Chapter 10 -12 linux+ guide to linux certification review

¡Supera tus tareas y exámenes ahora con Quizwiz!

When compiling source code into binary program, which command preforms a system check and creates the Makefile?

./configure

Which filename extension indicates a tarball?

.tar.gz

Which of the following represents the first nonrewinding SCSI tape device on a system?

/dev/nst0

Which file contains full and incremental backup information for use with the dump/restore utility?

/etc/dumpdates

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/hosts

Which file contains default information such as UID and GID ranges and minimum password length to be used as user creation?

/etc/login.defs

What s the name of the file that contains a listing of a user on the system and their home directories?

/etc/passwd

Which file stores the TCP/Ip address of the DNS servers used to resolve host names?

/etc/resolv.conf

Which file would you modify to change the TCP/IP address of the first wired NIC on the system the next time the system is booted or the card is brought up?

/etc/sysconfig/network-scripts/ifcfg-eth0

Most log files on the system are found in which directory?

/var/log

Which dump level indicates a full backup?

0

You have created a full backup and four incremental backups. In which order must you restore these backups?

0, 1, 2, 3, 4

Which of the following port numbers is associated with telnet?

23

Which of the following are stand-alone daemons?

Apache (httpd) and telnet(in.telnetd)

What are two means available to resolve a host name to the appropriate TCP/IP address?

DNS and /etc/hosts

The Debian Package Manager(DPM) is the default package manager used by Fedora 13.

False

The bzip2 and gzip utilities use similar compression algorithms.

False

To install a new program from RPM software repositories on the Internet, you can use the yum update programname command.

False

What is the most common method for obtaining Linux software?

Internet download

Which networking service allows you to share files with other computers on the network?

NFS

A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address.

True

Along with a listing of user accounts, the /etc/passwd file contains information on account expiry.

True

Most source code is available on the Internet in tarball format.

True

SSH encrypts all traffic that passes across the network, whereas telnet and rlogin do not.

True

The -9option to the gzip utility results in a higher compression ratio.

True

The line that configures the host name for the computer at boot time can be found in /etc/sysconfig/network.

True

What is the name used to describe a user providing a user name and password to log into a system?

authorization

You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and printer 1-21, respectively. Which command would you use to remove these two jobs from the print queue?

cancel Printer1-17 Printer1-21

What is the name of the utility used to rotate log files?

logrotate

The TCP/IP address 127.0.0.1 is also referred to as the?

loopback address

Which command can be used to send a print job to the default printer named Printer1?

lp-d Printer1 file and c. lp file

When compiling source code into a binary program, which command preforms compilation by running the GNU C Compiler?

make

When compiling source code into a binary program, which command copies compiled binary files to the correct location on the filesystem?

make install

Which command can be used to alter the primary group associated with a given user temporarily?

newgrp

The daemons associated with network services listen for network traffic associated with a particular?

port

The process of sending print jobs from the print queue to the printer is called?

printing

Which two commands can be used to modify the route table on a Linux computer?

route and ip

What devices are used to transfer information from one network to another?

routers

Which of the following commands can be used to list detailed information about a package, such as its installation date and license?

rpm -qi packagename

Which of the following commands can be used to list the files contained within an installed RPM package?

rpm -ql packagename

Which of the following commands creates an archive?

tar -zcvf/dev/fd0*

When a printer is disabled?

the print queue accepts jobs into the print queue and holds them there until the printer is enabled again.

When a printer is rejecting requests?

the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable.

You can clear a log file simply by redirecting nothing into it.

true

You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd.

true

Which command is used to delete a user account?

userdel username

Which command can you use to lock a user account?

usermod -L username

Which command would you use to unlock a user account?

usermod -U username

Files that have compressed using the compress utility typically have the_____ extension.

z

Which of the following are graphical remote administration technologies?

X Windows and VNC

Which of the following commands extracts an archive?

cpio -vicdu -I /dev/fd0

What is the background process responsible for printing on Fedora Linux?

cupsd

Before a computer can use a router, what configuration information must it be provided?

default gateway

To test DNS configuration by resolving a host name to an IP address, which command or commands you use?

dig hostname and host hostname

Which option to the rpm command can be used to remove a package from the system?

e

When referring to the /etc/rsyslog.conf file, _______ specifies information from a certain area of the system, whereas _________ is the level of importance of that information.

facility, priority.

Stand-alone daemons are started on demand using the Internet Super Daemon (xinetd).

false

UIDs and GIDs are unique to the system and, once used, can never be reused.

false

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)

ifconfig, ping and netstat -i

Which command would be used to activate the NIC aliased as eth0?

ifup eth0


Conjuntos de estudio relacionados

Ap Psych Thinking, Concepts, and Creativity (module 34 unit 11)

View Set

Swaim A Good Man is Hard to Find

View Set

Chapter 21 Immune system mastering

View Set

Management quiz 15, 16, 17 and 18

View Set

Module 1 : S1/S2/S3 : Applied Economics

View Set