Security Strategies in Linux Platforms and Applications Chapter Test Questions (Chapter 11-15)

Security Strategies in Linux Platforms and Applications Chapter Test Questions (Chapter 11-15)

59 Qs

quiz-placeholder

Similar activities

Quiz tema 7 kelas 6

Quiz tema 7 kelas 6

6th Grade

60 Qs

PENILAIAN AKHIR SEMESTER (PAS) - PKN 9

PENILAIAN AKHIR SEMESTER (PAS) - PKN 9

KG - University

55 Qs

Science STAAR Review 6

Science STAAR Review 6

KG - University

55 Qs

Government Midterm Review

Government Midterm Review

11th Grade - University

60 Qs

Olimpiade IPA SD

Olimpiade IPA SD

6th Grade

56 Qs

Force and Interaction Unit 1 Test

Force and Interaction Unit 1 Test

9th - 12th Grade

59 Qs

Mr. Bradley's Hearts of Fire

Mr. Bradley's Hearts of Fire

9th - 12th Grade

55 Qs

Security Strategies in Linux Platforms and Applications Chapter Test Questions (Chapter 11-15)

Security Strategies in Linux Platforms and Applications Chapter Test Questions (Chapter 11-15)

Assessment

Quiz

others

Hard

Created by

John Doe

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

59 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. For at least how long does Red Hat provide security updates for its Enterprise Linux distributions? (Chapter 11)
A. Two years
B. Five years
C. Seven years
D. Ten years

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. For Ubuntu’s LTS releases, Canonical provides security updates for its server distribution releases for at least five years. (Chapter 11)
A. True
B. False

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

3. Why would you read a security alert and not just download and install a security update to a key system such as the Linux kernel? (Select three.) (Chapter 11)
A. The update may affect interactions between the operating system and local hardware.
B. The update does not affect any systems that you use personally.
C. The update may not be bootable.
D. The update relates to Xen, which is a special kernel not used on the local system.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. Which command is commonly used to install and update packages from the command line on Red Hat systems? (Chapter 11)
A. yum
B. apt
C. get
D. update

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which of the following types of malware is not found on Linux? (Chapter 11)
A. Rootkits
B. Microsoft viruses
C. Trojan horses
D. None of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. Which of the following includes a system for tracking bugs in software? (Chapter 11)
A. ZENworks
B. Red Hat Network
C. Landscape
D. Launchpad

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Before creating a bug report, which of the following actions should you take? (Chapter 11)
A. Copy all log files to the report.
B. Research any FAQs.
C. Reinstall the software.
D. Reboot the system.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?