Question 1
Question
Where would you look for an error message from an installed daemon in Linux?
Answer
-
/etc
-
/usr/sbin
-
/etc/susconfig
-
/var/log/messages
Question 2
Question
Your Windows server is having a problem and you want to find out if there have been any driver failures. Which Windows event viewer log would you check?
Answer
-
Application Log
-
Security LOG
-
System Log
-
Forward Events Log
Question 3
Question
Before you acivated your Windows server with the slmgr command you entered the key..... what does that do?
Answer
-
Sets the IP address of the key manager
-
Puts the server in client mode for activation
-
installs the key management service
-
sends the activation mode key to KMS
Question 4
Question
To make changes to SELinux that would persist through a system reboot you must edit which file?
Answer
-
/etc/selinux
-
/etc/selinux/config
-
/bin/selinux
-
/var/log/selinux
Question 5
Question
_____________ services are used to guarantee that only one process can write to a file at a time.
Question 6
Question
Because local and remote filesystems can have different paths and names, NFS uses, _______________ to refer to files.
Answer
-
filehandles
-
PIDs
-
XDR numbers
-
RPC ports
Question 7
Question
A communications protocol that does not require the server to retain session information and treats each transaction as unique and independ is called ____________.
Answer
-
independent
-
stateless
-
remote procedure call
-
PAM
Question 8
Question
Which of the following best describes the function of the portmapper daemon?
Answer
-
maps XDR program numbers to the TCP/IP ports
-
maps XDR program numbers to the RPC ports
-
maps RPC program numbers to the TCP/IP ports
-
maps NFS program numbers to the TCP/IP ports
Question 9
Question
During an FTP session the data connection is opened _____________.
Question 10
Question
One of the biggest differences between FTP and NFS is that NFS is ___________ to the users and FTP is not.
Answer
-
faster
-
more secure
-
transparent
-
more efiicient
Question 11
Question
Which of the following would not be a normal use of the FTP protocol?
Answer
-
browse directories
-
make directories
-
copy multiple files
-
run programs
Question 12
Question
Which of the following would you be a good use of anonymous FTP?
Question 13
Question
PAM is a standard method of providing secure authentication services within the UNIX environment. It acts as the interface between the [blank_start]software[blank_end] and the underlying [blank_start]authentication[blank_end] methods.
Question 14
Question
What are five things you must consider when choosing and configuring a file transfer service?
F[blank_start]unction[blank_end]
I[blank_start]nteroperability[blank_end]
N[blank_start]etwork[blank_end]
S[blank_start]ecurity[blank_end]
F[blank_start]ailure[blank_end] R[blank_start]ecovery[blank_end]
T[blank_start]ransparency[blank_end]
P[blank_start]erformance[blank_end]
Answer
-
unction
-
nteroperability
-
etwork
-
ecurity
-
ailure
-
ecovery
-
ransparency
-
erformance