Home
21.
Sometimes a server reboot may be necessary. Which of the following is not typically one of them?
  • A.
    To recover from serious problems such as server hangs and kernel panics
  • B.
    To apply kernel updates
  • C.
    To apply changes to kernel modules that are used and because of that cannot be reloaded easily
  • D.
    To apply changes to the network configuration
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Typically, a server reboot is only necessary after making changes to the kernel and kernel modules that are in use. Changing the network configuration does not normally require a reboot, because it is possible to just restart the network service.
Report
Name Email  
22.
Which of the following is true about remote access to Linux servers from a Windows environment?
  • A.
    Open a shell terminal on Windows and type ssh . The ssh command is available as a default part of the Windows operating system.
  • B.
    Configure Remote Access on Windows if you want to access Linux servers running the sshd process.
  • C.
    Install the PuTTY program on Windows to access sshd services on Linux from Windows.
  • D.
    You cannot remotely access Linux machines from Windows.
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Windows has no native support for SSH. You need to install PuTTY or similar software to remotely connect to Linux using SSH.
Report
Name Email  
23.
What is the name of the file in which the public key fingerprint of the SSH servers you have connected to in the past are stored?
  • A.
    /etc/ssh/remote_hosts
  • B.
    /etc/ssh/known_hosts
  • C.
    ~/.ssh/remote_hosts
  • D.
    ~/.ssh/known_hosts
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Key fingerprints of hosts that you have previously connected to are stored in your home directory, in the subdirectory .ssh in a file with the name known_hosts.
Report
Name Email  
24.
To allow graphical applications to be used through an SSH session, you can set a parameter in the /etc/ssh/ssh_config file. Using this parameter makes it unnecessary to use the -X command-line option each time an SSH session is initiated. Which of the following parameters should be used?
  • A.
    Host *
  • B.
    TunnelX11 yes
  • C.
    ForwardX11 yes
  • D.
    Xclient yes
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The ForwardX11 option in the /etc/ssh/ssh_config file enables support for graphical applications through SSH.
Report
Name Email  
25.
Which of the following statements about key-based SSH authentication is true?
  • A.
    After creating the key pair, you need to copy the private key to the remote server.
  • B.
    Use scp to copy the public key to the remote server.
  • C.
    Use ssh-copy-id to copy the public key to the remote server.
  • D.
    Use ssh-keygen on the server to generate a key pair that matches the client keys.
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
To initiate key-based remote authentication, you should copy the public key to the remote server. The most convenient way to do so is using the ssh-copy-id command.
Report
Name Email