How would an administrator change the ownership of the directory /tmp/data/user1 from the account 'user1' to the account 'user2'?
A -
chown –R /tmp/data/user1 user2
B -
chown –R user2 /tmp/data/user1
C -
chown /tmp/data/user2 user 1
D -
chown user2 /tmp/data/user1 user2
2-
A system administrator who has forgotten his root password on a server can do which of the following to change the root password?
A -
Use the brute-force password sniffer.
B -
Edit the /etc/inittab file to load without NIS.
C -
Use the passwd command from the administrator group.
D -
Reboot the system in runlevel 1 and use "init=/bin/sh" as a boot option.
3-
When a new user account is created, the default settings are copied from which of the following?
A -
/etc/start
B -
/etc/default
C -
/etc/skel
D -
/usr/skel
4-
Which if the following commands can be used to compare two text files to find out how they are different?
A -
comp
B -
diff
C -
compare
D -
filediff
5-
A user needs to securely connect to a server. It is mandatory that encrypted passwords be used. Which of the following network utilities should be used?
A -
ssh
B -
tftp
C -
telnet
D -
rsh
6-
A user has overwritten the master boot record. How could the Linux record be restored?
A -
edit lilo conf
B -
edit fstab
C -
run "fdisk/mbr"
D -
run "/sbin/lilo
7-
Which if the following should be done before installing Linux on a home computer?
A -
Create ext2 and swap partitions on the hard drive.
B -
Verify the hardware on the Linux hardware compatibility list.
C -
Upgrade the computer's memory to at least 64 MB.
D -
Defragment the drive using the computer's current operating system.
8-
A client has downloaded the latest Linux kernel source and wants to compile and install it on a home machine. The downloaded file is named "linux-2.4.3.tar.gz". What command should be issued first?
A -
gzip q linux-2.4.3.tar.gz; tar xvf linux-2.4.3.tar
B -
gzip c linux-2.4.3.tar.gz; tar cvf linux-2.4.3.tar
C -
tar xzvf linux-2.4.3.tar.gz
D -
tar xvf linux-2.4.3.tar.gz
9-
A customer wants internal office information to be accessible by employees through a Web browser. Which of the following Linux services should be used?
A -
Apache
B -
MySQL
C -
Squid
D -
sendmail
10-
Why is the Shadow Password Suite important?
A -
It provides a second level of encryption for the /etc/passwd file.
B -
It moves the passwords to a separate file that has more restrictive permissions.
C -
It improves the encryption for all passwords in the /etc/passwd file.
D -
It moves the passwords to a separate file and will also encrypt the password file.