NDG Linux Essentials 2.0 Chapter 3 Exam Answers
NDG Linux Essentials 2.0 Chapter 3 Exam Answers
0 Chapter 3 Exam
Answers
Posted on May 9, 2019 by Admin Last Updated on May 10, 2019
4. Which of the following pieces of software deal with file sharing? (choose three)
o X-Windows
o PostgreSQL
o Netatalk
o Samba
o NFS
5. If you wanted to create and print an invoice, which software could you use?
o Evolution
o LibreOffice
o GNOME
o Compiz
o Firefox
11. Which of the following are true about compiled programming languages?
o Ruby is a compiled language
o Compiled languages are great for system administration tasks like scripting
o C is a compiled language
o Perl is a compiled language
o A programmer is usually more productive when using a compiled language
12. Which package manager is used in Fedora, a Red Hat derived system?
o tar
o bash
o yum
o vim
o apt-get
13. The Linux shell: (choose three)
o Is customizable
o Has a built-in text editor
o Allows you to launch programs
o Has a scripting language
o Is responsible for tracking the location of configuration files
14. Which application would you use to edit and piece together sound files to make a
podcast?
o Audiolicious
o GIMP
o Thunderbird
o Bash
o Audacity
15. The two main families of Linux shells are: (choose two)
o Emacs
o C Shell
o Bourne Shell
o Python Shell
o Korn shell
16. Which server software would you use to create a company directory that you could
search and authenticate against?
o bind
o OpenLDAP
o Samba
o ISC DHCP
o Netatalk
18. Which of the following are examples of a web server? (choose two)
o NFS
o postfix
o WordPress
o Nginx
o Apache
19. If you wanted to let a Linux machine share files with Windows clients and servers,
you would use:
o Netatalk
o DNS
o Samba
o NFS
o Bind
21. In virtualization, what are the host and guest? (choose two)
o The terms can be used interchangeably
o A guest is a virtual machine
o A host is a virtual machine
o The host is the machine that runs the virtual machines
o The guest is the machine that runs the virtual machines
22. Which of the following are traits of cloud computing? (choose two)
o You don’t have to worry about performance any more
o Resources can be accessed from anywhere over a network
o Scales IT resources so you pay for what you use
o You own the hardware but pay for it over time
o Only Linux works in cloud computing
23. If you wanted to write a report that was to be printed, you would probably use:
o A wiki
o Adobe Flash
o Firefox
o Chrome
o LibreOffice
24. To protect your privacy online, you can configure your computer to check for
updates periodically. (True or False) ?
o True
o False
25. Which of the following is a tool that helps you anonymize your Internet browsing?
o Web proxy
o Tor Browser
o Iptables
o AnonFirefox
o CookieCleaner
27. The term for individual computers running multiple systems at the same time is:
o MultiRun
o Cloud priority
o Distribution
o Virtualization
o Googleization
28. Which of the following are traits of a multiuser operating system? (choose three)
o Many users can log in simultaneously with a unique account
o Users can protect their information from other users
o Resources are shared between users
o Each user can only log in once per day
o An administrative user gets a dedicated CPU
29. If you want to store logins and passwords for different websites in a secure manner,
you could use:
o A text file in your home directory
o A LibreOffice document
o A sticky note on your monitor
o KeePassX
o In a spiral bound notebook in your file cabinet
30. Two components that provide the ability to implement a firewall include:
(choose two)
o iptables
o gufw
o ifconfig
o Cerberus
o Ipfw
31. What are tradeoffs of increasing the level of privacy you have in your web browser?
(choose two)
32. Social network “like” buttons can track your activity across the Internet.
True or False?
o True
o False
33. Which of the following are properties of a strong password? (choose three)
o At least 10 characters long
o Based on easy to remember items like birthdays
o Includes symbols
o Long so that it can be reused on multiple sites
o A mix of upper and lower case
34. What can be done to prevent unauthorized users from accessing your computer
remotely? (choose two)
o Block third party cookies
o Turn on a firewall
o Block all cookies
o Use strong passwords on all user accounts
o Don’t use wireless networks – only wired
35. In graphical mode, you can get to a shell by running which applications?
(choose two)
o Terminal
o Gbash
o console
o Xterm
o Guiterm