CIT 352 Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following commands will most likely increase the chance of a process receiving more time slices? A. renice 0 B. renice 15 C. renice -12 D. renice 19

C. renice -12

What value will be displayed at (1) and (2)? $ ls file1 (file1 exists) $ echo "$?" (1) $ ls file2 (file2 does not exist) $ echo "$?" 2 $ echo "$?" (2) A. (1) 0, (2) 0 B. (1) 0, (2) 2 C. (1) 1, (2) 2 D. (1) $1, (2) $2

A. (1) 0, (2) 0

What kill level signal cannot be trapped? A. 1 B. 9 C. 3 D. 15

B. 9

What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.) A. DHCP B. DNS C. /etc/hosts D. /etc/resolve.conf

B. DNS C. /etc/hosts

Which Windows program is often used to connect to a Linux server via SSH? A. SSHD B. Putty C. Rdesktop D. mstsc

B. Putty

The Apache daemon listens for HTTP requests on what port by default? A. TCP 20 B. TCP 25 C. TCP 80 D. CTP 110

C. TCP 80

Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors? A. apachectl B. sambactl C. testparm D. psql

C. testparm

Which command is used to gain real-time information about processes running on the system, with the most processor-intensive processes listed at the beginning of the list? A. ps B. ps -elf C. top D. pstree

C. top

When will the following entry in the user crontab be executed? 1 2 3 4 * /bin/go_catch_Pokemon A. 1:02 am on March 4 B. January 2nd at 3:04 am C. Monday, February 3rd at 4:00 am D. 1 minute after 2 am on the 3rd of April

D. 1 minute after 2 am on the 3rd of April

Which of the following port numbers is associated with SSH? A. 22 B. 137 C. 49 D. 23

D. 23

Which of the following commands can be used to remove the test DPM package, including any test configuration files? A. dpkg remove test B. apt remove test C. dpkg purge test D. apt purge test

D. apt purge test

When the same program is executed twice it will have the same PID. True or False?

False

You can purchase object storage from a cloud provider to provide persistent filesystem-based storage. True or False?

False

You can clear a log file simply by redirecting nothing into it. True or False?

True

dnf resolves package dependencies automatically. True or False?

True

Standalone daemons are started on demand using xinetd. True or False?

False

Which commands can you use or could you have used to install a package on Fedora? (Select three) A. dnf B. fed C. rpm D. yum

A. dnf C. rpm D. yum

Which command can be used to create an image backup of a partition? A. tar B. dd C. dump D. cpio

B. dd

DHCP clients send a DHCPREQUEST packet when they need to renew IP configuration. True or False?

True

The network interface configuration entered by ip or ifconfig command will survive the reboot. True or False?

False

SIGHUP

1

SIGINT

2

Which file holds the methods to be used and the order in which they will be applied for host name resolution? A. /etc/nsswitch.conf B. /etc/resolve.conf C. /etc/hosts D. /etc/dns.conf

A. /etc/nsswitch.conf

Which option to the dpkg command can be used to list the files that comprise a package? A. -l B. -L C. -s D. -i

B. -L

Files that have been compressed using the xz utility typically have the ______ extension. A. .zip B. .gz C. .xz D. .bz2

C. .xz

Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?

False

UIDs and GIDs are unique to the system and, once used, can never be reused. True or False?

False

As daemon processes are not associated with terminals, you must use an option such as -e alongside the ps command to view them. True or False?

True

Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?

True

The -9 option to the gzip utility results in a higher compression ratio. True or False?

True

The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?

True

The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?

True

SIGTERM

15

Which command can be used to see processes running in the background? A. bg B. jobs C. ps -% D. fg

B. jobs

Which one is NOT a Linux compression tool? A. bzip2 / bunzip2 B. compress / uncompress C. xz / unxz D. zap / unzap

D. zap / unzap

Which one is NOT a Linux backup tool? A. tar B. cpio C. ee D. dump / restore

C. ee

SIGKILL

9

Which file would you modify to permanently change the IP address of a network interface on a Fedora 28 system? A. /etc/sysconfig/network-scripts/ifcfg-enp8s0 B. /etc/sysconfig/network C. /etc/netplan/50-cloud-init.yaml D. /etc/network/interfaces

A. /etc/sysconfig/network-scripts/ifcfg-enp8s0

What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 18 FTP server? A. /srv/ftp B. /var/www/ftp C. /home/anonymous D. /var/ftp/pub

A. /srv/ftp

In NTP, what stratum consists of atomic devices or GPS clocks? A. 0 B. 1 C. 2 D. 5

A. 0

Which dump level indicates a full backup? A. 0 B. 9 C. 1 D. f

A. 0

You have created a full backup and four incremental backups. In which order must you restore these backups? A. 0, 1, 2, 3, 4 B. 0, 4, 3, 2, 1 C. 4, 3, 2, 1, 0 D. 1, 2, 3, 4, 0

A. 0, 1, 2, 3, 4

What is a shared library? (Select two) A. A binary file that contains function calls that are used by multiple applications B. Has the .sl extension C. Placed under /lib/ or /lib64/ directory typically D. Unique to Linux which is not found in Windows OS

A. A binary file that contains function calls that are used by multiple applications C. Placed under /lib/ or /lib64/ directory typically

Which of the following are stand-alone daemons? (Choose all that apply.) A. Apache (httpd) B. Washington University FTP (in.ftpd) C. telnet (in.telnetd) D. DNS (named)

A. Apache (httpd) D. DNS (named)

What must you do to transform your computer into a DNS server? (Choose all that apply.) A. Create zone files. B. Create resource records for DNS lookups. C. Create NIS maps. D. Run the name daemon (named).

A. Create zone files. B. Create resource records for DNS lookups. D. Run the name daemon (named).

Which of the following must you perform to share a directory using NFS? (Choose all that apply.) A. Edit the /etc/exports file. B. Mount the directory to the /etc/exports directory using the mount command. C. Run the exportfs -a command. D. Start or restart the NFS daemons.

A. Edit the /etc/exports file. C. Run the exportfs -a command. D. Start or restart the NFS daemons.

Which of the following statements is true? (Choose all that apply.) A. If /etc/at.allow exists, only users listed in it can use the at command. B. If /etc/cron.allow exists, only users listed in it can use the cron command. C. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command. D. If /etc/cron.allow and /etc/cron.deny exist, only users listed in the former can use the cron command and any listed in the latter are denied access to the cron command. E. If a user is listed in both /etc/cron.allow and /etc/cron.deny, then /etc/cron.deny takes precedence and the user cannot access the crontab command.

A. If /etc/at.allow exists, only users listed in it can use the at command. B. If /etc/cron.allow exists, only users listed in it can use the cron command. C. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command.

What command is used to view and modify user jobs scheduled to run with cron? A. crontab B. cron C. ps D. sched

A. crontab

Which one is NOT a typical step involved in compiling and installing software on Linux? A. Run "make" shell script B. Run "install" shell script C. Run "configure" shell script D. Run "make install" shell script

B. Run "install" shell script

What command can you use to view journald log entries on a system that uses Systemd? A. less B. journalctl C. syslog D. catlog

B. journalctl

Which filename extension indicates a tarball? A. .tar.xz B. .cpio C. .dump D. .tar

A. .tar.xz

How is SSH used? (Select two) A. Login to a shell on a remote system B. Browse websites securely C. X Window forwarding from a remote system D. Securely ping a remote system

A. Login to a shell on a remote system C. X Window forwarding from a remote system

You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue? A. cancel Printer1-17 Printer1-21 B. cancel -u Printer1-17 Printer1-21 C. cancel -a Printer1-17 Printer1-21 D. cancel 17 21

A. cancel Printer1-17 Printer1-21

How do you assign an IPv4 address using DHCP on modern Ubuntu? (Select two) A. dhclient <INTF> B. BOOTPROTO=dhcp (in configuration file) C. dhcp4: yes (in configuration file) D. dhcp4: auto (in configuration file)

A. dhclient <INTF> C. dhcp4: yes (in configuration file)

Which command can be used to list containers that are currently running on the operating system only? A. docker ps B. docker ps -a C. docker run D. docker exec

A. docker ps

Which of the following utilities can be used to check TCP/IP configuration or test network connectivity? (Choose all that apply.) A. ifconfig B. iwconfig C. ping D. nmcli

A. ifconfig B. iwconfig C. ping D. nmcli

Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.) A. lp -d Printer1 file B. lp Printer1 file C. lp file D. lp -m Printer1 file

A. lp -d Printer1 file C. lp file

Which commands may be used to display a routing path from the source to the destination? (Select two) A. mtr B. routepath C. traceroute D. ip route show path

A. mtr C. traceroute

Which commands can be used to display TCP/IP connections on your Linux system? (Choose all that apply.) A. netstat -t B. mtr C. traceroute show D. ss -t

A. netstat -t D. ss -t

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.) A. nslookup hostname B. dig hostname C. host hostname D. resolve hostname

A. nslookup hostname B. dig hostname C. host hostname

Which command below can be used at a BASH command prompt to obtain a web page? A. apachect1 B. ab C. curl D. webpage

C. curl

What influences how the network interface is being configured? (Select two) A. Quick vs slow boot B. Dynamic vs static assignment C. Temporal vs permanent configuration D. Democrats vs Republicans

B. Dynamic vs static assignment C. Temporal vs permanent configuration

Which describe journald? (Select two) A. Text log B. One log file for almost all system services C. Uses journalctl to view/extract log entries D. Older logging daemon

B. One log file for almost all system services C. Uses journalctl to view/extract log entries

When you run the ps command, how are daemon processes recognized? A. The terminal is listed as tty0. B. There is a question mark in the TTY column. C. There is an asterisk in the STIME column. D. There is a "d" for daemon in the terminal identification column.

B. There is a question mark in the TTY column.

Along with a listing of user accounts, the /etc/passwd file contains information on account expiry. True or False?

False

Each Linux workstation or server is configured with a default gateway and one or more DNS servers that exist on the local subnet. True or False?

False

ifconfig command is deprecated in most modern distros. True or False?

True

Which commands could you use to (effectively) lock a user account? (Select three) A. passwd -l <userid> B. systemctl lock-user <userid> C. usermod -L <userid> D. usermod -s /sbin/nologin <userid>

A. passwd -l <userid> C. usermod -L <userid> D. usermod -s /sbin/nologin <userid>

Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.) A. the CREATE DATABASE statement within the PostgreSQL utility. B. the ADD DATABASE statement within the PostgreSQL utility. C. the adddb command. D. the createdb command.

A. the CREATE DATABASE statement within the PostgreSQL utility. D. the createdb command.

​Where is the default document root directory for the Apache web server? A. /usr/local/html B. /var/www/html​ C. /usr/share/local/html D. /var/html

B. /var/www/html​

Which statements are true? (Select two) [user1@linux ~]$ ps -f - user1 5994 2670 0 14:47 pts/2 00:00:00 bash user1 6044 5994 0 14:49 pts/2 00:00:00 bash user1 6466 6044 0 14:52 pts/2 00:00:00 gedit file user1 6548 6044 0 14:54 pts/2 00:00:00 ps -f - A. PID of gedit is 6044 B. PPID of ps -f is 6044 C. gedit was started from bash (6466) D. bash (6044) was started from bash (5994)

B. PPID of ps -f is 6044 D. bash (6044) was started from bash (5994)

Which one is NOT a typical program used on a Linux server to download a tarball? A. curl B. firefox C. ftp or sftp D. wget

B. firefox

A process spawning or initiating another process is referred to as _____. A. a child process B. forking C. branching D. parenting

B. forking

When a printer is disabled, ________. A. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable B. the print queue accepts jobs into the print queue and holds them there until the printer is enabled again C. the printer appears as offline when an lp request is sent D. the print queue redirects all print jobs sent to it to /dev/null

B. the print queue accepts jobs into the print queue and holds them there until the printer is enabled again

Which term is used to describe the process of pushing new versions of a Web app to a cloud provider for testing? A. IaC B. Build automation C. CD D. Infrastructure automation

C. CD

Before a computer can use a router, what configuration information must it be provided? A. routing table B. subnet mask C. default gateway D. default router

C. default gateway

Which process has a PID of 1 and a PPID of 0? A. the kernel itself B. ps C. init/systemd D. top

C. init/systemd

Which file stores the Apache configuration in Fedora 28? A. /etc/apache2/httpd.conf B. /etc/apache2.conf C. /etc/httpd.conf D. /etc/httpd/conf/httpd.conf

D. /etc/httpd/conf/httpd.conf

Which file stores the IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the network interface? A. /etc/hosts B. /etc/host.conf C. /etc/resolve D. /etc/resolv.conf

D. /etc/resolv.conf

Which command is used to extract the tarball? A. tar -extf gimp-2.10.14.tar.gz B. tar -exvf gimp-2.10.14.tar.gz C. tar -zcvf gimp-2.10.14.tar.gz D. tar -zxvf gimp-2.10.14.tar.gz

D. tar -zxvf gimp-2.10.14.tar.gz

Find the match for the fields in /etc/passwd. # getent user1 passwd user1:x:1000:1000:Adam Smith:/home/user1:/bin/bash Field 1 Field 2 Field 6 Field 7

Field 1 userid Field 2 password Field 6 home directory Field 7 shell

Disable(7) Accept (3) Printing (9) Reject (4) Spooling (8) Enable (6) Ip (2) cupsd (1) /var/spool/cups (5)

Find the match. Disable Accept Printing Reject Spooling Enable Ip cupsd /var/spool/cups

For the network interface configuration to survive the reboot, it must be saved in a configuration file. True or False?

True

You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

True

When a printer is rejecting requests,____________. A. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable B. the print queue does accept jobs into the print queue and holds them there until the printer is accepting requests again C. the printer appears as offline when an lp request is sent D. the print queue redirects all print jobs sent to it to /dev/null

A. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do? A. Add the line to the /etc/aliases.db file instead. B. Run the newaliases command. C. Restart the Postfix daemon. D. Log out of the system and then log back into the system and resend the email.

B. Run the newaliases command.

Which commands may be used to display the configured ip address information? (Select three) A. ip B. ip a C. ip address show D. ifconfig

B. ip a C. ip address show D. ifconfig

Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do? A. Log in as the root user and reedit the configuration file. B. Run the dhcpconf command to edit the configuration file. C. Restart the DHCP daemon. D. Restart the xinetd daemon.

C. Restart the DHCP daemon.

How can you set the name of your workstation or server that will survive the reboot? (Select two) A. hostname <name> B. systemctl hostname <name> C. hostnamectl set-hostname <name> D. Edit the content of the /etc/hostname

C. hostnamectl set-hostname <name> D. Edit the content of the /etc/hostname

Which command within the command-line FTP utility can be used to change the current directory on the local computer? A. cd B. dir C. lcd D. get

C. lcd

Which statements are true? (Select two) A. The root user can set a priority to a process B. The lower the nice value is, the higher the chance will be for the specified process to receive more time slice. C. The higher the nice value is, the lower the process priority value will be. D. An owner of a process can "be nice" to other processes by increasing the nice value.

B. The lower the nice value is, the higher the chance will be for the specified process to receive more time slice. D. An owner of a process can "be nice" to other processes by increasing the nice value.

The daemons associated with network services listen for network traffic associated with a particular _____. A. station B. port C. IP address D. allocation number

B. port

Which statements describe logrotate? (Select two) A. Run by atd B. Run monthly C. Renames log files with a numeric or date extension before creating a new one. D. Older log files beyond the specified logging cycle are removed

C. Renames log files with a numeric or date extension before creating a new one. D. Older log files beyond the specified logging cycle are removed

Only the administrator can display the content of /etc/passwd True or False?

False

The bzip2 and gzip utilities use similar compression algorithms. True or False?

False

What is the name of the file that contains a listing of all users on the system and their home directories? A. /etc/passwd B. /etc/users C. /etc/shadow D. /etc/password

A. /etc/passwd

Which commands can you use or could you have used to install a package on Ubuntu? (Select all that apply) A. apt B. aptitude C. apt-get D. dpkg

A. apt B. aptitude C. apt-get D. dpkg

Which one is NOT a command used to terminate a process or processes? A. terminate B. kill C. killall D. pkill

A. terminate

Which of the following commands extracts an archive? A. cpio -vocBL /dev/fd0 B. cpio -vicdu -I /dev/fd0 C. cpio -vicdu -O /dev/fd0 D. cpio -vti -I /dev/fd0

B. cpio -vicdu -I /dev/fd0

What is the term used to describe a user providing a user name and password to log in to a system? A. validation B. authorization C. login D. authentication

D. authentication

What is the name given to a process not associated with a terminal? A. child process B. parent process C. user process D. daemon process

D. daemon process

When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information. A. section, priority B. service, precedents C. process, degree D. facility, priority

D. facility, priority

A runaway process that is faulty and consuming mass amounts of system resources ________. A. is a zombie process B. is an orphaned process C. has a PPID of Z D. is a rogue process

D. is a rogue process

The Debian Package Manager (DPM) is the default package manager used by Fedora 28. True or Fale?

False

The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False?

False

To install a new program from RPM software repositories on the Internet, you can use the dnf update programname command. True or False?

False

To kill a process running in the background, you must place a % character before its process ID. True or False?

False

Most source code is typically available on the Internet in tarball format or as a git repository. True or False?

True

PaaS cloud providers host sandboxed Web apps using containers for scalability. True or False?

True

How can you bypass the wait function and send a user process to the background once it was started as a foreground process? A. This cannot happen once a process is executing; it can be done only when the command is started by placing an ampersand (&) after it. B. This cannot happen; only daemon processes can run in the background. C. You can use the ps command. D. You can use the Ctrl+z key combination and the bg command.

D. You can use the Ctrl+z key combination and the bg command.

The IP address of 127.0.0.1 is also referred to as the _____. A. local address B. lookup address C. local host D. loopback address

D. loopback address

Which command can be used to temporarily alter the primary group associated with a given user? A. usermod B. chggrp C. gpasswd D. newgrp

D. newgrp

Every process has a process ID and a_______. A. fork process B. daemon C. child process D. parent process ID

D. parent process ID

The process of sending print jobs from the print queue to the printer is called _____. A. spooling B. queuing C. redirecting D. printing

D. printing

Which command entered without arguments is used to display a list of processes running in the current shell? A. pgrep B. list C. pid D. ps

D. ps

Which of the following commands creates a zipped archive? A. tar -cvf /dev/st0 B. tar -xvf /dev/st0 C. tar -tvf /dev/st0 D. tar -zcvf /dev/st0 *

D. tar -zcvf /dev/st0 *

Find the match. dnf install <package> dnf list <package> dnf upgrade <package> dnf remove <package>

Find the match. dnf install <package> Install <package> dnf list <package> Check if <package> is installed dnf upgrade <package> Update <package> dnf remove <package> Delete <package>

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

True

Most log files on the system are found in which directory? A. /etc/logfiles B. /etc/log C. /var/log D. /dev/log

C. /var/log

Which of the following commands should be run following the installation of a shared library to update the /etc/ld.so.conf and /etc/ld.so.cache files? A. ldd B. updatedb C. ldconfig D. dpkg-reconfigure

C. ldconfig

What is the name of the utility used to rotate log files? A. syslog B. jetpack C. logrotate D. logbackup

C. logrotate

When compiling source code into a binary program, which command does the compiling using the GNU C Compiler? A. tar B. ./configure C. make D. make install

C. make

Which command can you use to synchronize ntpd with an NTP time source? A. ntp B. ntpquery C. ntpdate D. hwclock

C. ntpdate

Which command would you use to unlock a user account? A. unlock username B. open username C. passwd -u username D. useradd -U username

C. passwd -u username

Which of the following command can be used to display the package to which the specified file belongs in RPM? A. rpm -a <file> B. rpm -F <file> C. rpm -qf <file> D. rpm -ql <file>

C. rpm -qf <file>

Which of the following commands can be used to list the files contained within an installed RPM package? A. rpm -qa packagename B. rpm -qi packagename C. rpm -ql packagename D. rpm -q packagename

C. rpm -ql packagename

The at command is used to _______________. A. schedule processes to run periodically in the background B. schedule processes to run periodically on a recurring basis in the future C. schedule processes to run at a single instance in the future D. schedule processes to run in the foreground

C. schedule processes to run at a single instance in the future

Which command can be used to connect to a remote Windows share called data on the server called fileserver? A. smbclient -L fileserver:data B. smbclient -L //fileserver/data C. smbclient //fileserver/data D. smbclient \\fileserver\data

C. smbclient //fileserver/data

What command do you use to delete a user account along with his/her home directory? A. userdel -h <userid> B. userdel -m <userid> C. userdel -r <userid> D. userdel -G <userid>

C. userdel -r <userid>

Which command is used to delete a user account? A. usermod -d username B. del username C. userdel username D. rm username

C. userdel username

Which command can you use to lock a user account? A. lock username B. secure username C. usermod -L username D. useradd -L username

C. usermod -L username

Which DNS resource record is an alias to other records? A. A B. AAAA C. CNAME D. NS

C. CNAME

Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.) A. route B. ipconfig C. ip D. traceroute

A. route C. ip

When working with Sendmail, what command can be used to test SMTP support? A. EHLO B. telnet C. HELO D. smtp

C. HELO

You want to generate SSH keys for your user account and copy them to a remote computer to simplify future SSH authentication. What two commands can you use to perform these actions? (Choose two answers.) A. ssh-keygen B. ssh-add C. ssh-copy-id D. ssh-agent

A. ssh-keygen C. ssh-copy-id

Which one is NOT a Linux scheduling tool? A. anat B. at C. anacron D. cron

A. anat

Which of the following can be used to provide graphical remote administration? (Choose all that apply.) A. telnet B. ssh -X C. ssh D. VNC

B. ssh -X D. VNC

What command do you use to add a user with the default home directory? A. useradd -h <userid> B. useradd -m <userid> C. useradd -r <userid> D. useradd -G <userid>

B. useradd -m <userid>

What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document? A. DirectoryIndex index.html B. DocumentRoot index.html C. Index index.html D. UseIndex index.html

A. DirectoryIndex index.html

How do you bring the "sleep 500" process to the foreground? [user1@okuda 145]$ jobs [1] Running sleep 400 & [2]- Running sleep 500 & [3]+ Running sleep 600 & A. $ % B. $ fg %2 C. Type CTRL+z followed by fg and press the enter key. D. $ fg sleep 500

B. $ fg %2

Which option to the rpm command can be used to remove a package from the system? A. -r B. -e C. -u D. -U

B. -e

When compiling source code into a binary program, which command performs a system check and creates the Makefile? A. tar B. ./configure C. make D. make install

B. ./configure

Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation? A. /etc/skel B. /etc/passwd C. /etc/login.defs D. /etc/default/useradd

C. /etc/login.defs

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet? A. DHCP B. NTP C. DNS D. NIS

C. DNS

Why does everyone have 'x' in the password field of /etc/passwd file? A. It is a sign that /etc/passwd file has been corrupted B. 'x' indicates there is an error in the account settings C. 'x' means the actual password is saved in /etc/shadow D. 'x' signifies that the account is locked

C. 'x' means the actual password is saved in /etc/shadow

Under which conditions can user1 schedule a command using at command? (Select two) A. Both /etc/at.allow and /etc/at.deny exist but they are empty B. /etc/at.allow exists with user2 in it, not user1. /etc/at.deny does not exist C. /etc/at.allow does not exist. /etc/at.deny exists with user2 in it, not user1 D. /etc/at.allow exists with user1 in it. /etc/at.deny also exists with user1 in it

C. /etc/at.allow does not exist. /etc/at.deny exists with user2 in it, not user1 D. /etc/at.allow exists with user1 in it. /etc/at.deny also exists with user1 in it

Nice values are used to affect process priorities using a range between _____________. A. 0 and 20 B. 0 and -19 C. -19 and 20 D. -20 and 19

D. -20 and 19

Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system? A. /etc/crontab B. /etc/cron/username C. /var/spool/cron D. /var/spool/cron/username

D. /var/spool/cron/username

Docker uses _________ technology. A. IOT B. Redundancy C. Virtualization D. Container

D. Container

Which one is NOT a step in setting up a user account on a Linux system? A. Create an account with the user's home directory B. Set the initial password C. Associate the user to groups D. Mount a USB drive for the user

D. Mount a USB drive for the user

Which one is NOT a common cloud architecture? A. IaaS B. PaaS C. SaaS D. TaaS

D. TaaS

What port is used by the Network Time Protocol (NTP) for communication? A. TCP 20 B. TCP 25 C. UDP 69 D. UDP 123

D. UDP 123

The pkill command terminates _________. A. all instances of a process with the same PPID B. all instances of a process with the same PID C. all instances of a process with the same priority D. all instances of a process with the same name matched by a regular expression

D. all instances of a process with the same name matched by a regular expression


Conjuntos de estudio relacionados

Macroeconomics chapters 7,8 and 10

View Set

Crossroads Chapter 4: The Napoleonic Era

View Set

Немецкие идиомы и их русские аналоги

View Set