21.
Sometimes a server reboot may be necessary. Which of the following is not
typically one of them?
- A.To recover from serious problems such as server hangs and kernel panics
- B.To apply kernel updates
- C.To apply changes to kernel modules that are used and because of that cannot be reloaded easily
- D.To apply changes to the network configuration
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Typically, a server reboot is only necessary after making changes to the kernel and kernel modules that are in use. Changing the network configuration does not normally require a reboot, because it is possible to just restart the network service. |
22.
Which of the following is true about remote access to Linux servers from a
Windows environment?
- A.Open a shell terminal on Windows and type ssh . The ssh command is available as a default part of the Windows operating system.
- B.Configure Remote Access on Windows if you want to access Linux servers running the sshd process.
- C.Install the PuTTY program on Windows to access sshd services on Linux from Windows.
- D.You cannot remotely access Linux machines from Windows.
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Windows has no native support for SSH. You need to install PuTTY or similar software to remotely connect to Linux using SSH. |
23.
What is the name of the file in which the public key fingerprint of the SSH
servers you have connected to in the past are stored?
- A./etc/ssh/remote_hosts
- B./etc/ssh/known_hosts
- C.~/.ssh/remote_hosts
- D.~/.ssh/known_hosts
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Key fingerprints of hosts that you have previously connected to are stored in your home directory, in the subdirectory .ssh in a file with the name known_hosts. |
24.
To allow graphical applications to be used through an SSH session, you can
set a parameter in the /etc/ssh/ssh_config file. Using this parameter makes it
unnecessary to use the -X command-line option each time an SSH session is
initiated. Which of the following parameters should be used?
- A.Host *
- B.TunnelX11 yes
- C.ForwardX11 yes
- D.Xclient yes
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The ForwardX11 option in the /etc/ssh/ssh_config file enables support for graphical applications through SSH. |
25.
Which of the following statements about key-based SSH authentication is
true?
- A.After creating the key pair, you need to copy the private key to the remote server.
- B.Use scp to copy the public key to the remote server.
- C.Use ssh-copy-id to copy the public key to the remote server.
- D.Use ssh-keygen on the server to generate a key pair that matches the client keys.
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
To initiate key-based remote authentication, you should copy the public key to the remote server. The most convenient way to do so is using the ssh-copy-id command. |