The document consists of a series of multiple-choice questions related to network and system administration, covering topics such as Linux directories, Microsoft Active Directory, system policies, network policies, and various commands. It tests knowledge on automation tools, DNS configuration, file permissions, and security concepts. The questions are designed to assess the understanding of fundamental concepts and practices in network and system administration.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
7 views
SysAdmin Practice Exam
The document consists of a series of multiple-choice questions related to network and system administration, covering topics such as Linux directories, Microsoft Active Directory, system policies, network policies, and various commands. It tests knowledge on automation tools, DNS configuration, file permissions, and security concepts. The questions are designed to assess the understanding of fundamental concepts and practices in network and system administration.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
Network and System Admin Questions: Choose the correct answer
1. Which Linux directory is used to store Network server’s information
A) /temp B) /export C) /dev D) /etc/home 2. _______ is a collection of domain within a Microsoft active directory network in which each domain has exactly one parent, leading to a hierarchical tree structure A) Tree B) Domain C) Forest D) Active directory 3. System policy includes; A) Organisational rights and responsibilities B) User rights and Account procedures C) Network infrastructure and access rights D) Application limits and responsibilities E) Security and privacy F) All 4. One of the following cannot be a Network policy for a system administrator? A) Network structure (design and functional requirements) B) Operational goals C) Segmentation and name resolution D) Address configuration E) None 5. One is false about Clock Synchronisation A) Keep the time-of-day clocks set correctly on all hosts within a network B) Security and maintenance tasks depend on time-of-day or elapsed time C) Hardware clock accuracy is always the same D) Can use UNIX script “rsh” command) 6. Which of the following is a Windows Schedule service command A) at command B) crontab command C) ft command D) usr/bin/script command 7. one is not an automation tool in system configuration policy A) Tivoli and HP OpenView B) Microsoft SMS and Sun Solstice C) Host Factory and GNU/Linux tools D) None 8. An environment for turning system policy into automated maintenance actions is ______ A) Preventative maintenance B) Cfengine C) SNMP tool D) Garbage collection 9. Which is false about cfengine automation tool? A) It’s a language used to define policies and a run-time environment to interpret and implement these policies B) Defining how all hosts in network are to be configured C) Check and set file permissions D) Delete ‘junk’ files E) None 10. System shutdown means; A) Complete all operations in progress B) Prevent new operations from starting C) Synchronise and Flush buffers/caches D) Dismount/park/eject disks E) all 11. DNS configuration in LINUX can be done through ________ A) /etc/resolv.conf B) /etc/nsswitch.conf C) /etc/dev D) A and B 12. Which is false about this output “- rwxrwxr-x 1 mike student 0 Sep 26 12:25 test” A) The first set of rwx symbols define owner access permission B) It’s the output of Ls –l C) the file is readable, writable, and not executable by the group owner D) The file is world-readable and world-executable, but not world-writable 13. The command cp file_1 file_2; A) copies file_1 to file_2 B) copies file_2 to file_1 C) move file_1 to file_2 D) delete file_1 14. which is false about root account; A) has UID of 1 B) has UID of 0 C) Can change the name and create other users D) perform any valid operation on any file or process 15. _______is when a sender or receiver want to ensure that message is not altered (in transit, or afterwards) without detection A) Confidentiality B) Integrity C) Authentication D) Availability 16. Which one of the following is not the system administrator’s code of Ethics A) Professionalism B) Privacy Social C) Responsibility D) None 17. __________ is a server that responds to authentication requests and verifies users on computer networks A) Domain controller B) member server C) active directory D) DNS 18. Which is false about workgroup; A) All computers in the network are equally treated B) All computers can be a client and a server C) it’s a collection of computers on a LAN that share common resources and responsibilities D) Users can be given access to resources anywhere in the domain 19. Monitoring the whole network and make repairs and changes before problems appear is called A) Firefighting technique B) Preventive technique C) Firewall configuration D) IPSec 20. One of the following is true about UNIX file system A) The i-node contains essential information needed to locate a file on the disk B) Top/start of UNIX file tree is called /etc file system C) Unlike windows, it do not follow hierarchal file system of directories and sub directory D) index entry stored in the special part of the file system is not important for each file 21. Which Linux command is used to change users access permission A) Chmod B) Grpmod C) Chown D) Chgrp 22. _______________ is a duplicate directory reference to an inode in the filesystem A) Symbolic link B) Soft link C) Hard link D) All 23. _________ is described as the ‘Swiss army knife’ of network utilities to reads and writes data across network connections using TCP or UDP protocols A) SSH B) Cfengine C) Netcat D) getHttp 24. In Linux disk partitioning, which partition is the first partition of standard disk controller or the root file system A) /dev/sd0a B) /dev/sd01 C) /dev/sd0b D) /dev/sd1c 25. _________ is a gate-keeper which limits access to and from any network A) Router B) Firewall C) IPSec D) www security 26. The process of detecting, isolating and correcting the abnormal operation of OSI environment in system administration is called________ A) Fault Management B) Configuration & Name Management A) Performance management C) Security management 27. _____is a network traffic filtering that can control incoming or outgoing traffic based on set of rules that define how to forward or block a packet A) Security Management B) Fault Management C) Access Control List D) Jobs and Audits 28. A collection of resources such as file handling, allocated memory, program code and CPU registers that associated with a specific running program is called____ A) System B) Process C) Log and audit D) Preventive and firefighting techniques 29. What is in /usr/bin of Ubuntu directory? A) Binary or executable programs B) Files which are more executable from OS C) super user utilities which perform super user activities D) Hardware and related devices 30. __________ command is used to login without a password using the .rhosts authority file for trusted hosts and users A) rlogin B) du C) telnet D) rhosts 31. Which file you need to edit to configure a new service on Unix like operating system A) /etc/server B) /etc/services C) /unix/etc/services D) None
Software Containers: The Complete Guide to Virtualization Technology. Create, Use and Deploy Scalable Software with Docker and Kubernetes. Includes Docker and Kubernetes.
Docker: The Complete Guide to the Most Widely Used Virtualization Technology. Create Containers and Deploy them to Production Safely and Securely.: Docker & Kubernetes, #1