QQ登录

只需一步,快速开始

 找回密码
 注册

QQ登录

只需一步,快速开始

查看: 8261|回复: 20

这是我们的考级题,试试你能否过关--(做完后帖子回复。)

[复制链接]
发表于 2005-9-3 13:32:37 | 显示全部楼层 |阅读模式

满分50,一题一分,35分满分,需要很高的英语水平哦。
1. When the system is mounted, all file systems in the /etc/fstab are mounted, except those with what in the option column?
A. nomount
B. noauto
C. noatime
D. nohup

2. You want to compile a new kernel. You have just run "make dep". What should you do next?
Choose the best answer:
A. make bzImage
B. make dep
C. make clean
D. make mrproper
E. make xconfig


3. With a Linux 2.2 Kernel-based machine configuration of 133 MHZ, 32 MB RAM and a 1 GB HD, how much swap should be configured?
A. 512MB
B. 256MB
C. 128MB
D. 64MB
E. 32MB



4. Which command removes all subdirectories in /tmp, regardless of whether they are non-existent or in use?
A. del /tmp/*
B. m -rf /tmp
C. rm -Ra /tmp/*
D. rm -rf /tmp/*
E. delete /tmp/*,*



5. You have the following file:
-rwxrwxr-x 1 foo root 0 Feb 23 07:48 /bin/foo
Which of the following commands will change the owner of the file /bin/foo from the foo user to the bar user without affecting group ownership?
A. chown /bin/foo bar
B. chown bar /bin/foo
C. chown bar.foo /bin/foo
D. chown.foo.bar /bin/foo


6. Your unmask is set to 002. If you create a new file, what will the permission of the new file be?
A. –rw-rw-r--
B. rwxrwx-w-
C. ------w-
D. rwxrwxr-x

7. What Linux utility allows you to easily configure your Sound Blaster card on Linux?
A. Sndconfig
B. SoundConf
C. Usrconf
D. Sysconf

8. Where can lilo place boot code?
A. The boot ROM
B. The boot RAM
C. The /boot partition
D. The MBR on a hard drive

9. What lilo.conf parameter will cause the root file system to be mounted read only?
A. no-write
B. read
C. no-right
D. read-only

10. Linux is a(n) _________ operating system, meaning the source code is freely available.
A. Open sourced
B. User licensed
C. Closed source
D. Open binary

11. Which of the following commands can be used to extract a tar file?
A. tar -vf
B. tar -xvf
C. tar -e
D. tar -v

12. Which of the following commands can be used to create a tar archive file in verbose mode?
A. tar -v
B. tar -cvf
C. tar -c
D. tar -vf

13. In what file do you change default shell variables for all users?
A. /etc/bashrc
B. /etc/profile
C. ~/.bash_profile
D. /etc/skel/.bashrc
E. /etc/skel/.bash_profile

14. Which two files in a user's home directory are used to customize the bash environment?
A. bash and .bashrc
B. bashrc and-bash_conf
C. bashrc and bashprofile
D. .bashrc and .bash_profile
E. bash.conf and .bash_profile

15. Where are the default settings for the useradd command kept?
A. /etc/default/useradd
B. /etc/sysconfig/useradd.cfg
C. /etc/.useradd
D. /etc/defaults/useradd
E. /etc/login.defs

16. Which protocol is used by ping?
A. TCP
B. UDP
C. SMB
D. ICMP
E. OSPF

17. If you suspect that a gateway machine on your network has failed but you are unsure which machine, which command will help locate the problem?
A. ps
B. netstat
C. nsloopup
D. ifconfig
E. traceroute

18. What is the binary conversion of the IP address 192.168.1.10?
A. 11000000.10101000.00000001.00001010
B. 01101010.11000100.10101000.00000001
C. 00000001.00001010.11000000.10101000
D. 10101000.00000001.00001010.11000000
E. None of the choices

19. Your server logfile shows repeated connections to TCP port 143, what service is being accessed?
A. smtp
B. imap
C. pop3
D. pop2

20. The _____ is used by the local host to determine which hosts are on the local subnet, and which hosts are on remote networks.
A. DNS
B. ARP
C. gateway
D. netmask
E. routing protocol

21. What system file contains definitions of well known ports, their associated services and protocols?
A. /etc/services
B. /etc/sysconfig/network-scripts
C. /etc/services.conf
D. /etc/inet/hosts
E. None of the choices

22. What is a well-known service that binds port 25 and is it required on all hosts?  
A. SNMP and it should be turned off if not needed.
B. SMTP and it is a required service.
C. SMTP and it is only required on MX hosts.
D. SLPD and it is required if you run LDAP services.
E. SSHD and it is required for secure logins.

23. Your machine has two working NIC's with proper addresses. You want to split your network into two new subnets. What single command will accomplish this?
A. ifconfig
B. route
C. default
D. netstat
E. None of the choices

24. What directory be default contains the delivered mail for each user?
A. ~/mail/
B. /usr/mail/
C. /var/mail/
D. /var/mail/spool/
E. /var/spool/mail/

25. You are running an email server configured with the default settings. In which directory will you found the delivered mail for the user foo?
A. /var/spool/mail
B. /home/foo/mail
C. /var/mail/spool
D. /var/users/mail

26. You have a standard Apache web server installation and want to make it respond to requests on port 8088. To do this, what configuration file do you need to change?
A. None. This is the default port.
B. /etc/httpd/apache.conf
C. /etc/httpd/ports.conf
D. /etc/httpd/httpd.conf
E. /etc/httpd/access.conf

27. What configuration file and directive will alter your apache server IP and or port that it listens to?
A. Port
B. IPAddress
C. Listen
D. MinSpareServers

28. What Apache directive must you change when using inetd to control your Apache server?
A. ServerType
B. ServerInetd
C. InetServer
D. StartServer
E. ServerMethod

29. Which Apache Directive specifies the location of the HTTP documents?
A. RootDocument
B. ServerRoot
C. DocumentRoot
D. RootServer
E. DocPath

30. What command can be used to shut down the Apache server gracefully?
A. apacheshut
B. apachectl
C. apachestop
D. apachestart

31. How many spare server processes are required by Apache for the typical, low-to-moderate volume website?
A. 1
B. 50
C. 10
D. 200

32. What is the simplest method to connect a Win98 host to a Linux Server? Choose all that apply.
A. Velcro
B. Samba
C. NFS
D. DNS
E. WINS

33. What is true about the root user and NFS?
A. NFS shares don't allow root access by default
B. NFS automatically masks out share permissions
C. NFS automatically maps all root UID's to the local user "rootsquash"
D. NFS ignores all users with a UID of 0 and a GID of 0
E. NFS pays no attention whatsoever to security

34. What configuration files on a Linux Server can be configured to share file systems with clients?
A. /etc/nmbd
B. /etc/smbd
C. /etc/smb/samba.conf
D. /etc/smb.conf
E. /etc/samba/smb.conf

35. This is a line from the file /etc/export:
/product Certkiller (rw)
What does it mean?
A. Only user Certkiller may access the filesystem /product when it is NFS mounted.
B. This computer will mount the filesystem /product on Certkiller via NFS.
C. The filesystem /product is exported for NFS mount to computer Certkiller .
D. All NFS access to /product will use suid Certkiller .

36. Shares can be configured for export via the NFS service by editing what file?
A. /etc/exports
B. /etc/export
C. /etc/exportfs
D. /etc/nfs/exports

37. Which port is used for DNS
A. 110
B. 21
C. 23
D. 52
E. 53

38. What are reverse DNS entries used for?
A. Reverse DNS enable diagnostic commands like traceroute to work.
B. Reverse DNS gives you information about the owner of the DNS entry.
C. Reverse DNS provides the hostname for a particular numeric IP address.
D. Reverse DNS provides geographical information about the DNS net location.

39. What file determines the DNS servers used by your computer?
A. /etc/hosts
B. /etc/named.conf
C. /etc/nsswitch.conf
D. /etc/resolv.conf

40. When you use DNS to find a hostname using a particular IP address, which kind of DNS entry is involved?
A. Reverse DNS entries
B. IP DNS entries
C. Address DNS entries
D. Network DNS entries

41. What file on a system contains a list of hosts that can't connect to the machine's services?
A. /etc/hosts/denial
B. /etc/hosts.deny
C. /etc/host.notallow
D. /etc/inetd.conf
E. /etc/hosts.not

42. Which of the following services would you be least likely to configure to be governed over by the Internet Super Server?
A. ftp
B. telnet
C. ssh
D. finger
E. bind

43. On a system using shadowed passwords, the correct permissions for /etc/passwd are ____- and the correct permission for /etc/shadow are _______.
A. -rw-r-----, -r--------
B. -rw-r--r--, -r--r--r--
C. -rw-r--r--, -r--------
D. -rw-r--rw-, -r-----r--
E. -rw--------, -r-------

44. Which of the following files has the correct permissions?
A. -rw--w--w- 1 root root 369 Dec 22 22:38 /etc/shadow
B. -rwxrw-rw- 1 root root 369 Dec 22 22:38 /etc/shadow
C. -rw-r--r-- 1 root root 369 Dec 22 22:38 /etc/shadow
D. –r-------- 1 root root 369 Dec 22 22:38 /ect/shadow

45. You have a user whose account you want to disable but not remove. What should you do?
A. Edit /etc/gshadow and just remove his name.
B. Edit /etc/passwd and change all numbers to 0.
C. Edit /etc/shadow file and remove the last field.
D. Edit /etc/passwd and insert an * after the first :.
E. Edit /etc/group file and put a # sign in front of his name.

46. To create a user account, keep in mind that the username is at most ____ characters long.
A. 6
B. 8
C. 12
D. 18

47. What file contains the default environment variables when using the bash shell?
A. ~/.profile
B. /bash
C. /etc/profile
D. ~/bash

48. All groups are defined in the /etc/group file. Each entry contains four fields in the following
order.
A. groupname, password, GID, member list
B. GID, groupname, password, member list
C. groupname, GID, password, member list
D. GID, member list, groupname, password

49. There are seven fields in the /etc/passwd file. Which of the following lists all the fields in the
correct order?
A. username, UID, password, GID, home directory, command, comment
B. username, password, UID, GID, comment, home directory, command
C. UID, username, GID, home directory, password, comment, command
D. username, password, UID, group name, GID, home directory, comment

50. What is the usual mode for the /tmp directory?
A. 0777
B. 0755
C. 7777
D. 1777
E. 0222
发表于 2005-9-3 16:15:21 | 显示全部楼层
不错不错,不过我才学俩月,看看很多不确定的
先顶了再看
回复

使用道具 举报

发表于 2005-9-4 09:26:46 | 显示全部楼层

回复

回复..
1,C 2,A 3,B 4,C 5,A 6,A 7,B 8,D 9,C 10,D 11,D 12,B 13,A

14,E 15,B 16,C 17,B 18,B 19,A 20,C 21,D 22,C 23,B 24,A

25,A 26,C 27,B 28,A 29,C 30,C31,C 32,A 33,C 34,B 35,D

36,A 37,D 38,A 39,C 40,B 41,C 42,A 43,D 44,D 45,D 46,A

47,D 48,C 49,A 50,B
回复

使用道具 举报

发表于 2005-9-5 09:12:34 | 显示全部楼层
求助答案,有谁可以做一边...?
回复

使用道具 举报

发表于 2005-9-6 09:07:01 | 显示全部楼层
题目有点老噢。
回复

使用道具 举报

发表于 2005-9-11 11:14:02 | 显示全部楼层
蒙 也能 蒙 几分吧
哈哈
回复

使用道具 举报

发表于 2005-10-7 11:06:23 | 显示全部楼层
好!顶
回复

使用道具 举报

发表于 2005-10-7 11:06:54 | 显示全部楼层
好!顶
回复

使用道具 举报

发表于 2005-10-7 11:08:09 | 显示全部楼层
??
回复

使用道具 举报

发表于 2005-10-12 08:41:21 | 显示全部楼层
bdddb
aadda
bbada
deabd
adada
ddecb
bbeec
aeddb
bcedb
cacbd
谁贴出正确答案?
回复

使用道具 举报

发表于 2005-11-5 16:47:17 | 显示全部楼层
看得似懂非懂的!
回复

使用道具 举报

发表于 2006-1-8 17:44:38 | 显示全部楼层
[quote:d17212a866="kelela"]
谁贴出正确答案?[/quote]
回复

使用道具 举报

发表于 2006-2-8 16:28:44 | 显示全部楼层
bcddccaddabbededeabdacadcdcacbdbdeabecdcdcddadcbb
回复

使用道具 举报

发表于 2006-2-16 23:09:31 | 显示全部楼层
第一题英文有问题吧。 "When the system is mounted“ ,能mounted 的"东西"是分区或类似设备,如何mount System 呢?
2、3题都没有标准答案。
第二题make bzImage 和make clean 都有可能。根本谈不上best 的问题

第三题是老问题了,FAQ里说了一百遍。只是建议swap是内存的两倍,但2.1倍或2.5倍,1.5倍呢。也未必就不行或不好。话又说回来。本公社用过P133/32M/1G 电脑 以及2.2内核的人也不多吧。


49题也不严谨。
回复

使用道具 举报

发表于 2006-3-5 20:10:12 | 显示全部楼层
有答案么????????????
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

GMT+8, 2024-4-19 23:43 , Processed in 0.154544 second(s), 15 queries .

© 2021 Powered by Discuz! X3.5.

快速回复 返回顶部 返回列表