0% found this document useful (0 votes)
7 views

SysAdmin Practice Exam

The document consists of a series of multiple-choice questions related to network and system administration, covering topics such as Linux directories, Microsoft Active Directory, system policies, network policies, and various commands. It tests knowledge on automation tools, DNS configuration, file permissions, and security concepts. The questions are designed to assess the understanding of fundamental concepts and practices in network and system administration.

Uploaded by

kiracherub866
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

SysAdmin Practice Exam

The document consists of a series of multiple-choice questions related to network and system administration, covering topics such as Linux directories, Microsoft Active Directory, system policies, network policies, and various commands. It tests knowledge on automation tools, DNS configuration, file permissions, and security concepts. The questions are designed to assess the understanding of fundamental concepts and practices in network and system administration.

Uploaded by

kiracherub866
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Network and System Admin Questions: Choose the correct answer

1. Which Linux directory is used to store Network server’s information


A) /temp
B) /export
C) /dev
D) /etc/home
2. _______ is a collection of domain within a Microsoft active directory network in which each
domain has exactly one parent, leading to a hierarchical tree structure
A) Tree
B) Domain
C) Forest
D) Active directory
3. System policy includes;
A) Organisational rights and responsibilities
B) User rights and Account procedures
C) Network infrastructure and access rights
D) Application limits and responsibilities
E) Security and privacy
F) All
4. One of the following cannot be a Network policy for a system administrator?
A) Network structure (design and functional requirements)
B) Operational goals
C) Segmentation and name resolution
D) Address configuration
E) None
5. One is false about Clock Synchronisation
A) Keep the time-of-day clocks set correctly on all hosts within a network
B) Security and maintenance tasks depend on time-of-day or elapsed time
C) Hardware clock accuracy is always the same
D) Can use UNIX script “rsh” command)
6. Which of the following is a Windows Schedule service command
A) at command
B) crontab command
C) ft command
D) usr/bin/script command
7. one is not an automation tool in system configuration policy
A) Tivoli and HP OpenView
B) Microsoft SMS and Sun Solstice
C) Host Factory and GNU/Linux tools
D) None
8. An environment for turning system policy into automated maintenance actions is ______
A) Preventative maintenance
B) Cfengine
C) SNMP tool
D) Garbage collection
9. Which is false about cfengine automation tool?
A) It’s a language used to define policies and a run-time environment to interpret and
implement these policies
B) Defining how all hosts in network are to be configured
C) Check and set file permissions
D) Delete ‘junk’ files
E) None
10. System shutdown means;
A) Complete all operations in progress
B) Prevent new operations from starting
C) Synchronise and Flush buffers/caches
D) Dismount/park/eject disks
E) all
11. DNS configuration in LINUX can be done through ________
A) /etc/resolv.conf
B) /etc/nsswitch.conf
C) /etc/dev
D) A and B
12. Which is false about this output “- rwxrwxr-x 1 mike student 0 Sep 26 12:25 test”
A) The first set of rwx symbols define owner access permission
B) It’s the output of Ls –l
C) the file is readable, writable, and not executable by the group owner
D) The file is world-readable and world-executable, but not world-writable
13. The command cp file_1 file_2;
A) copies file_1 to file_2
B) copies file_2 to file_1
C) move file_1 to file_2
D) delete file_1
14. which is false about root account;
A) has UID of 1
B) has UID of 0
C) Can change the name and create other users
D) perform any valid operation on any file or process
15. _______is when a sender or receiver want to ensure that message is not altered (in transit, or afterwards)
without detection
A) Confidentiality
B) Integrity
C) Authentication
D) Availability
16. Which one of the following is not the system administrator’s code of Ethics
A) Professionalism
B) Privacy Social
C) Responsibility
D) None
17. __________ is a server that responds to authentication requests and verifies users on computer
networks
A) Domain controller
B) member server
C) active directory
D) DNS
18. Which is false about workgroup;
A) All computers in the network are equally treated
B) All computers can be a client and a server
C) it’s a collection of computers on a LAN that share common resources and responsibilities
D) Users can be given access to resources anywhere in the domain
19. Monitoring the whole network and make repairs and changes before problems appear is called
A) Firefighting technique
B) Preventive technique
C) Firewall configuration
D) IPSec
20. One of the following is true about UNIX file system
A) The i-node contains essential information needed to locate a file on the disk
B) Top/start of UNIX file tree is called /etc file system
C) Unlike windows, it do not follow hierarchal file system of directories and sub directory
D) index entry stored in the special part of the file system is not important for each file
21. Which Linux command is used to change users access permission
A) Chmod
B) Grpmod
C) Chown
D) Chgrp
22. _______________ is a duplicate directory reference to an inode in the filesystem
A) Symbolic link
B) Soft link
C) Hard link
D) All
23. _________ is described as the ‘Swiss army knife’ of network utilities to reads and writes data
across network connections using TCP or UDP protocols
A) SSH
B) Cfengine
C) Netcat
D) getHttp
24. In Linux disk partitioning, which partition is the first partition of standard disk controller or the
root file system
A) /dev/sd0a
B) /dev/sd01
C) /dev/sd0b
D) /dev/sd1c
25. _________ is a gate-keeper which limits access to and from any network
A) Router
B) Firewall
C) IPSec
D) www security
26. The process of detecting, isolating and correcting the abnormal operation of OSI environment in
system administration is called________
A) Fault Management
B) Configuration & Name Management
A) Performance management
C) Security management
27. _____is a network traffic filtering that can control incoming or outgoing traffic based on set of
rules that define how to forward or block a packet
A) Security Management
B) Fault Management
C) Access Control List
D) Jobs and Audits
28. A collection of resources such as file handling, allocated memory, program code and CPU
registers that associated with a specific running program is called____
A) System
B) Process
C) Log and audit
D) Preventive and firefighting techniques
29. What is in /usr/bin of Ubuntu directory?
A) Binary or executable programs
B) Files which are more executable from OS
C) super user utilities which perform super user activities
D) Hardware and related devices
30. __________ command is used to login without a password using the .rhosts authority file for
trusted hosts and users
A) rlogin
B) du
C) telnet
D) rhosts
31. Which file you need to edit to configure a new service on Unix like operating system
A) /etc/server
B) /etc/services
C) /unix/etc/services
D) None

You might also like