Nagios Interview Question-Answer

Q.1 Host, service, and command configurations must be written in separate files only.

       A. True

       B. Recover Stage

       C. False

       D. Wait stage

Ans : True


Q.2 What constitutes objects?

       A. Services and Hosts

       B. Notification Escalations

       C. None of the options

       D. All the options

Ans : All the options


Q.3 _________ check is the most commonly used method for monitoring.

       A. Active

       B. Passive

       C. None of the options

       D. All the options

Ans : Active


Q.4 Sensitive Information such as passwords are stored in the __________ file.

       A. command.cfg

       B. resource.cfg

       C. nagios.cfg

       D. object.cfg

Ans : resource.cfg


Q.5 Sample configuration files are created when you configure and install Nagios.

       A. True

       B. False

Ans : True


Q.6 Service configurations need not have a preceding host configuration.

       A. True

       B. False

Ans : False


Q.7 Nagios allows you to configure a service once and add it to multiple hosts.

       A. True

       B. False

Ans : True


Q.8 Plugins can be invoked only from service configurations.

       A. True

       B. False

Ans : False


Q.9 Is there a way to configure Nagios to read more than the prescribed limit from the plugin’s output?

       A. True

       B. False

Ans : True


Q.10 __________ check results are submitted to Nagios for further processing.

       A. Passive

       B. Active

       C. None of the options

       D. All the options

Ans : Passive


Q.11 Connectivity to the specified host can be tested using ________

       A. check_udp and check_tcp

       B. check_udp

       C. check_tcp

       D. check_ping

       E. check_ping and check_udp

Ans : check_udp and check_tcp


Q.12 Is it right to say Nagios follows object oriented configuration?

       A. NO

       B. YES

       C. May Be

Ans : YES


Q.13 DISK OK – free space: / 33 MB (3%); is an output received after executing the plugin _______.

       A. Check_space

       B. Check_swap

       C. Check_disk

       D. Check_procs

Ans : Check_disk


Q.14 An argument value is passed after the _____ symbol.

       A. $

       B. !

       C. Both the options

       D. None of the options

Ans : !


Q.15 Nagios can be used to monitor ______.

       A. SSL certificates of the websites

       B. URL monitoring

       C. content monitoring

       D. All the options

Ans : All the options


Q.16 Resource files will be accessed by CGIs.

       A. True

       B. False

Ans : False


Q.17 Nagios can be used to monitor Windows machine.

       A. True

       B. False

Ans : True


Q.18 Objects can be defined to inherit variables from multiple templates.

       A. True

       B. False

Ans : True


Q.19 When Nagios is not able to reach a machine, its status is considered _____________.

       A. unknown

       B. down

       C. None of the options

Ans : unknown


Q.20 Nagios supports ______ monitoring.

       A. LDAP

       B. HTTP

       C. POP

       D. All the options

Ans : All the options


Q.21 Command definition has ______ parameters.

       A. 1

       B. 2

       C. 3

       D. None of the options

Ans : 2


Q.22 Elements involved in the monitoring and notification logic are _______.

       A. services

       B. hosts

       C. objects

Ans : objects


Q.23 To find out the usage of a plugin, try out ________.

       A. ./plugin_name –help

       B. ./plugin_name -h

       C. Both the options

       D. None of the options

Ans : Both the options


Leave a Comment