csis345 quiz4
Which file contains full and incremental back-up information for use with the dump/restore utility?
/etc/dumpdates
Which of the following files is always executed immediately after any user logs in to a Linux system and receives a BASH shell?
/etc/profile
What is the name of the directory that contains symbolic links to UNIX SysV rc scripts for runlevel 2?
/etc/rc2.d
How long did the dd transfer take? Round your response to the nearest second. In the space below, enter only the numeric value.
139
Which kill signal number is associated with the kill command by default?
15
Which thread appeared to have a bug in the /var/log/messages output?
1694
Before compression, the file sizes of sample1 and sample2 were 5098 and _______.
1753
Linux servers are typically installed in a rack using rackmount server hardware. Which of the following is used to describe the minimum height of a rackmount server?
1U
When you viewed the resolv.conf file, what was the address of the DNS server?
8.8.8.8
What priority number is assigned to the ps process?
80
What is the most common open source Web server available for Linux?
Apache
Which of the following are stand-alone daemons?
Apache (httpd)
Which of the commands shown will restart Apache without dropping any of the clients?
Apachectl graceful
What is the default shell in Linux called?
BASH
How do you indicate a comment line in a shell script?
Begin the line with #
The Linux DNS server we use is identified by the acronym BIND. Which choice identifies the correct full name of this service?
Berkeley Internet Name Daemon
Which of the following is the default desktop environment used by Linux Mint? Unity Cinnamon GNOME KDE
Cinnamon
What are the best practices for securing a local Linux server?
Ensure that the SELinux or AppArmor is used to protect key services
Character devices typically transfer data more quickly than block devices. True or False?
FALSE
The less command offers less functionality than the more command. True or False?
FALSE
ZFS volumes are mounted at boot time from entries within /etc/fstab by default?
FALSE
What was created to define a standard directory structure and common file location for Linux?
FHS
NIS clients use NIS records to access their configuration information. True or False?
False
RSA is a common symmetric encryption algorithm used by SSH and GPG. True or False?
False
UIDs and GIDs are unique to the system and once used can never be reused. True or False?
False
Which of the following statements are true?
Quotas can limit both user space and the number of files a user can own.
Drag and drop the check mark. The command "cd etc" uses a ____ path.
Relative
When using the fdisk -l command, what type of device contains the boot partition? Drag and drop the check mark.
SATA/SCSI
Which of the following accessibility features simulates simultaneous key presses when two keys are pressed in sequence? Sticky Keys Bounce Keys Slow Keys Repeat Keys
Sticky Keys
The operating system software is necessary for a computer to function. True or False?
TRUE
After you have successfully logged into the ftp server, what is the remote system type?
Unix
Which two implementations of X windows are commonly used in Linux?
XFree86 X.org
What command is equivalent to the man -k keyword command?
apropos keyword
Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.) at -q atq at -d at -l
at -q atq at -l
What command is used to view and modify user jobs scheduled to run with cron?
crontab
What is the name given to a process not associated with a terminal?
daemon process
Which of the following terms best describes the act of creating a new BASH shell child process from a parent BASH shell process?
forking
A production kernel refers to a kernel whose:
minor number is even
Which command mounts all existing filesystems in /etc/fstab?
mount -a
Which window manager is typically used by the GNOME desktop environment?
mutter
Which command searches for and displays any text content of a binary file?
strings
Which of the following Systemd commands can be used to stop a daemon called lala?
systemctl stop lala.service
Which of the following commands creates an archive?
tar -zcvf /dev/st0 *
Which of the following commands will shut down a Linux system? (Choose all that apply.) telinit 0 shutdown -h now poweroff runlevel 0
telinit 0 shutdown -h now poweroff
Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?
testparm
Which of the following options can be specified in the GRUB Legacy configuration file to set how long the boot menu is displayed before loading the default image? wait timeout splash timer
timeout
Which of the following is an on-screen keyboard used with Linux? XK TOKEN GOK xkb
xkb
Which of the following indicates the second partition on the third hard disk drive to GRUB?
(hd2,1)
Which file contains default information such as UID and GID ranges and minimum password length to be used at a user creating?
/etc/login.defs
Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system?
/var/spool/cron/(the user's login name)
Which dump level indicates a full backup?
0
How many ports were reported as Closed by the nmap -sT localhost command?
996
Only the root user can modify a file that has the immutable attribute set. True or False?
FALSE
RAID-Z is functionally equivalent to RAID level 1. True or False?
FALSE
The root user utilizes the chgrp command to give ownership of a file to another user. What must the root use do to regain ownership of the file?
Run chgrp again listing the root user as the new owner.
Which of the following is a valid Linux initialization process? Systemd SysV GRUB GRUB2
Systemd SysV
You can clear a log file simply by redirecting nothing in to it. True or False?
True
Which command is used to schedule jobs?
at
Which command is equivalent to the atrm command?
at -d
You want to see the filesystems that are presently in use on the system. What command could you use?
cat /etc/fstab
Before a computer can use a route, what configuration information must it be provided?
default gateway
What is the name of the file that contains the IPv4 DHCP configuration information for a Fedora 20 DHCP server?
dhcpd.conf
Which command within the command-line FTP utility can be used to change the current directory on the local computer?
lcd
Which command can you use to synchronize ntpd with an NTP time source?
ntpq
Every process has a process ID and a:
parent process ID
Which of the following commands can be used to create partitions on either a MBR or GPT hard disk?
parted
A special device file is used to:
represent hardware devices such as hard disk drives and ports
The at command is used to:
schedule processes to run at a single instance in the future
SCSI-1 is also referred to as:
slow and narrow
True or false? When using the output redirect > on an existing file the contents of the file will be replaced.
true
Which command can increase the number of filehandles that programs can open in a shell?
ulimit
Which command would you use to unlock a user account?
usermod -U username
Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system?
/etc/sysconfig/network-scripts/ifcfg-eth0
Which command entered without arguments is used to display a list of processes running in the current shell?
ps
Which command can be used to view the most information about each process running on a system?
ps -l
The ______ command displays the lineage of a process by tracing its PPID back to the init daemon.
pstree
The _________ command displays the lineage of a process by tracing its PPID back to the init daemon.
pstree
Which command would a user type on the command line to find out what directory in the directory tree he is currently in?
pwd
What will typing q! at the : prompt in command mode do when using the vi editor?
quit without saving any changes
Which construct can be used in a shell script to read Standard Input and place it in a variable?
read
Which prompt does the root user receive when logged in to the system?
#
Which metacharacter is used to run a process in the background?
&
When compiling source code into a binary program, which command performs a system check and creates the Makefile?
./configure
Files that have been compressed using the compress utility typically have what extension?
.Z
What format was the LiveCD image downloaded as?
.iso
Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? /dev/sda1 / ext4 defaults 1 1 none /dev/pts devpts gid=5,mode= 620 1 0 none /proc proc defaults 0 1 none /dev/shm tmpfs defaults 1 0 /dev/sdc2 swap swap defaults 0 1 /dev/dvd /media/dvd iso 9660 noauto,ro 0 0 /dev/fd0 /media/floppy auto noauto 0 0
/, /dev/pts and /dev/shm
Drag and drop the check mark. Where is the pwd command located on this system?
/bin
In what directory is Stage2 of the GRUB2 boot loader stored?
/boot
You plug a USB flash memory drive into a system that has two SATA hard disks. What will the partition on this USB flash memory drive be recognized as to the Linux system?
/dev/sdc1
Which directory stores the cron configuration file?
/etc/cron
Which of the following is an absolute pathname?
/home/resume
What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 14.04 FTP server?
/srv/ftp
What was the nice value of the ps process when it displayed using ps -l?
0
What was the nice value of the ps process when its displayed using ps-l?
0
Which runlevel halts the system?
0
Which RAID level is also referred to as mirroring?
1
Which of the following file descriptor numbers represents stdout?
1
What is the PID assigned to the yes command in the lab?
2218
Which of the following port numbers is associated with telnet?
23
Drag and drop the check mark. The inode number of the links file is 267885. What is the inode number of the links2 file?
267865
Which of the following kernels are developmental kernels?
3.3.4
What is the default runlevel in most Linux distributions?
5
What sector size in bytes is used on /dev/sda? In the space below enter only the numeric value.
512
In the lab, we used the reboot command to reboot the system. What runlevel does the reboot command correspond to?
6
Which runlevel shuts down the system and then reboots it with the mentioned level as the default runlevel?
6
What percentage of compression was achieved using the compress command on sample1?
62.82
After compression, the files sizes of sample1 and sample2 were 1895 and _________.
974
Which DNS resource record is an alias to other records?
CNAME
When sitting at a computer running Linux, what key combination is pressed to open the graphical terminal?
Ctrl+Alt+F1
Which SQL statement key word can be used to delete a record within a table?
DELETE
What is the third column in the cron table used to represent?
Day of the month
Which of the following steps is not a common troubleshooting procedure?
Delegate responsibility
Which of the following statements is true?
Either the MBR/GPT or the active partition can contain the boot loader
A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when viewed using ls -l command. True or False?
FALSE
Which of the following is not a piece of information that the Fedora installation program prompts you for?
Firewall settings
Which common GUI environments are available in most Linux distributions?
GNOME
To which license does Linux adhere?
GNU General Public License
Which choice is considered a legacy boot loader?
GRUB
You have opened a telnet session on port 25 with your email server. What command can you type within your telnet session to start an email session?
HELO
Which of the following are common methods for gaining support for Linux?
HOWTO documents at www.linuxdoc.org a local Linux User Group Internet newsgroups
What type of iptables chain targets traffic that is destined for the local computer?
INPUT
The iso9660 filesystem is used on CD-ROMs. What filesystem is used if you convert a CD-ROM to a disk image ISO file? Drag and drop the check mark.
Iso9660
Which boot loader is known as the traditional Linux boot loader but is no longer used by most modern Linux distributions?
LILO
________ is the traditional Linux Boot Loader.
LILO
Which of the following statements is true?
LILO needs to be reinstalled after it has been modified
Who was Linux was developed by and which operating system was it modeled after?
Linus Torvalds, MINIX
Where is the boot loader for an OS typically stored
MBR
Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?
Restart the DHCP daemon
Who formed the Free Software Foundation to promote open development?
Richard Stallman
Which culture embraced the term GNU (GNU's Not UNIX) and laid the free software groundwork for Linux?
the hacker culture
Which of the following can be used on Linux to provide file and print services?
Samba
Which of the following is not an example of virtualization software that can be used to install Linux within another operating system?
Spiceworks
Which part of the GRUB2 boot loader loads a terminal-friendly boot loader screen?
Stage2
Which of the following is not necessarily generated by every command on the system?
Standard Input
Linux has only one root directory per directory tree. True or False?
TRUE
Which of the following commands will prompt you to answer a series of questions to help determine which time zone file you should use? zones zoneselect timezones tzselect
tzselect
Which command is used to delete a user account?
userdel username
Which choice matches a portion of the command used to add bettyjane to the sales group?
usermod -G
Which command can you use to lock a user account?
usermod -L username
Which of the following settings may be configured using the xvidtune utility?
vsync and hsync
Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?
True
The -9 option to the gzip utility results in a higher compression ratio. True or False?
True
The alias command can be used to make a shortcut to a single command. True or False?
True
The line that configures the host name for the computer at boot time can be found in /etc/sysconfig/network. True or False?
True
The sed and awk commands are filter commands commonly used to format data within a pipe. True or False?
True
To install a new program from RPM software repositories on the Internet, you can use the yum update programname command. Ture or False?
True
A user mounts a device to a mount point directory and realizes afterward there are files previously found within the mount point directory that are needed. What should this user do?
Unmount the device from the directory
What must you do to successfully run the fsck command on a filesystem?
Unmount the filesystem
Which of the following statements regarding LVM structure is correct?
VGs are comprised of one or more PVs
What would be the effect of using the alias command to make an alias for the date command named cat in honor of your favorite pet?
When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead.
The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel?
when you need support in Linux for new hardware
Which command displays the users who are currently logged in to the Linux system?
who
Which command can be used to fine-tune the vsync and hsync of a video card for use in X Windows?
xvidtune
Using wildcard metacharacters, how can you indicate a character that is NOT an a or b or c or d?
[!a-d]
SCSI devices that use an 8-bit-wide data path use:
a 50-pin connector
The killall command terminates:
all instances of a process with the same name
What keystroke will open a grub> prompt at the Grub boot screen?
c
A user typed in the command pwd and saw the output: /home/jim/sales/pending. How could that user navigate to the /home/jim directory?
cd . . / . .
Which of the following will display the message welcome home if the cd /home/user1 command is successfully executed?
cd /home/user1 && echo "welcome home"
A file has the following permissions r----x-w-. The command chmod 143 would have the same effect as the command:
chmod u=x,g=r,o=wx file1
Which command blanks the terminal screen erasing previously displayed output?
clear
Which of the following commands will display the number of seconds that have elapsed since January 1, 1970? date +%s date --epochdiff datetime -s datetime --epoch
date +%s
What does the du /var command do?
dumps the /var directory
Which option to the rpm command be used to remove a package from the system?
e
The current value for the HOME variable is displayed by which of the following commands?
echo ~
The ___ command will display file types using special characters. Enter your answer in the space provided.
file
What will the following wildcard regular expression return: file[a-c]?
filea, fileb, filec
What Systemd target corresponds to runlevel 5?
graphical.target
What command can you use to safely shut down the Linux system immediately?
halt
You can view or set the host name for a Linux computer using the ______ command.
hostname
Which of the following is used to describe a computer that is used to access an iSCSI hard disk across the network?
iSCSI initiator
Where is the /proc filesystem stored?
in RAM
What equivalent to the man command generally provides an easier-to-read description of the queried command and also contains links to other related information?
info
The first daemon loaded on a Linux system is:
init
What daemon is started first on a Linux system
init
Which command causes the system to enter Single User Mode?
init 1
Which file contains the default runlevel information?
inittab
A runaway process that is faulty and consuming mass amounts of system resources:
is a rogue process
Which command can be used to see processes running in the background?
jobs
Which of the following commands can be used to only show jobs that have been paused. jobs -r jobs -s jobs -p jobs -n
jobs -s
Which of the following commands can be used on a Fedora 20 system to view hardware and service startup information during the boot process?
journalctl -b
Which of the following commands will generate a new initramfs? cutram mkinit dracut mkinitrd
mkinit
On which part of the maintenance cycle do Linux administrators spend the most time?
monitoring
What terms are used to describe the Linux operating system?
multiuser and multitasking
Which of the following is the default window manager used by the GNOME version 3 desktop environment? mutter metacity wmaker kwin
mutter
Which command do you use to rename files and directories?
mv
Which command can be used to alter the primary group associated with a given user temporarily?
newgrp
Which value can be configured to influence the priority of a process?
nice value
Which of the following commands can be used to scan the available ports on computers within your organization?
nmap
To test DNS configuration by resolving a host name to IP address, which command can you use?
nslookup hostname
Which of the following utilities can be used to check TCP/IP configuration and test network connectivity?
ping
The daemons associated with network services listen for network traffic associated with a particular:
port
We asked the user to enter a positive or negative number and used 4 as an example. Given what you know about the script the number 5 would be classified as a ________ number.
positive
Which of the following characters, when pressed while the top program is running, will allow you to change the niceness of a process? n p r d
r
Which of the following commands will most likely increase the chance of a process receiving more time slices?
renice -12
Which Systemd target unit is the same as Runlevel 1?
rescue.target
If resume is the name of a file in the home directory off the root of the filesystem and your present working directory is home, what is the relative name for the file named resume?
resume
Which of the following terms describes a process that has encountered an error during execution and continuously uses up system resources?
rogue process
Which command can be used to modify the route table on a Linux computer?
route
Which command can be used to remove the test RPM package, including any test configuration files?
rpm -ql packagename
Which of the following commands will show the current runlevel along with the previous runlevel? (Choose all that apply.) runlevel init -r echo $RUNLEVEL telinit -r
runlevel
Which of the following refers to the third primary partition on the second SCSI hard disk within Linux?
sdb3
The which command does what?
searches for a file only in directories that are in the PATH variable
The timeout value in the GRUB configuration file is measured in?
seconds
Which of the following is not a type of RAID?
seriel RAID
Which command can be used to start X Windows, the window manager, and the default desktop environment?
startx
Which of the following commands can be used to manually start X Windows on a Linux system?
startx
The | (pipe) metacharacter takes the stdout of a command and sends it to another command as ______.
stdin
Which partition do you typically create at minimum during a Fedora Linux installation?
swap
24-Which of the following commands will display a list of Systemd units sorted by the time they took to load? systemctl-analyze --blame systemd-analyze blame systemctl --listload systemd --listload
systemd-analyze blame
Which filename extension indicates a tarball?
tar.gz
Which parameter should be used with the shutdown command to schedule a shutdown?
-r
After typing the command umask731 the permissions on all subsequently created files and directories will be effected. In this case, what will the permissions on all new files be?
---r--rw-
The command chmod317file1 would produce with of the following lines in the ls command?
--wx--xrwx 1 user1 root 0 Apr 29 15:40 file1
Nice values are used to affect process priorities using a range between:
-20 and 19
Which option to the dpkg command can be used to list the files that comprise a package?
-L
Which prompt do regular users receive when logged in to the system?
$
Which parameter should be used with the shutdown command to cancel a scheduled shutdown?
-c
What option can be used with the ps command to display an entire list of processes across all Terminals, including daemons? -e -a -f -l
-e
In context of cron, which of the following is not the correct directory name?
/etc/cron.yearly/
Which files stores the Apache configuration in Fedora 20?
/etc/httpd/conf/httpd.conf
Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC?
/etc/resolv.conf
Which file contains information regarding the users, computers, and commands used by the sudo command?
/etc/sudoers
Must log files on the system are found in which directory?
/var/log
How many errors were generated during dd creation? In the space below, enter only the numeric value.
0
You have created a full backup and four incremental backups. In which order must you restore these backups?
0, 1, 2, 3, 4
What is the size of /dev/sda in GB? Drag and drop the check mark.
21.5
What is the size of the rc.conf file in bytes? In the space provided, enter only the numeric value.
281
How many instances of the term "root" were found in the password file? In the space provided, enter only the numeric value.
4
A Linux system that is configured to work in graphical mode, what is the run level?
5
What runlevel is associated with graphical mode?
5
Which RAID level uses striping with parity?
5
What was the data transfer rate in MB /s during the dd USB live creation? In the space below, enter only the numeric value.
5.2
What is bettyjane's userID?
502
By default what is the time period a user is warned before their password expires on a Red Hat Fedora system?
7 days
After using the gzip command, the file sizes of sample1 and sample2 were 938 and _______.
716
When the mpstat command was executed, what was the %idle value?
83.45
When the lspci command was executed, what manufacturer is listed for the Ethernet controller?
AMD
You noticed a file in your home directory that has a + symbol appended to the mode. What does this indicate?
Additional entries exist within the ACL of the file that can be viewed using the getfacl command.
Which of the following could result in a segmentation fault (fatal signal 11) during a Fedora installation?
All of the above
Which of the following are characteristics of Open Source Software?
Any bugs are fixed quickly
Comparing the total used swap space reported by the top and free commands, which statement is most accurate?
Both commands displayed the same value
We used 765 in this lab to set the mode of a file named project2. If we has used the value 675 who would be affected?
Both user and group
If a process state is currently showing as uninterruptible sleep, which letter will show in the output of the ps command? D U N S
D
After a partition on a hard disk drive is formatted with a filesystem, all partitions on that hard disk drive must use the same filesystem. True or False?
FALSE
If you boot your computer from Linux live media, you will be able to use a fully-functional Linux system prior to installing Linux on permanent storage. True or False?
FALSE
Linux commands entered via the command line are not case sensitive. True or False?
FALSE
SAS transfers data to SCSI disks via parallel cables. True or False?
FALSE
There is no real difference between the "S" and the "s" special permissions when displayed using the ls -l command. One just means it is on a file and the other that it is on a directory. True or False?
FALSE
Users enter commands directly to the kernel of the Linux operating system. True or False?
FALSE
Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry. True or False?
False
Because Standard Error and Statement Output represent the result of a command and Standard Input represents the input required for a command, only Standard Error and Standard Output can be redirected to/from a file. True or False?
False
NFS can be used to share files natively with computers running the Microsoft Windows operating system? True or False?
False
Standalone daemons are started on demand using inetd or xinetd. True or False?
False
Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?
False
The Debian Package Manager (DPM) is the default package manager used by Fedora 20. True or False?
False
The bzip2 and gzip utilities use similar compression algorithms. True or False?
False
The lspci command can be used to isolate problems with X Windows. True or False?
False
To kill a process running in the background, you must place a % character before its process ID. True or False?
False
Which of the following does iso9660 identify? Drag and drop the check mark.
Filesystem
What does >> accomplish when entered on the command line after a command?
It appends Standard Output to a file
What does the SGID special permission do when applied to a directory?
It causes all new files created in the directory to have the same group membership as the directory and not the entity that created them
After typing the ls -a command, you notice that there is a file whose filename begins with a dot ( . ). What does this mean?
It is a hidden file.
After typing the ls -F command, you notice a filename that ends with an * asterisk character. What does this mean?
It is an executable file.
When the core components of the Linux operating system are packaged together with other Open Source Software, it is called a:
Linux distribution
What is wrong with the following command string ls /etc/hosts >listofhostfile?
Nothing is wrong with the command
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? SIGQUIT SIGINT SIGTERM SIGKILL
SIGQUIT
Which of the following system variables can you modify to override the default system timezone within your current shell? LC_TZ LOCALE TZ TIME
TZ
Which of the following can be used to create a database within PostgreSQL?
The CREATE DATABASE statement within the PostgresSQL utility.
What does the PPID of a process identify?
The PID of a parent process
When user is deleted and a new user is created using the same UID, what is the status of the files owned by the previous user?
The new user becomes the owner.
DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?
True
Most source code is available on the Internet in tarball format. True or False?
True
SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?
True
The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?
True
Which command can be used to remove the test DPM package, including any test configuration files?
apt-get purge test
What command can be used to view all jobs scheduled with the at command?
at -l
Which command is equivalent to the atq command?
at -l
What is the name used to describe a user providing a user name and password to log in to a system?
authentication
When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad?
bad, because the processor is idle 10% of the time and perhaps a faster CPU is required
You use the Ipstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue?
cancel Printer1-17 Printer1-21
The main configuration file for GRUB2 is /boot/grub/grub. ________. This file is automatically built via entries within the /etc/default/grub file.
cfg
The main configuration file for GRUB2 is /boot/grub/grub_______. This file is automatically built via entries within the /etc/default/grub file.
cfg
Which of the following commands can be used to start a UNIX SysV daemon called lala in runlevels 1, 2, and 3?
chkconfig -- level 123 lala on
Which command can you use during a system rescue to switch from the root of the live OS to the root of the Linux system installed on the hard disk?
chroot
The vi editor can function in which two of the following modes?
command insert
Which command is used to display the amount of free space that exists on a filesystem?
df
A device file:
displays a major and minor number in place of a file size
The tac command:
displays the contents of a file in reverse order last line first and first line last
What does the command dumpe2fs -h do?
displays the number of inodes used and available in an ext2 filesystem
What are the three standard Linux permissions?
execute, read, write
When referring to the /etc/rsyslog.conf file, this term specifies information from certain area of the system, whereas this term is the level of importance of that information.
facility, priority
Which process will always have a PID of 1 and a PPID of o?
init
The TCP/IP address of 127.0.0.1 is also referred to as the:
loopback address
Which command can be used to send a print job to the default printer named Printer1?
lp -d Printer1 file
You know a Linux command will perform a desired function for you, but you cannot remember the full name of the command. You do remember it will flush a variable from your system. Which command typed at a command prompt displays a list of commands that would likely contain the command you desire?
man -key flush
The process of sending print jobs from the print queue to the printer is called?
printing
The default permissions given by the system prior to analyzing the unmask are known as what for directions, and referred to as what for files?
rwxrwxrwx and rw-rw-rw-
Which of the following files is likely to be found it the /var/log/sa directory on a Fedora 20 system over time?
sa19
After you log into a terminal, you receive a user interface called a:
shell
What keyword can be specified within a boot loader to force the system to boot Single User Mode?
single
Which command can be used to connect to a remote Windows share called data on the server called fileserver?
smbclient //fileserver/data
Every computer consists of physical components and nonphysical components. The nonphysical components of a computer that understand how to work with the physical components are referred to as:
software
What does the /var directory contain?
spools and log files
A user types in the command head /poems/mary. What will be displayed to the terminal screen?
the first 10 lines of the file mary
Which of the following commands will list the time zones available on a Linux system? timedatectl list-timezones timezones date --timezones tzlist
timedatectl list-timezones
Which command is used to gain real-time information about processes running on the system with the most processor-intensive processes listed at the beginning of the list?
top
Which of the following is responsible for starting tasks and services during boot, stopping them during shutdown, and supervising them while the system is running? GRUB Kickstart POST Upstart
upstart
Which of the following commands can be used to search for packages that contain the word oobla on RPM software repositories?
yum search oobla
What command can be used to create a ZFS volume called test from the space on /dev/sdb and /dev/sdc that functions like RAID level 1?
zpool create test mirror /dev/sdb /dev/sdc
If incompatible X Windows settings are configured, where will the errors that are generated be written to? ~/.xsession-errors ~/.xwin-error /var/log/xwindows.error ~/.xerror
~/.xsession-errors
Which of the following operators reverses the meaning of a test statement?
!
GRUB2 Stage 1.5 and Stage2 reside in the ______ directory.
/boot/grub
GRUB2 stage 2 resides in which directory?
/boot/grub /boot/grub2
Which of the following represents the first nonrewinding SCSI tape device on a system?
/dev/nst0
A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs? /etc/cron.d/cron.allow /etc/cron.allow /etc/cron.d/cron.deny /etc/cron.deny
/etc/cron.deny
Which directory stores most UNIX SysV rc scripts?
/etc/init.d
Which file does the UNIX SysV init daemon reference on a startup to determine the default runlevel?
/etc/inittab
Which of the following files is where the default runlevel is set on some Linux systems? /etc/rc.d/init.conf /etc/init.d/init /etc/rc.d/init.d/init.conf /etc/inittab
/etc/inittab
Which of the following files is a binary file that contains the rules for calculating the time based on your time zone relative to epoch time? /usr/local/bin/timecalc /etc/localtime /sbin/timeadj /sbin/tickadj
/etc/localetime
Which file holds the methods to be used and the order in which they will be applied for host name resolution?
/etc/nsswitch.conf
What is the name of the file that contains a listing of all users on the system and their home directories?
/etc/passwd
To which directory will the test ZFS volume from the previous question be mounted by the ZFS system?
/test
In addition to /etc/localtime, some Linux distributions also have an /etc/timezone text file that contains a reference to the correct time zone file contained in which directory? /etc/zoneinfo /usr/zoneinfo /usr/share/zoneinfo /usr/local/zoneinfo
/usr/share/zoneinfo
You want to view log files to get information about a problem that occurred during a Linux installation. In which directory will you likely find the log files?
/var/log
Where are scheduled commands stored on Ubuntu Linux systems? /etc/at/ /var/spool/at /tmp/at /var/spool/cron/atjobs
/var/spool/cron/atjobs
What is the default gateway for eth0?
192.168.15.1
How much data (in MB) was transferred to the USB device during the dd execution? In the space below, enter only the numeric value.
719
What is the numeric representation of the mode of a newly created directory? In the space provided, enter only the numeric value.
777
What percentage of compression was achieved using the gzip command on sample1?
82.1
What kill level signal cannot be trapped?
9
Which of the following Linux Intrusion Detection Systems can be used to detect altered and directories?
AIDE
What is a means available to resolve a host name to the appropriate TCP/IP address?
DNS
You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?
True
Which of the following actions should you first take to secure your Linux computer against network attacks?
Ensure that only necessary services are running.
When the fsck command cannot repair a nonroot filesystem, you should immediately restore all data from tape backup. True or False?
False
Which of the choices provided would NOT be considered an infrastructure service?
HTTP
What does the mv command do?
It moves a file
What does the usermod -U (username) perform?
It unlocks the account.
What must a user do to run cp or mv interactively and be asked if she wants to overwrite an existing file?
Just type cp or mv as they run in interactive mode by default
Which person below is one of the two co-creators of UNIX?
Ken Thompson
What are some good reasons for using Linux in a corporate environment?
Linux is widely available for many platforms and supports many programming languages
You wish to configure the runlevels that a particular upstart daemon is started in. What should you do?
Modify the daemon configuration file within the /etc/init directory
Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his machine. Before he can use them for data storage and retrieval, what must he do?
Mount any partitions created on the two hard drives such that they are accessible by the operating system.
A user runs the fsck command with the -a option on a filesystem that is showing signs of corruption. How would that user locate any files the system was unable to repair?
Mount the filesystem and check the lost+found directory underneath the mount point.
Many types of software are available today. Which type of software does Linux represent?
Open Source Software
How can you protect a metacharacter (such as the $ character) from shell interpretation?
Precede it with a \.
How can you specify a text pattern that must be at the beginning of a line of text using a regular expression?
Precede the string with a ^
How can a user switch from insert mode to command mode when using the vi editor?
Press the Esc key
Which Windows program is often used to connect to a Linux server via SSH?
Putty
Which of the following RAID levels is not fault tolerant?
RAID 0
Which encryption methods is used when using SSH for the first time to connect a new computer?
RSA
You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do?
Run the newaliases command
A directory is a type of file. True or False?
TRUE
Hard links need to reside on the same filesystem as the target, whereas symbolic links need not be on the same filesystem as the target. True or False?
TRUE
The lvextend command can be used to add additional unused space within a volume group to an existing logical volume. True or False?
TRUE
To install Linux within a virtual machine, you can specify the path to an ISO image that contains the Linux installation media within visualization software without having to first write the ISO image to a DVD or USB flash drive. True or False?
TRUE
What will the command sar -W 3 50 do?
Take 50 swap statistics every 3 seconds.
What would be the result of not configuring an /etc/at.allow file on a Fedora Linux system?
The /etc/at.deny file would be processed. All users would have access to the at command by default.
Consider the following shell script: echo -e "What is your favorite color?--> \c" read REPLY if [ "$REPLY" = "red" -o "$REPLY" = "blue" ] then echo "The answer is red or blue." else echo "The answer is not red nor blue." fi What would be displayed if a user executes this program and answered Blue when prompted?
The answer is not red nor blue
When you change the data in a file that is hard-linked to three others:
The data in the file you modified as well as the data in all hard linked files are modified as they share the same data and all have the same inode and file size.
The first floppy drive on the system is not responding. You enter the file /dev/fd0 command and receive the following output. What is the problem? [root@server1 root]# file /dev/fd0 /dev/fd0: ASCII text [root@server1 root]#
The device file has become corrupt
When you run the ps command, how are daemon processes recognized?
There is a question mark in the TTY column.
A for construct is a loop construct that processes a specified list of objects. As a result, it is executed as long as there are remaining objects to process. True or False?
True
A negative nice value increases the likelihood that the process will receive more time slices, giving it more time to use the CPU.
True
A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False?
True
As daemon processes are not associated with terminals, you must use the -e switch with the ps command to view them. True or False?
True
The private key is used when creating a digital signature. True or False?
True
After typing the ls -F command, you see the following line in the output: -rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1 What does this mean?
User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.
Which of the following are graphical remote administration technologies?
VNC
What is contained in the DISPLAY variable on a Linux system running the X window system? How many monitors are connected to a Linux system. Which X server the client is supposed to connect to by default. The resolution of the monitor connected to the Linux system. The display manager that should be used.
Which X server the client is supposed to connect to by default.
How can you bypass the wait function and send a user process to the background?
You can use the CTRL+Z key combination and the bg command.
You have redirected Standard Error to a file called Errors. You view the contents of this file afterward and notice that there are six error messages. After repeating the procedure, you notice that there are only two error messages in this file. Why?
You did not append the Standard Error to the Error file and as a result, it was overwritten when the command was run a second time.
When using two output redirects , >>, on an existing file, the file contents will be ______.
appended
Which of the following command can be used to remove a job from the list of pending jobs? (Choose all that apply.) atrm at --remove at -r at -d
at -r at -d atrm
If a user's current directory is /home/mary/project1, which command could she use to more the etc directory directly under the root?
cd/etc
Which of the following commands will change the user ownership and group ownership of file1 to user1 and root respectively?
chown user1:root file1
Which of the following commands extracts an archive?
cpio -vicdu -I/dev/fd0
Which of the following commands will show the current user cron jobs that have been created for the currently logged in user? cronjobs --list crontab -l cron -l cron --list
crontab -l
Before a user-defined variable can be used by processes that run in subshells, that variable must be:
exported
Every if construct begins with if and must be terminated with?
fi
The if decision construct will always end with the statement ______.
fi
Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?
firewall-cmd --add-service ssh -permanent
The term used to describe a process spawning or initiating another process is referred to as:
forking
You have recently modified the options within the /etc/default/grub file. What command can you use next to rebuild the GRUB2 configuration file?
grub2-mkconfig
Drag and drop the check mark. When searching with the which command, most of the commands were found in the same directory. Which of the choices was in a different directory than the others?
halt
Which of the following can be used to compare the hardware clock to the system clock, writing a new result to a new line every 10 seconds? hwtosys -c systohc --compare hwclock -c compare --hw2sys
hwclock -c
What is the name of the utility used to rotate log files?
logrotate
Which of the following commands can be used to convert files between different character encodings? conv transform convert iconv
iconv
In the lab, what was the configuration filename used to configure the first Ethernet device?
ifcfg-eth0
Which command would be used to activate the NIC aliased as etho?
ifup eth0
Which two commands can be used to change the runlevel? [Choose two.]
init telinit
What command can you use to view journald log entries on a system that uses Systemd?
journalctl
Which command indicates the shared libraries required by a certain executable program?
ldd
Which of the following commands will show a number of environment variables that start with LC_? printenv localvar locale env
locale
Which of the following commands can be used to display the current locale of a system? syslocale localed locale localectl
locale localectl
Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)? pstatus psfiles lsof pids
lsof
When compiling source code into binary program, which command does the compiling using the GNU C Compiler?
make
Which command is used to format a partition on a hard disk drive with the ext4 filesystem?
mke2fs -t ext4 device
What devices are used to transfer information from one network to another?
routers
Which command could you use to see a list of all environment and user-defined shell variables as well as their current values?
set
Which type of RAID is entirely configured during the Linux installation process?
software RAID
When a printer is disabled:
the print queue does accept jobs into the print queue and holds them there until the printer is enabled again
When a printer is rejecting requests:
the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable
Regardless of your username you can always refer to your home directory by using the ____ metacharacter.
~