Sunteți pe pagina 1din 5

What best describes the purpose of the .htaccess file?

To password protect a web directory


To limit access to the web directory from specified IPs
To override default web server configuration options
To store variables for use by the web server
2 Which of the following commands can you use to see the amount of swap space th
at is being used on your system?
/proc/free
free
ms
/proc/memuse
3 Which of the following entries would you add to the hosts.allow file to give a
ccess to the web server from a network of 10.10.10.0?
http: 10.10.10.
smtp: 10.10.10.
http: 10.10.10.1
http - 10.10.10
4A process called 'elix' is running with process id 402. Which directory contain
s information about the process?
/var/log/run/402/
/proc/elix/
/var/tmp/402
/proc/402
5 When you point your web browser to a CGI script you receive an Internal Server
Error. Which of the following is least likely to be the cause of the problem?
Incorrect permissions on the CGI script
A failure of the web server
A syntax error in the CGI script
The CGI script printing text before printing the CGI header
6 When you point your web browser to a CGI script you receive an Internal Server
Error. Which of the following is least likely to be the cause of the problem?
Incorrect permissions on the CGI script
A failure of the web server
A syntax error in the CGI script
The CGI script printing text before printing the CGI header
7 In the /etc/passwd file, what is the significance of an X in the password fiel
d?
It indicates that the password is set to X
It indicates that the password is shadowed
It indicates that the account is disabled
It indicates that the password has yet to be set on this account
8 What is the purpose of the SUID permission?
It allows a file to be executed with the supervisor permission
It allows a file to be executed with the permissions of the owner
It allows a file to be executed with the permissions of a group
It allows a file to be executed with the permissions provided on the com
mand line

9 What is the significance of square brackets around a process when looking at a


listing produced by the ps command?
The process has died
The task is a kernel task and cannot be killed
The task is sleeping
The task is being run from another virtual terminal
10 Which of the following commands would you use to determine what application o
r process created a core dump?
file
coreid
find
showcore

11 Which of the following commands would give you a list of the IDE hard disks i
nstalled on your system?
dmesg | grep hd
dmesg | hd grep
dmesg | grep HDD
dmesg | grep sd
12 Which of the following do you use to remove all the loaded modules that are n
ot currently in use?
lsmod -r
rmmod -r
rmmod -a
rmmod -removeall
13 In a .htaccess file, what would the following directive do?
<Limit GET>
Require user sunil alex teena reshmi
</Limit>
Allow access only to the listed users if they already exist as real user
s on the system
Allow access only to the listed users if they exist as users in a pre-de
fined file containing the list of users
Allow access to everyone but require a password from these users
Require that the listed users be the owners of the files they are access
ing
14 On your Debian system you add a network interface (eth0:4) to the /etc/networ
k/interfaces file. Which of the following commands do you use to activate the in
terface?
interfaces eth0:4
interfaces -a eth0:4
ifup -a
ifdown -a
15 Which of the following is required to decrypt a file that was initially encry
pted with the GPG key for foo@bar.org?
The secret key for foo@bar.org
The public key for foo@bar.org
The secret key and passphrase for foo@bar.org
The public key and passphrase for foo@bar.org
16 Which of the following commands enables you to check the current kernel versi
on?
cat /proc/version
cat /proc/kernel
cat /proc/lkernel
cat /proc/vkernel
17 With Apache, which of the following is normally true of the ServerRoot?
It is the directory from which the HTTP server is started
It contains the primary configuration files
It contains subdirectories that contain the primary configuration files
It contains the log files for the server
18 Which of the following would you say is the most important thing to do to sec
ure a server?
Regularly change server passwords
Operate a firewall
Make use of tcpwrapper
Keep all server software up-to-date
Use secure replacements like SSH instead of telnet and SCP instead of FT
P
19 You are contacted by a client who requires support for certain services which
is not offered by your company. Also you are aware that this client is one of t
he long term client of your company. What do you think would be the best way to
handle this situation and draft a complete reply to the customer.
20 You are contacted by a customer who is willing to do business with your compa
ny, but would like to get some discounts. But the company policy won't allow you
to provide this discount. But knowing that this is a prospective customer, woul
d you waive your company policy for this prospective client. If yes/no, please w
rite a complete reply to the customer based on the hypothetical scenario above.
21 While working on the server you accidentally deleted certain files which are
owned by the customer. Later you are contacted by the client and he complains hi
s files are missing. What do you think would be the best way to handle this situ
ation draft a complete reply to the customer.
22. What is the missing word in this sentence:
The computer puzzle was so ______ that none of us could work it out?
immense
dramatic
simplistic
challenging
outweighed
superficial
23. Which phrase best completes the following conversation?
'I need some money'. 'Ok, _____ you some'.
I'm lending
I have lend
lending
I'll lend
24 What is the missing word in this paragraph:
Dear Mr Sunil, I am not sure if we should proceed with the client's instructions
. Please ______ .
advice
tell
certify
advise
clear
mention
25 Which words can be used to complete these sentences:
1. Mary _____ Japanese very well.
2. I don't often _____ tea.
3. The shop _____ at 7.30 every morning.
4. Bad driving _____ many accidents.
1. speaks, 2. drinks, 3. opens, 4. causes
1. speaks, 2. drink, 3. opens, 4. causes
1. speak, 2. drink, 3. open, 4. cause
1. speaks, 2. take, 3. opens, 4. causes
1. speak, 2. drink, 3. opens, 4. causes
1. speaks, 2. drinks, 3. opens, 4. causes
26 What is the missing word: The benefits of computer games _____ the negative a
spects.
benefit
lopside
contradict
are
outweigh
beat
27 Which phrase best completes the following:
Mark and Diane _____ in London.
both were born
were each born
were both born
are both born
28 Dejected means:
miserable and crestfallen
unemotional about things
quietly tough
hiding one's feelings
29 Which phrase best completes the following sentence?
_____ you outside the hotel in half an hour, ok?
I meet
I'll meet
Will I meet
Shall I meet
30 Which phrase best completes the following:
How much of the earth's surface _____ by water?
is being covered
has been covered
is having coverage
is covered
31 Which word best completes the following sentence:
I asked her what happened but she _____ tell me.
doesn't
shan't
mustn't
won't
32 A fallacious argument is:
Disturbing
Valid
False
Necessary
33 If you rearrange the letters "MANGERY" you would have the name of a:
Ocean
Country
State
City
Animal
34 The pure and simple truth is rarely pure and never _______ .
Complete
Accurate
Complex
Simple
Wise
35 Which does not fit?
locksmith
accountant
baker
psychologist
employee

S-ar putea să vă placă și