Exam 1: Introduction to Linux
Exam 1: Introduction to Linux50 Questions
Exam 2: Linux Installation and Usage50 Questions
Exam 3: Exploring Linux Filesystems50 Questions
Exam 4: Linux Filesystem Management50 Questions
Exam 5: Linux Filesystem Administration50 Questions
Exam 6: Linux Server Deployment50 Questions
Exam 7: Working With the Bash Shell50 Questions
Exam 8: System Initialization and X Windows50 Questions
Exam 9: Managing Linux Processes50 Questions
Exam 10: Common Administrative Tasks50 Questions
Exam 11: Compression, System Backup, and Software Installation50 Questions
Exam 12: Network Configuration50 Questions
Exam 13: Configuring Network Services50 Questions
Exam 14: Troubleshooting, Performance, and Security50 Questions
Select questions type
Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
D
Describe the differences between Mail Transfer Agents (MTAs), Mail Delivery Agents (MDAs), and Mail User Agents (MUAs). Provide examples of each.
Free
(Short Answer)
4.9/5
(38)
Correct Answer:
E-mail is distributed via a network of e-mail servers, also known as Mail Transfer Agents (MTAs).Many MTAs are freely available for Linux, including sendmail, postfix, smail,and exim. Before the user can access his e-mail, it must be downloaded from a MTA; the service that provides this is known as a Mail Delivery Agent (MDA). Linux also provides several of these services; procmail and fetchmail are two of the most common. Finally, the user views her e-mail using a program known as a Mail User Agent (MUA). Common MUAs available for Linux include mutt, pine, printmail, elm, mail, Netscape, and Eudora.
Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project.
Free
(True/False)
4.9/5
(39)
Correct Answer:
True
________________ are a collection of programs and tools designed to allow for the creation, modification, manipulation, maintenance, and access of information from databases.
(Essay)
4.7/5
(38)
What two options below are examples of common UNIX flavors?
(Multiple Choice)
5.0/5
(36)
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
-A person who uses computer software maliciously for personal profit.
(Short Answer)
4.7/5
(38)
Which of the following is the greatest expense for companies using Linux?
(Multiple Choice)
4.9/5
(24)
In what year was the source code for the Linux kernel released?
(Multiple Choice)
4.9/5
(27)
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
-A popular and widespread method of clustering computers together to perform useful tasks using Linux.
(Short Answer)
4.7/5
(31)
When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?
(Multiple Choice)
4.8/5
(22)
Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.
(True/False)
4.9/5
(43)
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:
(Multiple Choice)
4.8/5
(28)
The term hacker refers to someone who illegally uses computers for personal benefit or to cause damage.
(True/False)
4.9/5
(40)
What Linux distribution is the most commonly used distribution within organizations today?
(Multiple Choice)
4.7/5
(39)
The iptables software on Linux is an example of what kind of software?
(Multiple Choice)
4.8/5
(42)
What software type is software that is distributed free of charge, but the source code is not available?
(Multiple Choice)
4.9/5
(28)
The ability for a computer to increase workload as the number of processors increases is known as _________________________.
(Short Answer)
4.8/5
(33)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)