Linux Essentials 2.0 & 2.21 | Working in Linux Module 3 | Chapter 03 Exam Answers Full 100%

  1. The Samba application is a:

    • File Server
    • Mail Server
    • Security Server
    • Web Server
  2. Which of the following are examples of desktop software?(choose two)

    • Compiler
    • Web browser
    • Music player
    • File share
    • Web server
  3. If you wanted to set up a blog, which software would be most helpful?

    • Samba
    • Postfix
    • Dovecot
    • MySQL
    • WordPress
  4. Which of the following pieces of software deal with file sharing?(choose three)

    • NFS
    • Samba
    • X-Windows
    • PostgreSQL
    • Netatalk
  5. If you wanted to create and print an invoice, which software could you use?

    • Evolution
    • Compiz
    • Firefox
    • LibreOffice
    • GNOME
  6. POP and IMAP are related to:

    • Letting users log in to multiple servers with 1 set of credentials
    • Email
    • Reading and writing music
    • Serving web pages
    • Sharing files
  7. When a computer boots, it can get its network information through:

    • DNS
    • SMTP
    • LDAP
    • DHCP
    • X11
  8. Which of the following are examples of text editors?

    (choose four)

    • pico​
    • vim
    • emacs
    • nano
    • Yum
  9. A package manager:(choose two)

    • Performs a fresh install of Linux
    • Keeps track of which files belong to which packages
    • Downloads software from the Internet
    • Emails you when software is out of date
    • Can optionally repartition your disk to make room for Linux
  10. An interpreted programming language: (choose two)

    • Tends to offer more features than compiled languages
    • Is converted into machine specific instructions as the program runs
    • Requires a compilation step but no linking step
    • Requires a linking step but no compilation step
    • Takes fewer resources to run than a compiled language
  11. Which of the following are true about compiled programming languages?

    • C is a compiled language
    • Ruby is a compiled language
    • Perl is a compiled language
    • A programmer is usually more productive when using a compiled language
    • Compiled languages are great for system administration tasks like scripting
  12. Which package manager is used in Fedora, a Red Hat derived system?

    • yum
    • tar
    • apt-get
    • vim
    • bash
  13. The Linux shell:

    (choose three)

    • Is responsible for tracking the location of configuration files
    • Is customizable
    • Has a built-in text editor
    • Has a scripting language
    • Allows you to launch programs
  14. Which application would you use to edit and piece together sound files to make a podcast?

    • GIMP
    • Audacity
    • Thunderbird
    • Bash
    • Audiolicious
  15. The two main families of Linux shells are:

    (choose two)

    • C Shell
    • Bourne Shell
    • Emacs
    • Python Shell
    • Korn shell
  16. Which server software would you use to create a company directory that you could search and authenticate against?

    • OpenLDAP
    • bind
    • Netatalk
    • ISC DHCP
    • Samba
  17. A Mail Transfer Agent’s primary purpose is to:

    • Deliver mail between servers
    • Manage the end user’s inbox
    • Filter out spam
    • Serve email to end clients
    • Act as a gateway between faxes and email
  18. Which of the following are examples of a web server?

    (choose two)

    • NFS
    • WordPress
    • postfix
    • Nginx
    • Apache
  19. If you wanted to let a Linux machine share files with Windows clients and servers, you would use:

    • Samba
    • bind
    • Netatalk
    • NFS
    • DNS
  20. Virtualization means:

    • Many users can share one hard drive
    • A machine can swap memory to disk
    • A user can connect to a server over the network and use a virtual console
    • Two users get different memory spaces on the same machine
    • A single host can be split up into multiple guests
  21. In virtualization, what are the host and guest? (choose two)

    • A guest is a virtual machine
    • The guest is the machine that runs the virtual machines
    • A host is a virtual machine
    • The terms can be used interchangeably
    • The host is the machine that runs the virtual machines
  22. Which of the following are traits of cloud computing? (choose two)

    • Scales IT resources so you pay for what you use
    • Only Linux works in cloud computing
    • You don’t have to worry about performance any more
    • You own the hardware but pay for it over time
    • Resources can be accessed from anywhere over a network
  23. If you wanted to write a report that was to be printed, you would probably use:

    • Chrome
    • LibreOffice
    • Adobe Flash
    • Firefox
    • A wiki
  24. To protect your privacy online, you can configure your computer to check for updates periodically. True or False?

    • True
    • False
  25. Which of the following is a tool that helps you anonymize your Internet browsing?

    • CookieCleaner
    • Tor Browser
    • AnonFirefox
    • Web proxy
    • Iptables
  26. Cloud computing is:

    • All are correct
    • Is made possible by faster internet speeds
    • Requires fewer resources because systems are shared among many users
    • Allows users in different geographical regions to work together in real time
    • Is useful for both business and home users
  27. The term for individual computers running multiple systems at the same time is:

    • Cloud priority
    • Googleization
    • Virtualization
    • Distribution
    • MultiRun
  28. Which of the following are traits of a multiuser operating system?

    (choose three)

    • Many users can log in simultaneously with a unique account
    • Users can protect their information from other users
    • An administrative user gets a dedicated CPU
    • Resources are shared between users
    • Each user can only log in once per day
  29. If you want to store logins and passwords for different websites in a secure manner, you could use:

    • In a spiral bound notebook in your file cabinet
    • A text file in your home directory
    • KeePassX
    • A LibreOffice document
    • A sticky note on your monitor
  30. Two components that provide the ability to implement a firewall include:

    (choose two)

    • ipfw
    • Cerberus
    • gufw
    • iptables
    • ifconfig
  31. What are tradeoffs of increasing the level of privacy you have in your web browser?

    (choose two)

    • Images won’t load properly
    • Sites may not work properly
    • You may get viruses
    • Websites may load slower
    • You may have to explicitly permit some cookies to be saved
  32. Social network “like” buttons can track your activity across the Internet.

    True or False?

    • True
    • False
  33. Which of the following are properties of a strong password?

    (choose three)

    • Based on easy to remember items like birthdays
    • Includes symbols
    • At least 10 characters long
    • A mix of upper and lower case
    • Long so that it can be reused on multiple sites
  34. What can be done to prevent unauthorized users from accessing your computer remotely?

    (choose two)

    • Use strong passwords on all user accounts
    • Don’t use wireless networks – only wired
    • Block all cookies
    • Turn on a firewall
    • Block third party cookies
  35. In graphical mode, you can get to a shell by running which applications?

    (choose two)

    • console
    • Terminal
    • Gbash
    • Xterm
    • Guiterm
5 1 vote
Article Rating
Notify of
Inline Feedbacks
View all comments