ITEC3123 - System and Network Administration
MCQ’s
When we install a new package in Linux system, then _______
a) All the files of the packages are installed in a single directory
b) Different files are installed at different locations of the file system
c) Package works just after extraction, installation is not required
d) None of the above
Host specific configuration files are installed in _____
a) /etc directory
b) /lib directory
c) /root directory
d) /bin directory
The directory /media is the _______
a) Mount point for removable media
b) Mount point for filesystem
c) Mount point for removable media & filesystem
d) None of the above
What is /bin/sh?
a) bourne shell
b) hard or symbolic link to the real shell command
c) bash shell
d) both bash shell and bourne shell
The /boot directory stores the data that is used ______
a) Before the kernel begins executing user mode programs
b) After the kernel begins executing user mode programs
c) Before the bootloader is loaded in the RAM
d) None of the above
Which one of the directories does not contain binary files?
a) /bin
b) /sbin
c) /etc
d) None of the above
Kernel modules are present in _________
a) /lib directory
b) /root directory
c) /boot directory
d) None of the above
The directory /opt is reserved for ________
a) Installation of add-on application software packages
b) Optional booting files
c) Optional user specific files
d) None of the above
The directory /srv contains ________
a) Site-specific data which is served by the system
b) All the system files
c) All the service files provided by the specific user
d) None of the above
Any file or directory present in the _________ directory may not be reserved
between the invocation of the program.
a) /var
b) /tmp
c) /etc
d) All of the above
Which one of the following statements is not true?
a) vim editor is the improved version of vi editor
b) vi editor commands are not case sensitive
c) vi editor has two modes of operation: command mode and insert mode
d) vi stands for visual editor
Which command is used to close vi editor?
a) q
b) wq
c) q and wq
d) None of the above
In vi editor, the key combination CTRL + F __________
a) Moves screen down one page
b) Moves screen up one page
c) Moves screen up one line
d) Moves screen down one line
Which vi editor command copies the current line of the file?
a) yy
b) yw
c) yc
d) None of the above
Which command is used to delete the character before the cursor location in
vi editor?
a) X
b) x
c) D
d) d
Which one of the following statements is true?
a) auto indentation is not possible in vi editor
b) auto indentation can be set using the command :set ai
c) auto indentation can be set using the command :set noai
d) auto indentation is set by default in vi editor
Which command searches the string in file opened in vi editor?
a) / or ?
b) f or F
c) t or T
d) None of the above
In vi editor, which command reads the content of another file?
a) read
b) r
c) ex
d) None of the above
Which command shows all the abbreviations in vi editor?
a) ab
b) abb
c) show
d) None of the above
Which command sets the number for all lines?
a) :set li
b) :set ln
c) :set nu
d) :set nl
User’s Primary Group id is listed in which file, at the time of creation of the
user (on a standard UNIX system)?
a) /etc/passwd
b) /etc/groups
c) /etc/login
d) /etc/profile
The encrypted password of a user is stored in _______
a) /etc/shadow
b) /etc/enpasswwd
c) /etc/.passwd
d) /etc/passwd
A user can change the default log-in shell using ______
a) chmod
b) chsh
c) rmsh
d) tchsh
Which of the following identifiers associated with a process decide its
privilege level?
a) uid
b) suid
c) euid
d) gid
The /etc/passwd file does not contain ________
a) userid
b) home directory for a user
c) login shell name
d) None of the above
User id 0 is _____
a) An invalid user id
b) The id of the root user
c) The id of a user when the user’s account is deleted
d) None of the above
The login shell is _____________
a) The shell program that runs when the user logs in
b) The shell program that authenticates the user while logging in
c) Common shell for all the users that belong to the same group
d) None of the above
Which of the following command can be used to change the user password?
a) user can’t change the password
b) passwd
c) passd
d) pwd
What does the following command do?
who | wc -l
a) List the number of users logged in
b) List the users
c) List the number of users in the system
d) Display the content of who command
By default, a Linux user falls under which group?
a) staff
b) others
c) same as userid (UPG)
d) system
When you use the ln command, which of the following occurs?
a) a file is created that points to an existing file
b) a file is created that is a copy of an existing file
c) a file is moved from one location to another
d) a file is renamed
srwxr-xrw- is a ________
a) Internet socket file
b) Unix domain socket file
c) Symbolic link
d) Shared file
Binary or executable files are _________
a) Regular files
b) Device files
c) Special files
d) Directory files
The directory file contains __________
a) File names & File sizes
b) File names & Inode Numbers
c) File names & Address
d) File names & Permissions
Which of the following is not a valid file type on Linux?
a) Socket
b) Softlink
c) Indoe
d) FIFO
Which of the following is not correct statement regarding file types?
a) Hard links share same inode number
b) Soft links cannot be created across partitions
c) Socket files are Unix domain sockets
d) Character file is a special file
What are the two types of device files?
a) Character & Block
b) Character & Socket
c) Block & FIFO
d) Input & Output
Which is an example for character special file?
a) Hard disk
b) CD-ROM
c) Terminal
d) Memory
Which is an example for block special file?
a) Virtual Terminal
b) CD-ROM
c) Terminal
d) Serial Modem
Which of the following is not a valid run-level?
a) S
b) 0
c) 8
d) 1
On Linux, initrd is a file ________
a) Containing root file-system required during bootup
b) Contains only scripts to be executed during bootup
c) Contains root-file system and drivers required to be preloaded during bootup
d) None of the above
The process of starting up a computer is known as _________
a) Boot Loading
b) Boot Record
c) Boot Strapping
d) Booting
Boot Strapping is also known as ___________
a) Quick Boot
b) Cold Boot
c) Hot Boot
d) Fast Boot
The shell used for single user mode shell is _________
a) bash
b) csh
c) ksh
d) sh
Single user mode shell runs as ____________
a) Admin user
b) Root user
c) Normal user
d) Log user
Which is the only partition mounted in single user mode?
a) boot
b) usr
c) root
d) tmp
Which daemon manages the physical memory by moving process from
physical memory to swap space when more physical memory is needed.
a) Sched daemon
b) Swap daemon
c) Init daemon
d) Process daemon
At the end of kernel bootstrap, which process is started?
a) /etc/init
b) /etc/sched
c) /etc/swap
d) /etc/kernel
The process id of init process is ________
a) -1
b) 0
c) 1
d) 2
We can change the priority of a running process using ________
a) nice
b) renice
c) priority cannot be changed for a running process
d) only superuser can change the priority
Which command is used to bring the background process to foreground?
a) bg
b) fg
c) background
d) foreground
The signal sent to a process when the Ctrl-C key is pressed is _______
a) KILL
b) TSTP
c) TERM
d) INT
Performance management is closely related to _________
a) Proactive Fault Management
b) Fault Management
c) Reactive Fault Management
d) Preventive Fault Management
Configuration management can be divided into two subsystems:
reconfiguration and __________
a) Documentation
b) Information
c) Servers
d) Entity
In Network Management System, the term that is responsible for controlling
access to network based on predefined policy is called ___________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
Control of users’ access to network resources through charges is the main
responsibility of ______________
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management
Which of the following networks supports pipelining effect?
a) Circuit-switched network
b) Message-switched network
c) Packet-switched network
d) Stream-switched network
DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
DHCP client and servers on the same subnet communicate via _________
a) UDP broadcast
b) UDP unicast
c) TCP broadcast
d) TCP unicast
After obtaining the IP address, to prevent the IP conflict the client may use
_________
a) Internet relay chat
b) Broader gateway protocol
c) Address resolution protocol
d) None of the above
What is DHCP snooping?
a) Techniques applied to ensure the security of an existing DHCP infrastructure
b) Encryption of the DHCP server requests
c) Algorithm for DHCP
d) None of the above
A DNS client is called _________
a) DNS updater
b) DNS resolver
c) DNS handler
d) None of the above
DNS database contains _________
a) Name server records
b) Hostname-to-address records
c) Hostname aliases
d) All of the above
The domain name system is maintained by _______
a) Distributed database system
b) A single server
c) A single computer
d) None of the above
Which one of the following is not true?
a) Multiple hostnames may correspond to a single IP address
b) A single hostname may correspond to many IP addresses
c) A single hostname may correspond to a single IP address
d) None of the above
Wildcard domain names start with label _______
a) @
b) *
c) &
d) #
How many types of groups are available in Active Directory?
a) 2
b) 3
c) 4
d) 5
There are _____ group scopes in Active Directory?
a) 0
b) 1
c) 2
d) 3
Which of the following is not one of the four divisions or container
structures in Active Directory?
a) Webs
b) Forests
c) Domain
d) Sites
Active Directory is a technology created by __________
a) Microsoft
b) IBM
c) Google
d) Amazon
The full form of ACL is __________
a) Access Configure List
b) All Caps List
c) Access Control List
d) All of the Above
Active Directory and a Windows-based file server are not required to
implement ________ on client Windows computers.
a) Windows 2000
b) Internet Explorer
c) Windows Registry
d) Roaming user profile
Which of the following MMC is used to transfer the domain naming master
operations role?
a) Active Directory Schema
b) Active Directory FSMO Transfers
c) Active Directory Domains and Trusts
d) Active Directory Users and Companions
Which of the following tab is used to enable or disable a printer for sharing
as well as to specify the name of the share?
a) General
b) Sharing
c) Location
d) Advanced
What command can you type to perform a system state backup?
a) wbadmin start statebackup
b) wbadmin start sysstatebackup
c) wbadmin start systemstatebackup
d) wbadmin begin systemstatebackup
Which of the following ports are used by Active Directory?
a) Port 135 TCP, UDP
b) Port 137 TCP, UDP
c) Port 636 TCP
d) All of the Above
Major Components of Active Directory are ___________
a) Tree
b) Site
c) Domain
d) All of the Above
Active directory was introduced in ________
a) 1996
b) 1997
c) 1998
d) None of the Above
Active Directory uses _________
a) DNS
b) Microsoft’s version of Kerberos
c) Lightweight Directory Access Protocol
d) All of the Above
Microsoft Active Directory management tools includes ______
a) Active Directory Sites and Services
b) Active Directory Domains and Trusts
c) Active Directory Users and Computers
d) All of the Above
Active Directory Services consist of _________
a) Domain Services
b) Certificate Services
c) Federation Services
d) All of the Above
Active Directory does not contain ______
a) Contact number
b) Email address
c) Portal Profile
d) All of the Above
What is the primary objective of cluster design in Parallel and Distributed
Computing?
a) To increase system complexity
b) To minimize hardware diversity
c) To achieve high performance and efficiency
d) To ignore user interfaces
Load balancing in cluster design involves:
a) Distributing computational tasks evenly
b) Ignoring system loads
c) Reducing interconnectivity
d) Allocating resources randomly
Fault Tolerance in cluster design is concerned with:
a) Enhancing user experience
b) Ensuring system reliability
c) Minimizing hardware costs
d) Reducing computational tasks
Scalability in cluster design refers to the ability to:
a) Minimize hardware diversity
b) Handle increasing workloads
c) Ignore system complexity
d) Reduce computational efficiency
The role of Interconnectivity in cluster design is to:
a) Break down computational tasks
b) Isolate cluster nodes
c) Design efficient communication channels between nodes
d) Increase hardware costs
Parallelism in cluster computing involves:
a) Breaking down computational tasks
b) Handling only sequential processing
c) Ignoring task distribution
d) Minimizing hardware diversity
Heterogeneity in cluster design refers to:
a) Ignoring hardware diversity
b) Reducing system complexity
c) Minimizing task distribution
d) Optimizing performance across varied components
The concept of Single System Image (SSI) in cluster design is related to:
a) Ensuring system reliability
b) Assigning computational tasks to cluster nodes
c) Making the cluster appear unified to users
d) Ignoring user interfaces
The significance of Task Scheduling in cluster design is:
a. Randomly allocating resources
b. Ignoring load balancing
c. Assigning computational tasks to cluster nodes efficiently
d. Minimizing user interfaces
The trade-off between Cost and Performance in cluster design involves:
a. Balancing hardware costs and performance
b. Ignoring system loads
c. Minimizing user experience
d. Reducing system complexity