ITN 170 Linux Final Exam, ITN 170 Linux Exam2, ITN 170 Exam1 prep

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is not a valid compression file extension for the Linux operating system? .gz .vz .xz .bz2

.vz

Which of the following commands cannot be used to create an exFAT filesystem on a USB thumb drive that is recognized as /dev/sdb?

mkfs exfat /dev/sdb1

The iptables software on Linux is an example of what kind of software? -Firewall -Anti-virus -Routing -Proxy

-Firewall

Which file should be configured so that quotas are enabled at boot time? /etc/edquota /etc/fstab /etc/fsq /etc/quotas

/etc/fstab

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?

Ctrl+G

Leonard wants to find detailed information about the Bluetooth kernel module. Which of the following commands can he use to display this information? modinfo bluetooth modstat bluetooth lsmod bluetooth modstatus bluetooth

modinfo bluetooth

While the top command is running, what key can be pressed to change the nice value of a process? p v n r

r

Which of the following commands will install an RPM package while ignoring any other packages that it may be dependent upon for proper operation? rpm -in package.rpm rpm -ivh --nodeps package.rpm rpm -i --ignoredeps package.rpm rpm -ivhn package.rpm

rpm -ivh --nodeps package.rpm

To display a text file in reverse order, what command should be used? tee cat sed tac

tac

Which of the following commands will shut down a Linux system? (Choose all that apply.) runlevel 0 telinit 0 shutdown -h now poweroff

telinit 0 shutdown -h now poweroff

Which Linux command can be utilized to display your current login name?

whoami

What service provides a method for the efficient transfer of files over the Internet? FSTP FTP FTTP STP

FTP

What software type is distributed free of charge, but the source code is not available? -Freeware -Open source software -Shareware -Closed source software

Freeware

Which of the following is an on-screen keyboard used with Linux? GOK xkb XK TOKEN

GOK

Which of the following would be a term applicable to an e-mail program on a workstation that is used to view email? -MUA -MTA -MBR -MDA

MUA

Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface? nshark tshark ushark wshark

tshark

Which of the following commands will count the number of lines in a file named data.csv? lines data.csv count -l data.csv lc data.csv wc -l data.csv

wc -l data.csv

Which of the following server roles does Apache perform? authentication security web server fileshare

web server

Which of the following commands can be used to modify configuration options for DPM packages after they have been installed? dpkg-configure dpkg-update dpkg-config dpkg-reconfigure

dpkg-reconfigure

Which of the following commands will not interpret regular expressions, which translates into faster results being returned? (Choose all that apply.) fgrep egrep grep -F grep

fgrep grep -F

When writing shell scripts and using an if statement to determine whether a set of code should be executed, what is the proper syntax to end the if construct? ___________

fi

Which of the following commands can be used to terminate a process by the process name? stop kill pkill pskill

pkill

Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen? tar -czvf tar -nzaf tar -ngac tar -cfza

tar -czvf

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a: -Tarball -DBMS -Router -Package manager

tarball

Which of the following files does a TCP wrapper check before starting a network daemon? /etc/tcp.allow and /etc/tcp.deny /etc/wrapper.allow and /etc/wrapper.deny /etc/daemon.allow and /etc/daemon.deny /etc/hosts.allow and /etc/hosts.deny

/etc/hosts.allow and /etc/hosts.deny

To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory? /proc/memoryinfo /proc/cpuinfo /proc/mem /proc/meminfo

/proc/meminfo

Where are the files stored that contain information for all of the time zones that could be recognized by a Linux operating system? /etc/timezones /var/zoneinfo /usr/share/zoneinfo /var/local/timezones

/usr/share/zoneinfo

Which of the following files stores information about failed logins on a Linux system? /var/log/wtmp /var/log/nolo /var/log/failed /var/log/btmp

/var/log/btmp

What zone configuration file contains a PTR record used to identify the loopback adapter? /var/named/named.ca /var/named/named.local /etc/named.loop /etc/named.conf

/var/named/named.local

Which of the following umask settings will result in new files receiving the default permissions -rw-------? 0688 0600 0177 0188

0177

The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of? 32 48 128 8

48

Which of the following commands can be used to create a BASH variable named CREATOR with the value of Torvalds? CREATOR="Torvalds" CREATOR = "Torvalds" var CREATOR as "Torvalds" set $CREATOR = "Torvalds"

CREATOR="Torvalds"

What two Linux distributions utilize the Debian package manager by default? -Red Hat Linux -Ubuntu Linux -SUSE Linux -Linux Mint

Linux Mint ​Ubuntu Linux

Which command can be used at a BASH command prompt to obtain a Web page? webpage ab apachect1 curl

curl

Which of the following permissions would show for a symbolic link when displayed with the ls -l command?

lrwxrwxrwx

Select the command that can be used to provide a long listing for each file in a directory: ls -F ls -T ls -I ls -L

ls -I

Wayne is using the command line and is in his home directory. Which of the following will display a list of all files and their sizes from his home directory? (Choose two.) ls -al /home/wayne ls -ax ~ ls -ax ls -al ~

ls -al /home/wayne ls -al ~

Jim wants to rename a directory for a project that he has been working on. Which of the following commands can he use to perform that action? rename projectx projecty move projectx projecty mv projectx projecty ren projectx projecty

mv projectx projecty

Which of the following commands can be used to display socket information out to the terminal screen? sstat woolsocks ss opensocks

ss

John has been using the cdrom on his computer that is running the Linux operating system. He pushes the eject button on the front of the drive, but it doesn't eject the disk. Which of the following commands should he run?(Choose all that apply.) detach /media/cdrom unmount /media/cdrom eject /media/cdrom umount /media/cdrom

* eject /media/cdrom * umount /media/cdrom

Which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do not charge for the software but also do not distribute the source code along with it? -malware -shareware -freeware -tryware

-freeware

When using the compress command to archive a set of files into a single file, which of the following options will display the compression ratio of the individual files making up the new compressed file? -s -a -c -v

-v

Which of the following file extensions are used by the Debian Package Manager? .dpm .d .deb .dpkg

.deb

Which of the following files can you add filenames to so that the git add * command will not stage them? .gitnopush .gitignore .nopush .ignore

.gitignore

Sandra needs to obtain the latest image of Fedora so that she can install it as a virtual machine on her Windows workstation. Which of the following file formats is Sandra likely to find available for download from Fedora's website in order to allow her to use the file as the source for booting and installing Linux as a VM? .tgz .iso .zip .tar.gz

.iso

Which of the following files contain the path and filename where DNS servers should be configured? /etc/nsswitch.conf /etc/resolv.conf /etc/hosts /etc/named.conf

/etc/resolv.conf

What is the complete path and filename of the file where ports and their associated protocols are defined? ___________

/etc/services

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?

/root

Under the root directory in Linux, which directory contains system commands and utilities? /var /boot /usr /opt

/usr

In addition to /etc/localtime, some Linux distributions also have an /etc/timezone text file that contains a reference to the correct time zone file contained in which directory? /usr/local/zoneinfo /usr/zoneinfo /etc/zoneinfo /usr/share/zoneinfo

/usr/share/zoneinfo

What directory under / contains the log files and spools for a Linux system? /opt /boot /var /usr

/var

What is the complete path and filename for the database that is used by the locate and mlocate commands?

/var/lib/mlocate/mlocate.db

Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server? 443/tcp open https 993/tcp open imaps 23/tcp open telnet 22/tcp open ssh

23/tcp open telnet

Which of the following ports would be used to resolve a domain name to an IP address? 53 23 443 69

53

If no level of compression is specified, the gzip command assumes what compression level? 4 7 5 6

6

Jan needs to set permissions on a file so that the owner has read, write, and execute permissions. The group should have read permissions only, and everyone else should have no access. Which of the following parameters, when used with the chmod command, would set the permissions described? 620 047 026 740

740

At the vi command mode prompt, what key combination will force a quit from the vi editor without saving changes? :q :! :q! :exit

:q!

What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output? & \ | ;

;

Which of the following will take output from a command and append it to the end of a file? < >> << >

>>

When issuing the ls -F command, what special character indicates a linked file? @ & = *

@

When using the vi text editor, which of the following keys, when in command mode, will change to insert mode and place the cursor at the end of the current line? i A I a

A

If a process state is currently showing as uninterruptible sleep, which letter will show in the output of the ps command? S D U N

D

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet? NTP DNS DHCP NIS

DNS

Which of the following SQL statements can be used to delete a table from a database? DELETE TABLE table_name; DROP FROM database TABLE table_name; ALTER DATABASE database DROP TABLE table_name; DROP TABLE table_name;

DROP TABLE table_name

Which of the following statements should be used at the end of a SQL statement where an aggregate function such as SUM or COUNT is used? JOIN HAVING GROUP BY ORDER BY

GROUP BY

Which of the following is the greatest expense for companies using Linux? -Software upgrades -Hiring people to maintain the Linux system -Additional software -Operating system cost

Hiring people to maintain the Linux system

Which of the following options is passed to the Linux kernel from the GRUB2 configuration file to set the locale? LC_* LC_ALL LANG TZ

LANG

What DNS resource record type is used to provide the IP address for the e-mail server for a zone? CNAME MX SOA NS

MX

When viewing the version number for a Linux kernel, what number indicates the stability of the kernel? -Major number -Minor number -Revision number -Production kernel number

Minor Number

Aria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk command indicates that the new partition information must be manually reloaded. Which of the following should she do next? Run the parted command Run the partprobe command Run the cfdisk program Reboot the system

Reboot the system Run the partprobe command

After logging into a terminal, a user will receive an interface known as which option? Swap memory User interface Shell Processor

Shell

What is the most commonly used LAN protocol? IPX/SPX UDP/IP DLC TCP/IP

TCP/IP

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?

Tab

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called? SCSI number Target ID Device ID SCSI controller

Target ID

What is contained in the DISPLAY variable on a Linux system running the X window system? The resolution of the monitor connected to the Linux system. Which X server the client is supposed to connect to by default. The display manager that should be used. How many monitors are connected to a Linux system.

Which X server the client is supposed to connect to by default.

Which of the following is a lightweight desktop environment that uses very few system resources that a system administrator might choose to install on a Linux server instead of one of the two main desktop environments? GNOME KDE XFCE mutter

XFCE

Which command can be used to create a new command that will monitor the contents of auth.log as they get added to the file? alias showauth='tail -f /var/log/auth.log' create showauth='tail -f /var/log/auth.log' ln showauth='tail -f /var/log/auth.log' new showauth as 'cat -f /var/log/auth.log'

alias showauth='tail -f /var/log/auth.log'

Select the command that can be used to change the root filesystem to a different directory, such as when you are in a rescue environment. chroot change_root croot set_root

chroot

Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them? imperative configuration declarative configuration agentless agent-based

declarative configuration

Which command should you run after installing a new kernel module to update the module dependency database? modprobe insmod lsmod depmod

depmod

What piece of software tells the operating system how to use a specific hardware device? registry device driver bios device manager

device driver

Which of the following commands will display messages that were displayed during the boot sequence by the kernel? messages kernlog kdis dmesg

dmesg

Which of the following commands will display detailed information for network hardware? lshw --net ethtool hwdisp --network lsnet

ethtool

Which of the following commands can you use to list users who have been locked out by pam_faillock.so? faillock locklist pam_faillock pam_tally2

faillock

Which of the following commands should you use to specify that you want to use Git for version tracking on them? git add git version git new git track

git add

Which of the following commands should you use to specify that you want to use Git for version tracking on them? git track git new git version git add

git add

You run the command hostname server1 and issue the reboot command. You notice that the host name has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead? hostnamectl set-hostname server1 ifconfig server1 set hostname="server1" host server1

hostnamectl set-hostname server1

What file in the /proc directory contains a list of memory address ranges reserved for device use? misc iomem meminfo ioports

ioports

Which of the following commands can you use to view events within the journald database? journal --display journalctl viewlogs --journald journald --list

journalctl

Which of the following commands will list missing libraries as not found if a necessary library is not installed? ldconfig ldchk ldd ldso

ldd

Which of the following commands will create a symbolic link named foo.txt to an original file named bar.txt ln -h foo.txt bar.txt ln foo.txt bar.txt ln -s bar.txt foo.txt ln bar.txt foo.txt

ln bar.txt foo.txt

Nicholas wants to verify whether a file is a hard link to a file within the same directory. Which of the following commands could he use to see information that would be helpful to make this determination?

ls -i

Which of the following can be used to show the block devices on a Linux system? (Choose two.) lsblk ls /etc/block ls /sys/block cat /proc/block

ls /sys/block lsblk

Which of the following commands can be used to show the block devices, including their major and minor numbers, on a system which are located in the /sys/block directory? ls -al /sys/block lsblk lsblock cat /sys/block

lsblk

Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)? lsof pids pstatus psfiles

lsof

Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel? ping server1 ping -c 4 server1 ping -4 server1 ping -n 4 server1

ping -c 4 server1

Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly delivered to users requesting the same resource while at the same time reducing the burden on the external network connection to the Internet for an organization?

proxy server

Mike has changed directory into one subdirectory after the next and has lost track of where he's at in the directory tree. Which of the following commands can he use to tell him the full path to the current subdirectory he is in? cd - ls -dir pwd cwd

pwd

Which of the following commands will count down from 10 to 1? seq 10 -1 1 seq 10 1 seq 10 1 -1 seq 10 -1

seq 10 -1 1

Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password? su sudoer switchuser user

su

Which of the following options can be specified in the GRUB Legacy configuration file to set how long the boot menu is displayed before loading the default image? splash timeout wait timer

timeout

Emily accidentally created a new user account on the wrong server. Which of the following commands could she use to delete the account she created? (Choose all that apply.) usermod -r userdel usermod -d deluser

userdel deluser

The Linux kernel exists as a file named: vmlinux kernel.0 vmlinuz krn.linux

vmlinuz

Which of the following utilities will allow you to view information about virtual memory usage on a Linux system? vmstat vmmview vmctl vmpager

vmstat

Which of the following can be used at the command line to download a file using the HTTP protocol? (Choose two.) curl wwwretr GET wget

wget curl

Which of the following is a special group that provides its members with the ability to run the su and sudo commands? wheel sudoers sys adm

wheel

What metacharacter indicates background command execution? @ ! & ^

&

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character. ^ ? * +

*

Which of the following files contains the list of shared libraries? /etc/ld.so.cache /etc/ld.so.conf /lib/ld.so.conf /lib/shared.conf

/etc/ld.so.cache

What would be the result of running the command chown :root file1.txt This would keep the current ownership of the file, and add root as a second owner of the file. This would set the owner of file1.txt to root. This would set the owner and group ownership of file1 to root. This would set the group ownership of file1 to root.

This would set the group ownership of file1 to root.

Which of the following commands can be used to display the filesystem and partition UUIDs on a Linux system? e2label fatlabel showpart blkid

blkid

What command looks for a Makefile and uses the information within it to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? make configure make install install

make

Which of the following is the default window manager used by the GNOME version 3 desktop environment? mutter metacity wmaker kwin

mutter

Which of the following is a valid APIPA address? 127.0.0.1 10.11.12.13 169.254.38.101 192.168.1.17

169.254.38.101

Jackson wants to automatically mount a secondary internal hard drive when his Linux workstation boots up. In which of the following files should he configure an entry for the partition on the drive that he wants to mount?

/etc/fstab

The quotas for certain users can be edited by using which command? edquota repquota usrquota chquota

edquota

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? SIGQUIT SIGKILL SIGTERM SIGINT

SIGQUIT

Which of the following types of cloud platforms would a webmail service offered to the general public be considered? -IaaS -MaaS -PaaS -SaaS

SaaS (Software as a Service)

Which of the following is a protocol originally developed by Cisco that uses TCP to handle authentication, authorization, and accounting services? NTP RADIUS SSH TACACS+

TACACS+

After a shell is no longer needed, what command can be given to exit the shell? :qw :wq ctrl+c exit

exit

If the mkfs command is executed to create a filesystem and only the block device name is specified, which of the following filesystems will be created? ext3 ext4 ext2 exFAT

ext2

If a hard link is created to a file and then the original file is deleted, which of the following is true? The original file will be removed while the hard link remains, though the content will not be accessible. The original file will be removed while the hard link remains usable to access the contents of the file. An error message will be displayed preventing the deletion of the original file. Both the original file and the hard link are removed.

The original file will be removed while the hard link remains usable to access the contents of the file.

Which of the following commands can be used to recursively search a directory tree for files that meet a certain criterion without using a database or premade index of files? where mlocate find locate

find

What command can be used to check different kinds of filesystems on Linux for errors? fsck fs_check chkdsk errorchk

fsck

Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.) rmg groupdel rmgroup delgroup

groupdel delgroup

Which of the following commands can a user run to display the groups that they are a member of? groups --list groupmod --list groups groupls

groups

In Fedora 20, what journaling database system has replaced the logging system used to record the messages normally stored within the boot.log, messages, and syslog files? journald messaged systemd logd

journald

Which of the following log files contains information and error messages generated by the Linux kernel? kern.log dmesg secure wtmp

kern.log

Which of the following commands will show a list of process names along with their process ID (PID)? (Choose two.) jobs top ps proc

top ps

How many times will the following loop execute as part of a script: #!/bin/bash COUNTER=0 while [ $COUNTER -lt 7 ] do echo "hello world" done 7 1 until ctrl-c is used to terminate it 0

until ctrl-c is used to terminate it

Which of the following commands can be used to set the number of days until user account jsmith with an expired password is disabled? usermod -e 15 jsmith usermod -d 15 jsmith usermod -x 15 jsmith usermod -f 15 jsmith

usermod -f 15 jsmith

Which of the following is required as a separate partition in order to use LVM? /tmp /var /home /boot

/boot

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be: Keywords Arguments Metacharacters Options

Options

Which of the following can you use to start network daemons in order to limit which computers are allowed to connect to the network service? ufw TCP Wrapper iptables netfilter

TCP Wrapper

What would be the result of running the command chown :root file1.txt

This would set the group ownership of file1 to root.

What command is most effective at identifying different types of files?

stat

Which of the following commands can be used to schedule very frequent recurring tasks, such as running once every minute? run while watch do

watch

Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.) at -d at -q at -l atq

at -q at -l atq

Which of the following commands can be used to pause a printer named Printer1? cupsdisable Printer1 cupsreject -p Printer1 cupsreject Printer1 cupsdisable -c Printer1

cupsdisable Printer1

Which of the following are valid permissions for a directory where the command chmod 1777 has been used to set the permissions on it? trwxrwxrwx drwxrwxrw- Srwxrwxrwx drwxrwxrwt

drwxrwxrwt

Which of the following entries could be added to the rsyslog.conf configuration file to have all syslog messages displayed to console 10? all /dev/tty10 rsyslog tty10 *.* /dev/tty10 /var/log/* tty10

*.* /dev/tty10

When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in ___________ in the ~/.ssh/ directory.

known_hosts

Which of the following can be used to mount a filesystem?

- A filesystem label - A device path such as /dev/sdb2 - A filesystem UUID

The apropos list command produces the same results as which command below? man -k list man -l list man -j list man -m list

man -k list

What command is used to manage a software RAID configuration after installation? pgadm vgadm mdraid mdadm

mdadm

Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection? finger ethstat ping transit

ping

Clint has run the command parted /dev/sdb and wants to display a list of the existing partitions that exist on that drive. Which of the following commands can he use to display the existing partitions? display disp print list

print

Which of the following commands can be used to update the last modified timestamp on a file, or if the file specified does not exist will create the file?

touch file.txt

Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.) udevadm control --reload udevadm control -r udevadm control -R udevadm --reload

udevadm control --reload udevadm control -R

Elijah is done working with an external USB hard drive and wants to properly disconnect it. Which of the following commands should he use before unplugging the USB cable? mount --eject umount unmount disable

umount

A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs? /etc/cron.allow /etc/cron.d/cron.deny /etc/cron.deny /etc/cron.d/cron.allow

/etc/cron.deny

Which of the following does the -r option for the gpg command specify? Remote key server to query. Encrypt for the user id given. Retrieve keys for given key ID. Revoke keys from the key server.

Encrypt for the user id given.

Which of the following package managers are used to install RPM packages on the SUSE or openSUSE distributions by default? APT DNF Zypper DPM

Zypper

Which of the following types of encryption keys uses a pair of keys known as a public and a private key? -asymmetric -symmetric -message digest -SHA1 hashing

asymmetric

You have just created a variable named CREATOR. Which of the following commands will display the contents of the variable to standard output? echo $CREATOR print CREATOR echo CREATOR disp $CREATOR

echo $CREATOR

What argument can be used with the chmod command to add read permission and removewrite permission for a group on a file? u+r+w o+r-w g+r-w g-r+w

g+r-w

Which of the following commands will display a summarization of quotas for a filesystem?

repquota

Which of the following commands will delete a directory and all of the files contained within it? (Choose all that apply.) rm olddir rmdir olddir rmdir -rf olddir rm -rf olddir

rm -rf olddir

Which of the following commands can you use to search available repository information? (Choose two.) apt-cache apt query apt apt-query

apt apt-cache

Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system? apt-get update apt-get upgrade all apt-get upgrade apt-get update-all

apt-get upgrade

A system administrator wants to schedule a task to run at 11 pm, but knows that she will not be in the office at that time. Which of the following commands can she use to schedule this task to run that night while she is at home? atq run exec at

at

Which of the following commands will generate a GPG public/private key pair? gpg-generate gpg --new-key gpg --gen-key gpg-key --generate

gpg --gen-key

Which of the following is a virtual filesystem that is made up of virtual files that a Linux operating system is able to export information to about kernel sub-systems, hardware devices, and device drivers to make it easy for users to access the information? sysfs tmpfs procfs varfs

sysfs

Which of the following commands will prompt you to answer a series of questions to help determine which time zone file you should use? zones timezones zoneselect tzselect

tzselect

Which of the following states describe a process that is waiting for a parent process to release its PID? suspended wait dead zombie

zombie

The SUSE and openSUSE Linux distributions use an alternative to yum but that provides the same functionality. What is the name of the command they use? rpm zypper dnf apt

zypper

Which of the following commands can be used to display general hardware information for the entire system? lscpu hware hwdisp lshw

lshw

Jo has received a text file which contains multiple instances of his name spelled correctly as well as multiple instances spelled as Joe. Which of the following commands would search a text file for any occurrences of either spelling and display them out to the terminal? (Choose three.) grep -E "Joe?" document1.txt grep "Joe?" document1.txt grep "Joe*" document1.txt grep -E "Joe*" document1.txt

- grep "Joe*" document1.txt - grep -E "Joe*" document1.txt - grep -E "Joe?" document1.txt

Which of the following are true of the echo command? -When used to display text, quotation marks are optional. -It can be used to display shell variables by including a $ sign in front of the variable name. -All of the other options are true. -Including a semicolon at the end of the line will not affect the text being displayed.

-All of the other options are true.

What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package? -P -D -d -r

-P

In which of the following directories can you place files that will be copied to new user directories when new users are created? /etc/rc.d /usr/local/useradd /etc/skel /usr/local/template

/etc/skel

The mutt software is an example of what type of mail service software on Linux? -Mail Transport Agent -Mail Transfer Agent -Mail Delivery Agent -Mail User Agent

Mail User Agent (MUA)

A calendar for the current month can be shown on the command line by issuing which command? date w cal id

cal

Which of the following results would be created by the command sequence: echo 'apple banana carrot dog elephant' | while read a b c; do echo result: $c $b $a; done carrot dog elephant apple banana apple banana carrot dog elephant elephant dog carrot carrot dog elephant banana apple

carrot dog elephant banana apple

Which of the following will display the contents of the /etc/shadow file? (Choose all that apply.) cat /etc/shadow getent /etc/shadow show /etc/shadow read /etc/shadow

cat /etc/shadow getent /etc/shadow

Which of the following commands will display the current CPU(s) detected by a Linux system? cat /etc/cpu.conf cat /sys/cpuinfo cat /var/log/boothw.log cat /proc/cpuinfo

cat /proc/cpuinfo

Which of the following will look at the /etc/passwd file for any lines containing the word root and display them out to the screen while simultaneously writing the results to a file? cat /etc/passwd | grep root >> ~/root.txt cat /etc/passwd | grep root | merge ~/root.txt grep root /etc/passwd | split ~/root.txt grep root /etc/passwd | tee ~/root.txt

grep root /etc/passwd | tee ~/root.txt

What command can be used to view and modify the date and time within the BIOS? clkmod date hwclock clock

hwclock

Which of the following can be used to compare the hardware clock to the system clock, writing a new result to a new line every 10 seconds? systohc --compare compare --hw2sys hwtosys -c hwclock -c

hwclock -c

Mindy wants to create a new subdirectory at ~/2019projects/projectx/projectplans to start storing the initial project plans for projectx. However, this is the first project she has worked on in 2019 and the 2019projects directory does not exist yet. Which of the following commands will create the higher level directories if they do not already exist? mkdir -p ~/2019projects/project/projectplans mkdir -r ~/2019projects/project/projectplans mkdir --all ~/2019projects/project/projectplans mkdir -v ~/2019projects/project/projectplans

mkdir -p ~/2019projects/project/projectplans

Which of the following commands will generate a new initramfs? mkinitrd mkinit dracut cutram

mkinitrd dracut

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel? kmods modinfo mod_info modules

modules

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database? mail newaliases sendmail alias

newaliases

Callie wants to make sure that a filesystem is checked every 20 days. Which of the following options, when used with the tune2fs command, would set a full filesystem check to run every 14 days?

-i 14d

Which of the following is a valid SQL statement for adding a new row of data to a SQL database table? ALTER TABLE users SET firstname = 'George', lastname = 'Washington'; UPDATE users SET firstname = 'George', lastname = 'Washington'; INSERT INTO users (firstname, lastname) values ('George', 'Washington'); INSERT ('George', 'Washington') INTO users (firstname, lastname);

INSERT INTO users (firstname, lastname) values ('George', 'Washington');

In Linux, the core component of the GUI is known as:

X Windows

Dustin runs a command at the command line trying to find out what kernel version the system is running. However, it doesn't give him the information he needs. He knows there is an option that can be used to display the kernel version. How can he find out which option to use? ver --help man uname lsproc -? help version

man uname

Select the utility below that will start and perform a thorough check of RAM for hardware errors when run. memtest86 memcheck68 fixram fsck

memtest86

Which of the following files holds the configuration information for GRUB Legacy on Ubuntu Linux systems? grub.conf menu.conf menu.lst grub.lst

menu.lst

Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.) netstat -u netstat udp netstat --udp netstat -t udp

netstat -u netstat --udp

Which of the following commands will display the output of a file while also displaying a line number at the left side of each line for the /etc/passwd file? numbers /etc/passwd ln /etc/passwd nl /etc/passwd wc -l /etc/passwd

nl /etc/passwd

Which of the following utilities can be used by a system administrator to determine which services are responding to network requests? nmap portscan netscan pmap

nmap

On a system running NetworkManager, which of the following commands can be used to view or modify connection information? netctonf nm nmcli netman

nmcli

Which of the following virsh commands will display the total amount of memory as well as the amount of free memory for a node? showmem nodesh nodememstats nodemem

nodememstats

What command can be issued to confirm which directory you are in at a command line prompt? ld pwd dir whereami

pwd

Which of the following commands will send the output of the cat command to the grep command to be filtered? cat /etc/passwd | grep jsmith cat /etc/passwd > grep jsmith cat /etc/passwd >> grep jsmith cat /etc/passwd @ grep jsmith

cat /etc/passwd | grep jsmith

The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up? int eth0 up ifup eth0 interface eth0 --status up netctl eth0 up

ifup eth0

Which of the following can you use to configure firewall rules for IPv6 on a Linux system? netfilter -6 ip6tables fw6 fw --ipv6

ip6tables

Which of the following commands will display the print jobs in the print queue for printer1 only? lpq -d printer1 lp -j printer1 lpq -p printer1 lpstat -o printer1

lpstat -o printer1

Chase is trying to extract records for employees 423 through 428 out of a comma separated values file and store them in another one. Which of the following commands would accomplish this? (Choose all that apply.) -grep "42[3-8]" < employees.csv > employees-newhires.csv -cat employees.csv | grep "42[3-8]" > employees-newhires.csv -cat employees.csv | grep 423,424,425,426,427,428 > employees.csv -grep "42[3-8]" employees.csv > employees-newhires.csv

-grep "42[3-8]" employees.csv > employees-newhires.csv -cat employees.csv | grep "42[3-8]" > employees-newhires.csv -grep "42[3-8]" < employees.csv > employees-newhires.csv

When using the vi text editor, which of the following keys, when in command mode, will move to the last line in the document? W P G L

G

Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables? LEFT JOIN RIGHT JOIN INNER JOIN FULL OUTER JOIN

INNER JOIN

When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration? Users must use at least 3 characters as numbers in their passwords. Users cannot re-use their last 3 passwords. There must be at least 3 characters that are different from their previous password. The minimum password length has to be at least 3 characters long.

Users must use at least 3 characters as numbers in their passwords.

Which of the following commands can be used to back up files in case of system failure, supports long filenames, and can also back up device files? cpio diskdup bkup sysbackup

cpio

Kate wants to compare two text files to identify what might have been changed from one version to another. Which of the following commands can she use to do this? diff document1.txt document2.txt match document1.txt document2.txt version --compare document1.txt document2.txt compare document1.txt document2.txt

diff document1.txt document2.txt

Which of the following commands will list the BIOS information about a device when it cannot otherwise be detected by a Linux system? biosinfo lsuefi hwls dmidecode

dmidecode

Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed? dpackage.log packages.log dpm.log dpkg.log

dpkg.log

Which of the following commands will prompt to convert an MBR partition to GPT, thus destroying all existing MBR partitions on a disk?

gdisk

Which of the following will display entries from the Name Service Switch libraries? nss getent dispdet nsslist

getent

An alias has previously been created named showauth. Which of the following commands can be used to get rid of that alias? alias -d showauth unalias showauth noalias showauth ualias shoauth

unalias showauth

Using the syntax below, what command will create directories named one, two, and three? ​ echo one two three | ___________ mkdir

xargs

Archie wants to optimize an XFS filesystem and minimize the chance of future corruption. Which of the following commands will compact or otherwise improve the layout of the contiguous blocks of file data for an XFS filesystem? defrag xfs_db fsck xfs_fsr

xfs_fsr

Which of the following characters can be entered at the beginning of a line in a shell script to ensure that line is recognized as a comment rather than try to execute it? % > $ #

#

What option can be used with the ps command to display an entire list of processes across all Terminals, including daemons? -l -a -e -f

-e

The System Log Daemon, rsyslogd, creates a socket for other system processes to write to. What is the path to this socket? /dev/log /var/log.sock /etc/rsyslog.socket /tmp/log

/dev/log

Which of the following would be the device file for the third partition on the second SATA drive on a Linux system? /dev/hdc2 /dev/sdb3 /dev/sdc2 /dev/hdb3

/dev/sdb3

On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination? /etc/init.conf /etc/cmd.conf /etc/inittab /etc/keys.conf

/etc/inittab

What file in the /proc directory contains information about a computer's CPU? /proc/meminfo /proc/cpu_info /proc/cpuinfo /proc/proc_info

/proc/cpuinfo

Where are scheduled commands stored on Ubuntu Linux systems? /etc/at/ /tmp/at /var/spool/cron/atjobs /var/spool/at

/var/spool/cron/atjobs

In order to move from the /home/joe/test/data to the /home/joe directory, what command should be issued?

cd ../..

Which of the following commands can be used to only show jobs that have been paused. jobs -p jobs -n jobs -s jobs -r

jobs -s

Which of the following commands can you use to view events within the journald database? journald --list viewlogs --journald journalctl journal --display

journalctl

Which of the following commands can be used to display the current locale of a system? (Choose two.) locale localectl localed syslocale

locale localectl

Jamie has created a hard link to another file within the same directory. Which of the following commands can he use to verify that the hard link was created correctly? (Choose all that apply.) ls -l ls -al ls -il ls -i

ls -il ls -i

Which of the following commands can be used to display any email messages awaiting delivery alongside the reason that they were not delivered? mail --queue mailq mailqueue mail -q

mailq

Which of the following permissions should a standard user have on the /etc/shadow file? read, write, and execute none of the above read and write read

none of the above

What PostgreSQL command-line utility backs up PostgreSQL database settings? pg_backup pg_dumpall pg_restore pg_dump

pg_dump

Which of the following can be included in a shell script to ask the user to type in a password and then store it in the variable named $password? read -p "Please enter the password: " $password read -p -s "Please enter the password: " password read -s -p "Please enter the password: " $password read -s -p "Please enter the password: " password

read -s -p "Please enter the password: " password

Which of the following commands will set the default runlevel of a Linux system? systemctl --set-default runlevel5.target systemctl set-default runlevel5.target systemctl --default runlevel5.target systemctl set-init runlevel5.target

systemctl set-default runlevel5.target

Which of the following two commands can be used to add custom log file entries to the journald database? (Choose two.) systemd-make mklog systemd-cat logger logentry

systemd-cat logger

Which of the following commands will return one result of where the grep binary executable is located? (Choose two.) find grep type grep locate grep which grep

which.grep type.grep

Which of the following options will change the ownership of files and directories recursively within a directory? (Choose all that apply.) -R -r --follow --recursive

-R --recursive

Which of the following files contains the list of shared libraries? /etc/ld.so.cache /etc/ld.so.conf /lib/shared.conf /lib/ld.so.conf

/etc/ld.so.cache

Which of the following directories is created by default when an ext2, ext3, or ext4 filesystem is created on a device that is used by the fsck utility?

/lost+found/

Which of the following can be used to synchronize the time between a number of Linux servers and workstations on a network with a time clock source on the Internet? -SMTP -SFTP -NTP -IMAP

NTP

Proxy servers keep track of the information passed to each client by maintaining what type of table? Firewall Network Address Translation (NAT) Routing Caching

Network Address Translation (NAT)

Which of the following will show account aging information for a user such as the date of the last password change, when the password expires, and the number of days of warning before the password expires? usermod --expiry jsmith chage -l jsmith chage -u jsmith lsuser jsmith

chage -l jsmith

In order to set all of the special permissions on a certain file or directory, which command should be used on a file named filename? chmod 7777 filename chmod 777 filename chmod 0000 filename chmod 6666 filename

chmod 7777 filename

The United States Air Force was able to install Linux on a popular gaming console and then connect over 1,700 of these systems together to work as one big supercomputer. Which of the following types of technologies did they implement? -group computing -herding -clustering *cloud computing

clustering

Which of the following commands when run from the /, or root, directory will return a very long list of many pages of results? ls -al fdisk --list du df

du

Which of the following commands will display all files and directories within the /var/log directory or its subdirectories which are owned by the root user?

find /var/log -user root

What command can be used to display the last five lines of a text file? tail -5 end -5 head -5 stop -5

tail -5

If incompatible X Windows settings are configured, where will the errors that are generated be written to? ~/.xsession-errors ~/.xerror ~/.xwin-error /var/log/xwindows.error

~/.xsession-errors

Which of the following is the highest value that can be set for the nice value which would result in a greater chance of a lower priority? 19 10 0 20

19

Which of the following is the default desktop environment used by Linux Mint? GNOME KDE Unity Cinnamon

Cinnamon


Conjuntos de estudio relacionados

Article V - Amending the Constitution Quizlet

View Set

25B Networking Essentials Practice Exam

View Set

Lesson 1: Microsoft Excel Basics ☺

View Set

Language Files Chapter 12 Language Contact

View Set

"At-Will" Default Rule and its Limits

View Set

Chapter 14 Muscoskeletal imagining, breast, and superficial structures.

View Set