43

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which character in the /etc/shadow file's encrypted password field means no password has been set for this user?

!

​What operator below is known as the NOT operator?

!

What character, when appended to a command, causes the command to be run in the background?

&

When there are multiple background process executing in the shell, the jobs command indicates the most recent one with which symbol?

+

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.

+

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?

+

In a file's mode, a permission that is unavailable is represented by what character?

-

What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system? ​

-F

When used with the uncompress command, what option displays the contents of the compress file to Standard Output?

-c

To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.

-e

When used with the compress command, the ____ option can be used to compress symbolic links.

-f

When used with the compress command, what option below can be used to compress symbolic links?

-f

The mkfs command can be issued with what switch in order to specify a filesystem type? a. -o b. -f c. -c d. -t

-t

The ____ option can be used with the tar command to extract a specified archive.

-x

What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?

-z -Z

dd

. In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted?

200 MB

. What is the recommended size for the /home directory?

When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.

.Z

The filename extension given to files compressed with bzip2 is ____.

.bz2

Which of the following files can you add filenames to so that the git add * command will not stage them?

.gitignore

Files with what two file extensions are commonly known as tarballs?

.tar.gz .tgz

The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?

/boot

The filesystem Hierarchy Standard specifies what directory as containing the Linux Kernel and the boot loader configuration files?

/boot

Under what directory is the Linux kernel stored?

/boot

Which device file below represents the first primary partition on the second PATA hard disk drive? a. /dev/hdb1 b. /dev/hdc2 c. /dev/hdc1 d. /dev/hda1

/dev/hdb1

In Fedora 20, where are user configured settings for Xorg stored?​

/etc/X11/xorg.conf.d/

A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs?

/etc/cron.deny

The _________________ file often contains a single uncommented line that configures the default runlevel for a system.​

/etc/inittab

Which of the following files is where the default runlevel is set on some Linux systems?

/etc/inittab

The configuration file(s) that is/are used to configure the BIND/DNS server:

/etc/named.conf

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

Which file contains user account information?

/etc/passwd

The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.

/etc/profile

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?

/etc/profile

Match the file with the order in which the BASH shell environment files are read: First Second Third Fourth

/etc/profile /etc/profile.d/* /etc/bashrc ~/.bashrc

Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC?

/etc/resolv.conf

The sshd daemon is configured by editing what configuration file?​

/etc/ssh/sshd_config

Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system?

/etc/sysconfig/network-scripts/ifcfg-eth0

What file in the /proc directory contains information about a computer's CPU?

/proc/cpuinfo

What file in the /proc directory contains information about a computer's CPU?​ a. ​/proc/meminfo b. ​/proc/cpuinfo c. /proc/cpu_info d. /proc/proc_info

/proc/cpuinfo

In addition to /etc/localtime, some Linux distributions also have an /etc/timezone text file that contains a reference to the correct time zone file contained in which directory?

/usr/share/zoneinfo

You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?​ a. /var/log/boot.log b. /var/log/messages c. /var/log/startup.log d. /var/log/wtmp

/var/log/boot.log

Where are the log files for the Samba daemon located?

/var/log/samba

Where are the log files for the Samba daemon located?​

/var/log/samba

Directory storing the shell environment and scheduled commands.

/var/spool/at

On a Fedora based system, where are the shell environment and scheduled commands for at stored?

/var/spool/at

On Linux, the root user always has a UID of what number?​

0

Process are started with what nice value by default?

0

Processes are started with a nice value of ____ by default.

0

Processes are started with what nice value by default?

0

The file descriptor stdin is represented by the number ____.

0

What number represents the stdin file descriptor?

0

Which of the following represents stderr at the command line when used for redirection?

2

Which of the following port numbers is associated with telnet?

23

A Class A network uses how many bits for the network ID, and how many bits for the host ID?

24 bits for network ID 8 bits for host ID

What well-known TCP port is utilized by the SMTP service?

25

What well-known TCP port is utilized by the SMTP service?​

25

What is the subnet mask for a Class B IP address?

255.255.0.0

What is the subnet mask for a Class C IP address?

255.255.0.0

What is the subnet mask for a Class C IP address?

255.255.255.0

What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?

255.255.255.255 0.0.0.0

What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size?

256-bit

What is the Advanced Encryption Standard (AES) encryption algorithm​'s largest key length size?

256-bit

​Select the mode below that corresponds to setting r-x:

5

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?

514

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?

514

What value in the /etc/shadow file's password expiration field means the user's password never expires?

99999

IPv6 IP address are delimited by what character?

:

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off? a. 0 b. 1 c. 6 d. 7

A

IPv6 IP addresses are delimited by what character below? a. : b. . c. , d. ;

A

In order to display a list of at job IDs, what option can be specified to the at command? a. -l b. -u c. -a d. -d

A

In order to display a list of at job IDs, what option can be specified to the at command? a. -l b. -u c. -a d. -d

A

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel? a. image= b. default= c. install= d. root=

A

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. process state b. process flag c. process priority d. PID

A

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. process state b. process flag c. process priority d. PID

A

On Linux, the root user always has a UID of what number? a. 0 b. q c. 23 d. 500

A

What character, when appended to a command, causes the command to be run in the background? a. & b. $ c. # d. %

A

Which command should be used to restrict access to printers? a. lpadmin b. lpa c. lpr d. admin

A

Which command should be used to restrict access to printers? a. lpadmin b. lpa c. lpr d. admin

A

RAID-Z

A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:

​What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively? Multiple Answer ​a. PWD ​b. CWD ​c. PATH d. ​SHELL

A and D

cal

A calendar for the current month can be shown on the command line by issuing which command?

character

A device that transfers data in a character-by-character fashion is referred to as what type of device?

4

A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices?

Under what directory is the Linux kernel stored? a. / b. /boot c. /root d. /krnl

B

What character is used to delimit most Linux configuration files? a. tab b. colon c. space d. semicolon

B

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted? a. grub-install b. grub2-install c. install_grub d. install_grub2

B

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?​ ​a. grub-install ​b. grub2-install ​c. install_grub ​d. install_grub2

B

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?​ a. psbranch ​b. pstree ​c. psparent ​d. pshead

B

What command below is used to display the lineage of a process by tracking its PPID until the init daemon? a. psbranch b. pstree c. psparent d. pshead

B

What command can be used to display the contents of a file that was compressed with the compress utility? a. acat b. zcat c. cat d. ccat

B

What device file below indicates the first ATAPI IDE tape device (nonrewinding)?​ a. ​/dev/st0 b. ​/dev/nht0 c. ​/dev/nst0 d. ​/dev/ht0

B

What file controls the default runlevel using Systemd? a. /etc/inittab b. /etc/systemd/system/default.target c. /etc/systemd/inittab.target d. /etc/systemd.comf

B

What file controls the default runlevel when using Systemd?​ ​a. /etc/inittab ​b. /etc/systemd/system/default.target ​c. /etc/systemd/inittab.target d. ​/etc/systemd.conf

B

What is the subnet mask for a Class B IP address? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

B

What option can be added to the dpkg command to remove specified package from the system, including any configuration files used by the package? a. -d b. -P c. -D d. -r

B

What option can be added to the rpm command in order to query packages? a. -i b. -q c. -v d. -h

B

What option should be used in conjunction with lp command in order to specify destination printer name? a. -n b. -d c. -p d. -l

B

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users? a. alert b. panic c. crit d. error

B

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?​ ​a. alert ​b. panic ​c. crit ​d. error

B

What yum command below can display a list of packagegroup names? a. yum list --groups b. yum grouplist c. yum -- list -g d. yum show groups

B

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol? a.* b. + c. - d. /

B

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol? a. * b. + c. - d. /

B

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? a. SIGINT b. SIGQUIT c. SIGKILL d. SIGTERM

B

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? a. SIGINT b. SIGQUIT c. SIGKILL d. SIGTERM

B

​In the process state column, what does an "R" indicate? ​a. The indicated process is being restarted because it resceived a SIGHUP kill signal. b. ​The process is currently running on the processor. ​c. The process is reading from the local hard disk. ​d. The process is recovering from a fatal error, and may potentially become a zombie.

B

​The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below? a. 780​ ​b. 631 ​c. 4586 ​d. 8080

B

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?​ Multiple Answers ​a. secure ​b. wtmp ​c. lastlog ​d. xferlog

B and C

The GNOME 3 desktop environment utilizes what window manager and toolkit below? Multiple Answer ​a. kwin ​b. mutter ​c. Qt toolkit ​d. GTK+ toolkit

B and D

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?​ Multiple Answers a. SIGHUP​ ​b. SIGINT ​c. 1 ​d. 2

B and D

​What two commands below can be used to modify the password expiry information and a user's default shell? Multiple Answers ​a. chexp ​b. chage ​c. shellmod ​d. chsh

B and D

____ is burning software that comes with Red Hat Fedora Core 2.

Brasero Disc Burner

After a background has been started, what command below can be used to move it to the foreground? a. b2f b. fgd c. fg d. fgnd

C

After a background process has been started, what command below can be used to move it to the foreground? a. b2f b. fgd c. fg d. fgnd

C

How many different kill signals can be sent by the kill command to a given process? a. 16 b. 32 c. 64 d. 128

C

If no level of compression is specified, the gzip command assumes what compression level? a. 4 b. 5 c. 6 d. 7

C

In order to download DPM packages, what command should be used below? a. yum b. apt-search c. apt-get d. dpm-grab

C

In order to send a print job to a printer using CUPS, what command must be used? a. print b. pl c. lp d. pr

C

In order to send a print job to a printer using CUPS, what command must be used? a. print b. pl c. lp d. pr

C

Most Linux distributions make use of what package manager? a. PRM b. MPR c. RPM d. RMP

C

Select the escape sequence that starts a new line when used with echo: ​a. \\ ​b. \a ​c. \n ​d. \r

C

Select the option that can be used with the lpstat command to display a list of printers that are enabled: a. -o b. -a c. -p d. -e

C

Select the test statement that can be used to determine if A is numerically greater than B: a. [ A -g B ] b. [ A -ge B ] c. [ A -gt B ] d. [ A +eq B ]

C

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?​ a. 827 ​b. 1012 ​c. 514 ​d. 23

C

The environment variables that are set by default and their current values can be viewed with what command? a. env b. get c. set d. setenv

C

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file? a. # b. < c. > d. |

C

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. newgroup b. groupmod c. newgrp d. groupadd

C

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. newgroup b. groupmod c. newgrp d. groupadd

C

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?​ ​a. boot-config ​b. loaderconf ​c. grubby d. ​parted

C

What command can be used to search for DPM package information? a. dpkg-search b. dpkg-info c. dpkg-query d. dpkg-list

C

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm? a. 40%-50% b. 50%-60% c. 60%-70% d. 70%-80%

C

What is the default print job priority for all print jobs created by the lp command? a. -50 b. 0 c. 50 d. 100

C

What is the default print job priority for all print jobs created by the lp command? a. -50 b. 0 c. 50 d. 100

C

What is the default target on a system with a GUI installed? a. multi-user.target b. single-user.target c. graphical.target d. gui.target

C

What is the default target on a system with a GUI installed?​ ​a. multi-user.target ​b. single-user.target ​c. graphical.target d. ​gui.target

C

What is the most commonly used LAN protocol? a. DLC b. UDP/IP c. TCP/IP d. IPX/SPX

C

What is the subnet mask for a Class C IP address? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

C

What kill signal stops a process, then restarts it with the same PID? a. SIGINT b. SIGQUIT c. SIGHUP d. SIGTERM

C

What option should be used in conjunction with the lp command in order to specify the destination printer name? a. -n b. -p c. -d d. -l

C

When using Systemd, what command can be used to start, stop and configure daemons to start automatically when the system starts? a. chkconfig b. service c. systemctl d. syscontroller

C

When using the compress utility, each file specified for compression is renamed with what extension? a. .cmp b. .c c. .Z d. .cpz

C

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory? a. daemon b. manip-daemon c. service d. daemon-service

C

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory? a. daemon b. manip-daemon c. service d. daemon-service

C

​What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package? a. ​-r b. ​-D c. ​-P d. ​-d

C

​What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system? a. ​-c b. ​-U c. ​-F d. ​-z

C

​When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts? ​a. chkconfig ​b. service c. ​systemctl ​d. syscontroller

C

Select the two window managers that have been used in GNOME:​' Multiple Answer a.​kwin ​b. lxde c. ​metacity d. ​mutter

C and D

The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?​ Multiple Answers ​a. log.conf ​b. rsyslog.conf ​c. rsyslog.d ​d. log.d

C and D

What two commands below can be used to stop a process, either by PID number or process name?​ Multiple Answers ​a. end ​b. stop c. kill​ d. ​killall

C and D

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?​ Multiple Answers ​a. /etc/prnt.config ​b. /etc/cupsd.conf ​c. /etc/cups/cupsd.conf ​d. /etc/cups/printers.conf

C and D

​What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is? Multiple Answers ​a. -s ​b. -h ​c. -d ​d. -k

C and D

Which of the following commands can be used to create a BASH variable named CREATOR with the value of Torvalds?

CREATOR="Torvalds"

____ are values that are calculated using a MD5 algorithm, a SHA-1 algorithm, or a SHA-256 algorithm. Read Answer Items for Question 13.

Checksum

An IPv6 IP address consists of 16-bit numbers in what numbering scheme? a. decimal b. octal c. binary d. hexadecimal

D

What device file below indicates that the first ATAPI IDE tape device (nonrewinding)? a. /dev/st0 b. /dev/nst0 c. /dev/ht0 d. /dev/nht0

D

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?​ ​a. silent b. ​noerror c. ​whisper ​d. quiet

D

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd? a. wtmp b. messages c. dmesg d. secure

D

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd? a. wtmp b. messages c. dmesg d. secure

D

What number indicates the lowest kernel priority (PRI) of a process possible?​ ​a. -20 ​b. 0 ​c. 20 d. ​127

D

What option, when added to the crontab command, opens the vi editor with a user's cron table? a. -u b. -c c. -f d. -e

D

What permissions are required to execute a shell script in a manner similar to any other executable program on the system? a. read b. write and read c. execute d. read and execute

D

Which command can be used to count the number lines, words, and characters in a file? a. pr b. nl c. tr d. wc

D

Which of the following is not one of the three main Linux commands? a. binary programs b. shell scripts c. shell functions d. device calls

D

Which of the following is not one of the three main types of Linux commands?​ ​a. binary programs ​b. shell scripts ​c. shell functions d. ​device calls

D

​What command can be used to search for DPM package information? a. dpkg-search b. dpkg-list c. dpkg-info d. dpkg-query

D

What are two means available to resolve a host name to the appropriate TCP/IP address? (choose two answers)

DNS /etc/hosts

A system process that is not associated with a terminal is called a(n) ____ process.

Daemon

tracks

Data is read from physical hard drives in concentric circles known as which of the following?

True

Each process can start an unlimited number of other processes.

An alternative to the vi editor that offers an equal set of functionality is the GNU _________________________.

Emacs (Editor MACroS) editor

The LISP artificial intelligence programming language can be used with which text editor below? a. Kedit editor b. Nedit editor c. Joe editor d. Emacs editor

Emacs editor

____________________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.

FHS

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. True or False?

False

T/F - The killall command uses the PID to kill a process.

False

Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy.​

False

What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system? T/F

False

When using the gzip utility, the -l option is also known as best compression and results in a higher compression ratio. True or False?

False

Zombie processes are also known as defunct processes.​ True or False

False

What command is most effective at identifying different types of files?​

File

____ are labels representing command input and output.

File descriptors

Archiving all data on a filesystem is performing a ____.

Full backup

An IPv6 address consists of 16-bit numbers in what numbering scheme?

Hexadecimal or Expanded numbering scheme

Filenames that start with a period, such as .file, are referred to as

Hidden Files

chmod 7777 filename

In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?

swapoff

In the event that you wish to disable a swap partition, what command must be used?

process state

In the output of th ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?

The process is currently running on the processor.

In the process state column, what does an "R" indicate?

root

In what filesystem are most of the operating system files contained?

command mode

In what mode does the vi editor open by default?

Which of the following will the split command do on a file when no other options are specified?

It will split a file into new equally sized files that are 1/10th of the original file size.

The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.

Kern

A user account can be locked with the usermod command using what option?

L

Which of the following options is passed to the Linux kernel from the GRUB2 configuration file to set the locale?

LANG

In order to send a print job to a printer using CUPS, what command must be used?

Lp

Describe the purpose the process state column displayed by the ps -l command. What values may appear in this column, and what do these values indicate?

the -l option to the ps command lists even more information about each process than the -f option. The process state (S) column is the most valuable to systems administrators because it indicates what the process is currently doing. The values that may appear are the (S) value for sleeping, the (R) value is for running, the (T) value is for a process that has stopped or is being traced by another process and the (Z) value indicates a zombie process

Multicast

the TCP/IP communication destined for a certain group of computers

broadcast

the TCP/IP communication destined for all computers on a network

​What two RAID types below utilize disk striping with parity, providing protection against one or two drive failures respectively? a. RAID6 b. RAID0 c. RAID5 d. ​RAID1

RAID 5 & RAID 6

​A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:

RAID Z

A ZFS volume that uses a variable stripe size and requires a minimum of 3 hard disks to protect against a single disk failure is known as

RAID-Z

​A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as: a. RAID+ b. RAID-Z c. RAID 5 d. ​ZFS Extended RAID

RAID-Z

forking

the act of creating a new BASH shell child process from a parent BASH shell process

What SCSI type supports speeds of up to 80 MB/second?

SCSI-3 Ultra2 Wide

What SCSI type supports speeds of up to 80 MB/second? a. SCSI-3 Ultra b. SCSI-2 Wide c. SCSI-3 Ultra2 Wide d. SCSI-3 Ultra3 Wide

SCSI-3 Ultra2 Wide

What kill signal stops a process, then restarts it with the same PID?

SIGH UP

The ____ kill signal stops a process and then restarts it with the same PID.

SIGHUP

What kill signal stops a process, then restarts it with the same PID?

SIGHUP

time slice

the amount of time a process is given on a CPU in a multiprocessing operating system

background (bg) command

the command used to run a foreground process in the background

at command

the command used to schedule commands and tasks to run at a preset time in the future

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?

SIGQUIT

​What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file? ​

SUID ​SGID

Explain why scheduling commands can be beneficial, and detail some of the methods available for scheduling commands.

Scheduling system maintenance commands to run during nonworking hours is good practice, as it does not disrupt normal business activities. There are two different methods to schedule commands: At daemon (atd) - which can be used to schedule a command to execute once in the future cron daemon (crond) - which is used to schedule a command to execute repeatedly in the future

What tool is designed as a secure remote access utility that encrypts information that passes across the network?

Secure Shell (SSH)

What tool below was designed as a secure remote access utility that encrypts information that passes across the network?

Secure Shell SSH

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

Segmentation fault

ls -l

Select the command below that can be used to provide a long listing for each file in a directory:

chroot

Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment

mke2fs

Select the command that can be used to check an ext2, ext3, or ext4 filesystem:

fdisk

Select the command that can be used to create partitions that will be stored in an MBR after installation:

\f

Select the escape sequence that is used for a form feed:

\n

Select the escape sequence that starts a new line when used with echo:

loadavg

Select the file in the /proc directory that contains statistics on the performance of the processor

5

Select the mode below that corresponds to setting r-x:

*

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.

[ A -gt B ]

Select the test statement that can be used to determine if A is numerically greater than B

[ A gt B ]

Select the test statement that can be used to determine if A is numerically greater than B

memtest86

Select the utility below that when run will start and perform a thorough check of RAM for hardware errors:

____ are files that are typically used to create custom programs that perform administrative tasks on Linux systems.

Shell scripts

Which of the following does Click Assist do?

Simulates a right click by holding down the left mouse button

link local

the portion of an IPv6 address that refers to a unique computer, it is analogous to the host portion of an IPv4 address

When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?

the process is high priority

Trapping

the process of ignoring a kill signal

When you run the ps command, how are daemon process recognized?

there is a question mark in the TTY column

How many DNS servers can be configured in the /etc/resolv.conf file?

three

The amount of time a process has to use the CPU is called a(n) ____________________.

time slice

The amount of time a process has to use the CPU is called a(n) __________________________.

time slice

Which of the following commands will list the time zones available on a Linux system?

timedatectl list-timezones

Which command is used to gain real-time information about processes running on the system, with the most processor-intensive processes appearing at the beginning of the list?

top

Which of the following commands will show a list of process names along with their process ID (PID)? (Choose two.)

top ps

The ____ command can be used to replace characters in a file sent via Standard Input.

tr

What command can be used to replace characters in a file sent via Standard Input?

tr

Data is read from physical hard drives in concentric circles known as which of the following?

tracks

Data is read from physical hard drives in concentric circles known as which of the following? a. blocks b. tracks c. sectors d. cylinders

tracks

What is the name of the concentric circles from where data is read from in a physical hard drive?

tracks

A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator. true or false

true

Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets. true or false

true

The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length.​ true or false

true

The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations.

true

When you print to a printer class, the print job is send to the first available printer in the printer class. true or false

true

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?

Sixth

The ____ field in a cron table contains the absolute pathname to the command to be executed.

Sixth

live media image

Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?

What stage of the GRUB boot loader typically resides on the MBR / GPT?

Stage 1

___________________ is the process in which a single large network is subdivided into several smaller network to control traffic flow and improve manageability.

Subnetting

What option can be used in the journald configuration file to specify a file size limit to the event log?

SystemMaxUse

Which of the following is a valid Linux initialization process?

Systemd SysV

What is the most commonly used LAN protocol?

TCP-IP

What is the most commonly used LAN protocol?

TCP/IP

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. T/F --

TRUE

Which of the following system variables can you modify to override the default system timezone within your current shell?

TZ

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Tab b. Ctrl c. Alt d. Esc

Tab

Filenames that end with the .tar.gz or .tgz extensions, and represent gzip-compressed tar archives are called ____.

Tarball

Linus Torvalds

The Linux kernel was developed and released in 1991 by:

KDE

The QT toolkit is utilized by which GUI environment?

echo $PS1

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?

set

The environment variables that are set by default and their current values can be viewed with what command?

127

The first software RAID volume on a system will use a multiple disk device file that starts with what number?

Firewall

The iptables software on Linux is an example of what kind of software?

Which of the following commands will prompt you to answer a series of questions to help determine which time zone file you should use?

tzselect

What file system below is used by software programs that write to a CD-RW or DVD-RW drive?

udf

What file system below is used by software programs that write to a CD-RW or DVD-RW drive? - udf - ntfs - hpfs - ext2

udf

In order to create user accounts on a Linux system, what command should be utilized?

useradd

What two commands can be used to show information about physical volumes and logical volumes respectively?

vgdisplay and lvdisplay

What two commands can be used to show information about physical volumes and logical volumes respectively?​ (Select 2 answers) a. showvg b. showlv c. lvdisplay d. vgdisplay

vgdisplay, lvdisplay

In order to quickly create an empty file, what command can be used?

vim file1

In order to quickly create an empty file, what command can be used?​

vim file1

You can execute ____ main types of Linux commands.

Three

tac

To display a text file in reverse order, what command should be used?

cat data

To display the contents of a text file called data, what command should be used?

/proc/meminfo

To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?

mount -a

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?

False

To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.

A route table is a list of TCP/IP networks that is stored in system memory

True

A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address.

True

After a process has been started, you can change its priority by using the renice command. True or False

True

After a process has been started, you can change its priority by using the renice command. True or False?

True

After a process has been started, you can change its priority by using the renice command. True or False.

True

CUPS contains versions of the lpr, lpc, lpq, and lprm commands.

True

Class D addresses are used for Multicasting

True

Each process can start an unlimited number of other processes. True or False

True

Each process can start an unlimited number of other processes. True or False?

True

Each process can start an unlimited number of other processes. T/F

True

Each process can start an unlimited number of other processes. True or FAlse

True

Everyone has permission to view the /etc/passwd file's contents.

True

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False

True

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False?

True

Most daemon scripts accept the arguments start, stop, and restart. True or False

True

Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stip daemons after system initialization. True or False?

True

Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets

True

SSH encrypts all traffic that passes across the network, whereas telnet does not.

True

T/F - You can choose to use a window manager only, and not use a desktop manager.

True

T/F - You can use the sed command to remove unwanted lines of text.

True

The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length

True

The compress utility preserves the original ownership, modification, and access time for each file that it compresses.

True

The compress utility preserves the original ownership, modification, and access time fore each file that it compresses. True or False?

True

The cpio command has the ability to handle long filenames and can be used to back up device files.

True

The cpio command has the ability to handle long filenames and can be used to back up device files. True or False?

True

The first thing you must do after creating a user is set the password.

True

The line that configures the host name for the computer at boot time can be found in /etc/hostname.

True

The newgrp command opens a new shell even if the command fails.

True

The tar utility cannot back up device files or files with filenames longer than 255 characters.

True

The tar utility cannot back up device files or files with filenames longer than 255 characters. True or False?

True

When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD.

True

When you print to a printer class, the print job is send to the first available printer in the printer class.

True

When you print to a printer class, the print job is send to the first available printer in the printer class. True or False

True

When you print to a printer class, the print job is send to the first available printer in the printer class. True or False?

True

While a process is waiting for its parent process to release the PID, the process is said to be in a(n) zombie state. T/F

True

You can choose to use a window manager only, and not use a desktop manager.

True

You can choose to use a window manager only, and not use a desktop manager. True or False

True

You can use the sed command to remove unwanted lines of text. True or False

True

Zombie processes are also known as defunct process. True or FAlse

True

Zombie processes are also known as defunct processes. True or False?

True

​Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stop daemons after system initialization.

True

​Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stop daemons after system initialization. True or False

True

Segmentation faults can sometimes be fixed by performing what two tasks?

Turning off CPU cache memory and increasing the number of memory wait states in BIOS

/var

Under the root directory in Linux, which directory contains system commands and utilities?

/boot

Under what directory is the Linux kernel stored?

Which of the following is responsible for starting tasks and services during boot, stopping them during shutdown, and supervising them while the system is running?

Upstart

[1-4]

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?

Red Hat

What Linux distribution is the most commonly used distribution within organizations today?

RAID5

What RAID level is commonly referred to as disk striping with parity?

SCSI-3 Ultra2 Wide

What SCSI type supports speeds of up to 80 MB/second?

g+r-w

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?

parent process ID

What can be used on a Linux system to trace the lineage of each child process?

#!

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?

/dev/ttyS1

What character device file represents the second serial port on a system (COM2)?

colon

What character is used to delimit most Linux configuration files?

cp

What command can be used to copy files?

ioports

What file in the /proc directory contains a list of memory address ranges reserved for device use?

/proc/cpuinfo

What file in the /proc directory contains information about a computer's CPU?

init; systemd

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or System init processes?

-l; -f

What two ps options can be used to display a full list of information about each process, and a long list of information about each process?

@

When issuing the ls -F command, what special character indicates a linked file?

%

When killing a background job with the kill command, the background job ID must be prefixed by what character below?

+

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?

systemctl

When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?

Options

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:

7

When using the chmod command, the mode rwx can be represented by which number?

The process is high priority.

When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?

Which command can be used to count the number lines, words, and characters in a file?

wc

Which of the following commands will count the number of lines in a file named data.csv?

wc -l data.csv

FTP

what service provides a method for the efficient transfer of files over the Internet?

The ____________________ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.

which command

What permission grants a user the ability to open, read, and edit the contents of a file?

write

​What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?

write

​What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file? - read - write - sticky bit - execute

write

If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?

write and read

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?​

wtmp ​lastlog

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?

wtmp lastlog

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?

wtmp lastlog

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.​

​(hd0,0)

What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

​-d, ​-k

Segmentation faults can sometimes be fixed by performing what two tasks below?​ a. perform a full reinstall of OS b. ​turn off CPU cache memory c. increase the number of memory wait states in BIOS d. update the Linux kernel

​turn off CPU cache memory, and increase the number of memory wait states in BIOS

/dev/hdb1

Which device file below represents the first primary partition on the second PATA hard disk drive?

SIGQUIT

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?

Select the escape sequence that is used for a form feed:

\f

Which of the following command can be used to remove a job from the list of pending jobs? (Choose all that apply.)

at -d at -r atrm

In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.

authentication

The ____ command can be used to extract, manipulate, and format text using pattern-action statements.

awk

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?

awk

In a file's mode, a permission that is unavailable is represented by what character? - ? - * - "b -" - +

b -

In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued? a. cd .. b. /home/joe c. cd ./.. d. cd ../..

cd ../..

Which command is used to list and modify password expiration information for user accounts?

chage

​What two commands below can be used to modify the password expiry information and a user's default shell?

chage chsh

A device that transfers data in a character-by-character fashion is referred to as what type of device?

character

A device that transfers data in a character-by-character fashion is referred to as what type of device? a. text b. binary c. block d. character

character

In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?

chmod 7777 filename

Select the command that can be used to change the root filesystem to a different directory, such as when you are in a rescue environment.

chroot

what command can be used to change the root filesystem to a different directory, such as when in a rescue environment?

chroot

​Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment. a. croot b. set_root c. change_root d. ​chroot

chroot

What two commands below can be used to modify the password expiry information and a user's default shell?

chsh chage

You have run the top command successfully, but realize that the q key on the keyboard has suddenly stopped working. What is another way that you can exit out of the top program?

ctrl-c

What option should be used in conjunction with the lp command in order to specify the destination printer name?

d

What command can be used to search for DPM package information?

dpkg-query

Select the command below that shows the size of a directory and its contents in kilobytes:​

du

Select the command below that shows the size of a directory and its contents in kilobytes:​ - du - sizeof - df - dir

du

What command shows the size of a directory and its contents in kilobytes?

du

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?

e

Which of the following commands will display the exit status of the last command used in the BASH shell?

echo $?

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?

echo $PS1

What command that can be used to create partitions that will be stored in a MBR after installation?

fdisk

After a background process has been started, it can be moved to the foreground by using the ____ command.

fg

After a background process has been started, what command below can be used to move it to the foreground?

fg

You have started a job running in the background that you want to now bring to the front so that you can watch it execute. Which of the following commands can be used to display the job's output to the terminal?

fg

When writing shell scripts and using an if statement to determine whether a set of code should be executed, what is the proper syntax to end the if construct? ___________

fi

Errors on a filesystem are common on most filesystems. What do these errors indicate? a. filesystem corruption b. raid degradation c. hard drive failures d. filesystem breaks

filesystem corruption

Any command that can take standard input and transform it into standard output is called a(n) ____________________ command.

filter

Which of the following will look at the /etc/passwd file for any lines containing the word root and display them out to the screen while simultaneously writing the results to a file?

grep root /etc/passwd | tee ~/root.txt

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?​

grubby

The first line in a shell script, which specifies the pathname to the shell that interprets the contents of the shell script, is ____.

hashpling

An IPv6 IP address consists of 16-bit numbers in what numbering scheme?

hexadecimal

An IPv6 IP address consists of 16-bit numbers in what numbering scheme?

hexidecimal

You can view or set the host name for a Linux computer using the _________________ command.

hostname

Which of the following can be used to compare the hardware clock to the system clock, writing a new result to a new line every 10 seconds?

hwclock -c

Which process will all have PID of 1 and a PID of 0?

init

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes?

int systemd

If the chage command is used without options, it is in ____ mode.

interactive?

What file in the /proc directory contains a list of memory address ranges reserved for device use?

ioports

What file in the /proc directory contains a list of memory address ranges reserved for device use? a. ioports b. meminfo c. iomem d. misc

ioports

Which of the following commands can be used to only show jobs that have been paused.

jobs -s

In Fedora 20, what journaling database system has replaced the logging system used to record the messages normally stored within the boot.log, messages, and syslog files?

journald

​In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?

journald

​In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called? a. journald b. systemd c. ​logd d. ​messaged

journald

What command below can be used to uninstall the LILO bootloader from an active partition?​

lilo -U

What file in the /proc directory that contains statistics on the performance of the processor?

loadavg

Which of the following commands will show a number of environment variables that start with LC_?

locale

Which of the following commands can be used to display the current locale of a system? (Choose two.)

locale localectl

Select the command below that utilizes a premade database that contains a list of all the files on a system:

locate

Select the command below that utilizes a premade database that contains a list of all the files on a system: - locate - search - find - id

locate

What command utilizes a pre-made database that contains a list of all the files on a system?

locate

What two commands can be used to locate files on a filesystem? - locate - grep - read - find

locate, find

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

login.defs

The TCP/IP address of 127.0.0.1 is also referred to as the _________________.

loopback address

The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.

make

____ is a command that can be used to copy files to the appropriate location on the filesystem.

make install

What command is used to manage a software RAID configuration after installation?

mdadm

What command is used to manage a software RAID configuration after installation?​ a. ​mdraid b. ​vgadm c. ​mdadm d. ​pgadm

mdadm

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?​ a. kmods b. modinfo c. mod_info d. modules

modules

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used??

mount -a

Which of the following is the default window manager used by the GNOME version 3 desktop environment?

mutter

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (choose all that apply)

nslookup hostname dig hostname resolve hostname

RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?

package dependancy

Which of the following commands can be used to terminate a process by the process name?

pkill

The daemons associated with network services listen for network traffic associated with a particular _____________________.

port

When a user creates a file or directory, that user's name and ____________________ becomes the owner and group owner of the file, respectively.

primary group

Which command when entered without argument is used to display a list of processes running in the current shell?

ps

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?

pstree

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?​

pstree

What command is used to display the lineage of a process by tracing its PPIDs until the init daemon?

pstree

What command below can be used to create a new physical volume?

pvcreate

What command will create a new physical volume?

pvcreate

What option can be added to the rpm command in order to query packages?

q

If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?​ - read - write - execute - move

read, write

what two commands will work recursively if specified with the -R option?

rm and cp

Processes that have encountered an error during execution and continuously uses up system resources are referred to as ________________ processes.

rogue

An RPM package can be converted to a cpio archive using what command?

rpm2cpio

The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?

rsyslog.conf rsyslog.d

The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?

rsyslog.conf rsyslog.d

A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.

runlevel

Which of the following commands will show the current runlevel along with the previous runlevel? (Choose all that apply.)

runlevel

The at command is used to ________________.

schedule processes to run at a single instance in the future

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?

secure

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?

secure

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

segmentation fault

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred? a. page fault b. IRQ fault c. segmentation fault d. RAM failure

segmentation fault

Which of the following commands will count down from 10 to 1?

seq 10 -1 1

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?

service

The environment variables that are set by default and their current values can be viewed with what command?

set

To see a list of the environment variables and their current values on a system, you can use the ____ command.

set

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?

sixth

Which of the following commands will display the contents of the /etc/passwd file in alphanumerical order?

sort /etc/passwd

Which of the following is a valid method of running a script named myscript.sh? (Choose two)

source myscript.sh ./myscript.sh

Which of the following are graphical remote administration technologies? (choose all that apply)

ssh-x VNC

The ____________ command can be used to start X Windows and the default window manager or desktop environment.​

startx

Any error messages generated by a command is ____.

stderr

The information that is processed by the command during execution is ____.

stdin

____ is the normal output of a command.

stdout

Most commands that are run by the shell are run in a separate ____________________, which is created by the current shell.

subshell

____ is a command that can be used to ensure that a file was received in its entirety after you download it.

sum

What section of a filesystem contains info about the filesystem in general?

superblock

What section of a filesystem contains information about the filesystem in general?

superblock

In the event that you wish to disable a swap partition, what command must be used?​ a. umount b. ​swapoff c. ​swapdrop d. ​delete_swap

swapoff

To create a(n) ____________________ link, you use the -s option to the ln command.

symbolic

Which of the following is a virtual filesystem that is made up of virtual files that a Linux operating system is able to export information to about kernel sub-systems, hardware devices, and device drivers to make it easy for users to access the information?

sysfs

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?

system-config-keyboard

Which of the following commands will display a list of Systemd units sorted by the time they took to load?

systemd-analyze blame

To display a text file in reverse order, what command should be used?​ a. tee b. ​tac c. ​cat d. ​sed

tac

What command can be used to display the last five lines of a text file?

tail -5

Files with what two file extensions are commonly known as tarballs?​

tar.gz ​.tgz

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called? a. SCSI controller b. target ID c. SCSI number d. device ID

target ID

The /etc/login.defs file is a(n) ____ file.

text

​What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

-k -d

The mfks command can be issued with what switch in order to specify a filesystem type?

-t

In order to redirect a file to the standard input of a command, what metacharacter should be used?

"<"

Which of the following characters can be entered at the beginning of a line in a shell script to ensure that line is recognized as a comment rather than try to execute it?

#

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?

#!

The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?

$

The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command? - $ - & - # - *

$

The contents of a certain variable in memory can be viewed using which metacharacter in combination with the echo command?

$

The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.

$PS1

When killing a background job with the kill command, the background job ID must be prefixed by what character below?

%

When killing a background job with the kill command, you must prefix the background job IDs by a(n) ____.

%

When you append a(n) ____ to a command, the command is run in a background process.

&

What character, when appended to a command, causes the command to be run in the background?

& (and command) &

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.​

(hd0,0)

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character. a. + b. ^ c. ? d. *

*

Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?​ a. -o loop b. --mode l c. --option l d. --loop

--loop

Nice values are used to affect process priorities using a range between ______________________.

-20 and 19

What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?

-F

Which switch below can be added to the ls command to show a list of files and their type?

-F

A user account can be locked with the usermod command using what option?

-L

What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?

-P

​What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?

-P

What option can be used with SSH to enable tunneling of X Windows information?

-X

What option can be used with ssh to enable tunneling of X Windows information?​

-X

​What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?

-Z -z

When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.

-c

What option should be used in conjunction with the lp command in order to specify the destination printer name?

-d

What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

-d -k

To create or edit a user cron table, you can use the ____ option to the crontab command.

-e

To remove a package from the system, you can use the ____ option to the rpm command.

-e

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?

-e

What option, when added to the crontab command, opens the vi editor with a user's cron table?

-e

What two ps options can be used to display a full list of information about each process, and a long list of information about each process?

-f -l

What option can be added to the netstat command in order to display network statistics?

-i

What option can be added to the netstat command in order to display network statistics?​

-i

Select the options to use with the cpio utility to cause the utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation:

-i -u

In order to display a list of at job IDs, what option can be specified to the at command?

-l

In order to display a list of at jobs IDs, what option can be specified to the at command?

-l

Select the command below that can be used to provide a long listing for each file in a directory:

-l

Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed:

-l

The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.

-l

To display a list of at Job IDs, you can specify the ____ option to the at command.

-l

which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?

-loop

When using the cpio utility, the ____ option causes a new archive to be created.

-o

Select the option that can be used with the lpstat command to display a list of printers that are enabled:

-p

When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames.

-p

What option can be added to the rpm command in order to query packages?

-q

What command option, when added to the rm command, is commonly referred to as the -resume option?

-r

What option can be added to the userdel command to remove the home directory of the target user?

-r

What option can be added to the userdel command to remove the home directory of the target user?

-r

What option, when added to the rm command, is commonly referred to as the -resume option?

-r

What option, when added to the rm command, is commonly referred to as the -resume option? - r - d - f - i

-r

Select the options to use with the cpio utility to cause the utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation:

-u -i

When using the compress utility, each file specified for compression is renamed with what extension?

.Z

What device file below indicates that the first ATAPI IDE tape device (nonrewinding)?

/dev/nht0

What device file below indicates the first ATAPI IDE tape device (nonrewinding)?

/dev/nht0

What two device files below represent the first SCSI tape device, rewinding and non-rewinding?​

/dev/st0 /dev/nst0

What two device files below represent the first SCSI tape device, rewinding and non-rewinding?

/dev/st0 /dev/nst0

What character device file represents the second serial port on a system (COM2)?

/dev/ttyS1

What character device file represents the second serial port on a system (COM2)? a. /dev/ttyS1 b. /dev/tty2 c. /dev/tty1 d. /dev/ttyS0

/dev/ttyS1

In which directory would a system administrator store scripts that should be run monthly by the cron daemon?

/etc/cron.monthly

The location of system cron tables.

/etc/crontab

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

/etc/cups/printers.conf

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?

/etc/cups/printers.conf ​/etc/cups/cupsd.conf

In Linux, the group database configuration file is ____.

/etc/group

Which of the following files is a binary file that contains the rules for calculating the time based on your time zone relative to epoch time?

/etc/localtime

Select below the configuration file that is used to configure the BIND / DNS server:​

/etc/named.conf

Which file is a configuration file containing passwords and password expiration information for all user accounts?

/etc/shadow

Where is the skeleton directory located on most Linux systems?

/etc/skel

The SSHD daemon is configured by editing what configuration file?

/etc/ssh/sshd_config

To ensure that Linux has detected the correct amount of RAM in the filesystem after installation, you should view the contents of what file in the proc directory?

/proc/meminfo

To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?

/proc/meminfo

To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory? a. /proc/meminfo b. /proc/memoryinfo c. /proc/mem d. /proc/cpuinfo

/proc/meminfo

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?

/root

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory? - /root - /bin - /home/root - /boot

/root

On a Fedora based system, where are the shell environment and scheduled commands for at stored?​

/var/spool/at

The location of user cron tables.

/var/spool/cron

Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system?

/var/spool/cron/(the user's login name)

Where are scheduled commands stored on Ubuntu Linux systems?

/var/spool/cron/atjobs

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?

0

On Linux, the root user always has a UID of what number?

0

You have a script to run on April 1 each year at 9:00am. Write the cron table entry to make this happen. The script is located in /bin and named aprilfools.

0 9 1 4 * /bin/aprilfools

What range of ports is considered to be "well-known"?

0-1023

What range of ports is considered to be "well-known"?​

0-1023

1. A calculated value that is unique to a file's size and contents. 2. The amount of compression that occurred during compression algorithm. 3. A utility that can be used to manage DPM packages using a graphical interface. 4. The process whereby files are copied to an archive. 5. A group of RPM packages that are commonly installed to provide a specific function on the system. 6. A command used to view the contents of an archive created with compress or gzip to Standard Output in a page-by-page fashion. 7. A gzip-compressed tar archive. 8. A command used to decompress files compressed by the gzip command. 9. A command used to extract archives created with the dump command. 10. A command used to decompress files compressed by the bzip2 command

1. checksum 2. compression ratio 3. Aptitude 4. system backup 5. package group 6. zmore command 7. tarball 8. gunzip command 9. restore command 10. bunzip2 command

1. The command used to change the GECOS for a user. 2. The area of the system from which information is gathered when logging system events 3. The command used to remove print jobs from the print queue in the CUPS print system 4. A unique number assigned to each user account 5. A group of CUPS printers that are treated as a single unit for the purposes of printing and management. 6. The command used to modify the name or GID of a group on the system. 7. the process of accepting a print job into a print queue. 8. The daemon responsible for printing in the CUPS printing system. 9. The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user. 10. The act of verifying a user's identity by comparing a user name and password to a system database (/etc/passwd and /etc/shadow)

1. chfn 2. facility 3. cancel 4. User Identifier (UID) 5. printer class 6. groupmod 7. spooling 8. CUPS daemon 9. primary group 10. authentication

What is VNC? How does it transfer graphics across the network?

A Virtual Network Computer (VNC) is a cross-platform technology that allows users to connect to a graphical desktop across a network. It transfers graphics across the network by using the special platform-independent protocol called Remote FrameBuffer (RFB) to transfer graphics, mouse movements, and keystrokes across the network.

Select the two escape sequences that represent a horizontal tab and a vertical tab, respectively:​ Multiple Answer ​a. \V ​b. \t ​c. \v ​d. \b

A and B

What two files below are the first two BASH environment files to be executed?​ Multiple Answer ​a. /etc/profile ​b. /etc/bashrc ​c. ˜/.bashrc d. ​˜/.bash_profile

A and B

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?

60-70 percent

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?

60-70%

The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below?

631

​The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below?

631

How many different kill signals can be sent by the kill command to a given process?

64

How many different kill signals can be sent by the kill command to give a process?

64

There are ____ different kill signals that the kill command can send to a certain process.

64

In a SCSI chain the highest priority SCSI device is given what SCSI ID?

7

In a SCSI chain the highest priority SCSI device is given what SCSI ID? a. 1 b. 6 c. 7 d. 15

7

When using the chmod command, the mode rwx can be represented by which number?

7

When using the chmod command, the mode rwx can be represented by which number? - 0 - 1 - 7 - 8

7

​A Class A network uses how many bits for the network ID, and how many bits for the host ID?

8 24

Each octet in an IP address represents a binary number consisting of how many bits / bytes?

8-bit

Each octet in an IP address represents a binary number consisting of how many bits/bytes?

8-bit

What hex code is associated with a Linux swap type partition?​

82

What hex code is associated with a Linux swap type partition?​ a. ​96 b. 83 c. 12 d. 82

82

What kill level signal cannot be trapped?

9

IPv6 IP addresses are delimited by what character below?

:

​At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes? a. ​:q! b. ​:! c. :exit d. :q

:q!

You can redirect a file to the standard input of a command using the ____ metacharacter.

<

Which of the following can be used for comparing values within an if statement? (Choose two.)

= -lt

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?

>

You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file.

>

Which of the following will take output from a command and append it to the end of a file?

>>

When issuing the ls -F command, what special character indicates a linked file?

@

A list of all exported environment and user-defined variables in a shell can be viewed with what command below? a. env b. set c. setenv d. getenv

A

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.​ ​a. (hd0,0) ​b. (hd1,1) ​c. (hda,0) ​d. (hda,1)

A

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel? a. image= b. default= c. install= d. root=

A

Most Linux distributions make use of what package manager? a. RPM b. PRM c. MPR d. RMP

A

On Linux, the root user always has a UID of what number?​ ​a. 0 ​b. 1 ​c. 23 ​d. 500

A

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate? a. xvidtune b. xvideotune c. xtune d. vidtune

A

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate? a. xvidtune b. xvideotune c. xtune d. vidtune

A

The K desktop environment utilizes what window manager and toolkit below?​ Multiple Answer ​a. kwin ​b. mutter ​c. Qt toolkit ​d. GTK+ toolkit

A and C

RPM package that require other RPM packages to be installed on a system prior to being installed creates a relationship known as? a. package dependancy b. recursing package c. branching package d. family package

A

What character, when appended to a command, causes the command to be run in the background? a. & b. $ c. # d. %

A

What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces? a. ifconfig b. ipconf c. ipconfig d. ifconf

A

What command can be used to display the contents of a file that was compressed with the compress utility? a. zcat b. ccat c. cat d. acat

A

What command can be used to replace characters in a file sent via Standard Input? a. tr b. rt c. ts d. st

A

What number represents the stdin file descriptor? Correct a. 0 b. 1 c. 2 d. 3

A

What option can be added to the rpm command in order to query packages?​ a. ​-q b. ​-v c. ​-h d. ​-i

A

What option can be added to the rpm command to update a specified package only if an older version exits on the system? a. -F b. -U c. -z d. -c

A

What option can be added to the userdel command to remove the home directory of the target user? a. -r b. -d c. -R d. -x

A

What option can be added to the userdel command to remove the home directory of the target user? a. -r b. -d c. -R d. -x

A

What option can be used in the journald configuration file to specify a file size limit to the event log?​ ​a. SystemMaxUse ​b. Max_file_size ​c. Journal_Limit ​d. SizeLimit

A

What options can be used in the journald configuration file to specify a file size limit to the event log a. SystemMaxUse b. Max_file_size c. Journal_Limit d. SizeLimit

A

What stage of the GRUB boot loader typically resides on the MBR / GPT? a. Stage1 b. Stage1.5 c. Stage2 d. Stage2.5

A

What stage of the GRUB boot loader typically resides on the MBR/GPT? a. Stage 1 b. Stage 1.5 c. Stage 2 d. Stage 2.5

A

When used with the compress command, what option below can be used to compress symbolic links? a. -f b. -r c. -c d. -v

A

When used with the compress command, what option below can be used to compress symbolic links? a. -f b. -c c. -v d. -r

A

When used with the uncompress command, what option displays the contents of the compress file to Standard Output? a. -c b. -r c. -v d. -f

A

When used with the uncompress command, what option displays the contents of the compress files to Standard Output? a. -c b. -v c. -f d. -r

A

When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process? a. The process is high priority b. The process is exiting c. The process is accepting redirected input from a terminal. d. The process is currently active on the processor.

A

When viewing the output of the ps ax​ command, what does a < symbol in the STAT column indicate for a process? ​a. The process is high priority. ​b. The process is exiting. ​c. The process is accepting redirected input from a terminal. ​d. The process is currently active on the processor.

A

Where are the log files for the Samba daemon located?​ a. ​/var/log/samba b. ​/var/run/samba/log c. ​/var/log/access.log d. ​/var/log/Samba/log

A

Where is the skeleton directory located on most Linux systems? a. /etc/skel b. /var/skel c. /etc/skeleton d. /var/skeleton

A

Where is the skeleton directory located on most Linux systems? a. /etc/skel b. /var/skel c. /etc/skeleton d. /var/skeleton

A

​RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as? a. package dependency b. branching package​ c. family package d. recursing package

A

​What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on? ​a. for ​b. while ​c. case ​d. switch

A

Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded:​ Multiple Answer ​a. append= ​b. map= ​c. initrd= d. ​boot=

A and D

What two window managers is the Compiz Fusion window manager based upon?​ Multiple Answer ​a. compiz ​b. sawfish c. ​fvwm d. beryl​

A and D

env

A list of all exported environment and user-defined variables in a shell can be viewed with what command below?

Detail shell scripts and explain how they are used and executed.

A shell script is meant to be run by the UNIX shell. These commands can be written in different types of scripting languages. These scripts can be used to start programs, manipulate files, and printing out text. Scripts can be executed from the command-line in UNIX.

The process state column, what does an "R" indicate? a. The indicate process is being restarted because it received a SIGHUP kill signal. b. The process is currently running on the processor. c. The process is reading from the local hard disk. d. The process is recovering from a fatal error, and may potentially become a zombie.

B

Under what directory is the Linux kernel stored? a. / b. /boot c. /root d. /krnl

B

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database? a. info b. alert c. debug d. panic

B

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database? a. info b. alert c. debug d. panic

B

What can be used on a Linux system to trace the lineage of each child process? a. process ID b. parent process ID c. execution order ID d. process fork ID

B

What can be used on a Linux system to trace the lineage of each child process?​ ​a. process ID b. ​parent process ID ​c. execution order ID ​d. process fork ID

B

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script? ​a. @! ​b. #! ​c. // ​d. ->

B

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent? a. 30-40 b. 40-50 c. 50-60 d. 60-70

B

The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below? a. 780 b. 631 c. 4586 d. 8080

B

The GUI components and related software take up how much space on a typical Linux installation? a. 1 GB b. 2 GB c. 3 GB d. 4 GB

B

​What operator below is known as the NOT operator? ​a. -o ​b. -a ​c. ! ​d. %

B

In an if construct, what statements are optional?​ Multiple Answer ​a. fi ​b. elif ​c. else ​d. then

B and C

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config file? a. grub2-install b. gruv-config c. grub-mkconfig d. grub-compile

C

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​ ​a. grub2-install ​b. grub-config ​c. grub-mkconfig d. ​grub-compile

C

An RPM package can be converted to a cpio archive using what command? a. ​conv_arch b. ​rpmconv c. ​rpm2cpio d. ​cpioconv

C

How many different kill signals can be sent by the kill command to a given process? a. 16 b. 32 c. 64 d. 128

C

If no level of compression is specified, the gzip command assumes what compression level? a. 4 b. 5 c. 6 d. 7

C

Select the option that can be used with the lpstat command to display a list of printers that are enabled: a. -o b. -a c. -p d. -e

C

The System Log Daemon uses what TCP and UPD port to accept incoming requests from another System Log Daemon on a remote system? a. 827 b. 1012 c. 514 d. 23

C

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below? a.sed b. grep c. awk d. nl

C

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable? a. ls $PWD b. echo #PWD c. echo $PS1 d. ls #PS1

C

The dump/restore utility is limited to a maximum of how many different incremental backups? a. seven b. eight c. nine d. ten

C

The dump/restore utility is limited to a maximum of how many different incremental backups? a. seven b. eight c. nine d. ten

C

What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer? a. route b. route add c. traceroute d. ip

C

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available a. system.conf b. local.setup c. login.defs d. user.defs

C

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH? a. ˜/.bash_profile b. ˜/.bash_login c. /etc/profile d. ˜/.profile

C

What is the Advanced Encryption Standard (AES) encryption algorithm​'s largest key length size? a. ​192-bit b. ​64-bit c. ​256-bit d. ​128-bit

C

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm? a. 40%-50% b. 50%-60% c. 60%-70% d. 70%-80%

C

What kill signal stops a process, then restarts it with the same PID? a. SIGINT b. SIGQUIT c. SIGHUP d.SIGTERM

C

What number represents the stderr file descriptor? a. 0 b. 1 c. 2 d. 3

C

What option can be used with ssh to enable tunneling of X Windows information?​ a. ​-L b. ​-f c. ​-X d. ​-x

C

What tool below was designed as a secure remote access utility that encrypts information that passes across the network? a. Virtual Network Computing (VNC) b. Telnet c. Secure Shell (SSH) d. rlogin

C

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. first b. second c. fifth d. sixth

D

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command? a. sys-conf-kb b. system-config-kb c. sys-config-keyboard d. system-config-keyboard

D

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command? a. sys-conf-kb b. system-config-kb c. sys-config-keyboard d. system-config-keyboard

D

In order to create user accounts on a Linux system, what command should be utilized? a. uadd b. usercreate c. adduser d. useradd

D

In order to create user accounts on a Linux system, what command should be utilized? a. uadd b. usercreate c. adduser d. useradd

D

In order to download DPM packages, what command should be used below?​ a. ​apt-search b. ​yum c. ​dpm-grab d. ​apt-get

D

In order to redirect a file to the standard input of a command, what metacharacter should be used? a. > b. # c. | d. <

D

Select below the configuration file that is used to configure the BIND / DNS server:​ a. ​/etc/dns.conf b. ​/etc/bind.conf c. ​/etc/resolv.conf d. ​/etc/named.conf

D

Select the command that can be used to send a small TCP/IP packet to another IP address and await a response: a. png b. ipquery c. ring d. ping

D

Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed: a. -c b. -f c. -r d. -l

D

The GUI components and related software take up how much space on a typical Linux installation? a. ​1 GB ​b. 2 GB ​c. 3 GB ​d. 4 GB

D

The GUI components and related software take up how much space on a typical Linux installation? a. 1 GB b. 2 GB c. 3 GB d. 4 GB

D

The sshd daemon is configured by editing what configuration file?​ a. ​/etc/sshd.config b. ​/etc/ssh/ssh_config c. ​/etc/ssh.conf d. ​/etc/ssh/sshd_config

D

What command below can be used to uninstall the LILO bootloader from an active partition?​ ​a. lilo --remove ​b. lilo -d ​c. lilo delete ​d. lilo -U

D

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? a. install b. configure c. make install d. make

D

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? a. configure b. install c. make install d. make

D

What number indicates the lowest priority kernel priority (PRI) of a process possible? a. -20 b. 0 c. 20 d. 127

D

What option can be added to the netstat command in order to display network statistics?​ a. ​-s b. ​-p c. ​-a d. ​-i

D

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons? a. -f b. -l c. -a d. -e

D

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons? a. -f b. -l c. -a d. -e

D

What option, when added to the crontab command, opens the vi editor with a user's cron table? a. -u b. -c c. -f d. -e

D

What range of ports is considered to be "well-known"?​ a. ​10023-24433 b. ​24434-65535 c. ​1024-10023 d. ​0-1023

D

What well-known TCP port is utilized by the SMTP service?​ a. ​110 b. ​22 c. ​23 d. ​25

D

When killing a background job with the kill command, the background job ID must be prefixed by what character below? a. & b. # c. $ d. %

D

When killing a background job with the kill command, the background job ID must be prefixed by what character below? a. & b. # c. $ d. %

D

When using the compress utility, each file specified for compression is renamed with what extension? a. .c b. .cmp c. .cpz d. .Z

D

​What yum command below can display a list of package group names? a. ​yum --list -g b. ​yum show groups c. ​yum list --groups d. ​yum grouplist

D

____ are constructs that alter the flow of a program based on whether a command in the program completed successfully or based on a decision that the user makes given a question posed by the program.

Decision construct

C

Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?

target ID

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?

____ are shell variables that are typically set by the system and contain information that the system and programs access regularly.

Environment variables

filesystem corruption

Errors on a filesystem are common on most filesystems. What do these errors indicate?

By default, new users are forced to change their passwords.

False

Each device attached to a system can be represented by multiple device files.

False

Fedora 20 makes use of the XFree86 implementation of X Windows. True or False?

False

Fedora 20 makes use of the XFree86 ​implementation of X Windows.

False

Fedora 20 makes use of the XFree86 ​implementation of X Windows. True or False

False

Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully. True or False

False

In Linux, you are restricted to using only one type of filesystem on a system.

False

On most Linux systems, the logrotate utility is automatically scheduled to run weekly.

False

On most Linux systems, the logrotate utility is automatically scheduled to run weekly. True or False

False

On most Linux systems, the logrotate utility is automatically scheduled to run weekly. True or False?

False

Regular users typically have a UID less than 100.

False

SLIP is a newer technology that PPP

False

Stand-alone daemons are started on demand using inetd or xinetd.

False

T or F: On most Linux systems, the logrotate utility is automatically scheduled to run weekly.

False

T or F: The killall command uses the PID to kill a process.

False

T or F: The secure log file contains information regarding the last user to log in to a system.​

False

T or F: Zombie processes are also known as defunct processes

False

T/F - A value of 0 for a process priority indicates low priority.

False

T/F - Can the top command be used to change the priority of processes?

False

T/F - Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully.

False

T/F - If a compression utility compresses a file to 52% of its original size, it has a compression ratio of 52%.

False

T/F - In a decision construct, you can have an unlimited number of if then statements.

False

T/F - The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory.

False

T/F - The SIGINT kill signal is the default kill signal used by the kill command.

False

T/F - The init daemon has a PID of 0.

False

T/F - The ps command is the only command that can view process information.

False

T/F - To decompress files that have been compressed with the compress utility, you can use the decompress command followed by the names of the files to be decompressed.

False

T/F - To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.

False

T/F - Traditionally, CDs/DVDs were used to back up data.

False

T/F - Users can create their own custom variables, called shell variables.

False

T/F - When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.

False

T/F - When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.

False

T/F - You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.

False

The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory.

False

The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory. True and False

False

The killall command uses the PID to kill a process. True or False

False

The killall command uses the PID to kill a process. True or False

False

The killall command uses the PID to kill all process. True or False?

False

The ps command is the only command that can view process information. T/F

False

The secure log file contains information regarding the last user to log in to a system.

False

The secure log file contains information regarding the last user to log in to a system. True or False?

False

The secure log file contains information regarding the last user to log in to a system.​ True or False

False

To kill a process running in the background, you must place a % characters before its process ID. True or False?

False

To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor. True or False

False

When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.

False

Which Windows program is often used to connect to a Linux server via SSH?

Putty

The K desktop environment utilizes what window manager and toolkit below?​

Qt toolkit kwin

​What RAID level is commonly referred to as disk striping with parity? a. RAID4 b. RAID0 c. ​RAID5 d. RAID1

RAID 5

Most Linux distributions make use of what package manager?

RPM

Most Linux distributions today use ____ as their package manager.

RPM

If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.

Read and execute

Text wildcards used to ease the searching of specific text information are called _________________________.

Regular expressions (regexp)

What does the setfacl -b command do?

Removes all extra ACL assignments on a given file.

What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file?

SGID and SUID

​What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file? - SGID - SUID - SQUID - sticky bit

SGID, SUID

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?

SIGINT 2

What signal name and number function as the absolute kill signal, and when issued, forces the Linux kernel to stop executing the process by sending the process's resources to /dev/null?

SIGKILL 9

The ____ kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory.

SIGQUIT

Describe the telnet and SSH utilities. What is the difference between them?

SSH is a network protocol used to remotely access and manage a device. The key difference between Telnet and SSH is that SSH uses encryption, which means that all data transmitted over a network is secure from eavesdropping. Like Telnet, a user accessing a remote device must have an SSH client installed.

du

Select the command below that shows the size of a directory and its contents in kilobytes:

|

Select the metacharacter that can be used to send the standard output of one command to another command as standard input:

What stage of the GRUB boot loader typically resides on the MBR / GPT?

Stage1

Which of the following accessibility features simulates simultaneous key presses when two keys are pressed in sequence?

Sticky Keys

What option can be used in the journald configuration file to specify a file size limit to the event log?

SystemMaxUse

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?

Target ID

/boot

The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?

/root

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?

Free Software Foundation (FSF)

The GNU General Public License (GPL) was developed by which organization?

4GB

The GUI components and related software take up how much space on a typical Linux installation?

Emacs editor

The LISP artificial intelligence programming language can be used with which text editor below?

vmlinuz

The Linux kernel exists as a file named:

How does the NICE value affect process priority? How and why can nice values by altered?

The NICE value (NI) can be used to affect the process priority indirectly, it is measured between -20 (a greater chance of a high priority) and 19 (a greater chance of a lower priority). The lower the number the more priority that task gets, if the nice value is high number like 19 the task will be set to its lowest priority and the CPU will process whenever it gets a chance. You can use the -n command line option to change the or adjust the nice value which adds a set of integer value to the niceness.

PATH

The ______ environment variable contains a list of directories used to search for executable programs.

awk

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?

man -k list

The apropos list command produces the same results as which command below?

$

The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?

False

The killall command uses the PID to kill a process.

-t

The mkfs command can be issued with what switch in order to specify a filesystem type?

Total cost of ownership (TCO)

The overall cost of using a particular operating system is known as?

In the process state column, what does an "R" indicate?

The process is currently running on the processor.

​In the process state column, what does an "R" indicate?

The process is currently running on the processor.

When viewing the output of the ps ax​ command, what does a < symbol in the STAT column indicate for a process?

The process is high priority.

edquota

The quotas for certain users can be edited by using which command?

the mode of the file

The section of an inode that stores permissions is referred to as what?

>

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?

Ignoring a kill signal.

Trapping

Any command that can be executed on the command line can also be placed inside any environment file. True or False

True

As daemon process are not associated with terminals, you must use the -e switch with ps command to view them. True or False?

True

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script.

True

CUPS contains versions of the lpr, lpc, lpq, and lprm commands. True or False

True

CUPS contains versions of the lpr, lpc, lpq, and lprm commands. True or False?

True

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False

True

Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond

True

Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond True or False

True

Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond àFound in book

True

Logs from the cron daemon (crond) can be viewed using the command journalctl_COMM=crond True or False?

True

Most daemon scripts accept the arguments start, stop, and restart.

True

T or F: After a process has been started, you can change its priority by using the renice command.

True

T or F: CUPS contains versions of the lpr, lpc, lpq, and lprm commands.

True

T or F: Each process can start an unlimited number of other processes.

True

T or F: If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.

True

T or F: Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond

True

T or F: When you print to a printer class, the print job is send to the first available printer in the printer class

True

T/F - After a process has been started, you can change its priority by using the renice command.

True

T/F - Aliases are shortcuts to commands stored in special variables that can be created and viewed using the alias command.

True

T/F - Any command that can be executed on the command line can also be placed inside any environment file.

True

T/F - Because its primary use is to back up files in case of system failure, cpio uses absolute pathnames by default when archiving.

True

T/F - Each process can start an unlimited number of other processes.

True

T/F - If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.

True

T/F - It is good form to read the Makefile after you run the configure script.

True

T/F - Most commands such as ls, find, and grep are binary programs that exist on the filesystem until executed.

True

T/F - Most daemon scripts accept the arguments start, stop, and restart.

True

T/F - The BASH shell assumes stdout in the absence of a numeric file descriptor.

True

T/F - The ENV environment variable represents the location of the BASH run-time configuration file.

True

T/F - The compress utility preserves the original ownership, modification, and access time for each file that it compresses.

True

T/F - The dump/restore utility can only work with files on ext2 and ext3 filesystems.

True

T/F - The tar utility cannot back up device files or files with filenames longer than 255 characters.

True

T/F - While a process is waiting for its parent process to release the PID, the process is said to be in a(n) zombie state.

True

When using the chage command, how do you set the maximum password age?

Type 90 and press Enter.

&

What character, when appended to a command, causes the command to be run in the background?

pvcreate

What command below can be used to create a new physical volume?

grub2-install

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?

lilo -U

What command below can be used to uninstall the LILO bootloader from an active partition?

pstree

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?

rm

What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?

pwd

What command can be issued to confirm what directory you are in at a command line prompt?

fsck

What command can be used to check different kinds of filesystems on Linux for errors?

grubby

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?

tail -5

What command can be used to display the last five lines of a text file?

tr

What command can be used to replace characters in a file sent via Standard Input?

stat

What command is most effective at identifying different types of files?

mdadm

What command is used to manage a software RAID configuration after installation?

DEC PDP-7

What computer system was the first to run the UNIX operating system?

for

What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?

It removes all extra ACL assignments on a given file.

What does the setfacl -b command do?

/etc/profile

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?

/etc/systemd/system/default.target

What file controls the default runlevel when using Systemd?

udf

What file system below is used by software programs that write to a CD-RW or DVD-RW drive?

modules

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?

82

What hex code is associated with a Linux swap type partition?

DVD

What installation media source is the most common source for Linux packages?

graphical.target

What is the default target on a system with a GUI installed?

2

What is the minimum number of user accounts that must be created at install time?

ZFS volume

What is the term for a ZFS managed filesystem that is created from ZFS pools?

quiet

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?

2; SIGINT

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl_c combination to kill a running process?

SIGHUP

What kill signal stops a process, then restarts it with the same PID?

;

What metacharacter can be used to issue tw term-31o commands to be run in consecutive order, without piping or redirecting output?

~

What metacharacter can be used to refer to the current user's home directory?

&

What metacharacter indicates background command execution?

127

What number indicates the lowest kernel priority (PRI) process possible?

2

What number represents the stderr file descriptor?

0

What number represents the stdin file descriptor?

!

What operator below is known as the NOT operator?

-e

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?

-e

What option, when added to the crontab command, opens the vi editor with a user's cron table?

-r

What option, when added to the rm command, is commonly referred to as the -resume option?

execute

What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?

write

What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?

write

What permission grants a user the ability to open, read, and edit the contents of a file?

read and execute

What permissions are required to execute a shell script in a manner similar to any other executable program on the system?

device driver

What piece of software tells the operating system how to use a specific hardware device?

superblock

What section of a filesystem contains information about the filesystem in general?

9; SIGKILL

What signal name and number function as the absolute kill signal, and when issued, forces the Linux kernel to stop executing the process by sending the process's resources to /dev/null?

Freeware

What software type is software that is distributed free of charge, but the source code is not available?

Stage1

What stage of the GRUB boot loader typically resides on the MBR / GPT?

GNU Public License

What stipulates that the source code of any software published under its license must be freely available.

virtual host

What term describes the physical hardware and the underlying operating system upon which a virtual machine runs?

PWD; SHELL

What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively?

kill; killall

What two commands below can be used to stop a process, either by PID number or process name?

/etc/profile; /etc/bashrc

What two files below are the first two BASH environment files to be executed?

minor number

When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?

whoami

Which Linux command can be utilized to display your current login name?

What is contained in the DISPLAY variable on a Linux system running the X window system?

Which X server the client is supposed to connect to by default.

{}

Which character(s) below represent extended regular expression metacharacter(s)?

service

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?

df

Which command below provides the easiest method for monitoring free space on mounted filesystems?

wc

Which command can be used to count the number lines, words, and characters in a file?

device calls

Which of the following is not one of the three main types of Linux commands?

Hiring people to maintain the Linux system

Which of the following is the greatest expense for companies using Linux?

Ctrl+g

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?

--loop

Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?

-F

Which switch below can be added to the ls command to show a list of files and their type?

Artistic

Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?

Due to the fact that the * character can be used to match all ​characters in a filename, or all files in a directory, it is referred to as a ____________ metacharacter.

Wildcard

The ____ option to the ps command displays all processes that do not run on terminals.

X

Which of the following is a lightweight desktop environment that uses very few system resources that a system administrator might choose to install on a Linux server instead of one of the two main desktop environments?

XFCE

False

You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.

/var/log/boot.log

You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?

How do you configure a NIC? What do you do if the NIC is not detected during installation?

You can configure a NIC by using the ifconfig (interface configuration) command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer. If the NIC is not detected during installation then we need to view the appropriate Linux drivers for the NIC that were not included in the installation media.

In order to download DPM packages, what command should be used below?

apt-get

A system administrator wants to schedule a task to run at 11 pm, but knows that she will not be in the office at that time. Which of the following commands can she use to schedule this task to run that night while she is at home?

at

The command used to schedule commands and tasks to run at a present time in the future.

at command

Daemon used to schedule a command to execute once in the future.

at daemon

Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.)

atq at -l at -q

​What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use? ​a. system.conf ​b. local.setup ​c. login.defs ​d. user.defs

C

Select the two commands below that will provide the number of lines in a file, and the number of characters in a file, respectively:​ Multiple Answer ​a. count -c b. ​pr -d ​c. wc -l ​d. wc -c

C and D

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes? Multiple Answers a. ​kthreadd ​b. syslogd ​c. init ​d. systemd

C and D

​What two ps options can be used to display a full list of information about each process, and a long list of information about each process? ​a. -e ​b. -p ​c. -f ​d. -l

C and D

Which of the following is the default desktop environment used by Linux Mint?

Cinnamon

Most configuration files on Linux systems are delimited using ____ characters.

Colon

A ____ is a standard set of instructions used to compress a file.

Compression algorithm

The rate of compression is called the ____.

Compression ratio

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?

Ctrl +g

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?​ a. ​Ctrl+k b. ​dd c. ​Ctrl+a d. ​Ctrl+d

Ctrl+k

A user account can be locked with the usermod command using what option? a. -U b. -u c. -l d. -L

D

A user account can be locked with the usermod command using what option? a. -U b. -u c. -l d. -L

D

Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat

D

Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat

D

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. first b. second c. fifth d. sixth

D

What two window managers is the Compiz Fusion window manager based upon?​

beryl​ ​compiz

Which two problems below are typically seen on large systems that write large amounts of data to a non-ZFS filesystem?​ a. ​snapshotting b. ​bit rot c. ​misdirected writes d. segment faults

bit rot, misdirected

What two commands below can be used to view the contents of a bzip2-compressed file page by page?

bzless bzmore

On a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.

cancel

Which of the following results would be created by the command sequence: echo 'apple banana carrot dog elephant' | while read a b c; do echo result: $c $b $a; done

carrot dog elephant banana apple

Which of the following commands will send the output of the cat command to the grep command to be filtered?

cat /etc/passwd | grep jsmith

Which of the following commands will display the current CPU(s) detected by a Linux system?

cat /proc/cpuinfo

To display the contents of a text file called data, what command should be used?

cat data

Which of the following statements is true? (choose all that apply)

if /etc/at.allow exists, only users listed in it can use the at command if /etc/cron.allow exists, only users listed in it can use the cron command if /etc/cron.deny exists and /etc/cron.allow does no exist, any user not listed in /etc/cron.deny can use the cron command

What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

d k

What is the name given to a process not associated with a terminal?

daemon process

In vi, using command mode, what ​series of key presses below will cause the line on which the cursor is on to be deleted? a. ​yw b. ​dd c. ​d d. ​X

dd

Before a computer can use a router, with what configuration information must it be provided?

default gateway

The IP address of the network interface on the router to which you send packets is called _____________________________.

default gateway

Which command should you run after installing a new kernel module to update the module dependency database?

depmod

Which of the following is not one of the three main types of Linux commands?

device calls

Which of the following is not one of the three main types of Linux commands?​

device calls

What command provides the easiest method for monitoring free space on mounted filesystems?

df

Which command below provides the easiest method for monitoring free space on mounted filesystems? - du - df - fs - fd

df

Which of the following commands will display messages that were displayed during the boot sequence by the kernel?

dmesg

The quotas for certain users can be edited b using which command?

edquota

The quotas for certain users can be edited by using which command? - chquota - usrquota - repquota - edquota

edquota

A list of all exported environment and user-defined variables in a shell can be viewed with what command below?

env

To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command.

env

A case construct must be ended by ____________________.

esac

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?​

etc/cups/cupsd.conf ​/etc/cups/printers.conf

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?

etc/cups/printers.conf /etc/cups/cupsd.conf

What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?

execute

What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?​ - write - sticky bit - execute - read

execute

On most Linux systems, the logrotate utility is automatically scheduled to run weekly true or false

false

SLIP is a newer technology than PPP. true or false

false

Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy.​ true or false

false

Select the command that can be used to create partitions that will be stored in an MBR after installation:

fdisk

Select the command that can be used to create partitions that will be stored in an MBR after installation: - fdisk - formatdisk - partition - format

fdisk

Errors on a filesystem are common on most file systems. What do these errors indicate?

filesystem corruption

Errors on a filesystem are common on most filesystems. What do these errors indicate?

filesystem corruption

​What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?

for

A process spawning or initiating another process is referred to as _____________________.

forking

In a process referred to as _________________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.

forking

In a process referred to as ____________________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.

forking

What command can be used to check different kinds of filesystems on Linux for errors?

fsck

What command can be used to check different kinds of filesystems on Linux for errors? - chkdsk. - errorchk - fs_check - fsck

fsck

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?

g+r-w

what two commands can be used to edit a GPT based hard disk's partitions?

gdisk and parted

​What two commands below can be used to edit a GPT based hard disk's partitions? (Select 2 answers) - gdisk - parted - fdisk - gtpedit

gdisk, parted

Which of the following commands should you use to specify that you want to use Git for version tracking on them?

git add

Which command can be used to download an updated copy of the master branch from the original Git repository?

git pull origin master

What is the default target on a system with a GUI installed?​

graphical.target

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​

grub-mkconfig

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?​

grub2-install

Which of the following is a type of software that allows a piece of hardware to host multiple operating systems?

hypervisor

What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk? (Select two answers.) a. ​iSCSI initiator b. ​iSCSI host c. ​iSCSI slave d. ​iSCSI target

iSCSI initiaitor, iSCSI target

Which of the following commands can be used to convert files between different character encodings?

iconv

Which of the following constructs can be used in a shell script to determine whether two values are equal and if so run another set of commands?

if

What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?

ifconfig

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (choose all that apply)

ifconfig ping netstat -i

Which command would be used to activate the NIC aliased as eth0?

ifup eth0

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?

image=

What two daemons can be used to start and manage connections for smaller network daemons such as telnet and rlogin?

inetd xinetd

The first daemon process on a system is called the ____________________ daemon.

initialize

What two commands below can be used to manipulate the routing table?​

ip route route

What two commands can be used to manipulate the routing table?

ip route route

A runaway process that is faulty and consuming mass amounts of system resources ________________________.

is a rogue process

Which command can be used to see processes running in the background?

jobs

What two commands below can be used to stop a process, either by PID number or process name?

kill killall

Which of the following commands will send a process's resources to /dev/null to kill the process for process ID 1357?

kill -9 1357

​Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table:

l p

what are two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table

l and p

​Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table: (Select 2 answers) a. l b. a c. p d. v

l, p

In order to create and manage KVM or Qemu virtual machines, a Linux system must have which of the following installed?

libvert

In order to create a hard link, what command must be used?

ln

In order to create a hard link, what command must be used? - ln - link - lk - lnk

ln

Select the file in the /proc directory that contains statistics on the performance of the processor:

loadavg

Select the file in the /proc directory that contains statistics on the performance of the processor: a. kcore b. loadavg c. cpuinfo d. modules

loadavg

What two commands below can be used to locate files on a filesystem?

locate find

what two commands can be used to locate files on a filesystem?

locate and find

In order to send a print job to a printer using CUPS, what command must be used?

lp

Which command should be used to restrict access to printers?

lpadmin

Adding the -t option to what command below will provide a list of all printers on the system and their status?

lpstat

Adding the t option to what command below will provide a list of all printers on the system and their status?

lpstat

Which of the following commands can be used to display general hardware information for the entire system?

lshw

Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)?

lsof

A government office wants to secure a few of its Linux systems so that they can only use certain USB devices. After plugging in a USB device, which of the following commands could be used to detect certain identifying information that can be used to only allow that type of USB device?

lsusb

what are the commands that can be used to extend a volume group and logical volume respectively.

lvextend and vgextend

​Select the commands that can be used to extend a volume group and logical volume respectively: (Select 2 answers) a. lvextend b. vgextend c. lvm_extend d. pgextend

lvextend, vgextend

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?

make

Which of the following commands can be used to create and manage a software RAID configuration after installation?

mdadm

Select the two window managers that have been used in GNOME:​

metacity ​mutter

The subdirectory newdir does not currently exist in the current directory that you are in. Which of the following commands will create a new directory named newdir and then change into that directory? (Choose two.)

mkdir newdir && cd newdir mkdir newdir; cd newdir

Select the command that can be used to check an ext2, ext3, or ext4 filesystem:​ a. mke2fs b. ext2fsck c. fdisk d. e2fsck

mke2fs

What command that can be used to check an ext2, ext3, or ext4 filesystem?

mke2fs

Which of the following commands will generate a new initramfs?

mkinitrd dracut

​Select the two commands below that can be used to prepare a swap partition and then enable it for use:

mkswap ​swapon

what are two commands that van be used to prepare a swap partition and then enable it for use?

mkswap and swapon

​Select the two commands below that can be used to prepare a swap partition and then enable it for use: (Select 2 answers) a. swapit b. mkswap c. ​swapon d. mkfs.swap

mkswap, swapon

Leonard wants to find detailed information about the Bluetooth kernel module. Which of the following commands can he use to display this information?

modinfo bluetooth

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?

modules

Which command allows you to find out which group has a GID of 100?

more /etc/group | grep 100

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?

mount -a

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used? a. mount -f b. mount -u c. mount -o d. mount -a

mount -a

In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?

net.ipv4.ip_forward

In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?​

net.ipv4.ip_forward

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?

newgrp

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?

newgrp

The ______________ can be used to affect the process priority indirectly.

nice value

The ____________________ can be used to affect the process priority indirectly.

nice value

The dump/restore utility is limited to a maximum of how many different incremental backups?

nine

Which of the following commands will display the output of a file while also displaying a line number at the left side of each line for the /etc/passwd file?

nl /etc/passwd

Users can change their own passwords by typing passwd with ____ to specify the username.

no argument

Which of the following virsh commands will display the total amount of memory as well as the amount of free memory for a node?

nodememstats

RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?

package dependency

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?

panic

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?​

panic

Every process has a process ID and a __________________.

parent process ID

What can be used on a Linux system to trace the lineage of each child process?

parent process ID

What can be used on a Linux system to trace the lineage of each child process?​

parent process ID

Select the command that can be used to send a small TCP/IP packet to another IP address and await a response:

ping

What is the command that can be used to send a small TCP/IP packet to another IP address and wait for a response?

ping

A(n) ____________refers to a program that is running in memory and on the CPU.

process

In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.

process state

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?

process state

A network ________________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.

protocol

​What command below can be used to create a new physical volume? a. lvcreate b. pvdisk c. pvcreate d. new_pv

pvcreate

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?

pwconv

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?

pwconv

What command can be issued to confirm what directory you are in at a command line prompt?

pwd

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?​

quiet

Which of the following characters, when pressed while the top program is running, will allow you to change the niceness of a process?

r

The ____________________ command takes user input from stdin and places it in a variable specified by an argument.

read

If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?​

read write

Which of the following can be included in a shell script to ask the user to type in a password and then store it in the variable named $password?

read -s -p "Please enter the password: " password

What permissions are required to execute a shell script in a manner similar to any other executable program on the system?

read and execute

To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -r option

recursive

Which of the following commands will most likely increase the chance of a process receiving more time slices?

renice -12

What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?

rm

What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove? - rm - del - delete - remove

rm

Processes that have encountered an error during execution and continuously uses up system resources are referred to as ____________________ processes.

rogue

In what filesystem are most of the operating system files contained?

root

In what filesystem are most of the operating system files contained? a. boot b. data c. root d. mnt

root

Which two commands can be used to modify the route table on a Linux computer? (choose two)

route ip

What devices are used to transfer information from one network to another?

routers

In the event that you wish to disable a swap partition, what command must be used?

swapoff

​When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?

systemctl

Which of the following commands will set the default runlevel of a Linux system?

systemctl set-default runlevel5.target

____ is a filter command that takes information from standard input and sends that information to a file, as well as to standard output.

tee

Describe the system cron table. How is it organized, and what information may be contained within it?

the cron table includes six fields separated by space or tab characters the first 5 fields specify the times to run the command and the sixth field is the absolute pathname to the command to be executed.

The section of an inode that stores permissions is referred to as what?

the mode of the file

IP version 4 (IPv4)

the most common version of IP used on the Internet, it uses 32-bit addressing scheme organized into different classes

In the process state column, what does an "R" indicate?

the process is currently running on the processor

How many DNS servers can be configured in the /etc/resolv.conf file?

three (3)

What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?

traceroute

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. true or false

true

RAID level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance ​and allows up to two simultaneous hard disk drive failures while remaining fault tolerant. true or false

true

The cpio command has the ability to handle long filenames and can be used to back up device files.​ true or false

true

​The database for the locate command can be updated manually by using the updatedb command. true or false

true

An alias has previously been created named showauth. Which of the following commands can be used to get rid of that alias?

unalias showauth

How many times will the following loop execute as part of a script: #!/bin/bash COUNTER=0 while [ $COUNTER -lt 7 ] do echo "hello world" done

until ctrl-c is used to terminate it

Which command is used to create user accounts and update default information for new users?

useradd

On a system using the KVM hypervisor, which of the following modules would you expect to see as part of the output of the lsmod command on a guest Linux virtual machine?

virtio

in the fdisk interactive mode, what letter can be used to save partition table and exit?

w

​In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit? - w - s - q - d

w

Which of the following commands can be used to schedule very frequent recurring tasks, such as running once every minute?

watch

The ____ command counts the number of lines, words, and characters in a file.

wc

Using the syntax below, what command will create directories named one, two, and three? ​ echo one two three | ___________ mkdir

xargs

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?

xvidtune

How can you bypass the wait function and send a user process to the background?

you can use the Ctrl+z key combination and the bg command

What yum command below can display a list of package group names?

yum grouplist

The ____ command can be used to display the contents of a compressed file.

zcat

What command can be used to display the contents of a file that was compressed with the compress utility?

zcat

The root UID is ____.

zero

In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?​

zfs get all

In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?​ a. zfs list​ b. zpool list c. ​zpool get all d. zfs get all

zfs get all

in order to list all configuration parameters that can be modified for a sub-filesystem, what command should be issued?

zfs get all

Which of the following states describe a process that is waiting for a parent process to release its PID?

zombie

The ​state and performance of a RAID-Z volume can be viewed using what two commands? (Select two answers.) a. zpool iostat b. ​zpool status c. zfs iostat d. zfs status

zpool iostat, zpool status

Which character(s) below represent extended regular expression metacharacter(s)?

{}

Select the metacharacter that can be used to send the standard output of one command to another command as standard input:

|

You can send the standard output of one command to another command as standard input using the ____ shell metacharacter.

|

What metacharacter can be used to refer to the current user's home directory?

~

If incompatible X Windows settings are configured, where will the errors that are generated be written to?

~/.xsession-errors

In Fedora 20, where are user configured settings for Xorg stored?​

​/etc/X11/xorg.conf.d/

Select below the configuration file that is used to configure the BIND / DNS server:​

​/etc/named.conf

What file controls the default runlevel when using Systemd?​

​/etc/systemd/system/default.target

What file in the /proc directory contains information about a computer's CPU?​

​/proc/cpuinfo

Where are the log files for the Samba daemon located?​

​/var/log/samba

On a Fedora based system, where are the shell environment and scheduled commands for at stored?

​/var/spool/at

The GUI components and related software take up how much space on a typical Linux installation?

​4 GB

What does the setfacl -b command do?​

​It removes all extra ACL assignments on a given file

​What two commands below can be used to modify the password expiry information and a user's default shell?

​chage, ​chsh

On Linux systems that use the traditional ​UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?

​chkconfig

​What command can be used to search for DPM package information?

​dpkg-query

What is the default target on a system with a GUI installed?​

​graphical.target

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​

​grub-mkconfig

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?​

​grub2-install

What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk?

​iSCSI initiator ​iSCSI target

What command below can be used to uninstall the LILO bootloader from an active partition?​

​lilo -U

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

​login.defs

​What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

​login.defs

Segmentation faults can sometimes be fixed by performing what two tasks below?​

​turn off CPU cache memory increase the number of memory wait states in BIOS

Identifies the process that started another process.

PPID

The average compression ratio for gzip is ____%.

60-70

1. A Linux system process that provides a system service. ​2. The default window manager for the GNOME Desktop Environment in Fedora 13 3. A UNIX SysV term that defines a certain type and number of daemons on a Linux system.​ ​4. The component of X Windows that draws graphics to windows on the terminal screen. ​5. A UNIX standard that is used to provide the structure of the system initialization process on Linux systems. ​6. A recent version of the UNIX SysV system initialization process used on modern Linux distributions. ​7. A Systemd term that is used to describe the number and type of daemons running on a Linux system. It is functionally equivalent to the UNIX SysV term runlevel . 8. The component of X Windows that requests graphics to be drawn from the X server and displays them on the terminal screen. 9. The partition searched for an operating system after the MBR/GPT.​ ​10. A relatively new software framework used on Linux systems that provides a system initialization process and system management functions.

1. daemon 2. mutter window manager 3. runlevel​?? 4. X server 5. UNIX Sys V​ 6. upstart 7. target unit​ 8. X client 9. active partition 10.Systemd

1. Command option used to remove a specified member from the group account. 2. Command option used to specify the user's default login shell. 3. Command option used to allow assignment of a duplicate GID. 4. Command option used to change the user's login name. 5. Command option used to force the GID to what's entered at the command line. 6. Command option used to unlock specific user accounts. 7. Command option used to add a home directory for a new user. 8. Command option used to display all password expiration information for the specified user account. 9. Command option used to change the number of days the password is valid for the specified user account.

1. groupmod -R 2. useradd -s 3. groupadd -o 4. usermod -l name 5. groupadd -g 6. usermod -U 7. useradd -m 8. chage -l 9. chage -m

In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?

1024

In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders? a. 256 b. 512 c. 1024 d. 2048

1024

The first software RAID volume on a system will​ use a multiple disk device file that starts with what number? a. 254 b. ​127 c. 128 d. 255

127

What number indicates the lowest kernel priority (PRI) of a process possible?​

127

Most Parallel SCSI controllers are capable of supporting up to how many devices? a. 12 b. 13 c. 14 d. 15

15

In Linux, what runlevel is also known as the multiuser mode?

2

The file descriptor stderr is represented by the number ____.

2

What number represents the stderr file descriptor?

2

The number of bits needed to make an IPv4 and IPv6 IP address?

32 bits for an IPv4 128 bits for an IPv6

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent?

40-50

The compression algorithm used by the compress utility has an average compression ratio of ____%.

40-50

The following entry is in a cron table. When will the myscript script run? (be very specific)

45 23 * * 6 /bin/myscript

The GUI components and related software take up how much space on a typical Linux installation?

4GB

select the mode below that corresponds to setting r-x

5

​Select the mode below that corresponds to setting r-x: - 2 - 5 - 1 - 6

5

What is the default print job priority for all print jobs created by the lp command?

50

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?​

514

If no level of compression is specified, the gzip command assumes the number ____.

6

If no level of compression is specified, the gzip command assumes what compression level?

6

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?

60%-70%

Describe what a subnet mask is, and explain why it is used. The, detail how it is used to determine the network ID of an IP address.

A subnet mask is the 8-bit number used to determine the network and host portions of an IP address. It is used to divide an IP address into two parts that identify the host (computer), and the other identifies the (network) to which it belongs to. A subnet mask is a 32-bit number used to differentiate the network component of an IP address by dividing the IP address into a network address and host address. It does so with bit arithmetic whereby a network address is but multiplied by the subnet mask revealing the underlying subnetwork. They are used to design subnetworks, or subnets that connect local networks, by determining both the number and size of subnets where the size of a subnet is the number of hosts that can be addressed.

_____________________is a mathematical operation that compares two binary digits and gives a result of 1 or 0. If both binary digits being compared have a value of 1, the result is 1. If one digit is 0 and the other is 1, or if both digits are 0, the result is 0.

ANDing

fg

After a background process has been started, what command below can be used to move it to the foreground?

True

After a process has been started, you can change its priority by using the renice command.

exit

After a shell is no longer needed, what command can be given to exit the shell?

shell

After logging into a terminal, a user will receive an interface known as which option below?

grub-mkconfig

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?

tarball

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:

Which of the following are stand-alone daemons? (choose all that apply)

Apache (httpd) DNS (named)

____ are back-up copies of files and directories.

Archives

:q!

At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes

0

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwdconv b. pwconv c. passwd d. pwdcv

B

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwdconv b. pwconv c. passwd d. pwdcv

B

An RPM package can be converted to a cpio archive using what command? a. cpioconv b. rpm2cpio c. rpmconv d. conv_arch

B

Each octet in an IP address represents a binary number consisting of how many bits / bytes? a. 4-bit b. 8-bit c. 4-byte d. 8-byte

B

How many DNS servers can be configured in the /etc/resolv.conf file? a. two b. three c. four d. five

B

In Fedora 20, where are user configured settings for Xorg stored? a. /etc/X11/xorg.conf b. /etc/X11/xorg.conf.d/ c. /etc/inittab d. /etc/X11.conf

B

In Fedora 20, where are user configured settings for Xorg stored?​ ​a. /etc/X11/xorg.conf ​b. /etc/X11/xorg.conf.d/ ​c. /etc/inittab d. ​/etc/X11.conf

B

In Linux, what runlevel is also known as the multiuser mode? a. 1 b. 2 c. 3 d. 4

B

In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?​ a. ​iproute.ipv4 b. ​net.ipv4.ip_forward c. ​ipv4.routing d. net.routing.enable​

B

On Linux systems that use the traditional ​UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in? a. systemctl​ ​b. chkconfig ​c. autoservice ​d. run-daemon

B

On a Fedora based system, where are the shell environment and scheduled commands for at stored? a. /var/spool/cron/atjobs b. /var/spool/at c. /var/run/at d. /var/run/cron/at

B

On a Fedora based system, where are the shell environment and scheduled commands for at stored?​ ​a. /var/spool/cron/atjobs b. ​/var/spool/at ​c. /var/run/at d. /var/run/cron/at​

B

Processes are started with what nice value by default? a. -20 b. 0 c. 1 d. 19

B

Processes are started with what nice value by default? a. -20 b. 0 c. 1 d. 19

B

Select the escape sequence that is used for a form feed: \n b. \f /f /n

B

Select the metacharacter that can be used to send the standard output of one command to another command as standard input: a. < b. | c. > d. #

B

Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed: a. -r b. -l c. -f d. -c

B

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent? a. 30-40 b. 40-50 c. 50-60 d. 60-70

B

Describe how forking works, and how it affects the parent process.

Forking is the creation of a new subshell; it is carried out by the fork function in the BASH shell. It is used to create processes. It takes no arguments and returns a process ID. The purpose of fork is to create a new process which becomes the child process of the caller, after a new child process is created both processes will execute the next instruction following the fork system call.

_______________ represents a text description of the user and is typically left blank.

GECOS

Which of the following is an on-screen keyboard used with Linux?

GOK

The GNOME 3 desktop environment utilizes what window manager and toolkit below?

GTK+ toolkit ​mutter

False

Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completes successfully.

64

How many different kill signals can be sent by the kill command to a given process?

vim file1

I order to quickly create an empty file, what command can be used?

segmentation fault

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

Tab

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?

True

If the /etc/at.allow and /etc/at.deny files do not exist the root user is allowed to schedule tasks using the at daemon.

journald

In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?

tty1

In Fedora 20, what terminal is used for graphical login?

/etc/X11/xorg.conf.d/

In Fedora 20, where are user configured settings for Xorg stored?

X Windows

In Linux, the core component of the GUI is known as:

2

In Linux, what runlevel is also known as the multiuser mode?

7

In a SCSI chain the highest priority SCSI device is given what SCSI ID?

sixth

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?

-

In a file's mode, a permission that is unavailable is represented by what character?

elif; else

In an if construct, what statements are optional?

system-config-keyboard

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?

ln

In order to create a hard link, what command must be used?

-l

In order to display a list of at job IDs, what option can be specified to the at commands?

zfs get all

In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?

cd ../..

In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued?

<

In order to redirect a file to the standard input of a command, what meta character should be used?

<

In order to redirect a file to the standard input of a command, what metacharacter should be used?

1024

In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?

(hd0,0)

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.

image=

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?

Ctrl+k

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?

w

In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit?

What is the effect of changing the date the password was last changed to zero?

It forces the user to change the password at the next login.???

Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?

Modems (modulator-demodulator) devices between the digital data of a computer and the analog signal of a telephone line, transmits data at 56KB/s and they are configured by using the Modem Manager utility ISDN modem is otherwise known as an integrated services digital network it is a digital phone connection that can transmit data, voice, and video over a normal telephone line. It is configured to route IP over a Dial-on-Demand Routing (DDR) link, by the use of the switch software and not the MFG or the model. It transfers speeds up to 128KB/s. DSL modem is a digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line which provides the digital subscriber line service for connection to the Internet, which is often called DSL broadband. Typically they are configured via webpage accessing by typing the IP address given in the router's manual into the browser's address bar. Runs on speeds of 100MB/s.

15

Most Parallel SCSI controllers are capable of supporting up to how many devices?

You can perform up to ____ different incremental backups using the dump/restore utility.

Nine

chkconfig

On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?

/var/spool/at

On a Fedora based system, where are the shell environment and scheduled commands for at stored?

xvidtune

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?

The ____________________ environment variable contains a list of directories to search for executable programs.

PATH

A process's identifier that allows the kernel to identify it uniquely.

PID

When a computer first initializes, the system BIOS performs a(n) ____________________.

POST

What can be used on a Linux system to trace the lineage of each child process?

PPID - Parent Process ID

Pog O

Pog

Pog U

Pog Off

A set of information that is sent to a printer at the same time is called a(n) ____________________.

Print Job

Hardware Compatibility List (HCL)

Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?

A(n) ____________________ refers to a program that is running in memory and on the CPU.

Process

In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.

Process state

An executable file on the hard disk that can be run when you execute it.

Program

Network Address Translation (NAT)

Proxy servers keep track of the information passed to each client by maintaining what type of table?

What is the term for a ZFS managed filesystem that is created from ZFS pools?

ZFS volume

What is the term for a ZFS managed filesystem that is created from ZFS pools?​

ZFS volume

What is the term for a ZFS managed filesystem that is created from ZFS pools?​ a. ZFS vault b. ​ZFS volume c. ZFS store d. ZFS lake

ZFS volume

True

Zombie processes are also known as defunct processes.

Select the test statement that can be used to determine if A is numerically greater than B:

[ A -gt B ]

The test statement ____ would be used to determine if A is numerically greater than B.

[ A -gt B ]

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?

[1-4]

The ____ escape sequence represents a form feed.

\f

Select the escape sequence that starts a new line when used with echo:

\n

Which of the following is the common escape sequence to display a horizontal tab using the echo command?

\t

cron table

a file specifying tasks to be run by the cron daemon; there are user cron tables and system cron tables

(CIDR) notation

a notation that is often used to represent an IP address and its subnet mask

Octet

a port of an IP address that represents eight binary bits

parent process

a process that has started other processes (child processes)

child process

a process that was started by another process (parent process)

Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to take approximately 20 minutes to run individually. However, he would like to go to lunch 15 minutes from now. He knows that he can type all of the commands on the same line and separate them with a certain character to run them sequentially. Which character can he type after each command to have them run one after the next without requiring further input from him?

a semicolon

Internet Protocol (IP) address

a series of four 8-bit numbers that represent a computer on a network

Protocol

a set of rules of communication used between computers on a network

daemon process

a system process that is not associated with a terminal

Route Table

a table of information used to indicate which networks are connected to network interfaces

process ID (PID)

a unique identifier assigned to every process as it begins

host name

a user-friendly name assigned to a computer

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?

alert

Which command can be used to create a new command that will monitor the contents of auth.log as they get added to the file?

alias showauth='tail -f /var/log/auth.log'

The killall command terminates ____________________________.

all instances of a process with the same name

Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded:​

append= ​boot=

On Linux systems that use the traditional ​UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?

chkconfig

What two* commands will grant only the execute permission to username bob on file1, assuming bob is the file's owner?

chmod 777 file1

​What two commands below will grant only the execute permission to username bob on file1, assuming that bob is the file's owner?

chmod 777 file1, chmod u=x​ file1

In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?

chmod 7777 filenam

What character is used to delimit most Linux configuration files?

colon

Each field in the /etc/passwd file is separated by ____.

colons

In what mode does the vi editor open by default?​ a. ​command mode b. ​overview mode c. ​insert mode d. append mode

command mode

What command can be used to copy files?

cp

What command can be used to copy files? - copy - cp - cpy - mv

cp

​What two commands below will work recursively if specified with the -R option? (Select 2 answers.) - cp - rm - mkdir - mv

cp, rm

What file in the /proc contails info about a computer's CPU?

cpuinfo

Daemon used to schedule a command to execute repeatedly in the future.

cron daemon

What command is used to view and modify user jobs scheduled to run with cron?

crontab

Which of the following commands will show the current user cron jobs that have been created for the currently logged in user?

crontab -l


Conjuntos de estudio relacionados

Patho/Pharm Exam 1 Practice Questions

View Set

ATI Chapter 67 Musculoskeletal Diagnostic Procedures

View Set

Children final flash cards study 20

View Set

Clinical Evaluation and Diagnosis

View Set

Final Exam Study Guide (Ch. 6, 10, 14, 15)

View Set

MKT 205 Ch 1-5,7 Example Problems

View Set

Medical Terminology - Chapter 9 Review

View Set

HIST 1377 - chap 5: the unfinished nation

View Set