1In Linux device management, which directory primarily contains special files that represent hardware devices?
A./etc
B./dev
C./sys
D./proc
Correct Answer: /dev
Explanation:The /dev directory contains device files (nodes) that represent hardware components like hard drives, terminals, and input devices.
Incorrect! Try again.
2Which of the following describes a 'block device' in Linux?
A.A device that transfers data character by character.
B.A device that stores data in fixed-size chunks and allows random access.
C.A virtual network interface.
D.A pseudo-terminal device.
Correct Answer: A device that stores data in fixed-size chunks and allows random access.
Explanation:Block devices (e.g., hard drives, USB flash drives) read and write data in blocks and support random access, unlike character devices.
Incorrect! Try again.
3Which command is used to list information about all available block devices?
A.lsblk
B.lspci
C.lsusb
D.lscpu
Correct Answer: lsblk
Explanation:lsblk lists information about all specified or available block devices, showing their tree structure.
Incorrect! Try again.
4What does the character 'c' represent in the file permission string crw-rw-rw-?
A.Configuration file
B.Character device
C.Command file
D.Core dump
Correct Answer: Character device
Explanation:The 'c' at the beginning of the permission string indicates a character special file, such as a serial port or terminal.
Incorrect! Try again.
5Which specific pseudo-filesystem in Linux provides an interface to kernel data structures regarding hardware and device drivers?
A./var
B./sys
C./mnt
D./boot
Correct Answer: /sys
Explanation:The /sys directory (sysfs) exposes information about devices, drivers, and kernel subsystems to user space.
Incorrect! Try again.
6Which command displays detailed information about PCI buses and connected devices?
A.lsblk
B.lsusb
C.lspci
D.dmesg
Correct Answer: lspci
Explanation:lspci is a utility for displaying information about PCI buses in the system and devices connected to them.
Incorrect! Try again.
7Where are persistent device naming rules managed by the udev system typically stored?
A./etc/udev/rules.d/
B./var/udev/rules/
C./dev/rules/
D./sys/class/udev/
Correct Answer: /etc/udev/rules.d/
Explanation:Custom persistent device rules are stored in /etc/udev/rules.d/. This allows administrators to define static names for devices.
Incorrect! Try again.
8To view the kernel ring buffer messages, often used for troubleshooting hardware detection during boot, which command is used?
A.journalctl -u cron
B.dmesg
C.tail /var/log/auth.log
D.uname -a
Correct Answer: dmesg
Explanation:dmesg prints the message buffer of the kernel, which contains messages from device drivers and hardware initialization.
Incorrect! Try again.
9Which command is used to query and control network driver and hardware settings, particularly for Ethernet devices?
A.iwconfig
B.ethtool
C.netstat
D.dig
Correct Answer: ethtool
Explanation:ethtool is the standard Linux utility for querying and controlling network driver and hardware settings.
Incorrect! Try again.
10Which special device file discards all data written to it (commonly known as the 'bit bucket')?
A./dev/null
B./dev/zero
C./dev/random
D./dev/urandom
Correct Answer: /dev/null
Explanation:/dev/null is a special file that discards all data written to it and provides an end-of-file condition when read.
Incorrect! Try again.
11A system administrator needs to check the health status of a hard drive using S.M.A.R.T. technology. Which command should they use?
A.fsck
B.hdparm
C.smartctl
D.badblocks
Correct Answer: smartctl
Explanation:smartctl (part of smartmontools) is used to control and monitor S.M.A.R.T. (Self-Monitoring, Analysis and Reporting Technology) data on hard drives.
Incorrect! Try again.
12In the TCP/IP model, which layer corresponds to the physical hardware transmission?
A.Application Layer
B.Transport Layer
C.Internet Layer
D.Network Access (Link) Layer
Correct Answer: Network Access (Link) Layer
Explanation:The Network Access (or Link) layer in the TCP/IP model deals with the physical transmission of data via media (cables, wireless).
Incorrect! Try again.
13An IPv4 address consists of how many bits?
A. bits
B. bits
C. bits
D. bits
Correct Answer: bits
Explanation:IPv4 addresses are -bit numbers, typically displayed in dotted-decimal notation (e.g., 192.168.1.1).
Incorrect! Try again.
14Which of the following is the loopback address for an IPv4 local host?
A.127.0.0.1
B.192.168.1.1
C.10.0.0.1
D.255.255.255.0
Correct Answer: 127.0.0.1
Explanation:127.0.0.1 is the standard IPv4 loopback address, allowing the computer to communicate with itself.
Incorrect! Try again.
15Which file is primarily used to configure DNS name servers on a Linux client?
A./etc/hosts
B./etc/resolv.conf
C./etc/nsswitch.conf
D./etc/networks
Correct Answer: /etc/resolv.conf
Explanation:/etc/resolv.conf contains the IP addresses of the DNS servers the system should query to resolve domain names.
Incorrect! Try again.
16What is the purpose of the Subnet Mask?
A.To encrypt data packets.
B.To distinguish the Network ID from the Host ID.
C.To assign dynamic IP addresses.
D.To resolve hostnames to MAC addresses.
Correct Answer: To distinguish the Network ID from the Host ID.
Explanation:The subnet mask allows the TCP/IP stack to determine which part of the IP address represents the network and which part represents the host.
Incorrect! Try again.
17Which modern command is preferred over ifconfig to display and configure network interfaces?
A.ip
B.netstat
C.route
D.arp
Correct Answer: ip
Explanation:The ip command (part of the iproute2 suite) is the modern replacement for the deprecated ifconfig command.
Incorrect! Try again.
18A Linux server configured as a 'DHCP Server' is responsible for:
A.Resolving domain names to IP addresses.
B.Hosting web pages.
C.Assigning dynamic IP addresses to clients on the network.
D.Filtering network traffic.
Correct Answer: Assigning dynamic IP addresses to clients on the network.
Explanation:DHCP (Dynamic Host Configuration Protocol) servers automatically assign IP addresses and other network configuration parameters to clients.
Incorrect! Try again.
19Which protocol is associated with port 22 by default?
A.HTTP
B.FTP
C.SSH
D.Telnet
Correct Answer: SSH
Explanation:SSH (Secure Shell) uses port 22 by default for secure remote login and other secure network services.
Incorrect! Try again.
20Which command allows a user to query DNS servers to lookup IP addresses associated with domain names?
A.ping
B.traceroute
C.dig
D.netcat
Correct Answer: dig
Explanation:dig (Domain Information Groper) is a flexible tool for interrogating DNS name servers.
Incorrect! Try again.
21When configuring a static IP on a Red Hat/CentOS based system using NetworkManager, which command-line tool provides a text-based user interface?
A.nmtui
B.nmcli
C.ifconfig
D.netplan
Correct Answer: nmtui
Explanation:nmtui (NetworkManager Text User Interface) provides a cursor-based text interface to configure networking.
Incorrect! Try again.
22In a virtualized environment, what is the 'Hypervisor'?
A.A container engine.
B.Software that creates and runs virtual machines.
C.The physical network card.
D.A cloud storage service.
Correct Answer: Software that creates and runs virtual machines.
Explanation:A hypervisor (or Virtual Machine Monitor) is software, firmware, or hardware that creates and runs virtual machines by abstracting physical hardware.
Incorrect! Try again.
23Which virtualization technology uses a shared kernel and isolates processes in user space (e.g., Docker)?
A.Type 1 Hypervisor
B.Type 2 Hypervisor
C.Containerization
D.Full Virtualization
Correct Answer: Containerization
Explanation:Containerization (OS-level virtualization) shares the host OS kernel but isolates the application processes and dependencies.
Incorrect! Try again.
24Which command serves as a client to request an IP address from a DHCP server manually?
A.dhcpd
B.dhclient
C.ip link
D.bind
Correct Answer: dhclient
Explanation:dhclient is the Dynamic Host Configuration Protocol Client used to configure a network interface using DHCP.
Incorrect! Try again.
25To identify which application is listening on a specific TCP port, which command should be used?
A.ss -tulpn
B.ping
C.traceroute
D.route -n
Correct Answer: ss -tulpn
Explanation:ss (socket statistics) with flags -tulpn lists TCP/UDP listening sockets, processes, and numeric ports.
Incorrect! Try again.
26What is the primary function of cloud-init in a Linux cloud instance?
A.To encrypt the hard drive.
B.To handle early initialization and configuration of a cloud instance.
C.To monitor CPU usage.
D.To providing a GUI desktop environment.
Correct Answer: To handle early initialization and configuration of a cloud instance.
Explanation:cloud-init is the industry standard for cross-platform cloud instance initialization, handling user data, SSH keys, and network config on first boot.
Incorrect! Try again.
27Which network troubleshooting tool sends ICMP Echo Request packets to test connectivity?
A.ping
B.ssh
C.telnet
D.nslookup
Correct Answer: ping
Explanation:ping uses ICMP Echo Request packets to test the reachability of a host on an IP network.
Incorrect! Try again.
28Which networking command displays the path (hops) and transit delays of packets across an IP network?
A.route
B.traceroute
C.netstat
D.hostname
Correct Answer: traceroute
Explanation:traceroute (or tracepath) tracks the route packets take to a network host, showing each hop along the way.
Incorrect! Try again.
29Which file is used to map hostnames to IP addresses locally, taking precedence over DNS by default?
A./etc/hosts
B./etc/hostname
C./etc/resolv.conf
D./etc/gateways
Correct Answer: /etc/hosts
Explanation:The /etc/hosts file allows manual mapping of IP addresses to hostnames and is usually checked before querying external DNS servers.
Incorrect! Try again.
30Which command changes the system's hostname permanently on systemd-based distributions?
A.hostname
B.hostnamectl set-hostname
C.ip hostname
D.echo name > /proc/sys/kernel/hostname
Correct Answer: hostnamectl set-hostname
Explanation:hostnamectl is the command used to query and change the system hostname and related settings in systemd distributions.
Incorrect! Try again.
31In KVM virtualization, what does 'KVM' stand for?
A.Kernel-based Virtual Machine
B.Keyboard Video Mouse
C.Kali Virtual Manager
D.Kernel Virtual Module
Correct Answer: Kernel-based Virtual Machine
Explanation:KVM stands for Kernel-based Virtual Machine, a virtualization module in the Linux kernel.
Incorrect! Try again.
32Which networking configuration file format is used by Netplan (common in Ubuntu)?
A.XML
B.JSON
C.YAML
D.INI
Correct Answer: YAML
Explanation:Netplan uses YAML configuration files (usually in /etc/netplan/) to describe network interface settings.
Incorrect! Try again.
33If a server cannot access the internet, but can ping 8.8.8.8, what is the most likely issue?
A.The network cable is unplugged.
B.There is a DNS resolution issue.
C.The default gateway is incorrect.
D.The firewall is blocking ICMP.
Correct Answer: There is a DNS resolution issue.
Explanation:If the server can ping an IP address (connectivity exists) but cannot browse by name (e.g., google.com), the issue is likely with the DNS configuration.
Incorrect! Try again.
34Which command is used to capture and analyze packets flowing through a network interface in real-time?
A.tcpdump
B.netstat
C.nmap
D.iptables
Correct Answer: tcpdump
Explanation:tcpdump is a command-line packet analyzer tool used to capture traffic on a network interface.
Incorrect! Try again.
35A Type 1 Hypervisor runs:
A.Inside a web browser.
B.As an application on top of a host Operating System.
C.Directly on the host hardware (Bare Metal).
D.Inside a Docker container.
Correct Answer: Directly on the host hardware (Bare Metal).
Explanation:Type 1 hypervisors (e.g., ESXi, Xen) run directly on the system hardware without a host operating system underneath.
Incorrect! Try again.
36Which command allows you to view the kernel routing table?
A.ip route show
B.ip link show
C.ip addr show
D.ip neigh show
Correct Answer: ip route show
Explanation:ip route show (or simply ip route) displays the IP routing table, including the default gateway.
Incorrect! Try again.
37What is the function of the ARP protocol?
A.To map IP addresses to MAC addresses.
B.To map Domain names to IP addresses.
C.To route packets between networks.
D.To assign IP addresses dynamically.
Correct Answer: To map IP addresses to MAC addresses.
Explanation:ARP (Address Resolution Protocol) resolves a known IP address to a physical MAC address on the local network segment.
Incorrect! Try again.
38Which Linux server role would be primarily configured using software like Samba or NFS?
A.Web Server
B.File Server
C.Database Server
D.DNS Server
Correct Answer: File Server
Explanation:Samba (SMB/CIFS) and NFS (Network File System) are protocols used to share files over a network, characterizing a File Server role.
Incorrect! Try again.
39Which directory contains the definition files for USB devices?
A./proc/bus/usb
B./sys/bus/usb
C./dev/usb
D./etc/usb
Correct Answer: /sys/bus/usb
Explanation:While /dev/bus/usb contains device nodes, /sys/bus/usb contains the kernel object structure and attributes for USB devices.
Incorrect! Try again.
40To add a new IP address 192.168.1.50/24 to interface eth0 temporarily, which command is used?
A.ip addr add 192.168.1.50/24 dev eth0
B.ifconfig eth0 192.168.1.50/24
C.netplan apply
D.route add 192.168.1.50 dev eth0
Correct Answer: ip addr add 192.168.1.50/24 dev eth0
Explanation:The ip addr add command adds a protocol address to a device. This change is not persistent across reboots.
Incorrect! Try again.
41Which command lists all USB devices currently connected to the system?
A.lsusb
B.lspci
C.lsdev
D.usbview
Correct Answer: lsusb
Explanation:lsusb is a utility for displaying information about USB buses in the system and the devices connected to them.
Incorrect! Try again.
42Which of the following is a private IP address range (RFC 1918) often used in LANs?
A.8.8.8.0/24
B.172.16.0.0/12
C.1.1.1.1/32
D.200.100.50.0/24
Correct Answer: 172.16.0.0/12
Explanation:The private IP ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. These are not routable on the public internet.
Incorrect! Try again.
43If a device file is located at /dev/sda, what does 'a' typically signify?
A.It is an Audio device.
B.It is the first detected drive of that type.
C.It is a partition.
D.It is an Archive device.
Correct Answer: It is the first detected drive of that type.
Explanation:In Linux naming conventions (like sd or hd), the letter indicates the order the drive was detected (a=1st, b=2nd, etc.).
Incorrect! Try again.
44Which virtualization network mode allows a VM to appear as a unique physical host on the same network as the host machine?
A.NAT
B.Bridged
C.Host-Only
D.Internal
Correct Answer: Bridged
Explanation:Bridged networking connects a virtual machine to a network using the host's Ethernet adapter, allowing it to have its own IP address on the physical LAN.
Incorrect! Try again.
45Which command is used to display hardware information by reading from various /proc files in a readable format?
A.lshw
B.grep
C.find
D.sysctl
Correct Answer: lshw
Explanation:lshw (list hardware) is a tool used to extract detailed information on the hardware configuration of the machine.
Incorrect! Try again.
46When troubleshooting a network service that fails to start, which command allows you to view the service's logs?
A.journalctl -u [service_name]
B.dmesg
C.history
D.top
Correct Answer: journalctl -u [service_name]
Explanation:journalctl queries the systemd journal. The -u flag filters entries for a specific unit (service).
Incorrect! Try again.
47Which file system is mounted at /proc?
A.ext4
B.xfs
C.procfs
D.tmpfs
Correct Answer: procfs
Explanation:The procfs (Process Filesystem) is a virtual filesystem maintained by the kernel, mounted at /proc, providing process and system information.
Incorrect! Try again.
48What is the result of the command nmcli con up "Wired connection 1"?
A.It deletes the connection profile.
B.It activates the network connection profile named "Wired connection 1".
C.It displays the configuration details only.
D.It installs the NetworkManager service.
Correct Answer: It activates the network connection profile named "Wired connection 1".
Explanation:nmcli con up activates (brings up) a specific network connection profile managed by NetworkManager.
Incorrect! Try again.
49Which command is used to manage partitions on a hard drive using a text-based interface (legacy)?
A.mkfs
B.fdisk
C.mount
D.df
Correct Answer: fdisk
Explanation:fdisk is a dialog-driven command-line utility for creating and manipulating partition tables.
Incorrect! Try again.
50The theoretical limit of the number of unique addresses in IPv6 is approximately:
A. billion ()
B. ()
C. million
D.
Correct Answer: ()
Explanation:IPv6 uses -bit addresses, allowing for unique addresses, which is approximately .
Incorrect! Try again.
Give Feedback
Help us improve by sharing your thoughts or reporting issues.