Q1. CORRECT TEXT - (Topic 6)
With X11 forwarding in ssh, what environment variable is automatically set in the remote host shell that is not set when X11 forwarding is not enabled? (Specify only the environment variable without any additional commands or values.)
Answer: DISPLAY, $DISPLAY
Q2. - (Topic 1)
Which of the following commands puts the output of the command date into the shell variable mydate?
A. mydate="$(date)"
B. mydate="exec date"
C. mydate="$((date))"
D. mydate="date"
E. mydate="${date}"
Answer: A
Q3. CORRECT TEXT - (Topic 5)
How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)
Answer: 14
Q4. - (Topic 3)
What is the purpose of the iconv command?
A. It converts bitmap images from one format to another such as PNG to JPEG.
B. It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS).
C. It displays additional meta information from icon files ending in .ico.
D. It changes the mode of an inode in the ext4 file system.
E. It converts files from one character encoding to another.
Answer: E
Q5. - (Topic 5)
Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.)
A. 127.0.0.0/8
B. 10.0.0.0/8
C. 169.255.0.0/16
D. 172.16.0.0/12
E. 192.168.0.0/16
Answer: B,D,E
Q6. - (Topic 3)
Which of the following crontab entries will execute myscript at 30 minutes past every hour on Sundays?
A. 0 * * * 30 myscript
B. 30 * * * 6 myscript
C. 30 0 * * 0 myscript
D. 30 0-23 * * 0 myscript
E. 0 0-23 * * 30 myscript
Answer: D
Q7. CORRECT TEXT - (Topic 6)
Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)
Answer: /etc/xinetd.d/, /etc/xinetd.d
Q8. - (Topic 6)
What is a purpose of an SSH host key?
A. It must be sent by any SSH client in addition to a user key in order to identify the client's host.
B. It provides the server's identity information to connecting SSH clients.
C. It is the root key by which all user SSH keys must be signed.
D. It authenticates any user that logs into a remote machine from the key's host.
E. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
Answer: B
Q9. CORRECT TEXT - (Topic 5)
Which command is used to set the hostname of the local system? (Specify ONLY the command without any path or parameters.)
Answer: hostname
Q10. CORRECT TEXT - (Topic 5)
With IPv6, how many bits have been used for the interface identifier of an unicast address? (Specify the number using digits only.)
Answer: 64