NDG Linux Essentials 2.21 | Working in Linux Module 3 | Chapter 03 Exam Answers Full 100% 2013

These are questions of Cisco NDG Linux Essentials 2.21 Working in Linux Chapter 03 Exam Answers with the latest version and updated in 2023. All answers are verified by experts with explanations.

  1. The Samba application is a:

    • File Server
    • Mail Server
    • Security Server
    • Web Server
    • Answers Explanation & Hint:

      The Samba application is primarily a file server. It is an open-source implementation of the Server Message Block (SMB) protocol, which allows file and printer sharing between computers. Samba enables file sharing between systems running different operating systems, such as Windows, Linux, and macOS, by providing compatibility with the SMB/CIFS protocols used by Windows systems. While Samba can provide limited support for other server functionalities like acting as a print server, its primary focus is on file sharing. It is not specifically designed to function as a mail server, security server, or web server.

  2. Which of the following are examples of desktop software?
    (choose two)

    • Compiler
    • Web browser
    • Music player
    • File share
    • Web server
    • Answers Explanation & Hint:

      1. Web browser: A web browser is a software application used to access and view websites and webpages on the internet. It allows users to navigate the World Wide Web, view multimedia content, and interact with web-based applications.
      2. Music player: A music player is a software application designed to play audio files. It allows users to organize and play their music collection, create playlists, and control playback options such as volume, shuffle, and repeat.

      Please note that compilers, file shares, and web servers are not typically considered as desktop software. Compilers are tools used for software development, file sharing is a network service, and web servers are primarily used to host websites and web applications on servers rather than being directly installed on desktop computers.

  3. If you wanted to set up a blog, which software would be most helpful?

    • Samba
    • Postfix
    • Dovecot
    • MySQL
    • WordPress
    • Answers Explanation & Hint:

      The software that would be most helpful for setting up a blog is WordPress.

      WordPress is a popular content management system (CMS) and blogging platform. It provides a user-friendly interface for creating and managing websites, including blogs. With WordPress, you can easily create and customize your blog, publish posts, manage media files, install themes and plugins, and interact with your readers through comments and social media integration.

      On the other hand, Samba is a file server software, Postfix and Dovecot are email server software, and MySQL is a relational database management system. While these tools may be useful for other purposes, they are not specifically designed for setting up and managing a blog like WordPress is.

  4. Which of the following pieces of software deal with file sharing?
    (choose three)

    • NFS
    • Samba
    • X-Windows
    • PostgreSQL
    • Netatalk
    • Answers Explanation & Hint:

      The three pieces of software that deal with file sharing from the given options are:

      1. NFS (Network File System): NFS is a distributed file system protocol that allows files and directories to be shared and accessed over a network. It is commonly used in Unix and Linux environments for file sharing between systems.
      2. Samba: Samba, as mentioned earlier, is an open-source implementation of the Server Message Block (SMB) protocol. It allows for file and printer sharing between computers running different operating systems, such as Windows, Linux, and macOS.
      3. Netatalk: Netatalk is an open-source implementation of Apple’s AppleTalk networking protocol suite. It provides file sharing services specifically for macOS and Unix-like systems, allowing them to act as file servers for Mac clients using the Apple Filing Protocol (AFP).

      X-Windows and PostgreSQL do not directly deal with file sharing. X-Windows is a system for managing graphical user interfaces in Unix-like operating systems, and PostgreSQL is an open-source relational database management system.

  5. If you wanted to create and print an invoice, which software could you use?

    • Evolution
    • Compiz
    • Firefox
    • LibreOffice
    • GNOME
    • Answers Explanation & Hint:

      To create and print an invoice, you could use the software called LibreOffice.

      LibreOffice is a popular open-source office suite that provides various applications for word processing, spreadsheets, presentations, and more. The suite includes an application called LibreOffice Calc, which is comparable to Microsoft Excel, and can be used to create and manage invoices. You can design and customize your invoice template, input the necessary details, perform calculations if needed, and then print the invoice directly from LibreOffice.

      Evolution is an email and personal information management application. Compiz is a window manager and compositing manager for Linux desktop environments. Firefox is a web browser. GNOME is a desktop environment. While these software applications serve different purposes, they are not specifically designed for invoice creation and printing like LibreOffice.

  6. POP and IMAP are related to:

    • Letting users log in to multiple servers with 1 set of credentials
    • Email
    • Reading and writing music
    • Serving web pages
    • Sharing files
    • Answers Explanation & Hint:

      POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) are both related to email.

      POP and IMAP are protocols used for accessing and managing email messages. They allow users to retrieve email messages from a mail server and interact with their email accounts.

      Here are some key characteristics of POP and IMAP:

      1. POP (Post Office Protocol): POP is an older email retrieval protocol that downloads emails from a mail server to a client device (such as a computer or smartphone). With POP, messages are typically removed from the server once they are downloaded to the client device, which means that accessing emails from multiple devices may result in inconsistent email synchronization.
      2. IMAP (Internet Message Access Protocol): IMAP is a more modern and advanced email retrieval protocol. It allows users to access and manage their email messages directly on the mail server. With IMAP, email messages remain on the server, and any changes made on one device (e.g., reading, deleting, or moving messages) are reflected across all devices accessing the same email account. IMAP enables users to log in to multiple servers with one set of credentials and access their email from different devices.

      Therefore, POP and IMAP are protocols specifically designed for email-related functionalities, not for reading and writing music, serving web pages, or sharing files.

  7. When a computer boots, it can get its network information through:

    • DNS
    • SMTP
    • LDAP
    • DHCP
    • X11
    • Answers Explanation & Hint:

      When a computer boots, it can obtain its network information through the DHCP (Dynamic Host Configuration Protocol).

      DHCP is a network protocol that automatically assigns IP addresses, subnet masks, default gateways, and other network configuration settings to devices on a network. When a computer boots and connects to a network, it can send a DHCP request to a DHCP server. The DHCP server then provides the necessary network information to the computer, allowing it to join the network and communicate with other devices.

      DNS (Domain Name System) is responsible for translating domain names into IP addresses and is not directly involved in providing network configuration information during booting.

      SMTP (Simple Mail Transfer Protocol) is used for sending email messages and is not related to obtaining network information during booting.

      LDAP (Lightweight Directory Access Protocol) is a protocol used for accessing and managing directory information, typically for user authentication and directory services. It is not specifically used for obtaining network information during the boot process.

      X11 is a network protocol used for graphical user interfaces, specifically for remote display and control of graphical applications. It is not involved in obtaining network information during booting.

  8. Which of the following are examples of text editors?

    (choose four)

    • pico​
    • vim
    • emacs
    • nano
    • Yum
    • Answers Explanation & Hint:

      Four examples of text editors from the given options are:

      1. pico: pico is a simple and lightweight text editor commonly found on Unix-based systems. It provides basic editing functionalities and is often used for quick editing tasks.
      2. vim: vim, short for “Vi Improved,” is a highly configurable and powerful text editor inspired by the classic vi editor. It is known for its extensive features, including syntax highlighting, code folding, macros, and plugins. Vim is popular among programmers and system administrators.
      3. emacs: emacs is a versatile and extensible text editor known for its extensive customization options and built-in functionalities. It offers features like syntax highlighting, macro recording, and supports various programming languages. Emacs is known for its powerful editing capabilities and its ability to function as an integrated development environment (IDE) for programming.
      4. nano: nano is a user-friendly and beginner-friendly text editor available on many Unix-like systems. It aims to be easy to use with simple keyboard shortcuts and a straightforward interface.

      Yum, on the other hand, is not a text editor. It is a command-line package manager used primarily in RPM-based Linux distributions to install, update, and manage software packages.

  9. A package manager:
    (choose two)

    • Performs a fresh install of Linux
    • Keeps track of which files belong to which packages
    • Downloads software from the Internet
    • Emails you when software is out of date
    • Can optionally repartition your disk to make room for Linux
    • Answers Explanation & Hint:

      Two characteristics of a package manager are:

      1. Keeps track of which files belong to which packages: A package manager maintains a database or registry of installed software packages on a system. It keeps track of the files, dependencies, and configurations associated with each package, ensuring proper management and organization of the installed software.
      2. Downloads software from the Internet: A package manager is responsible for fetching and retrieving software packages from online repositories or other sources. It can download and install software, including updates and dependencies, making it convenient for users to obtain and manage software on their systems.

      Performing a fresh install of Linux, emailing you when software is out of date, and repartitioning your disk to make room for Linux are not specific functions of a package manager. Performing a fresh install typically involves a separate installation program or installer specific to the operating system. Email notifications and disk partitioning tasks are also typically handled by separate tools or utilities outside the scope of a package manager.

  10. An interpreted programming language:
    (choose two)

    • Tends to offer more features than compiled languages
    • Is converted into machine specific instructions as the program runs
    • Requires a compilation step but no linking step
    • Requires a linking step but no compilation step
    • Takes fewer resources to run than a compiled language
    • Answers Explanation & Hint:

      Two characteristics of an interpreted programming language are:

      1. Is converted into machine-specific instructions as the program runs: In an interpreted programming language, the code is not compiled into machine-specific instructions ahead of time. Instead, an interpreter reads and executes the code line by line or in chunks, converting it into machine instructions as the program runs.
      2. Requires no compilation step but may require a linking step: Interpreted languages typically do not require a separate compilation step. The source code can be executed directly by the interpreter without the need for compiling into an executable binary. However, some interpreted languages may still require a linking step if they rely on external libraries or modules.

      It’s important to note that the other statements are not characteristics of interpreted programming languages. Interpreted languages may or may not offer more features than compiled languages, depending on their specific implementations. Additionally, the resource requirements of a programming language depend on various factors and cannot be generalized as taking fewer resources than compiled languages.

  11. Which of the following are true about compiled programming languages?

    • C is a compiled language
    • Ruby is a compiled language
    • Perl is a compiled language
    • A programmer is usually more productive when using a compiled language
    • Compiled languages are great for system administration tasks like scripting
  12. Which package manager is used in Fedora, a Red Hat derived system?

    • yum
    • tar
    • apt-get
    • vim
    • bash
  13. The Linux shell:

    (choose three)

    • Is responsible for tracking the location of configuration files
    • Is customizable
    • Has a built-in text editor
    • Has a scripting language
    • Allows you to launch programs
  14. Which application would you use to edit and piece together sound files to make a podcast?

    • GIMP
    • Audacity
    • Thunderbird
    • Bash
    • Audiolicious
  15. The two main families of Linux shells are:

    (choose two)

    • C Shell
    • Bourne Shell
    • Emacs
    • Python Shell
    • Korn shell
  16. Which server software would you use to create a company directory that you could search and authenticate against?

    • OpenLDAP
    • bind
    • Netatalk
    • ISC DHCP
    • Samba
  17. A Mail Transfer Agent’s primary purpose is to:

    • Deliver mail between servers
    • Manage the end user’s inbox
    • Filter out spam
    • Serve email to end clients
    • Act as a gateway between faxes and email
  18. Which of the following are examples of a web server?

    (choose two)

    • NFS
    • WordPress
    • postfix
    • Nginx
    • Apache
  19. If you wanted to let a Linux machine share files with Windows clients and servers, you would use:

    • Samba
    • bind
    • Netatalk
    • NFS
    • DNS
  20. Virtualization means:

    • Many users can share one hard drive
    • A machine can swap memory to disk
    • A user can connect to a server over the network and use a virtual console
    • Two users get different memory spaces on the same machine
    • A single host can be split up into multiple guests
  21. In virtualization, what are the host and guest?
    (choose two)

    • A guest is a virtual machine
    • The guest is the machine that runs the virtual machines
    • A host is a virtual machine
    • The terms can be used interchangeably
    • The host is the machine that runs the virtual machines
  22. Which of the following are traits of cloud computing?
    (choose two)

    • Scales IT resources so you pay for what you use
    • Only Linux works in cloud computing
    • You don’t have to worry about performance any more
    • You own the hardware but pay for it over time
    • Resources can be accessed from anywhere over a network
  23. If you wanted to write a report that was to be printed, you would probably use:

    • Chrome
    • LibreOffice
    • Adobe Flash
    • Firefox
    • A wiki
  24. To protect your privacy online, you can configure your computer to check for updates periodically. True or False?

    • True
    • False
  25. Which of the following is a tool that helps you anonymize your Internet browsing?

    • CookieCleaner
    • Tor Browser
    • AnonFirefox
    • Web proxy
    • Iptables
  26. Cloud computing is:

    • All are correct
    • Is made possible by faster internet speeds
    • Requires fewer resources because systems are shared among many users
    • Allows users in different geographical regions to work together in real time
    • Is useful for both business and home users
  27. The term for individual computers running multiple systems at the same time is:

    • Cloud priority
    • Googleization
    • Virtualization
    • Distribution
    • MultiRun
  28. Which of the following are traits of a multiuser operating system?

    (choose three)

    • Many users can log in simultaneously with a unique account
    • Users can protect their information from other users
    • An administrative user gets a dedicated CPU
    • Resources are shared between users
    • Each user can only log in once per day
  29. If you want to store logins and passwords for different websites in a secure manner, you could use:

    • In a spiral bound notebook in your file cabinet
    • A text file in your home directory
    • KeePassX
    • A LibreOffice document
    • A sticky note on your monitor
  30. Two components that provide the ability to implement a firewall include:

    (choose two)

    • ipfw
    • Cerberus
    • gufw
    • iptables
    • ifconfig
  31. What are tradeoffs of increasing the level of privacy you have in your web browser?

    (choose two)

    • Images won’t load properly
    • Sites may not work properly
    • You may get viruses
    • Websites may load slower
    • You may have to explicitly permit some cookies to be saved
  32. Social network “like” buttons can track your activity across the Internet.

    True or False?

    • True
    • False
  33. Which of the following are properties of a strong password?

    (choose three)

    • Based on easy to remember items like birthdays
    • Includes symbols
    • At least 10 characters long
    • A mix of upper and lower case
    • Long so that it can be reused on multiple sites
  34. What can be done to prevent unauthorized users from accessing your computer remotely?

    (choose two)

    • Use strong passwords on all user accounts
    • Don’t use wireless networks – only wired
    • Block all cookies
    • Turn on a firewall
    • Block third party cookies
  35. In graphical mode, you can get to a shell by running which applications?

    (choose two)

    • console
    • Terminal
    • Gbash
    • Xterm
    • Guiterm
5 4 votes
Article Rating
Notify of
Inline Feedbacks
View all comments