company has a Linux-based
network. The company has 150 Engineers. The root user has configured quota
limits for each user. You want to view quota limits for your system. Which of
the following commands will you use to accomplish this task?
A)
repquota
-a
B)
quota
-v
C)
quotacheck
D)
edquota
Answer: B
11. Which of the following commands is used to create a
user account for a new user?
A)
USERMOD
B)
MOUNT
C)
USERADD
D)
CRUSER
Answer: C
12. You work as a Network Administrator for Tech
Perfect Inc. The company has a Linux-based network. You are configuring a
server that will be used as a file server. You want to install an RPM package,
named FILELOCATOR, on the server. You want to check whether the package is already
installed. Which of the following commands will you use?
A)
grep
FILELOCATOR
B)
find -q rpm
|grep FILELOCATOR
C)
rpm -qa |
grep FILELOCATOR
D)
find
FILELOCATOR
Answer: C
13.
By
default, which of the following commands configures the current run level?
A)
chkconfig
B)
pstree
C)
service
D)
ntsysv
Answer: D
14. When installing RHEL in the graphical interface,
which of the following switches can be used to specify a resolution?
A)
lowers
B)
vnc
C)
resolution
D)
skipddc
Answer: C
15. You work as a Network Administrator for Net World
International. The company has a Linux-based network. You want to upgrade an
RPM package and get the status during the upgrade. Which of the following
commands will you use to accomplish the task?
A)
A. rpm -ivh
B)
B. rpm -evh
C)
C. rpm -qvh
D)
D. rpm -Uvh
Answer: D
16.
John
works as a Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. John is working as a root user on the Linux operating
system. He wants to run the cc process at runlevel three. If the order of
execution of cc command is 43, which of the following commands will John use to
accomplish his task?
A)
ln
-s /etc/init.d/cc /etc/rc.d/rc3.d/K43cc
B)
ln
-s /etc/rc.d/init.d/cc /etc/rc.d/rc3.d/K43cc
C)
ln
-s /etc/rc.d/cc /etc/rc.d/rc3.d/s43cc
D)
ln
-s /etc/rc.d/init.d/cc /etc/rc.d/rc3.d/S43cc
Answer: D
17. Which of the following commands displays a module
name or filename and associated information, such as the authors name, license,
description, module version, dependencies, parameters, etc?
A)
modprobe
B)
lsmod
C)
modprob
D)
modinfo
Answer: D
18. After creating the swap area, which of the
following commands will you need to run to start using it?
A)
mkswap
B)
mkfs
C)
swapon
D)
swapoff
Answer: C
19. You work as a Network Administrator for Secure Web
Inc. The company has a Linux-based network. The network has a mixed set of
client operating systems. You want to format a new hard disk drive. The drive
will have only one partition. Both the Linux and Windows operating systems will
access the partition. Which of the following file systems will you use?
A)
VFAT
B)
XFS
C)
REISER
D)
EXT3
Answer: A
20. What is the minimum RAM requirement for installing
Red Hat in GUI mode?
A)
1GB
B)
512 MB
C)
128MB
D)
64MB
Answer: C
21. Which of the following commands can be used to
modify kernel parameters at
runtime?
A)
sync
B)
sysctl
C)
mkinitrd
D)
lsdev
Answer: B
22.
You
want to verify the PGP signature of all headers and signatures associated with
an RPM package. Which of the following commands will you use to accomplish the
task? Each correct answer represents a complete solution. Choose all that
apply.
A)
rpm
-e
B)
rpm
-K
C)
rpm
--checksig
D)
rpm
-V
Answer: B,C,D
23. Which of following options will you use to force
mtr to display numeric IP numbers and not try to resolve the host names?
A)
-t
B)
-n
C)
-l
D)
-p
Answer: B
24. Which of the following statements are true about
kernel modules? Each correct answer
represents a complete solution. Choose all that apply.
A)
Kernel
modules do not support executable loaders.
B)
The kernel
module contains extra kernel codes that may be loaded after the loading of the
base kernel. Only a minimal resident kernel is loaded into memory at boot time.
C)
Kernel
modules do not support the device drivers, network drivers, and file system drivers.
D)
Whenever a
user requests a feature that is not present in the resident kernel, a kernel
module is dynamically loaded into memory.
Answer: B,D
25. You want to temporarily change your primary group
to another group of which you are a member. In this process, a new shell will
be created, and when you exit the shell, your previous group will be
reinstated. Which of the following commands will you use to accomplish this
task?
A)
chgrp
B)
newgrp
C)
chmod
D)
chown
Answer: B
26. You want to make Rick an owner of the files
TRADE1.TXT and TRDREPORT.TXT. Which of the following commands will you use to
accomplish this?
A)
chown rick
TRADE1.TXT TRDREPORT.TXT
B)
chgrp rick
TRADE1.TXT + TRDREPORT.TXT
C)
chown rick
TRADE1.TXT + TRDREPORT.TXT
D)
chgrp rick
TRADE1.TXT TRDREPORT.TXT
Answer: A
27.
You
work as a Network Administrator for McNeil Inc. The company has a Linux-based
network. You are a root user on the Linux system. You have to create a user
named Trinity and deny interactive login. Which of the following should you use
to accomplish the task? Each correct answer represents a part of the solution.
Choose all that apply.
A)
vi
/etc/passwd
B)
vi
/etc/shadow
C)
useradd
Trinity
D)
passwd
Trinity
E)
Trinity:x:505:505::/home/Trinity:/sbin/nonlogin
Answer: A,B,C,D,E
28. Which of the following commands can be used to
check the errors of the ext2 and ext3 file systems? Each correct answer
represents a complete solution. Choose two.
A)
fsck --ext2
B)
fsck.ext3
C)
fsck --ext3
D)
e2fsck
Answer: B,D
29. Which of the following statements is true about
fdisk command?
A)
It is used to
build a Linux file system on a device, usually a hard disk partition.
B)
It is used to
create, change, delete, or display current partitions on the hard disk.
C)
It is used to
check and optionally repair one or more Linux file systems.
D)
It displays
or changes thefilesystem label on the ext2 filesystem located on device.
Answer: B
30.
You
have recently been appointed as a Network Administrator for Rick International
Inc. The company has a Linux-based network. You have to print an important file
named secure.txt urgently. You therefore want to know what printers are
currently configured on your computer and how you can connect to them. Which of
the following commands will you use to accomplish the task?
A)
lpstat
-s
B)
lpstat
-d
C)
lpr
D)
lpstat
-p
Answer: A
31. You want to uninstall an rpm package foo without
verifying its dependencies. Which of the following commands will you use?
A)
rpm --erase
--allmatches
B)
rpm -e
--allmatches
C)
rpm -e
--noscript
D)
rpm -e
--nodeps
Answer: D
32. During the boot process of a Linux computer, which
of the following daemons is called after the kernel is loaded?
A)
LPD
B)
TELNETD
C)
INIT
D)
RLOGIND
Answer: C
33.
You
work as a Network Administrator for McNeil Inc. The company has a Linux-based
network. You have just created a directory named Sales on a file server. David,
a Sales Manager, has to use this directory to keep sales reports. David reports
that he is unable to save his reports in the directory. When you list the
directory using the LS command, you get the following result: drwxr-xrx 2 root
root 2048 Jan 2 2006 Sales What is the most likely cause?
A)
The
Sales directory is not properly mounted.
B)
David
is working on his local computer's login.
C)
The
Sales directory has been deleted by accident.
D)
David
does not have the Write permission on the directory.
Answer: D
34. You want to shrink a Logical Volume manager
partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands
can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that
apply.
A)
lvreduce
B)
resize2fs
C)
lvsize
D)
reduce2fs
Answer: A,B
35. John works as a Network Administrator for Perfect
Solutions Inc. The company has a Linux-based network. Due to some network
security reasons, John wants to shut down all network interfaces just before
rebooting the Linux server. Which of the following commands will he use to
accomplish the task?
A)
init 3
B)
init 6
C)
init 0
D)
shutdown -r
now
E)
reboot -i
Answer: E
36.
You
work as a Network Administrator for Tech World Inc. The company has a
Linux-based network. The permissions on a file named Report are shown below:
rwxr--r- You want to add a sticky bit to the file.
Which of the following commands will you use?
A)
chmod
2744 report
B)
chmod
1744 report
C)
chmod
7744 report
D)
chmod
4744 report
Answer: B
37. Which of the following statements is true about
Linux kernel? Each correct answer represents a complete solution. Choose all
that apply.
A)
It constitutes
the core part of the Linux operating system.
B)
It detects
hardware resources and boots up the system.
C)
It allocates
memory on behalf of running process.
D)
It does not
verify firewall rules
Answer: A,B,C
38. Which of the following commands is used to make a
swap active after creating a new SWAP partition?
A)
mkswap
B)
swapon
C)
fdisk
D)
mkfs
Answer: A
39. In a Linux computer, which of the following files
defines run levels for the processes to be started up during boot up?
A)
/etc/inittab
B)
/etc/syslog.conf
C)
/etc/lilo.conf
D)
/etc/runlevel
Answer: A
40. You work as a Network Administrator for Perfect
Solutions Inc. The company has a Linux-based network. You have to create user
accounts for four new Management Trainees. You also have to create a group
named MT and provide membership of this group to the new user accounts. How will
you accomplish this?
A)
Use the
ADDUSER command to create new user accounts and the MT group. Add the users account
to the group.
B)
Use the
USERADD command to create new user accounts and the MT group. Add the user
accounts to the group.
C)
Use the
GROUPADD command to create the MT group. Use the USERADD command to create the
user accounts and provide them the membership of the MT group.
D)
Use the
ADDGROUP command to create the MT group. Use the ADDUSER command to create the
user accounts and provide them the membership of the MT group.
Answer: C
41. John works as a Network Administrator for Perfect
Solutions Inc. The company has a Linux-based network. John is working as a root
user on the Linux operating system. He wants to check the errors of an ext2
filesystem. Which of the following commands can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
A)
e2fsck
B)
fsck
C)
fsck -N
D)
fsck.ext2
Answer: A,B,D
42.
You
work as a Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. You have received an error on your Linux server stating
that the superblock is damaged.\ Which of the following commands will you use
to resolve the issue?
A)
mount
B)
e2fsck
C)
fsck
D)
mkfs
Answer: B
43. You work as a Network Administrator for Mac World
Inc. The company has a Linux-based network. Your Linux computer turns off
because of power outage. The UPS was unable to provide backup power. Which of
the following utilities will run automatically during the next boot to scan the
hard disk for the possibility of file system damage?
A)
mkfs
B)
mount
C)
scanfs
D)
fsck
Answer: D
44. Which of the following files is used to view the
current status of RAID devices in Linux?
A)
/proc/mdstat
B)
/proc/stat
C)
/proc/meminfo
D)
/proc/mounts
Answer: A
45. 45.Which of the following network protocols are used
by the dhclient command to configure the IP addresses of computers on the network?
A)
Thedhclient
command does not use any protocol. It statically assigns the address to the network
computers.
B)
RARP and DHCP
C)
BOOTP and
DHCP
D)
BOOTP and
RARP
Answer: C
46. You work as a system administrator for Tech Perfect
Inc. The company has a Linux-based network. You are a root user on the Linux
operating system. A user, Jetson, wants to view the speed and the duplex for
his Ethernet card. His ethernet card is activated on interface eth0. Which of
the following commands can you use to accomplish this task?
A)
ifup eth0
B)
ifconfig eth0
C)
ip link show
eth0
D)
sudo ethtool
eth0
Answer: D
47. Which of the following files are used to activate
disk quotas on a file system?
Each correct answer represents a complete solution. Choose all that
apply.
A)
quotA.group
B)
quotA.user
C)
quotaon
D)
.quotaon
Answer: A,B
48. You work as a Network Administrator for Perfect
Solutions Inc. You are required to configure a hard disk for a Linux
workstation. You are using the FDISK utility to configure it. Which of the following
options will you use to show all the existing partitions of the hard disk?
A)
n
B)
w
C)
1
D)
p
Answer: D
49. John works as a Network Administrator for Perfect
Solutions Inc. The company has a Linux-based network. John is working as a root
user on the Linux operating system. He wants to print a file named print.txt.
Which of the following commands can John use to accomplish the task? Each correct
answer represents a complete solution. Choose all that apply.
A)
lpr
B)
lprm
C)
lp
D)
a2ps
Answer: A,C
50. Which of the following run levels is used to boot a
Linux computer in graphical user interface (GUI) mode?
A)
3
B)
7
C)
5
D)
9
Answer: C
51. Which of the following commands are used to remove
a package from a Linux system? Each correct answer represents a complete
solution. Choose two.
A)
yum -rm
packagename
B)
yum erasepackagename
C)
yum
-rpackagename
D)
yum
removepackagename
Answer: B,D
52.
You
work as the Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. You are a root user on the Red Hat operating system. You
want to view all files with a size of over 50 megabytes on your system. Which
of the following commands should you use to accomplish the task?
A)
find
size +50M
B)
find
-size 50M
C)
find
-size -50M
D)
find
-size +50M
Answer: D
53. John works as a Network Administrator for Perfect
Solutions Inc. The company has a Linux-based network. John is working as a root
user on the Linux operating system. He wants to change the group membership of
the file foo to group bar. Which of the following commands will he use to accomplish
the task?
A)
chgrp bar foo
B)
chgroup foo
bar
C)
chgrp foo bar
D)
chgroup bar
foo
Answer: A
54. Which of the following files lists the file systems
to be mounted automatically at startup?
A)
/etc/mtab
B)
/dev/fstab
C)
/etc/fstab
D)
/dev/mtab
Answer: C
55.
Which
of the following commands is used to mount file systems?
A)
detach
B)
mount
C)
umount
D)
attach
Answer: B
56. What command will you use to find the current
runlevel of an active Linux session?
A)
runlevel
B)
init
C)
rlevel
D)
ls
/etc/runlevel
Answer: A
57. Which of the following files contains the names and
locations of system log files?
A)
/etc/lilo.conf
B)
/usr/syslog.conf
C)
/etc/syslog.conf
D)
/usr/lilo.conf
Answer: C
58. Which of the following utilities is used to set ACL
for files and directories?
A)
enable acl
B)
setacl
C)
setfacl
D)
getfacl
Answer: C
59. You work as a Network Administrator for Perfect
Solutions Inc. The company has a Linux-based network. A user complains that his
Linux computer gets rebooted occasionally. Which of the following files will
provide you the required information to troubleshoot the issue?
A)
/var/log/wtmp
B)
/var/log/dmesg
C)
/var/log/bootmsg
D)
/var/log/messages
Answer: D
60. You work as a Network Administrator for Net World
Inc. The company has a Linux-based network. You want to mount an SMBFS share
from a Linux workstation. Which of the following commands can you use to
accomplish the task? Each correct answer represents a complete solution. Choose
two.
A)
smbmount
B)
smbfsmount
C)
mount smb
D)
mount -tsmbfs
Answer: A,D
61. You work as a Network Administrator for McNeil Inc.
The company has a Linux-based network. You want to know the ownership of the
/etc/inittab file. Which of the following commands will you use to accomplish
the task?
A)
rpm -e
/etc/inittab
B)
rpm -i
/etc/inittab
C)
rpm -qa
/etc/inittab
D)
rpm -qf
/etc/inittab
Answer: D
62.
Which
of the following files is used to initialize a computer-wide environment on a
Linux computer?
A)
/etc/group
B)
/etc/profile
C)
/etc/syslog.conf
D)
/etc/startup
Answer: B
63. Which of the following commands helps an
administrator to switch a Linux server to different run levels without
rebooting the server?
A)
su
B)
cngrl
C)
mount
D)
init
Answer: D
64. You work as a Network Administrator for World
Perfect Inc. The company has a Linux-based network. You have configured a Linux
Web server on the network. A user complains that the Web server is not
responding to requests. The process list on the server shows multiple instances
of the HTTPD process. You are required to stop the Web service. Which of the
following commands will you use to resolve the issue?
A)
stophttpd
B)
stopall httpd
C)
kill httpd
D)
killall httpd
Answer: D
65.
John
works as a Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. John is working as a root user on the Linux operating
system. He wants to get the status of the modules currently loaded in the
kernel. Which of the following commands will John use to accomplish his task? Each
correct answer represents a complete solution. Choose all that apply.
A)
locate
B)
lsmod
C)
cat
/proc/modules
D)
ls
/proc
Answer: B,C
66. Which of the following commands or command flags
can be used to list the installed services and their associated runlevels?
A)
config
B)
xconfig
C)
menuconfig
D)
chkconfig
Answer: D
67. Which of the following commands is used to list all
contents of a superblock of a partition?
A)
tune2fs -c
B)
tune2fs -f
C)
tune2fs -l
D)
tune2fs -j
Answer: C
68.
You
work as a Network Administrator for Tech World Inc. The company has a
Linux-based network. You have installed a video card in your Linux workstation.
Which of the following will you require in order to configure X?
A)
etc/videoconf
B)
root/videoconf
C)
root/x11/xf86config
D)
etc/x11/xf86config
Answer: D
69. John works as a Network Administrator for
We-are-Secure Inc. The company uses a Linux server.
John wants to give the following file permissions to the imp.c file:
l Read, Write, and Execute permissions to the owner
l Read and Write permissions to groups
l Read Only permissions to other users
Which of the following commands will John use to accomplish the task?
A)
chmod 765
B)
chmod 777
C)
chmod 712
D)
chmod 764
Answer: D
70. Which of the following commands can be used to
overwrite an existing kernel image file?
A)
mkinitrd -v
B)
mkinitrd
--preload
C)
mkinitrd
--builtin
D)
mkinitrd -f
Answer: D