Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

ITEC3123 - System and Network Administration

MCQ’s

 When we install a new package in Linux system, then _______


a) All the files of the packages are installed in a single directory
b) Different files are installed at different locations of the file system
c) Package works just after extraction, installation is not required
d) None of the above

 Host specific configuration files are installed in _____


a) /etc directory
b) /lib directory
c) /root directory
d) /bin directory

 The directory /media is the _______


a) Mount point for removable media
b) Mount point for filesystem
c) Mount point for removable media & filesystem
d) None of the above
 What is /bin/sh?
a) bourne shell
b) hard or symbolic link to the real shell command
c) bash shell
d) both bash shell and bourne shell

 The /boot directory stores the data that is used ______


a) Before the kernel begins executing user mode programs
b) After the kernel begins executing user mode programs
c) Before the bootloader is loaded in the RAM
d) None of the above

 Which one of the directories does not contain binary files?


a) /bin
b) /sbin
c) /etc
d) None of the above

 Kernel modules are present in _________


a) /lib directory
b) /root directory
c) /boot directory
d) None of the above
 The directory /opt is reserved for ________
a) Installation of add-on application software packages
b) Optional booting files
c) Optional user specific files
d) None of the above

 The directory /srv contains ________


a) Site-specific data which is served by the system
b) All the system files
c) All the service files provided by the specific user
d) None of the above

 Any file or directory present in the _________ directory may not be reserved
between the invocation of the program.
a) /var
b) /tmp
c) /etc
d) All of the above

 Which one of the following statements is not true?


a) vim editor is the improved version of vi editor
b) vi editor commands are not case sensitive
c) vi editor has two modes of operation: command mode and insert mode
d) vi stands for visual editor
 Which command is used to close vi editor?
a) q
b) wq
c) q and wq
d) None of the above

 In vi editor, the key combination CTRL + F __________


a) Moves screen down one page
b) Moves screen up one page
c) Moves screen up one line
d) Moves screen down one line

 Which vi editor command copies the current line of the file?


a) yy
b) yw
c) yc
d) None of the above

 Which command is used to delete the character before the cursor location in
vi editor?
a) X
b) x
c) D
d) d
 Which one of the following statements is true?
a) auto indentation is not possible in vi editor
b) auto indentation can be set using the command :set ai
c) auto indentation can be set using the command :set noai
d) auto indentation is set by default in vi editor

 Which command searches the string in file opened in vi editor?


a) / or ?
b) f or F
c) t or T
d) None of the above

 In vi editor, which command reads the content of another file?


a) read
b) r
c) ex
d) None of the above

 Which command shows all the abbreviations in vi editor?


a) ab
b) abb
c) show
d) None of the above
 Which command sets the number for all lines?
a) :set li
b) :set ln
c) :set nu
d) :set nl

 User’s Primary Group id is listed in which file, at the time of creation of the
user (on a standard UNIX system)?
a) /etc/passwd
b) /etc/groups
c) /etc/login
d) /etc/profile

 The encrypted password of a user is stored in _______


a) /etc/shadow
b) /etc/enpasswwd
c) /etc/.passwd
d) /etc/passwd

 A user can change the default log-in shell using ______


a) chmod
b) chsh
c) rmsh
d) tchsh
 Which of the following identifiers associated with a process decide its
privilege level?
a) uid
b) suid
c) euid
d) gid

 The /etc/passwd file does not contain ________


a) userid
b) home directory for a user
c) login shell name
d) None of the above

 User id 0 is _____
a) An invalid user id
b) The id of the root user
c) The id of a user when the user’s account is deleted
d) None of the above

 The login shell is _____________


a) The shell program that runs when the user logs in
b) The shell program that authenticates the user while logging in
c) Common shell for all the users that belong to the same group
d) None of the above
 Which of the following command can be used to change the user password?
a) user can’t change the password
b) passwd
c) passd
d) pwd

 What does the following command do?


who | wc -l
a) List the number of users logged in
b) List the users
c) List the number of users in the system
d) Display the content of who command

 By default, a Linux user falls under which group?


a) staff
b) others
c) same as userid (UPG)
d) system

 When you use the ln command, which of the following occurs?


a) a file is created that points to an existing file
b) a file is created that is a copy of an existing file
c) a file is moved from one location to another
d) a file is renamed
 srwxr-xrw- is a ________
a) Internet socket file
b) Unix domain socket file
c) Symbolic link
d) Shared file

 Binary or executable files are _________


a) Regular files
b) Device files
c) Special files
d) Directory files

 The directory file contains __________


a) File names & File sizes
b) File names & Inode Numbers
c) File names & Address
d) File names & Permissions

 Which of the following is not a valid file type on Linux?


a) Socket
b) Softlink
c) Indoe
d) FIFO
 Which of the following is not correct statement regarding file types?
a) Hard links share same inode number
b) Soft links cannot be created across partitions
c) Socket files are Unix domain sockets
d) Character file is a special file

 What are the two types of device files?


a) Character & Block
b) Character & Socket
c) Block & FIFO
d) Input & Output

 Which is an example for character special file?


a) Hard disk
b) CD-ROM
c) Terminal
d) Memory

 Which is an example for block special file?


a) Virtual Terminal
b) CD-ROM
c) Terminal
d) Serial Modem
 Which of the following is not a valid run-level?
a) S
b) 0
c) 8
d) 1

 On Linux, initrd is a file ________


a) Containing root file-system required during bootup
b) Contains only scripts to be executed during bootup
c) Contains root-file system and drivers required to be preloaded during bootup
d) None of the above

 The process of starting up a computer is known as _________


a) Boot Loading
b) Boot Record
c) Boot Strapping
d) Booting

 Boot Strapping is also known as ___________


a) Quick Boot
b) Cold Boot
c) Hot Boot
d) Fast Boot
 The shell used for single user mode shell is _________
a) bash
b) csh
c) ksh
d) sh

 Single user mode shell runs as ____________


a) Admin user
b) Root user
c) Normal user
d) Log user

 Which is the only partition mounted in single user mode?


a) boot
b) usr
c) root
d) tmp

 Which daemon manages the physical memory by moving process from


physical memory to swap space when more physical memory is needed.
a) Sched daemon
b) Swap daemon
c) Init daemon
d) Process daemon
 At the end of kernel bootstrap, which process is started?
a) /etc/init
b) /etc/sched
c) /etc/swap
d) /etc/kernel

 The process id of init process is ________


a) -1
b) 0
c) 1
d) 2

 We can change the priority of a running process using ________


a) nice
b) renice
c) priority cannot be changed for a running process
d) only superuser can change the priority

 Which command is used to bring the background process to foreground?


a) bg
b) fg
c) background
d) foreground
 The signal sent to a process when the Ctrl-C key is pressed is _______
a) KILL
b) TSTP
c) TERM
d) INT

 Performance management is closely related to _________


a) Proactive Fault Management
b) Fault Management
c) Reactive Fault Management
d) Preventive Fault Management

 Configuration management can be divided into two subsystems:


reconfiguration and __________
a) Documentation
b) Information
c) Servers
d) Entity

 In Network Management System, the term that is responsible for controlling


access to network based on predefined policy is called ___________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
 Control of users’ access to network resources through charges is the main
responsibility of ______________
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management

 Which of the following networks supports pipelining effect?


a) Circuit-switched network
b) Message-switched network
c) Packet-switched network
d) Stream-switched network

 DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69

 DHCP client and servers on the same subnet communicate via _________
a) UDP broadcast
b) UDP unicast
c) TCP broadcast
d) TCP unicast
 After obtaining the IP address, to prevent the IP conflict the client may use
_________
a) Internet relay chat
b) Broader gateway protocol
c) Address resolution protocol
d) None of the above

 What is DHCP snooping?


a) Techniques applied to ensure the security of an existing DHCP infrastructure
b) Encryption of the DHCP server requests
c) Algorithm for DHCP
d) None of the above

 A DNS client is called _________


a) DNS updater
b) DNS resolver
c) DNS handler
d) None of the above

 DNS database contains _________


a) Name server records
b) Hostname-to-address records
c) Hostname aliases
d) All of the above
 The domain name system is maintained by _______
a) Distributed database system
b) A single server
c) A single computer
d) None of the above

 Which one of the following is not true?


a) Multiple hostnames may correspond to a single IP address
b) A single hostname may correspond to many IP addresses
c) A single hostname may correspond to a single IP address
d) None of the above

 Wildcard domain names start with label _______


a) @
b) *
c) &
d) #

 How many types of groups are available in Active Directory?


a) 2
b) 3
c) 4
d) 5
 There are _____ group scopes in Active Directory?
a) 0
b) 1
c) 2
d) 3

 Which of the following is not one of the four divisions or container


structures in Active Directory?
a) Webs
b) Forests
c) Domain
d) Sites

 Active Directory is a technology created by __________


a) Microsoft
b) IBM
c) Google
d) Amazon

 The full form of ACL is __________


a) Access Configure List
b) All Caps List
c) Access Control List
d) All of the Above
 Active Directory and a Windows-based file server are not required to
implement ________ on client Windows computers.
a) Windows 2000
b) Internet Explorer
c) Windows Registry
d) Roaming user profile

 Which of the following MMC is used to transfer the domain naming master
operations role?
a) Active Directory Schema
b) Active Directory FSMO Transfers
c) Active Directory Domains and Trusts
d) Active Directory Users and Companions

 Which of the following tab is used to enable or disable a printer for sharing
as well as to specify the name of the share?
a) General
b) Sharing
c) Location
d) Advanced

 What command can you type to perform a system state backup?


a) wbadmin start statebackup
b) wbadmin start sysstatebackup
c) wbadmin start systemstatebackup
d) wbadmin begin systemstatebackup
 Which of the following ports are used by Active Directory?
a) Port 135 TCP, UDP
b) Port 137 TCP, UDP
c) Port 636 TCP
d) All of the Above

 Major Components of Active Directory are ___________


a) Tree
b) Site
c) Domain
d) All of the Above

 Active directory was introduced in ________


a) 1996
b) 1997
c) 1998
d) None of the Above

 Active Directory uses _________


a) DNS
b) Microsoft’s version of Kerberos
c) Lightweight Directory Access Protocol
d) All of the Above
 Microsoft Active Directory management tools includes ______
a) Active Directory Sites and Services
b) Active Directory Domains and Trusts
c) Active Directory Users and Computers
d) All of the Above

 Active Directory Services consist of _________


a) Domain Services
b) Certificate Services
c) Federation Services
d) All of the Above

 Active Directory does not contain ______


a) Contact number
b) Email address
c) Portal Profile
d) All of the Above

 What is the primary objective of cluster design in Parallel and Distributed


Computing?
a) To increase system complexity
b) To minimize hardware diversity
c) To achieve high performance and efficiency
d) To ignore user interfaces
 Load balancing in cluster design involves:
a) Distributing computational tasks evenly
b) Ignoring system loads
c) Reducing interconnectivity
d) Allocating resources randomly

 Fault Tolerance in cluster design is concerned with:


a) Enhancing user experience
b) Ensuring system reliability
c) Minimizing hardware costs
d) Reducing computational tasks

 Scalability in cluster design refers to the ability to:


a) Minimize hardware diversity
b) Handle increasing workloads
c) Ignore system complexity
d) Reduce computational efficiency

 The role of Interconnectivity in cluster design is to:


a) Break down computational tasks
b) Isolate cluster nodes
c) Design efficient communication channels between nodes
d) Increase hardware costs
 Parallelism in cluster computing involves:
a) Breaking down computational tasks
b) Handling only sequential processing
c) Ignoring task distribution
d) Minimizing hardware diversity

 Heterogeneity in cluster design refers to:


a) Ignoring hardware diversity
b) Reducing system complexity
c) Minimizing task distribution
d) Optimizing performance across varied components

 The concept of Single System Image (SSI) in cluster design is related to:
a) Ensuring system reliability
b) Assigning computational tasks to cluster nodes
c) Making the cluster appear unified to users
d) Ignoring user interfaces

 The significance of Task Scheduling in cluster design is:


a. Randomly allocating resources
b. Ignoring load balancing
c. Assigning computational tasks to cluster nodes efficiently
d. Minimizing user interfaces
 The trade-off between Cost and Performance in cluster design involves:
a. Balancing hardware costs and performance
b. Ignoring system loads
c. Minimizing user experience
d. Reducing system complexity

You might also like