Topic 1: Volume A
Which of the following statements are true about kernel modules?
Each correct answer represents a complete solution. Choose all that apply.
A.
Kernel modules do not support executable loaders.
B.
The kernel module contains extra kernel codes that may be loaded after the loading of
the base kernel.
Only a minimal resident kernel is loaded into memory at boot time.
C.
Kernel modules do not support the device drivers, network drivers, and file system
drivers.
D.
Whenever a user requests a feature that is not present in the resident kernel, a kernel
module is dynamically loaded into memory.
The kernel module contains extra kernel codes that may be loaded after the loading of
the base kernel.
Only a minimal resident kernel is loaded into memory at boot time.
Whenever a user requests a feature that is not present in the resident kernel, a kernel
module is dynamically loaded into memory.
John works as a Network Administrator for We-are-Secure Inc. The company uses a Linux
server. John wants to give the following file permissions to the imp.c file:
l Read, Write, and Execute permissions to the owner
l Read and Write permissions to groups
l Read Only permissions to other users
Which of the following commands will John use to accomplish the task?
A.
chmod 765
B.
chmod 777
C.
chmod 712
D.
chmod 764
chmod 764
Which of the following commands is used to mount file systems?
A.
detach
B.
mount
C.
umount
D.
attach
mount
You work as a Network Administrator for World Perfect Inc. The company has a Linuxbased
network. You have configured a Linux Web server on the network. A user complains
that the Web server is not responding to requests. The process list on the server shows
multiple instances of the HTTPD process. You are required to stop the Web service. Which
of the following commands will you use to resolve the issue?
A.
stop httpd
B.
stopall httpd
C.
kill httpd
D.
killall httpd
killall httpd
By default, which of the following commands configures the current run level?
A.
chkconfig
B.
pstree
C.
service
D.
ntsysv
ntsysv
You work as a Network Administrator for Tech World Inc. The company has a Linux-based
network. The permissions on a file named Report are shown below:
rwxr-r—
You want to add a sticky bit to the file. Which of the following commands will you use?
A.
chmod 7744 report
B.
chmod 1744 report
C.
chmod 2744 report
D.
chmod 4744 report
chmod 1744 report
Which of the following commands can be used to check the errors of the ext2 and ext3
filesystems?
Each correct answer represents a complete solution. Choose two.
A.
fsck --ext2
B.
fsck.ext3
C.
fsck --ext3
D.
e2fsck
fsck.ext3
e2fsck
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linuxbased
network. You have to create user accounts for four new Management Trainees. You
also have to create a group named MT and provide membership of this group to the new
user accounts. How will you accomplish this?
A.
Use the ADDUSER command to create new user accounts and the MT group. Add the
users account to the group.
B.
Use the USERADD command to create new user accounts and the MT group.
Add the user accounts to the group.
C.
Use the GROUPADD command to create the MT group. Use the USERADD command
to create the user accounts and provide them the membership of the MT group.
D.
Use the ADDGROUP command to create the MT group.
Use the ADDUSER command to create the user accounts and provide them the
membership of the MT group.
Use the GROUPADD command to create the MT group. Use the USERADD command
to create the user accounts and provide them the membership of the MT group.
You work as a Network Administrator for Secure Web Inc. The company has a Linux-based
network. The network has a mixed set of client operating systems. You want to format a
new hard disk drive. The drive will have only one partition. Both the Linux and Windows
operating systems will access the partition. Which of the following file systems will you
use?
A.
VFAT
B.
XFS
C.
REISER
D.
EXT3
VFAT
You have recently been appointed as a Network Administrator for Rick International Inc.
The company has a Linux-based network. You have to print an important file named
secure.txt urgently. You therefore want to know what printers are currently configured on
your computer and how you can connect to them. Which of the following commands will
you use to accomplish the task?
A.
lpstat -s
B.
lpstat -d
C.
lpr
D.
lpstat -p
lpstat -s
Page 2 out of 31 Pages |
Previous |