Which of the following statements would create a default route using a gateway of
A. netstat -add default gw
B. route default 192.168.1.1
C. ip route default 192.168.1.1
D. route add default gw 192.168.1.1
E. ifconfig default gw 192.168.1.1 eth0
Which of the following is the purpose of the dig command?
A. To adjust a directory’s hidden permissions
B. To search for files on the filesystem
C. To adjust a file’s hidden permissions
D. To perform hostname lookups
E. To ping all known hosts on the current subnet
Which of the following configuration files does sudo read when determining if a user is
permitted to run applications with root privileges?
The files in the /etc/skel directory are used by the:
A. pwconv command
B. pwunconv command
C. useradd command
D. passwd command
The protocol uses two (2) TCP/IP ports one of them being port 20 for data transfer?
(Please do not enter duplicate answers in this field.)
Which of the following statements about crontab are true? (Select TWO).
A. Every user may have their owncrontab.
B. Changing a crontab requires a reload/restart of the cron daemon.
C. The cron daemon reloads crontab files automatically when necessary.
D. hourly is the same as “0 * * * *”.
E. A cron daemon must run for each existing crontab.
Which of the following commands is used to deactivate a network interface?
Which of the following looks like a correct entry in the /etc/hosts file?
A. localhost 127.0.0.1 localhost.localdomain
B. localhost.localdomainlocalhost 127.0.0.1
C. localhostlocalhost.localdomain 127.0.0.1
D. 127.0.0.1 localhost.localdomainlocalhost
E. localhost.localdomain 127.0.0.1 localhost
Which of the following lines would an administrator find in the file /etc/resolv.conf?
B. 192.168.168.4 dns-server
C. hosts: files,dns
D. domain mycompany.com
Which of the following commands will provide locale-specific information about a system and its environment?
Which of the following should the permission settings be for /etc/passwd and /etc/shadow?
A. /etc/passwd: -rw-r–r– /etc/shadow: -r——–
B. /etc/passwd: -r——– /etc/shadow: -rw-r–r–
C. /etc/passwd: -rw-r–r– /etc/shadow: -rw-r–r–
D. /etc/passwd: -r——– /etc/shadow: -r——–}
Suppose that the command netstat -a hangs for a long time without producing output. An
administrator might suspect:
A. a problem with NFS
B. a problem with DNS
C. a problem with NIS
D. a problem with routing
E. that the netstat daemon has crashed
Which of the following describes the Linux ping packet or datagram?
A. IP packet with a packet type
B. ICMP packet with a message type
C. ICMP packet with a payload
D. UDP datagram with a protocol type
E. UDP datagram with a payload
Which of the following commands would an administrator use to create an OpenSSH
Which of the following Class B IPv4 networks are reserved by IANA for private address
assignment and private routing? (Select TWO).
The IP protocol is connectionless and unreliable? (Please enter only a single answer and
do not enter duplicate answers in this field.)
Which of the following commands can be used to activate a specific network interface?
What are the three sets of permissions for a file?
A. user, group, others
B. administrator, group, others
C. user, standard user, others
D. administrator, standard user, others
Which of the following commands will create an archive file, named backup.tar, containing all the files from the directory /home?
A. tar /home backup.tar
B. tar -cf /home backup.tar
C. tar -xf /home backup.tar
D. tar -xf backup.tar /home
E. tar -cf backup.tar /home
What command would you use to get comprehensive documentation about any command in Linux?
A. help command
B. echo command
C. locate command
D. man command
E. get command
Which command will display running process information in real time?
B. show current
C. ps current
What is the command to change the password of a user?
With which command can you determine the time of the last restart of a system?
A. current reboottime
B. find reboot
C. expect –reboot
D. last | reboot
E. last reboot