|
1、Please choose a correct description of /etc/inittab.(Select the best)
A. used for defining the run level which allows telnet login
B. used for setting run level after booting up the system
C. used for setting to which virtual console can be switched in run level 5
D. used for mounting file system in corresponding run level
2、 Which tool is userd to configure auto-startup httpd after booting up TurboLinux?(Select the best)
A. turbonetcfg
B. turbobootcfg
C. turboxconfig
D. turboservice
3、Please choose two WRONG description of system maintenance.(Select all that apply)
A. You should have a clear picture of your system's users as well as memory and disk usage so that you can manage it easily if the system goes abnormal
B. Use UPS to prevent system shutdown caused by power outage
C. Don't use system log because it will cause overload
D. Keep your computer unscrewed so that you can change hardware whenever you want
4、If you are creating a new file, which of the following control commands should be used to define the default permission?(Select the best)
A. subnetmask
B. newmod
C. umask
D. defaulmod
5、If you want to add a service, such as syslog, and wish the daemon named started whenever the system is brought to run-level 3, which of the following steps should you take?(Select all that apply)
A. to create a symbol link in etc/rc.d/rc3.d pointing to etc/rc.d/init.d/syslog
B. to create a symbol link in /etc/rc.d/init.d pointing to /etc/rc.d/init.d/syslog
C. to assign a proper sequence number to the created symbol link
D. to copy /etc/rc.d/init.d/syslog to the /etc/rc.d/rc3.d directory
6、Which is the standard use of /usr file system?(Select the best)
A. to install additinal applications
B. to store executable programs, system admin tools and libraries
C. to store configuration files for system admin
D. to set up users' home directories
7. What effect will be created if sticky bit is set on the /tmp directory as shown below?(Select the best)
drwxrwxrwt 2 sys sys 512 May 26 11:02 /tmp
A. It permits superuser access only.
B. It prohibits all read/write permissions.
C. It only allows the owner to remove and rename his / her files.
D. It causes security risk because any user can delete other users' files.
8. What is the difference between a router and a firewall?(Select the best)
A. Firewalls use cashing which can increase network throughput but routers do not
B. A firewall provides security function by controlling traffic between two networks while router allows exchanging data between the networks freely
C. A Linux system can be used as a firewall but not as a router unless it has a special "routing" network card
D. A firewall requires a separate gateway on the network but a router does not.
9、1. Which of the following parameters can be defined in "dhcpd.conf" with option?
A routers
B subnet-mask
C broadcast-address
D domain-name
10 Which of the following enables file sharing with Macintosh system?
A FML
B imap
C apache
D netalk
11which of the following stores the configurations of soundmail
A mail.cofiguration
B sedmail.cofiguration
C sendmail.cf
D CF
12 which of the following parameter can be defined in 搣dhcpd.conf攠with 搣option攠
a domain –name
b subnet –mask
c broaclcase –mask
d routers
13. Which of the following are wrong
a SMTP is a protocol running on network management
b command 搣ping攠 uses ICMP protocol
c IPV4 is one of the methods for solving the problem of insufficient IP address
d ARP is a protocol for getting MAC address from give IP address
14. Which functions cannot be supported by apache?
A.ssl B.NFS C .CGI D.Appletalk
15. Which of the following parameters can be defined in 搣dhcpd.conf攠 with 搣option攠 ?
A.routers B. domain-name C.subnet –mask D.broadcast -address |
|