SAMPLE QUESTION FOR MCQ FOR “LINUX ADMINISTRATION”
1. Command used to display currently logged in user?
a) which
b) where
c) whoami
d) what
2. Command used to count number of character in a file is
a) grep
b) wc
c) count
d) cut
3. Which of these commands could you use to show one page of output at a
time? a) less
b) sed
c) pause
d) grep
4. Which commands will give you information about how much disk space each file in the
current directory uses?
a) ls -l
b) ls -la
c) du
d) ls -a
5. Which of the following command output contains userid?
a) ls
b) help
c) date
d) ls –l
6. Which command is used to display all the files including hidden files in your current and its
subdirectories ?
a) ls –aR
b) ls –a
c) ls –R
d) ls –l
7. pwd command displays
a) user password
b) password file content
c) present working directory
d) none of the mentioned
8. Which tar command option is used to list the files in a tape archive
format? a) cvf
b) tvf
c) xvf
d) ovf
9. Which of the following commands will allow the user to search contents of a file for a
particular pattern
a) touch
b) grep
c) find
d) ls
10. ____________ is a platform between hardware & software of your computer.
a. Kernel
b. Operating System
c. Application
d. User
11. To show last 10 commands which of the following command can be
used? a. history
b. 10 history
c. history 10
d. history -10
12. # kill -9 123 command will send ________ signal to a process with pid
123. a. SIGHUP
b. SIGKILL
c. SIGTERM
d. Shutdown
13. The killall command will stop processes by using their _________.
a. Names
b. PIDs
c. UIDs
d. GIDs
14. CRON scheduler uses following timer:
a. Minutes
b. Hour
c. Day of week
d. All of the above
15. In the command # mount –t iso9660 /dev/sr0 /mnt
a. File system
b. Directory
c. Device driver
d. Parameter
16. Which RPM command is used to query particular package?
a. rpm –l
b. rpm –e
c. rpm –i
d. rpm –q
17. Software dependencies are automatically resolved by
a. RPM
b. YUM
c. Tar ball
d. Zip
18. On red hat server, all the messages will be logged into __________
file. a. /var/log
b. /var/messages
c. /var/log/messages
d. /var
Unit II
19. Which of the following is the default file system on
RHEL? a. XFS
b. FAT 32
c. vfat
d. EXT 4
20. Which file system is used for high availability clusters?
a. XFS
b. FAT 32
c. vfat
d. GFS
21. The popular command-line tools are used to create partitions on RHEL is
a. fstab
b. fdisk
c. mkfs
d. ext
22. Select partition type on RHEL system.
a. Primary partition
b. Logical partition
c. Extended partition
d. All of the above
23. __________ command is used to display device drivers of connected
devices. a. dmesg
b. du
c. df
d. fdisk
24. To format a partition with swap file system use command
a. mkfs swap
b. fdisk
c. fstab
d. mkswap
25. Select correct statement for Logical Volume manager.
a. Create system partition with system id 8e.
b. Create logical volumes.
c. Create volume groups.
d. All of the above.
26. ___________ allows you to freeze the current state of an LVM
volume. a. LVM snapshot
b. LVM Freeze
c. LVM Pause
d. None of the above
27. SSH stands for
a. Standalone shell
b. System shell
c. Secure shell
d. None of the
28. SSH uses __________ to copy the public key of the client to the server.
a. cp
b. mv
c. scp
d. ftp
29. To establish a remote connection to a full graphical desktop __________ can be used.
a. RDC
b. FTP
c. NFS
d. VNC
30. Type of users in linux operating system is
a. System user
b. Super user
c. Local user
d. All of them
31. Which command can be used to switch user?
a. useradd
b. sudo
c. su
d. chown
32. # id tom will display
a. Current group assignment of user tom
b. UID of user tom
c. GID of user tom
d. Password of user tom
33. With read permission on file, user can
a. Edit the file
b. Read the content of the file
c. Execute that file
d. Go into the directory.
34. With execute permission on directory, user can
a. Execute the files of the directory
b. Delete content of directory
c. Use the cd command to access the directory
d. List content of directory
35. Which command is used to change ownership of a file?
a. su
b. chmod
c. chgrp
d. chown
36. Umask for root user & local user are __________ respectively.
a. 022 & 002
b. 022 & 022
c. 002 & 002
d. 200 & 200
37. __________ command line Linux utility that is used to set/unset certain attributes to a file in
Linux system to secure accidental deletion or modification of important files and folders. a.
chown
b. chgrp
c. chattr
d. chmod
38. Which command is used to modify user password expiry
information? a. chage
b. chgrp
c. chattr
d. chmod
39. In RHEL 6, for local users GIDs are assigned from
a. 0 and onwards
b. 500 and onwards
c. 1000 and onwards
d. 150 and onwards
40. ___________ is a user database file which contains entries of all users.
a. /etc/shadow
b. /etc/group
c. /etc/gshadow
d. /etc/passwd
Unit III
41. Linux based firewall is controlled by the program called
a. iptables
b. firewalld
c. netfilter
d. none of the above
42. Select component of firewall from given options.
a. Table
b. Chain
c. Target
d. All of the above
43. Which type of table can be possible present in
firewall? a. Filter
b. NAT
c. Mangle
d. All of the above
44. PKI certificates and SSL are primarily used with
a. Web servers
b. Email
c. SSH
d. Telnet
45. GPG is commonly used in
a. Web servers
b. Email
c. SSH
d. Telnet
46. Red Hat Enterprise Linux 6 and newer versions use
a. NFSv3
b. NFSv4
c. NFSv6
d. NFSv7
47. ________ file contains the shares you want to offer through
NFS. a. /etc/share
b. /etc
c. /etc/exports
d. /etc/nfs
48. Major disadvantageof NFS is
a. it is unsecure
b. it is slow
c. it is unreliable
d. it works only between Linux and UNIX machines
49. Which cross platform file system is offered by Linux Samba Server?
a. FAT 32
b. EXT4
c. CIFS
d. GFS
50. _____________ are commonly used services designed to offer access to shared files within
the same network.
a. Samba & NFS
b. FTP & Email
c. Samba & SSH
d. NFS & DHCP
51. If user want to download and upload files with external users, _______ is a more suitable
option.
a. Samba
b. FTP
c. NFS
d. SSH
52. On Red Hat Enterprise Linux, _______ is the preferred FTP server.
a. ftp
b. ftp 2000
c. vsftpd
d. dhcp
53. Samba’s main configuration file is _______________.
a. /etc/samba
b. /etc/samba/samba.conf
c. /etc/smb.conf
d. /etc/samba/smb.conf
54. ___________ a service that mounts NFS shares automatically.
a. Export
b. Automount
c. Share
d. NFS
55. __________ loads specific kernel module to add functionality & enhancement to
firewall. a. Module
b. Rule
c. Target
d. Chain
56. What is the mandatory component of firewall rule?
a. Chain
b. Port
c. Target
d. Protocol
57. When using logging, numerous lines are written to the log files resulting in very large log
files. To avoid this, we can use the __________ module with firewall.
a. Drop
b. Reject
c. Ignore
d. Limit
58. Which type of security can be used to secure services while transmitting
packets? a. FTP
b. SSL
c. NFS
d. DHCP
59. To create and manage self-signed certificates, ________ command-line utility is
used. a. SSH
b. NFS
c. FTP
d. Openssl
60. A certificate revocation list (CRL) is a list of certificates that are
a. Invalid
b. Exchanged
c. Currently in use
d. Corrupted
Unit IV
61. Domain Name System (DNS) is the system that associates
a. IP addresses to hostname
b. Hostnames to IP addresses
c. Hostnames to physical addresses
d. Hostnames to port addresses
62. Select top level domain from given options.
a. .com
b. .gov
c. .in
d. All of the above
63. __________ service is used to offer DNS services on Red Hat Enterprise Linux.
a. BIND
b. vsftpd
c. ftp
d. dhcp
64. Type of name server is
a. Primary name server
b. Authoritative name server
c. Recursive name server
d. All of the above
65. Most DNS servers are configured to service at least two zone types which are
a. Primary & secondary zone
b. Forward & reverse zone
c. Upward & downward zone
d. Master & slave zone
66. DHCP is used to assign _____________
a. IP address statically
b. MAC address statically
c. IP address dynamically
d. MAC address dynamically
67. Red Hat Linux offers _________ as the default mail server.
a. Gmail
b. Yahoo mail
c. Ubantu mail
d. Postfix
68. Linux command-line Mutt tool provides
a. Mail transfer agent
b. Mail user agent
c. Mail access agent
d. Message delivery agent
69. ___________ service on Red Hat Linux offers functionalities of POP and IMAP.
a. Postfix
b. SMTP
c. Dovecot
d. MTA
70. /etc/httpd/conf/httpd.conf is a main configuration file of _____________.
a. Mail sever
b. Postfix
c. Samba sever
d. Apache server
71. Apache can be started in two different modes:
a. Prefork & Worker mode
b. Static & Dynamic mode
c. Master & slave mode
d. Primary & Secondary mode
72. ___________ is a default mode of apache server.
a. Worker mode
b. Prefork mode
c. Slave mode
d. Static mode
73. __________ is a definition of different websites to be served by the Apache web server.
a. Virtual website
b. Apache web server
c. Virtual host
d. Dynamic host
74. After securing the web server with TLS certificate, it listens on __________ port.
a. 80
b. 22
c. 121
d. 443
75. Red Hat Linux uses which service to start MySQL?
a. Postfix
b. Dovecot
c. Mysqld
d. Oracle
76. LDAP stands for
a. Lightweight Directory Access Protocol
b. Load Directory Access Protocol
c. Local Directory Access Protocol
d. Lightweight Directory Access Program
77. Full form of PAM is
a. Plugin Access Module
b. Pluggable Authentication Module
c. Pluggable Access Module
d. Primary Authentication Module
78. Identify incorrect statement:
a. DHCP offers much more than just the IP address to hosts that request its information. b.
DHCP server can be configured to assign more than 80 different parameters to its clients. c. IP
addresses, default gateways, IP address of the DNS name servers can be configured using DHCP.
d. DHCP is used to configure IP address only.
79. In DNS, resource record ‘A’ indicates
a. Match a name to an IP address
b. Match an IP address to host name
c. Creates alias name for specific host
d. Tells DNS which sever is available for mail exchange
80. First part of zone file contains generic information whereas second part defines ______.
a. Header
b. Resource Records
c. IP addresses
d. Host names
Unit V
81. The ________ allows user to assign the output of a shell command to a
variable. a. Double quotes
b. Single quotes
c. Back tick
d. Pipe
82. What will be output of $expr 5 * 2 ?
a. 10
b. 2.5
c7
d. Syntax error
83. Linux terminal command line supports ________ arithmetic only
a. Integer
b. Floating point
c. Logarithmic
d. Power
84. The exit status of a command that successfully completes is ___________.
a. 1
b. Zero
c. 255
d. 127
85. The format of the test command is
a. # test [condition]
b. # test – condition
c. test condition
d. test (condition)
86. The bash shell provides _______ command to allow you to create a loop that iterates through
a series of values.
a. if then
b. case
c. while
d. for
87. On Red Hat Enterprise Linux, the __________ boot loader is used.
a. LILO
b. GRUB
c. Anaconda
d. Debian
88. In a high-availability (HA) cluster, at least ______ servers are involved when offering high
availability of vital services.
a. One
b. Two
c. Ten
d. Thousand
89. Select components involved in setting up an HA cluster.
a. All of them
b. Fence devices
c. Ethernet bonding
d. Shared storage
90. A _______ is typically a hardware device, which is available to shut down another node, even
if the node itself has failed.
a. Shutdown device
b. Fencing device
c. Power off device
d. Halt device
91. Software-based iSCSI SAN is used to offer ______________ in a cluster.
a. Shared desktop
b. Shared network
c. Shared storage
d. Shared application
92. Identify Red Hat High Availability Software Component.
a. Corosync
b. Rgmanger
c. Pacemaker
d. All of the above
93. Red Hat offers ___________ as the default cluster file system.
a. EXT 4
b. XFS
c. GFS2
d. VFAT
94. PXE is
a. Primary Execution Environment
b. Preboot Execution Environment
c. Phase Execution Environment
d. Postfix Execution Environment
95. _____ file is a simple text file that contains configuration information for RHEL
installation. a. Boot
b. Kernel
c. Kickstart
d. Loader
96. To minimize the impact of network card failure and to get more bandwidth, ______ is often
used in HA cluster environments.
a. Cluster bonding
b. Redundant network card
c. Multiple interfaces
d. Ethernet bonding
97. The double bracket command provides advanced features for
a. String comparison
b. Mathematical expression
c. Logarithmic expression
d. Floating point number
98. The double parenthesis command is used for
a. String comparison
b. Mathematical expression
c. Logarithmic expression
d. Floating point number
99. The test command can evaluate
a. Numeric comparisons
b. String comparisons
c. File comparisons
d. All of the above
100. What would be the exit status of following command: $
asdfg a. 0
b. 1
c. 127
d. 255