Q.1 Host, service, and command configurations must be written in separate files only.
A. True
B. Recover Stage
C. False
D. Wait stage
Ans : True
Q.2 What constitutes objects?
A. Services and Hosts
B. Notification Escalations
C. None of the options
D. All the options
Ans : All the options
Q.3 _________ check is the most commonly used method for monitoring.
A. Active
B. Passive
C. None of the options
D. All the options
Ans : Active
Q.4 Sensitive Information such as passwords are stored in the __________ file.
A. command.cfg
B. resource.cfg
C. nagios.cfg
D. object.cfg
Ans : resource.cfg
Q.5 Sample configuration files are created when you configure and install Nagios.
A. True
B. False
Ans : True
Q.6 Service configurations need not have a preceding host configuration.
A. True
B. False
Ans : False
Q.7 Nagios allows you to configure a service once and add it to multiple hosts.
A. True
B. False
Ans : True
Q.8 Plugins can be invoked only from service configurations.
A. True
B. False
Ans : False
Q.9 Is there a way to configure Nagios to read more than the prescribed limit from the plugin’s output?
A. True
B. False
Ans : True
Q.10 __________ check results are submitted to Nagios for further processing.
A. Passive
B. Active
C. None of the options
D. All the options
Ans : Passive
Q.11 Connectivity to the specified host can be tested using ________
A. check_udp and check_tcp
B. check_udp
C. check_tcp
D. check_ping
E. check_ping and check_udp
Ans : check_udp and check_tcp
Q.12 Is it right to say Nagios follows object oriented configuration?
A. NO
B. YES
C. May Be
Ans : YES
Q.13 DISK OK – free space: / 33 MB (3%); is an output received after executing the plugin _______.
A. Check_space
B. Check_swap
C. Check_disk
D. Check_procs
Ans : Check_disk
Q.14 An argument value is passed after the _____ symbol.
A. $
B. !
C. Both the options
D. None of the options
Ans : !
Q.15 Nagios can be used to monitor ______.
A. SSL certificates of the websites
B. URL monitoring
C. content monitoring
D. All the options
Ans : All the options
Q.16 Resource files will be accessed by CGIs.
A. True
B. False
Ans : False
Q.17 Nagios can be used to monitor Windows machine.
A. True
B. False
Ans : True
Q.18 Objects can be defined to inherit variables from multiple templates.
A. True
B. False
Ans : True
Q.19 When Nagios is not able to reach a machine, its status is considered _____________.
A. unknown
B. down
C. None of the options
Ans : unknown
Q.20 Nagios supports ______ monitoring.
A. LDAP
B. HTTP
C. POP
D. All the options
Ans : All the options
Q.21 Command definition has ______ parameters.
A. 1
B. 2
C. 3
D. None of the options
Ans : 2
Q.22 Elements involved in the monitoring and notification logic are _______.
A. services
B. hosts
C. objects
Ans : objects
Q.23 To find out the usage of a plugin, try out ________.
A. ./plugin_name –help
B. ./plugin_name -h
C. Both the options
D. None of the options
Ans : Both the options