Q1. - (Topic 5)
What is the purpose of the nsswitch.conf file?
A. It is used to configure where the C library looks for system information such as host names and user passwords.
B. It is used to configure network protocol port numbers such as for HTTP or SMTP.
C. It is used to configure LDAP authentication services for the local system.
D. It is used to configure which network services will be turned on during the next system boot.
Answer: A
Q2. - (Topic 2)
What is the purpose of a screen reader?
A. It reads text displayed on the screen to blind or visually impaired people.
B. It reads the parameters of the attached monitors and creates an appropriate X11 configuration.
C. It displays lines and markers to help people use speed reading techniques.
D. It manages and displays files that contain e-books.
Answer: A
Q3. - (Topic 1)
Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?
A. SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;
B. SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;
C. COUNT(SELECT order_type FROM orders);
D. SELECT COUNT(*) FROM orders ORDER BY order_type;
E. SELECT AUTO_COUNT FROM orders COUNT order_type;
Answer: B
Q4. CORRECT TEXT - (Topic 6)
On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)
Answer: /etc/shadow
Q5. CORRECT TEXT - (Topic 5)
Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?
Answer: files
Q6. - (Topic 4)
What is the purpose of the command mailq?
A. It fetches new emails from a remote server using POP3 or IMAP.
B. It is a multi-user mailing list manager.
C. It is a proprietary tool contained only in the qmail MTA.
D. It queries the mail queue of the local MTA.
E. It is a command-line based tool for reading and writing emails.
Answer: D
Q7. - (Topic 6)
Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?
A. core
B. edquota
C. ulimit
D. quota
Answer: C
Q8. - (Topic 4)
Which of the following commands is used to rotate, compress, and mail system logs?
A. rotatelog
B. striplog
C. syslogd --rotate
D. logrotate
E. logger
Answer: D
Q9. - (Topic 5)
Which of the following programs can be used to determine the routing path to a given destination?
A. dig
B. netstat
C. ping
D. route
E. traceroute
Answer: E
Q10. - (Topic 6)
What is a purpose of an SSH host key?
A. It must be sent by any SSH client in addition to a user key in order to identify the client's host.
B. It provides the server's identity information to connecting SSH clients.
C. It is the root key by which all user SSH keys must be signed.
D. It authenticates any user that logs into a remote machine from the key's host.
E. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
Answer: B
Q11. CORRECT TEXT - (Topic 6)
The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.)
Answer: /etc/nologin
Q12. - (Topic 4)
What is true about the ntpdate command?
A. It is the primary management command for the NTP time server.
B. It updates the local system's date (i.e. day, month and year) but not the time (i.e. hours, minutes,seconds).
C. It queries one or more NTP time servers and adjusts the system time accordingly.
D. It sends the local system time to one or many remote NTP time servers for redistribution.
E. It can be used by any user to set the user clock independently of the system clock.
Answer: C
Q13. CORRECT TEXT - (Topic 2)
What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)
Answer: xdm
Q14. - (Topic 5)
On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?
A. The local routing information may be corrupted and must be re-validated using a routing protocol.
B. One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout.
C. There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default.
D. DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.
Answer: D
Q15. - (Topic 3)
What is the purpose of the iconv command?
A. It converts bitmap images from one format to another such as PNG to JPEG.
B. It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS).
C. It displays additional meta information from icon files ending in .ico.
D. It changes the mode of an inode in the ext4 file system.
E. It converts files from one character encoding to another.
Answer: E
Q16. - (Topic 1)
When the command echo $$ outputs 12942, what is the meaning of 12942?
A. It is the process ID of the echo command.
B. It is the process ID of the current shell.
C. It is the process ID of the last command executed.
D. It is the process ID of the last command which has been placed in the background.
Answer: B
Q17. CORRECT TEXT - (Topic 3)
Which command is used to add an empty group to the system? (Specify ONLY the command without any path or parameters.)
Answer: groupadd, /usr/sbin/groupadd