Linux-v6-Dom2-Practice

Linux-v6-Dom2-Practice

12th Grade

61 Qs

quiz-placeholder

Similar activities

CLASS 12 COMPUTER APPLICATIONS CH-1 TO CH-6 STATEBOARD I - MID

CLASS 12 COMPUTER APPLICATIONS CH-1 TO CH-6 STATEBOARD I - MID

12th Grade

63 Qs

Linux Final Exam

Linux Final Exam

9th - 12th Grade

66 Qs

ICT SPM : LA6 (Sistem Maklumat)

ICT SPM : LA6 (Sistem Maklumat)

10th - 12th Grade

57 Qs

Vic - 1.2 Memory and Storage

Vic - 1.2 Memory and Storage

9th - 12th Grade

66 Qs

SIMULASI UJIAN INFORMATIKA KELAS 9

SIMULASI UJIAN INFORMATIKA KELAS 9

9th Grade - University

60 Qs

Code.org Csd

Code.org Csd

9th - 12th Grade

65 Qs

Python - 5.பைத்தான் அறிமுகம் – மாறிகள் மற்றும் செயற்குறிகள்

Python - 5.பைத்தான் அறிமுகம் – மாறிகள் மற்றும் செயற்குறிகள்

12th Grade

65 Qs

Word Modules 1 and 2

Word Modules 1 and 2

9th - 12th Grade

56 Qs

Linux-v6-Dom2-Practice

Linux-v6-Dom2-Practice

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Maureen Christie

Used 2+ times

FREE Resource

61 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols ensures that messages being transmitted on the internet are private and tamper-proof, uses TCP, and allows for quick auto-configuration of hosts that are attempting to connect?

DTLS

SSL

TLS

IPsec

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following impacts all the files in a folder?

File permissions

All folder permissions

Default ACLs

Folder group permissions

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following utilities would you typically use to lock a user account?

passwd

gpasswd

useradd

userdel

usermod

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

As an IT administrator, which of the following are the MOST likely reasons you would want to prevent users from logging in to a Linux system?

While reading log files

While running a Bash script

While responding to a security event

While updating kernel software

While troubleshooting problems

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the full path to the directory that contains log files, including secure, messages, [application], and kern.log?

/var/log

/usr/bin

/etc/logs

/home/logs

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You would like to use SSH port tunneling to work on a remote system. You also need to ensure that all data that you send to the remote system is encrypted. Which SSH configuration option, in the /etc/ssh/sshd_config file, needs to be set to yes?

AllowSSHTunneling

AllowTCPTunneling

AllowSSHForwarding

AllowTCPForwarding

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are managing a Linux server with a console (without a GUI installed). Which of the following key combinations would you press to switch to the fourth shell session?

Ctrl+F4

Ctrl+4

Ctrl+Alt+F4

Ctrl+Shift+4

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?