Home » Free and open-source software

MCQ | Basics | Free and open-source software | Set 4

Here, we have a set of multiple-choice questions and answers (quiz) on basics of Free and open-source software. For any help, you can refer to the previous articles on the same topic.
Submitted by Monika Sharma, on March 31, 2020

Q1. What do you call the technique of storing encrypted user passwords in Linux?

  1. System Password Management
  2. Shadow Password
  3. Encrypted Password
  4. None of these

Answer: b. Shadow Password


Linux turning out to be increasingly mainstream, it is turning into an extremely alluring objective for intruders to focus their break-in endeavors on. To keep it safe one method is Shadow passwords.

Q2. Full Form of SSH?

  1. Server Secure Hub
  2. Security in Server Hub
  3. Secure Shell
  4. Secure Server Hub

Answer: c. Secure Shell


The Secure Shell utilizes encryption to make sure about the association between a customer and a server. All client validation, directions, yield, and document moves are encoded to secure against threats and leaks in the system.

Q3. Which of the below is incorrect about Telnet?

  1. Telnet is a client-server program often used in general
  2. It provides you the portability of using software on a remote system
  3. It can be used to transfer files
  4. Telnet can be used for logging in from remote systems

Answer: c. It can be used to transfer files


File Transfer Protocol is used for file transfer whereas telnet provides you the access to a command-line interface which allows you to access systems remotely.

Q4. Select out the two unreliable features of Telnet.

  1. Decoded Transmission of Data
  2. Less no. of port access
  3. Remote access
  4. Telnet ports are often left open

Answer: a. Decoded Transmission of Data & d. Telnet ports are often left open


Telnet is unreliable for two reasons: One, sessions are decoded, which means the world, including username and passwords, are transmitted as clear content. Second, an open telnet port is one of the principals an attacker will attempt to connect with.

Q5. Choose among the additional options to make your server more secure?

  1. Keep an eye on unused ports
  2. Update your Linux Distribution time to time
  3. Connect to networks when required
  4. Make Console Access Secure
  5. Disable Root login access

Answer: a. Keep an Eye on Unused Ports, d. Make Console Access Secure & e. Disable Root Login


You need to focus on certain more strategies wherein you monitor all unused or open ports so that no unwanted activity takes place from it along with it make sure only the authorized persons can access consoles of your system and lastly to avoid any mishappenings disable the root account so that no passwords can be changed remotely no accounts can be created or disabled.

Q6. The no. of stages in an Open Source Development model are:

  1. 6
  2. 7
  3. 8
  4. 9

Answer: b.7


  1. Manage Configuration
  2. Develop OSS Code
  3. Assert Requirements Design
  4. Communicate experience
  5. Download and Install
  6. End Use
  7. Read, analyze and Redesign

Q7. In which phase do the users who require the software to fall into?

  1. Download and Install
  2. End-Use
  3. Communicate Experience
  4. None of these

Answer: b. End-Use


The users who require the software fall into this phase and use the OSS daily to provide experience and feedback to the developers or for personal benefits.

Comments and Discussions!

Load comments ↻

Copyright © 2024 www.includehelp.com. All rights reserved.