Linux +
In NTP, stratum ____ consists of atomic devices or GPS clocks.
0
The IP addresses___and___ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.
0.0.0.0; 255.255.255.255.
To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command. 1) -t 2) -f 3) -c 4) -o
1) -t
It is good form to check the installation log files after installation as well as verify settings on the system after installation to ensure that all hardware was detected with the correct values. 1) True 2) False
1) True
To check whether the /mnt/floppy directory is being used by any users, you can use the fuser command with the -u option 1) True 2) False
1) True
To perform a Linux installation over a network, you can connect to a server with the appropriate installation files via FTP. 1) True 2) False
1) True
To view the size of a directory and its contents in Kilobytes, you can use the du command. 1) True 2) False
1) True
You can use a small bootable Linux kernel to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers. 1) True 2) False
1) True
Should most files residing in a user's home directory be owned by that user? 1) Yes 2) No
1) Yes
You can edit the quotas for certain users by using the ____ command. 1) edquota 2) editquota 3) quota 4) repquota
1) edquota
Some installation fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders.
1024
The shell restricts the number of file handles that programs can open to ____ by default.
1024
The BIOS configurations on different computers are generally very similar or exactly the same. 1) True 2) False
2) False
____ installation log file(s) is/are created by the Fedora installation program. 1) One 2) Two 3) Three 4) Four
2) Two
The subnet mask for a Class B IP address is ____.
255.255.0.0
The subnet mask for a Class C IP address is ____.
255.255.255.0
In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader. 1) /load 2) /bin 3) /boot 4) /mnt
3) /boot
Devices that transfer data in a character-by-character fashion are referred to as ____ devices. 1) text 2) block 3) character 4) binary
3) character
In the FHS, the ____ directory is the root user's home directory. 1) /bin 2) /home 3) /boot 4) /root
4) /root
If a Linux installation ends abnormally and the screen displays a "fatal signal ____" error message, it indicates an error known as a segmentation fault. 1) 0 2) 1 3) 10 4) 11
4) 11
The compression algorithm used by the compass utility has an average compression ratio of _____%
40-50
By default, all print jobs have a priority of____.
50
If no level of compression is specified, the gzip command assumes the number____.
6
The average compression ratio for gzip is ______%
60-70
Each octet in an IP address represents a(n)_____ binary number.
8-bit
IPv6 IP addresses are delimited by the ____ character.
:
The _____ priority used by the system log daemon indicates an error that should be rectified immediately, such as a corrupt system database.
Alert
On a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.
Cancel
____________________ is used to reduce the size of a file or set of files.
Compression
____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet.
DNS
The ____ SQL statement is used to delete a database.
DROP DATABASE
The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.
DirectoryIndex index.html
A LILO version available for Intel Pentium and Itanium computers that use Extensible Firmware Interface (EFI).
ELILO
Most printers are plug and play compatible and must be manually configured when they are plugged into the system.
False
When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.
False
When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.
False
Most common boot loader on modern Linux systems.
Grand unified bootloader
When working with Sendmail, you can use the ____ command to test SMTP support.
HELO
To send a print job to a printer, you nust first use the ___ command and specify what to print.
Ip
You can restrict who can print to certain by using the ____ command.
Ipadmin
The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.
Kern
The first readable sector of a hard disk, where partition definitions are stored
MBR
The first readable sector of a hard disk, where partition definitions are stored.
MBR
Shares password databases among Linux systems
Network Information Service (NIS)
What are specific letters that start with a dash (-)?
Options
Client computers can retrieve e-mail from e-mail servers via ____ or ____.
POP; FTP
Most linux distributions today use____ as their package manager.
RPM
When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.
SIGHUP
The ___ log file contains information and error messages regarding netork access generated by daemons such as sshd and xinetd.
Secure
Hard disk quotas that the user can exceed for a certain period of time.
Soft limits
_____ of the GRUB boot loader typically resided on the Master boot record
Stage 1
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
Subnetting
Apache daemon listens for HTTP requests on port ____.
TCP 80
A(n) ____ is a program that can start a network daemon.
TCP wrapper
The most command LAN protocol used today is____.
TCP/IP
The /etc/resolv.conf file can contain up to ____ DNS servers.
Three(3)
A route table is a list of TCP/IP networks that is stored in system memory.
True
All DNS servers contain a DNS cache file
True
Class D addresses are used for multicasting.
True
Passwords used by the PPP daemon are stored in two files:/etc/ppp/pap-secrets and /etc/ppp/chap-secrets.
True
The compress utility preserves the original ownership, modification, and access time for each file that it compresses.
True
The tar utility cannot back up device files or files with filenames longer than 255 characters
True
The use of NFS is less common than the use of FTP to transfer files on public networks.
True
The very secure FTP Daemin is a stand-alone Daemon.
True
NTP uses port ____.
UDP 123
Modifies the look and feel of X Windows
Window manager
Programs that tell X Windows how to draw teh graphics and display the reult
X Client
___ is a freely available version of X Windows used in many Linux Distributions.
XFree86
Partition to which the MBR points
active partition
Specify a commands' working parameters
arguments
In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.
authentication
Program started by the BIOS that loads the Linux kernel into memory from a hard disk partition inside the computer
boot loader
Some peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ____________________.
bus mastering
To view the contents of a file that was compressed with the bzip2 utility, you must use the ____________________ command.
bzcat
Devices that transfer data in a character-by-character fashion are referred to as______devices.
character
Command used to change the ownership of a file or directory.
chown
A system process tha performs useful tasks, such as printing, scheduling, and operating system maintenance
daemon
The IP address of the network interface on the router to which you send packets is called the ____________________.
default gateway
The easiest method for monitoring free space by mounted filesystems is to use the _____ command
df
Shell variables that are typically set by the system and contain information that the system and programs access regularly
environment variables
Labels representing command input and output
file descriptors
Creating a filesystem on a device is commonly referred to as ____________________.
formatting
To create an encrypted password for use in the /boot/grub/grub.conf, you can use the ____ command
grub-md5-crypt
Rigid quota limits that the user cannot exceed
hard limits
Rigid quota limits that the user cannot exceed.
hard limits
IPv6 IP addresses are written using eight 16-bit ____ numbers.
hexadecimal
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.
ifconfig
In the /etc/lilo.conf file, the ____ keyword specifies the absolute pathname to the Linux kernel.
image=
A(n) ____________________ backup backs up only the data that has been changed since the last backup.
incremental
Another name for runlevels
initstates
In the /etc/lilo.conf file, the ____ keyword specifies the file that contains the physical layout of the disk drive.
install=
To see a list of all printers on the system and their status, you can use the -t option to the _____ command.
ipstat
The two most common dsktop environments that are used on Linux are ____and____.
kde and gnome
The first DNS server in a zone is called the ____________________ DNS server.
master or primary
The ______ window manager is used for the GNOME desktop in Red Hat Fedora Core 2
metacity
Two or more computers that are connected with media that can exchange information are called a(n) ____________________.
network
When working with Sendmail, if you modify the /etc/aliases file, you need to run the ____ command to rebuild the aliases database
newaliases
You can perform up to____ different incremental backups using the dump/restore utility.
nine
To see what network services are running on your network, you can run the ____ command.
nmap
Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.
nohup
Command used to test network connectivity
ping
Command used to test network connectivity.
ping
The ____ command sends a small TCP/IP packet to another IP address and awaits a response.
ping
Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.
public ; private
To Convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.
pwconv
Databases store information in the form of ____, each of which contains ____.
records; tables
The _____ filesystem contains most of the operating system files.
root
Packages in the Red Hat Package Manager format have filenames that indicate the hardware architecture for which the software was compiled, and end with the ____________________ extension.
rpm
You can use the ____ command to start, stop, or restart any daemons listed within the /etc/rc.d/init.d directory.
service
Files that are typically used to create custom programs that perform administrative tasks on Linux systems.
shell scrpits
A file that allows a process on another computer to write to a file on the local computer while another process reads from that file
socket file
Any error messages generated by a command
stderr
By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.
ten
A common utility used to troubleshoot routing is the ____ command.
traceroute
Command used to create modify filesystem parameters.
tune2fs
You can create user accounts on the Linux system by using the ____.
useradd
After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility withing the desktop environment.
xvidtune
The____ command can be used to display the contents of a compressed file.
zcat
You can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command
$
The ____ option for the sar command is used to display swap statistics.
-B
The______ option, when used with the Gzip Command, causes the compression ratio for files that have been compressed to be listed.
-I
To lock an account, you can use the usermod command with the____ option.
-L
The ____ option to the iptables command can be used to specify the default policy for a certain chain type.
-P
To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.
-V
When used with the uncompress command, the ___ option displays the contents of the compressed file to Standard Output.
-c
The ____ option to the iptables command can be used to specify the destination address of packets for a rule.
-d
The ip command uses the ___ option to specify the destination printer name.
-d
To remove a package from the system, you can use the ___ option to the rpm command.
-e
When used with the uncompressed command, the _____ option can be used to compress symbolic links.
-f
When using the cpio utility, the ___ option causes a new archive to be created.
-o
The ___ option to the ipstat command causes a list of printers that are enabled to be displayed.
-p
When used with the tar utility, the ___ option causes filenames to be stored in an archive using absolute pathnames.
-p
The ____ option for the sar command is used to displays statistics for the processor queue.
-q
You can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents.
-r
To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.
-t
The _____ option can be used with the tar command to extract a specified archive.
-x
When using the compress utility, each file is renamed with a(n)_____ filename extension to indicate that is compressed.
.Z
The Filename extension given to files compressed with bzip2 is ____.
.bz2
In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader
/boot
The Linux kernel is stored in the _____ directory.
/boot
Directory that stores device files.
/dev
Directory that stores devices files
/dev
The _____ environment fiel is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.
/etc/profile
After the entries in /etc/inittab have been executed, the ____ file is executed to perform tasks that must occur after system startup.
/etc/rc.d/rc.local
If your system uses the X.org implementation of X Windows, the mouse, keyboard, monitor, and video adapter card information is stored in the ____ file in text format
/etc/x11/xorg.conf
In FHS, the ____ directory is the root user's home directory
/root
File that contains a lists of packages that were installed as well as a list of those that were not installed
/root/install.log
File that lists all of the system events that occurred during the installation, such as the creation of user and group accounts
/root/install.log.syslog
The ____ zone configuration file contains a PTR record used to identify the loopback adapter.
/var/named/named.local
A Linux system in runlevel ___ is a system that has no daemons active in memory and is ready to be powered off
0
The ____ ftp utility command runs a shell on the local computer.
!