A Linux machine has a local address of 192.168.1.1 with a subnet mask of 255.255.255.0. At this time, all services are denied. Which of the following lines would be appended to the hosts.allow file to permit access to the Web service on the local subnet?
A -
ALL except httpd: 192.168.1.1/24
B -
httpd: 192.168.1.
C -
192.168.1.255/255.255.255.0:httpd
D -
ALL: 192.168.1.255/24
2-
Where is the first place to look for error messages while installing and testing an application?
A -
/var/log/messages
B -
/var/log/dmesg
C -
/var/log/kernel/errors
D -
/tmp/boot.log
3-
Which of the following programs can be reconfigured to boot Linux?
A -
Disk Druid
B -
FIPS.EXE
C -
LOADLIN.EXE
D -
Minix
4-
In order to prevent monitor damage when configuring X, all of the following must be configured correctly EXCEPT
A -
RAMDAC
B -
Resolution capability
C -
Video RAM
D -
Refresh rate
5-
A new shell command is installed and does not perform correctly. It generates too much diagnostic output to read on the screen and does not write to a log file. Which of the following would capture the output for evolution?
A -
Make the changes to /etc/syslog.conf
B -
Run the command as a daemon.
C -
Add redirection to the command line.
D -
Run the command in the background.
6-
What may happen if a network cable and a power cable are too close together?
A -
Power surges may occur on the network cable.
B -
EMI may occur.
C -
Jabber may occur.
D -
Crosstalk may occur.
7-
A technician booted a PC and noted that none of the four ATA devices were detected. He verified that the device were cabled properly, physically connected to the ATA controller and power supply, and jumpered correctly. Which of the following is the most likely problem?
A -
No PC can support four ATA devices.
B -
ATA devices have not been set up with the configuration diskette.
C -
The BIOS does not appear to support ATA devices.
D -
The CMOS setup is set to ignore all ATA devices.
8-
A group of users would like accounts created for them. They want to access a particular application on the server. The group requires sharing the files created using the application. What method would be used to accomplish these goals?
A -
As root, run the groupadd command to create the shared group, then use the adduser command to create the user accounts.
B -
As root, run the adduser command to create the shared group, then adduser to create the user accounts.
C -
As root, run the adduser command to create the users' accounts, then edit the letclpasswd file to change each users GID.
D -
As root, run the adduser command to create the users' accounts, then edit the letclpasswd file to change each users GID.
9-
What command would allow an administrator to add an existing user's phone number to the system as a comment?