Linux Ch 7-12 Mega Set

¡Supera tus tareas y exámenes ahora con Quizwiz!

There are several encryption services. State the two most popular authentication protocols.

CHAP (Challenge Handshake Authentication Protocol) Kerberos

Today, the most common printing system used on Linux computers is the _____.

CUPS

_____ is a general-purpose encryption similar to 3DES and is commonly available using a 128-bit key length.

Carlisle Adams Stafford Tavares (CAST)

_____ is a process in which files are reduced in size by stripping out characters.

Compression

The _____ is the most common package manager used by Debian-based Linux systems today. Ubuntu Linux uses this Package Manager.

Debian Package Manager (DPM)

_______ are the most common type of construct used in shell scripts. They alter the flow of a program based on whether a command completed successfully or based on user input to a question.

Decision Constructs

Windows Server has two options to make user account inactive. State and briefly explain them.

Disable it - temporarily turning account off; retains all assigned rights and may be restored Delete it - removes account completely

Which of the following statements is true?

Either the MBR/GPT or the active partition can contain the boot loader?

_____ are character sequences that have special meaning inside the echo command and are prefixed by \ character. The echo -e command must be used for this sequence.

Escape Sequences

1. Because Standard Error and Standard Output represent the results of a command and Standard Input represents the input required for a command, only Standard Error and Standard Output can be redirected to/from a file. True or False?

False

10. The Debian Package Manager (DPM) is the default package manager used by Fedora 13. True or False?

False

13. To install a new program from RPM software repositories on the Internet, you can use the yum update programname command. True or False?

False

5. The bzip2 and gzip utilities use similar compression algorithms. True or False?

False

9. UIDs and GIDs are unique to the system and once used can never be reused. True or False?

False

The _____ utility uses a Lempel-Ziv compression algorithm (LZ77) that varies slightly from the one used by the compress utility. Typically, this algorithm yields better compression than the one used by compress. The average compression ratio for gzip is 60 to 70%.

GNU zip (gzip)

Which of the following statements is true?

GRUB need not be reinstalled after it has been modified

tr l L </etc/hosts

It does not modify the /etc/hosts file. It merely translates all of the "l"'s to "L"'s and displays the output on the screen.

tr l L </etc/hosts >newhosts

It does the same thing as the previous command which is translates all of the "l"'s to "L"'s. However, it does not display the output on the screen but rather saves the output to a file named newhosts.

The _____ is the printing system used on older Linux systems.

Line Printer Daemon (LPD)

_____ an account makes an account temporarily unusable and alters the password information in the /etc/shadow file.

Locking

_____ execute commands repetitively. They alter the flow of a program based on the results of a particular statement. They repeat parts of the program until it reaches the desired result. They can be used to process a list of objects, such as files, directories, users, printers and so on. The for construct is an example.

Loop Constructs

The _____ command created a variable that is available to the current shell. The_____ command displays the value of the variable.

MYVAR, echo

export MYVAR2="This is another sample variable." set | grep MYVAR2

MYVAR2='This is another sample variable.' _=MYVAR2

env | grep MYVAR2

MYVAR2=This is another sample variable.

set | grep MYVAR

MYVAR='This is a sample variable.'

export MYVAR env | grep MYVAR

MYVAR=This is a sample variable.

env | grep MYVAR

Nothing is displayed.

The _____ provides a standard format for distributing programs as well as a central database to store information about software packages installed on the system. It is used to install, query and remove packages.

Package Manager

Passwords can be set at many levels. State them.

Passwords on the PC can be BIOS setup passwords, operating system passwords, and passwords on files, folders and applications.

A set of information that is sent to a printer at the same time is called a _____.

Print Job

VNC uses a special platform-independent protocol called _____ to transfer graphics, mouse movements and keystrokes across the network.

Remote FrameBuffer (RFB)

_____ are a set of commands that can be used to execute commands on remote systems, obtains remote shells and copy files between systems.

Remote commands (r commands)

_____ was designed to encrypt information passing between computers across a network. It offers a secure replacement for the r commands.

Secure Shell (SSH)

runtime configuration (rc) scripts

Shell scripts that are used by the init daemon to initialize the system at boot time as well as start and stop daemons when entering a particular runlevel

virtualization software

Software that can be used to run multiple OSs simultaneously on the same computer

_____ must be compiled on the local architecture before it can be used.

Source Code

_____ is a file descriptor that refers to the information processed by the command during execution, and is often takes the form of user input typed on the keyboard.

Standard Input (stdin)

_____ is a file descriptor that refers to the normal output of a command.

Standard Output (stdout)

Three file descriptors are available to each command that can be manipulated by the BASH shell. Name them.

Standard input (stdin) Standard output (stdout) Standard error (stderr)

Every file descriptor is represented by a number. State the file descriptors and their represented numbers.

Stdin is represented by the number 0. Stdout is represented by the number 1. Stderr is represented by the number 2.

The _____ is used to test a condition. It generates a true value if they perform their function properly. The condition is inside of square brackets ([ ... ]) and there must have spaces after "[" and before "]".

Test Statement

/boot/grub/grub.conf

The GRUB configuration file

/etc/lilo.conf

The LILO configuration file

vmlinuz-<kernal version>

The Linux kernel file

parent process ID (PPID)

The PID of the parent process that created the current process.

forking

The act of creating a new BASH shell child process from a parent BASH shell process.

time slice

The amount of time a process is given on a CPU in a multiprocessing operating system.

killall command

The command that kills all instances of a process by command name.

renice command

The command used to alter the nice value of a process currently running on the system.

nice command

The command used to change the priority of a process as it is started.

top command

The command used to give real-time information about the most active processes on the system; it can also be used to renice or kill processes.

kill command

The command used to kill or terminate a process.

ps command

The command used to obtain information about processes currently running on the system.

foreground (fg) command

The command used to run a background process in the foreground.

background (bg) command

The command used to run a foreground process in the background.

at command

The command used to schedule commands and tasks to run at a preset time in the future.

jobs command

The command used to see the list of background processes running in the current shell.

crontab command

The command used to view and edit user cron tables.

X client

The component of X windows that requests graphics to be drawn from the X server and displays them on the screen by X Windows

X Windows

The component of the Linux GUI that displays graphics to Windows on the terminal screen.

X server

The components of X Windows that draws graphics to windows on the terminal screen

/etc/inittab

The configuration file for the init daemon that specifies the default runlevel

/etc/X11/xorg.conf

The configuration file used by the X.org implementation of X windows

/etc/X11/XF86Config

The configuration file used by the XFree86 implementation of X Windows

process state

The current state of the process on the processor; most processes are in the sleeping or running state.

GNU Object Model Environment (GNOME)

The default desktop environment in Fedora Linux; it was created in 1997;

/etc/crontab

The default system cron table.

Megacity Window Manager

The default window manager for the GNOME Desktop Environment in Fedora 13

/etc/rc.d/rc*.d

The directories used to start and kill daemons in each runlevel

/etc/rc.d/init.d

The directory in which most daemons', startup/shutdown scripts are located

The following is a pretty sample shell script called "myscript":

#!/bin/bash echo "Today's date is:" date echo "" echo "The people logged on to your system include:" who echo "" echo The contents of the / directory are:" ls -F /

The following is a more fancy shell script called "myscript":

#!/bin/bash echo -e "Today's date is: \c" date echo -e "\nThe people logged on to your system include:" who echo -e "\nThe contents of the / directory are:" ls -F /

Here is another shell script called "newscript":

#!/bin/bash echo -e "What is your name? -->\c" read USERNAME echo "Hello $USERNAME"

A sample shell script called "myscript":

#!/bin/bash #this is a comment date who ls -F /

Another example of a shell script with an if construct called "ifthenscript2":

#!/bin/bash echo -e "Today's date is: \c" date echo -e "\nThe people logged on to your system include:" who echo -e "Would you like to see the consents of /?(y/n) -->\c" read ANSWER if [ $ANSWER = "y" -o $ANSWER = "Y" ] then echo -e "\nThe contents of the / directory are:" ls -F / fi

An example of a shell script with an if construct called "ifthenscript":

#!/bin/bash echo -e "Today's date is: \c" date echo -e "\nThe people logged on to your system include:" who echo -e "Would you like to see the contents is /?(y/n) -->\c"read ANSWER if [ANSWER = "y" ] then echo -e "\nThe contents of the / directory are:" ls -F / fi

The command on the right of the _____ construct is executed only if the command on the left of the construct completes successfully.

&&

Which of the following indicates the second partition on the third hard disk drive to GRUB?

(hd2,1)

State some special comparison operators for the if construct.

-o (OR) -a (AND) ! (NOT)

After installation, the RPM database is updated to contain information about the installed package and files contained in it. List some useful options to use with the rpm command.

-q option: query the full package name -i option: together with -q used to display full package information -f option: together with -q used to display the package to which a specific file belongs -e option: used to remove a package from the system

During execution, this program sets var_name to a string name, and executes the commands between do and done for that string. It repeats for all of the items in the string.

...

From now on, type dw.

...

From now on, type mf.

...

In addition, the __________________________ command can be used to download and install DPM packages from software repositories on the Internet and is analogous to the yum command for the RPM.

...

Most RPM packages are located on Internet servers called __________________________.

...

The DPM is similar to the RPM. However, it uses the __________________________ extension for its packages.

...

The Red Hat Package Manager is the most common package manager used by Fedora Core Linux systems today.

...

The __________________________ command can be used to install DPM packages that have been downloaded locally.

...

The __________________________ command extracts the archives created with dump.

...

The __________________________ filter command searches for patterns of text and perform some action on the text found. This command treats each line of text as a record in a database and each word in a line as a database field.

...

The filename extension given to a compressed file using bzip2 is __________________________.

...

The gzip utility uses the __________________________ filename extension by default and can control the level of compression via a numeric option (based on time needed to compress the file).

...

The packages in RPM format have filenames that indicate the hardware architecture for which the software was compiled and end with the __________________________ extension.

...

The yum (Yellowdog Update Modular) command is used to search Internet software repositories for RPM packages. It downloads and installs the dependent packages if necessary.

...

_________________________ are processes that run on your computer and provide some type of valuable service for client computers on the network. They are often represented by a series of daemon processes that listen for certain requests on the network. Daemons identify the packets to which they should respond using a port number that uniquely identifies each service.

...

_________________________ is forwarding packets from one interface to another and is also known as routing.

...

alias dw="date;who"

...

alias mf="mount -t ext2 /dev0/fd0 /media/floppy"

...

In what directory is the Linux kernal stored?

/boot

The _____ file contains information regarding the default primary group, the location of home directories, the default number of days to disable accounts with expired passwords, the date to disable user accounts, the shell used and skeleton directory used.

/etc/default/useradd

The _____ file lists all of the groups and their members. It allows the users to belong to multiple groups.

/etc/group

Which file does init reference on startup to determine the default runlevel?

/etc/inittab

The _____ file contains parameters that set the default location for: e-mail, password expiration information, minimum password length and the range of UIDs and GIDs available for use. It also determines whether home directories will be automatically made during user creation as well as the password hash algorithm used to store passwords within /etc/shadow.

/etc/login.defs

Most new user information such as UID, shell, and home directory locations, are taken from two files that contain user account creation default values. These two files are _____

/etc/login.defs & /etc/default/useradd.

The _____ file is used by the logrotate utility. It specifies the rotation parameters for log files and whether the log files are compressed after rotation.

/etc/logrotate.conf

The ____ file contains the user account information.

/etc/passwd

The_____ file is always executed immediately after login for all users on the system and sets most environment variables, such as HOME and PATH.

/etc/profile

Which runtime configuration file is executed last during system initialization?

/etc/rc.d/rc.local

What is the name of the directory that contains the configuration information for runlevel 2?

/etc/rc.d/rc2.d

The _____ file contains the encrypted password and expiration information.

/etc/shadow

Log files are typically stored in the _____ directory.

/var/log

Whic runlevel halts the system?

0

How many active partitions are allowed per hard disk drive?

1

Which value can be configured to influence the priority of a process? 1) NI 2) influence value 3) var value 4) pri value

1) NI

State the common rules governing the if construct.

The elif (else if) and else statements are optional. There are an unlimited number of elif statements. The do these commands section may consist of multiple commands, one per line. The do these commands section is typically indented for readability. The end of statement must be a backward "if" (fi). The this is true part of the if syntax can be a command or a test statement.

/etc/rc.d/rc.local

The final scripts executed during system startup

Initialize (init) daemon

The first process started by the Linux kernel; it is responsible for starting and stopping other daemons

/etc/rc.d/rc.sysinit

The first script executed during the system startup

upstart init system

The next generation init daemon and related files used by modern Linux distributions such as Fedora 13

GRUB root partition

The partition containing the second stage of the GRUB boot loader and the /boot/grub/grub.conf file

active partition

The partition searched for by an OS after the MBR

trapping

The process of ignoring a kill signal.

default runlevel

The run level that is entered when the Linux system is initialized at boot time

desktop environment

The software that works with a window manager to provide a standard GUI environment that uses standard programs and development tools

Qt toolkit

The software toolkit used with the K Desktop Environment

at daemon (atd)

The system daemon that executes tasks at a future time; it is configured with the at command.

cron daemon (crond)

The system daemon that executes tasks repetitively in the future and that is configured using cron tables.

kill signal

The type of signal sent to a process by the kill command; different kill signals affect processes in different ways.

nice value

The value that indirectly represents the priority of a process; the higher the value, the lower the priority.

K Window Manager (kwin)

The window manager that works under the KDE Desktop Enviroment

The features of variable identifiers are the following:

They can contain alphanumeric characters (0 - 9, A - Z, a - z), the dash (-) character, or the underscore (_) character. They must not start with a number. They are typically capitalized to follow convention.

set

This command displays a list of the environment variables that are set by the BASH shell.

cat prologue | awk '/the/ {print $1, $4}'

This command displays the first and fourth words only on lines of the prologue file that contains the word "the".

tail /etc/passwd | awk -F: '/user1/ {print $6, $7}'

This command displays the sixth and seventh words for lines that contain the word "user1" in the last 10 lines of the file.

echo $PS1

This command displays the value of the PS1 variable. [\u@h \W\$ \u - user \h - host name \W - name of the current directory

mount | grep /dev/sda

This command executes the mount command and displays only those lines in the output dealing with the /dev/sda directory.

cat prologue | sed s/the/THE/g

This command searches each line of the prologue file for the word "the" and replaces it with the word "THE". It now replaces all of the strings "the" it finds globally in the whole document.

cat prologue | sed s/the/THE/

This command searches each line of the prologue file for the word "the" and replaces it with the word "THE". It only replaces the first "the" it finds in each line.

cat prologue | sed /love/s/the/THE/g

This command searches each line of the prologue file that contains the string "love" and replaces all of the strings "the" with the string "THE".

cat prologue | sed 5,8s/the/THE/g

This command searches lines 5 through 8 of the prologue file for the string "the" and replaces them with the string "THE" globally.

cat prologue | sed /the/d

This command searches through the prologue file and deletes all of the lines that contain the string "the".

ls -l /etc | less

This command sends the output of the ls command to the input of the less command.

tr a A <prologue | sort | nl > newprologue

This command takes the prologue file and translates the "a"'s to "A"'s and then sorts the lines in alphabetical order and numbers them. The output is saved as a file called newprologue.

cat prologue | tr a A | sort | pr -d | less

This command takes the prologue file and translates the "a"'s to "A"'s and then sorts the lines in alphabetical order. In addition, it displays the file on the terminal double spaced and allows the user to view the results page-by-page.

cat prologue | tr a A | sort | pr -d | tee newfile | less

This command takes the prologue file and translates the "a"'s to "A"'s and then sorts the lines in alphabetical order. In addition, it displays the file on the terminal double spaced and allows the user to view the results page-by-page. In addition, it uses the tee command to save a copy of the output as a file called newfile.

A command may be in the form of the following: ls /etc/hosts /etc/h 2>badoutput Explain what this command is doing.

This would simply send the stderr to the badoutput file. The stdout is still displayed on the screen because it was not redirected to a file.

A command may be in the form of the following: ls /etc/hosts /etc/h 1>goodoutput Explain what this command is doing.

This would simply send the stdout to the goodoutput file. The stderr is still displayed on the screen because it was not redirected to a file.

_____ encrypts blocks of data in three stages using a 168-bit key length.

Triple Data Encryption (3DES)

There are several main types of encryption supported by the ssh daemon. State them.:

Triple Data Encryption Standard (3DES) Advanced Encryption Standard (AES) Blowfish Carlisle Adams Stafford Tavares (CAST) ARCfour

1. Most source code is available on the Internet in tarball format. True or False?

True

11. You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

True

18. A for construct is a loop construct that processes a specified list of objects. As a result, it is executed as long as there are remaining objects to process. True or False?

True

18. Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry. True or False?

True

2. You can clear a log file simply by redirecting nothing in to it. True or False?

True

3. The alias command can be used to make a shortcut to a single command. True or False?

True

7. The -9 option to the gzip utility results in a higher compression ratio. True or False?

True

T/F. A BASH shell has several variables in memory at any one time.

True

T/F. A good password is a mixture of letters, numbers, and symbols and has no logical meaning.

True

T/F. A host ID is a single computer on that network.

True

T/F. A network ID identifies the network on which a computer is located.

True

T/F. After /etc/profile finishes executing, the home directory of the user is searched for the hidden environment files .bash_profile, .bash_login and .profile.

True

T/F. After compilation, the binary files the program comprises remain in the source code directory. To copy the files to the appropriate location on the filesystem, such as a directory listed in the PATH variable, you must type make install.

True

T/F. After you install a VNC server daemon on a computer, other computers that run a VNC client can connect to the VNC server daemon across the network to obtain a desktop environment.

True

T/F. All user accounts must have the password set before they can log in to the computer system.

True

T/F. Although a VNC client is installed in Fedora 13 by default, to allow remote connections you must install a VNC server by running the yum install vnc-server command.

True

T/F. Any command can also be placed inside any environment file.

True

T/F. As a general rule of thumb, you should back up user files from home directories and any important system configuration files such as /etc/passwd.

True

T/F. Backing up files to a compressed archive on a filesystem is useful when transferring the archived data across a network. However, you can use tar to back up data directly to a device such as a tape.

True

T/F. Because most source code comes in tarball format, you must uncompress and extract the files. This creates a subdirectory under the current directory containing the source code.

True

T/F. Before we can configure appropriate network services, we must identify the types and features of these network services.

True

T/F. Do not remove log files because the permissions and ownership will be removed also.

True

T/F. Each user ID can be assigned certain rights and permissions that apply to only that ID. The network administrator defines user permissions (read, write and execute).

True

T/F. Each user can set his/her own default printer by adding the line default printername to the .lpoptions file in his/her home directory.

True

T/F. Few networks have adopted IPv6 because of proxy servers and NAT routers. These devices have an IP address and access the Internet on behalf of the local area network. It allows computers behind different NAT routers or proxy servers to have the same IPv4 address.

True

T/F. Graphical utilities exist to create, modify, and delete user and group accounts.

True

T/F. IPv4 addresses are composed of a network ID and a host ID.

True

T/F. IPv6 address contains two portions. The first half is assigned by the ISP and identifies the network. The last half is the link local portion and is used to uniquely identify computers in a LAN.

True

T/F. If a match is found for the case construct, the commands to the right of pattern are executed.

True

T/F. If a request is rejected, cupsd gives an error message stating that the printer is not accepting print jobs.

True

T/F. If the printer is disabled, the print job stays in the print queue.

True

T/F. If the printer is enabled and ready to accept the print job, the cups daemon then sends the print job from the print queue to the printer and removes the copy of the print job in the print queue.

True

T/F. If the user redirects the Standard Output and Standard Error to the same file without any loss of data, special notation must be used. The following command can be used: ls /etc/hosts /etc/h >goodoutput 2>&1

True

T/F. If these files exist, the first one found is executed. As a result, only one of these files is typically used.

True

T/F. If you have read permission to a shell script, you can execute the shell script by starting another BASH shell and specifying the shell script as an argument. bash myscript

True

T/F. In addition, this directory typically contains a README file with information about the program and an INSTALL file with instructions for installation.

True

T/F. It is best to redirect the content of Standard Output and Standard Error to two separate files.

True

T/F. KPackageKit is a graphical utility for installing or updating packages.

True

T/F. Log files can take up unnecessary space and the contents should be cleared occasionally.

True

T/F. Many people do not keep their passwords secret. People write down their passwords.

True

T/F. Many programs store the log files in subdirectories of the /var/log directory.

True

T/F. Mobile computers often have both wired and wireless NICs.

True

T/F. Most commands that are run by the shell are run in a separate subshell which was created by the current shell. Any variables created in the current shell are not available to those subshells and the commands running within them.

True

T/F. Multihomed hosts are computers with multiple network interfaces.

True

T/F. Next you can type the make command, which looks for the Makefile file and uses the information in it to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.

True

T/F. Only computers with the same network ID can communicate without a router.

True

T/F. Passwords are encrypted at the entry point and decrypted just before they are validated.

True

T/F. Piping is commonly used to reduce the amount of information displayed on the terminal screen from commands that display too much information.

True

T/F. Port numbers range from 0 to 65534. The well-known ports are the ports from 0 to 1023. They represent the commonly used services.

True

T/F. Print jobs can consist of a file, several files or the output of a command.

True

T/F. Redirecting the Standard Output to a file for later use is more common than redirecting the Standard Error to a file, the BASH shell assumes Standard Output in the absence of a numeric file descriptor, i.e., ls /etc/hosts /etc/h >goodoutput

True

T/F. Redirection and piping can be combined together. Input redirection must occur at the beginning of the pipe and output redirection must occur at end of the pipe.

True

T/F. Redirection only occurs from a command to a file and vice versa.

True

T/F. SSH can be used to transfer files between computers.

True

T/F. Shell scripts may need input from the user executing the program. This input can then be stored in a variable for later use.

True

T/F. Since the output of the set command and the env command is typically large, it is common to redirect the Standard Output of these commands to the grep command to display certain lines only.

True

T/F. Software for Linux can consist of binary files and source code.

True

T/F. Some commands on the Linux system only accept files when they are passed by the shell through Standard Input. Therefore to redirect stdin of a file, the user must use the "<" shell metacharacter.

True

T/F. The -u option with the cancel command can remove all the jobs sent by a specified user.

True

T/F. The /etc/dumpdates is a file used to store information about incremental and full backups.

True

T/F. The BASH shell can be used to redirect stdout and stderr from the terminal screen to a file on the filesystem using the ">" shell metacharacter followed by the absolute or relative pathname of the file.

True

T/F. The BASH shell clears the contents of the goodoutput file if it exists and creates the file if it does not exist.

True

T/F. The BASH shell is responsible for providing a user interface and interpreting commands entered on the command line. In addition, the BASH shell can manipulate command input and output, provided the user specifies certain shell metacharacters on the command line alongside the command.

True

T/F. The Bash shell clears a file that already exists before performing the redirection.

True

T/F. The IPv6 protocol uses 128 bits to identify the computers on a network. The addresses are written using eight 16-bit hexadecimal numbers.

True

T/F. The PATH variable is searched in the order that the directories are listed. If the executable file is not in a directory listed in the PATH variable, the user must specify either the absolute or relative pathname to the executable file.

True

T/F. The Printer Configuration tool is used to edit these files.

True

T/F. The administrator can restrict logon hours by time, day or both. This procedure prevents intruder break-in after working hours.

True

T/F. The administrator can set restrictions about when an old password may be reused.

True

T/F. The administrator needs to determine what happens when a user is logged in and the authorized time expires. The administrator can disconnect the user or just prevent connection to new resources.

True

T/F. The administrator should limit the number of times a user may enter the wrong password before an account is locked. Longer passwords are better.

True

T/F. The awk command uses space or tab characters as delimiters for each field in a line. Most configuration files on Linux systems are delimited using the colon (:) character. To change the delimiter that the awk command uses, use the -F option to the command.

True

T/F. The bzip2 utility can't use zcat and zmore to view files. Instead, the bzcat, bzmore and bzless command must be used.

True

T/F. The case construct must end with esac ("case" backwards).

True

T/F. The compress utility is one of the oldest compression utilities common to most UNIX and Linux systems. Its compression algorithm, which is called Adaptive Lempel-Ziv coding (LZW), has an average compression ratio of 40 to 50%.

True

T/F. The contents of the route table is lost when computer powered off.

True

T/F. The file that contains settings for cupsd is /etc/cups/cupsd.conf.

True

T/F. The file that contains the configuration information for each printer installed on the system is /etc/cups/printers.conf.

True

T/F. The format of any line in the system log file is

True

T/F. The if construct controls the flow of the program based on true/false decisions.

True

T/F. The log files can be cleared by using the > redirection symbol.

True

T/F. The lpstat command with -t (total) option lists all printers and their status.

True

T/F. The ls and mount commands are not filter commands because they do not accept Standard Input from other commands.

True

T/F. The number of IP addresses using the IPv4 protocol is unsuitable for Internet growth.

True

T/F. The order of redirection on the command line does not matter.

True

T/F. The other environment files are only executed after login after the ~/.bashrc file has been executed.

True

T/F. The print queue for a printer is typically /var/spool/cups.

True

T/F. The printer can accept or reject a request to print.

True

T/F. The procedure for compiling source code into binary programs is standardized today among most Open Source Software (OSS) developers.

True

T/F. The r commands allow access to remote computers without a password, if the remote computer has trusted access - in other words, permission to do so.

True

T/F. The root user can change any user's password.

True

T/F. The root user is usually listed at the top of /etc/passwd file.

True

T/F. The route table is a list of TCP/IP networks stored in system memory.

True

T/F. The ssh command is used to connect to a remote computer running the ssh daemon. It receives a host name or an IP address of the target computer as an argument. The first time you connect to a remote computer using ssh, you will be prompted to accept the RSA encryption fingerprint for the target computer.

True

T/F. The system administrator should force the users to change passwords for security.

True

T/F. The tar utility does not compress files inside the archive. Therefore, the time needed to transfer the archive across a network is high. To reduce transfer times, you can compress the archive using a compression utility before transmission.

True

T/F. The tar, cpio and dump utilities copy data to a backup medium in a character-by-character or block-by-block format. It is typically used with tape, floppy and hard disk media.

True

T/F. The user can create a single alias to multiple commands by using the ";" metacharacter.

True

T/F. The user can redirect both Standard Output and Standard Error to separate files at the same time, as shown in the following output, ls /etc/hosts /etc/h >goodoutput 2>badoutput

True

T/F. The user can redirect stdout and stderr to separate files.

True

T/F. The user can send the Standard Output of one command to another command as Standard Input. To do this, the user must use the pipe | shell metacharacter and specify commands on either side. The space before and after the | symbol is optional.

True

T/F. The user can use more than one pipe | metacharacter on the command line to pass information from one command to another over a series of commands.

True

T/F. The user is said to be authenticated on the server and the identity is verified. The user is now allowed to access the resources that he/she has the proper permission to access.

True

T/F. The user should print a copy of the log files for his/her records.

True

T/F. The user should use separate filenames for stdout and stderr.

True

T/F. The user should use unique alias names.

True

T/F. There are shortcut constructs that take less time when only one decision needs to be made during the execution of the program.

True

T/F. To add a variable, add a line to the environment file that has the same format as the command used on the command line.

True

T/F. To apply standard printer properties to several printers on your system, you need to create a printer class.

True

T/F. To change the value of a variable, the user can specify the variable name followed by the equal sign (=) and the new value.

True

T/F. To create new variables, specify the variable identifier followed by equal sign and the new contents.

True

T/F. To install an RPM package, use -i option with the rpm command.

True

T/F. To prevent the file from being cleared by the BASH shell and append output to the existing output, you can specify two ">" metacharacters alongside the file descriptor. The following is an example: date >>dateoutput

True

T/F. Trusted access allows one computer to access another computer without providing a password.

True

T/F. Users should be able to access resources they are allowed to access and not access resources they do not have permission to access. Network operating systems have user management utilities to accomplish this task.

True

T/F. Using the echo -e command makes it easier to read the output of the shell scripts.

True

T/F. Virtual Network Computing (VNC) is another graphical option for administering a Linux system remotely.

True

T/F. When a user account is deleted, any files that were previously owned by the user become owned by a number that represents the UID of the deleted user. Any future user account that is given the same UID then becomes the owner of those files.

True

T/F. When exiting the BASH shell, all variables stored in memory are destroyed along with the shell itself.

True

T/F. While inside the source code directory, the first step to installation is to run the configure program. This performs a preliminary check for system requirements and creates a list of what to compile inside a file called Makefile in the current directory.

True

T/F. X Windows is a network application that can be used to obtain graphical utilities from a remote Linux computer.

True

T/F. You can also use the -r option with the cupsdisable and cupsreject commands to specify a reason for the action.

True

T/F. You can manipulate the status of a printer using either the cupsaccept, cupsreject, cupsenable, and cupsdisable commands followed by the printer name.

True

T/F. You can use the zcat and zmore commands to send the contents of a compressed file using the gzip utility to standard output.

True

T/F. You can use the zmore and zless commands to view the contents of a compressed file page-by-page.

True

T/F. You may want to execute cleanup tasks upon exiting the shell. Simply add those cleanup tasks to the .bash_logout file in your home directory.

True

T/F. You need to install the telnet daemon using yum command. It uses regular commands and exit to kill a remote BASH shell.

True

T/F. Both stdout and stderr are displayed on the terminal screen by default.

True ls /etc/hosts etc/h

The _____ construct begins with a test statement and the commands within the loop construct are executed as long as the test statement returns true. It contains a counter variable and the value of the counter changes with each iteration of the loop.

While

Which implementation of X Windows are commonly used in Linux?

X.org, XFree86

State two methods of setting up trusted access.

You can add the host names of computers to the /etc/hosts.equiv file. You can create an .rhosts file in the home directory of each user who wants to connect using trusted access.

8. What is the name of the file that contains a listing of all users on the system and their home directories? a. /etc/passwd b. /etc/users c. /etc/shadow d. /etc/password

a. /etc/passwd

4. Which of the following files is always executed immediately after a user logs in to a Linux system and receives a BASH shell? a. /etc/profile b. ~/.bash_profile c. ~/.bash_login d. ~/.profile

a. /etc/profile

2. Which dump level indicates a full backup? a. 0 b. 9 c. 1 d. f

a. 0

8. You have created a full backup and four incremental backups. In which order must you restore these backups? a. 0, 1, 2, 3, 4 b. 0, 4, 3, 2, 1 c. 4, 3, 2, 1, 0 d. 1, 2, 3, 4, 0

a. 0, 1, 2, 3, 4

What would be the result of not configuring an /etc/at.allow file on a Fedora Linux system? (Choose all that apply.) 1) The /etc/at.deny file would be processed. 2) The /etc/at.deny file would not be processed. 3) All users would have access to the at command by default. 4) No users would have access to the at command by default.

1) The /etc/at.deny file would be processed. 3) All users would have access to the at command by default.

What does the PPID of a process identify? 1) The child PID 2) The PID of a parent process 3) The PID of a user process 4) The PID of another child process

2) The PID of a parent process

What is the third column in the cron table used to represent? 1) Hour 2) Minute 3) Day of the month 4) Month of the year

3) Day of the month

Which kill signal number is associated with the kill command by default? 1) 1 2) 2 3) 9 4) 15

4) 15

ELILO

A boot loader used with computers that support Intel Extensible Firmware Interface technology

pstree command

A command that displays processes according to their lineage, starting from the init daemon.

Linux Loader (LILO)

A common boot loader used on Linux systems

Grand Unified Bootloader (GRUB)

A common boot loader used on the Linux systems

X.Org

A common implementation of X Windows used in Linux distributions

XFree86

A common implementation of X Windows used in Linux distributions

dual boot

A configuration in which two or more OSs exist on the hard disk of a computer; a boot loader allows the user to choose which OS to load at boot time

K Desktop Environment (KDE)

A desktop environment created by Matthias Ettrich in 1996

GTK+toolkit

A development toolkit for C programming; it is used in the GNOME desktop and the GNU Image Manipulation Program (GIMP)

/etc/cron.d

A directory that contains additional system cron tables.

/var/spool/at

A directory that stores the information used to schedule commands using the at daemon.

/var/spool/cron

A directory that stores user cron tables.

/etc/at.allow

A file listing all users who can use the at command.

/etc/cron.allow

A file listing all users who can use the cron command.

/etc/at.deny

A file listing all users who cannot access the at command.

/etc/cron.deny

A file listing all users who cannot access the cron command.

cron table

A file specifying tasks to be run by the cron daemon; there are user cron tables and system cron tables.

.dmrc(display manager runtime configuration)

A file that is stored within each user's home directory to list the preferred desktop environment for use by the GNOME Display Manager.

.xinitrc(X initialization runtime configuration) file

A file that is stored within each user's home directory to list the preferred desktop environment for use by the startx command

EasyBCD

A free Windows utility that can be used to modify and configure the Windows boot loader so that it can dual boot a Linux OS

X Display Manager (xdm)

A graphical login screen

KDE Display Manager (kdm)

A graphical login screen for users that resembles the KDE desktop

Display Settings utility

A graphical utility that can be used to configure the video card and monitor settings for use by X Windows

Service Configuration utility

A graphical utility that can be used to start, stop, and restart daemons as well as configure the run levels that they are automatically started and stopped in.

daemon

A linux system process that provides a certain service

process priority

A number assigned to a process, used to determine how many time slices on the processor that process will receive; the higher the number, the lower the priority.

user process

A process begun by a user and which runs on a terminal.

foreground process

A process for which the BASH shell that executed it must wait for its termination.

background process

A process that does not require the BASH shell to wait for its termination. Upon execution, the user receives the BASH shell prompt immediately.

rogue process

A process that has become faulty in some way and continues to consume far more system resources than it should.

zombie process

A process that has finished executing, but whose parent has not yet released its PID; the zombie retains a spot in the kernel's process table.

parent process

A process that has started other processes (child processes).

child process

A process that was started by another process (parent process).

process

A program currently loaded into physical memory and running on the system.

GNOME Display Manager (gdm)

A program that provides a graphical login screen

xvidtune

A program used to fine-tune the sync and hsync video card settings for use in X Windows

boot loader

A program used to load the OS

program

A structured set of commands stored in an executable file on a filesystem. A program can be executed to create a process.

daemon process

A system process that is not associated with a terminal.

runlevel

A term that defines a certain type and number of daemons on a linux system.

process ID (PID)

A unique identifier assigned to every process as it begins.

ntsysv

A utility that can be used to alter the daemons that are started in each run level

compiz

A window manager that is commonly used within the KDE and GNOME desktops to provide 3D effects

_____ is a fast encryption algorithm that operates on streams of data instead of blocks of data and uses variable-length keys up to 2048 bits in length.

ARCfourhttp

_____ is an improvement on 3DES encryption and is available in 128-bit, 192-bit and 256-bit key lengths.

Advanced Encryption Standard (AES)

single user mode

Also called run level 1; The mode that provides a single terminal and a limited set of services.

multiuser mode

Also called run level 2; the mode that provides most daemons and a partial set of networking daemons

extended multiuser mode

Also called run level 3; the mode that provides most daemons and a full set of networking daemons

power on-self test(POST)

An initial series of tests run when a computer is powered on to ensure that hardware components are functional

GNU Image Manipulation Program (GIMP)

An open source graphics manipulation program that uses the GTK + toolkit;

______ are the backup copies of files and directories.

Archives

_____ is used to verify a user's identity. It is usually done by comparing the username and password to a system database.

Authentication

_____ are precompiled to run on certain hardware architectures.

Binary files

_____ is an encryption algorithm that is much faster than 3DES and can use keys up to 448 bits in length.

Blowfish

_____ is used to write files to CD-RW or DVD-RW media. Fedora Core comes with the Brasero Disc Burner program.

Burning software

15. What is wrong with the following command string ls /etc/hosts >listofhostfile? a. Nothing is wrong with the command. b. The file descriptor was not declared; unless 1 for Standard Ouput or 2 for Standard Error is indicated, the command will fail. c. The ls command is one of the commands that cannot be used with redirection; you must use | to pipe instead. d. The file listofhostfile will always only contain Standard Error as a file descriptor was not declared.

a. Nothing is wrong with the command.

19. You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue? a. cancel Printer1-17 Printer1-21 b. cancel -u Printer1-17 Printer1-21 c. cancel -a Printer1-17 Printer1-21 d. cancel 17 21

a. cancel Printer1-17 Printer1-21

7. Which of the following will display the message welcome home if the cd /home/user1 command is successfully executed? a. cd /home/user1 && echo "welcome home" b. cat "welcome home" || cd /home/user1 c. cd /home/user1 || cat "welcome home" d. echo "welcome home" && cd /home/user1

a. cd /home/user1 && echo "welcome home"

7. Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.) a. lp -d Printer1 file b. lp Printer1 file c. lp file d. lp -m Printer1 file

a. lp -d Printer1 file, c. lp file

17. Which construct can be used in a shell script to read Standard Input and place it in a variable? a. read b. sum c. verify d. test

a. read

12. When a printer is rejecting requests,____________. a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable b. the print queue does accept jobs into the print queue and holds them there until the printer is accepting requests again c. the printer appears as off-line when a lp request is sent d. the print queue redirects all print jobs sent to it to /dev/null

a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

The _____ command creates a shortcut to a command and is stored in a special variable.

alias

20. Consider the following shell script: echo -e "What is your favorite color?--> \c" read REPLY if [ "$REPLY" = "red" -o "$REPLY" = "blue" ] then echo "The answer is red or blue." else echo "The answer is not red nor blue." fi a) The answer is red or blue. b) The answer is not red nor blue. c) The code would cause an error. d) The answer is red or blue. The answer is not red nor blue.

b) The answer is not red nor blue

19. When compiling source code into a binary program, which command performs a system check and creates the Makefile? a. tar b. ./configure c. make d. make install

b. ./configure

14. Which file contains full and incremental backup information for use with the dump/restore utility? a. /etc/dumps b. /etc/dumpdates c. /etc/dumpfile d. /etc/dump.conf

b. /etc/dumpdates

4. What is the name used to describe a user providing a user name and password to log in to a system? a. validation b. authorization c. login d. authentication

b. authorization

9. Which of the following commands extracts an archive? a. cpio -vocBL /dev/fd0 b. cpio -vicdu -I /dev/fd0 c. cpio -vicdu -O /dev/fd0 d. cpio -vti -I /dev/fd0

b. cpio -vicdu -I /dev/fd0

16. What is the background process responsible for printing on Fedora Linux? a. lp b. cupsd c. lpd d. lpstat

b. cupsd

17. Which option to the rpm command can be used to remove a package from the system? a. r b. e c. u d. U

b. e

8. The current value for the HOME variable is displayed by which of the following commands? (Choose all that apply.) a. echo HOME= b. echo ~ c. echo $HOME d. echo ls HOME

b. echo ~ c. echo $HOME

20. Which of the following commands can be used to list detailed information about a package such as its installation date and license? a. rpm -qa packagename b. rpm -qi packagename c. rpm -ql packagename d. rpm -q packagename

b. rpm -qi packagename

The_____ utility is one of the oldest and most widely used backup utilities. It can create an archive in a file on a filesystem or directly on a device. It accepts options to determine the location of the archive and the action to perform on the archive.

tape archive (tar)

There are several backup utilities available. State them.

tar cpio dump/restore Disk-burning software

To create an archive called /backup.tar that contains the contents of the current directory and view the contents, you can use the commands:

tar -cvf /backup.tar * ls -l /backup.tar

A_____ command is a filter command that takes information from Standard Input and sends that information to a file, as well as to Standard Output.

tee

The _____ command is traditionally used to obtain a command-line shell on a remote server. It receives a host name or IP address of the remote computer as an argument. It is the easiest way to perform remote administration.

telnet

window manager

the GUI component that is responsible for determining the appearance of the windows drawn on the screen by X Windows

/boot

the directory that contains the kernel and boot-related files

The _____ command can be used to replace characters in a file sent via Standard Input.

tr

The _____ command is used to troubleshoot routing. It displays the routers between the current and the remote computers.

traceroute

If you want to modify the Windows boot loader to dual boot Linux, you can use the EasyBCD program within Windows.

true

State some examples of commands that may be placed in an environment file.

umask 077 date alias dw="date;who"

The _____ command is used to add new user accounts.

useradd

The _____command removes user accounts.

userdel

The _____ command modifies the user account information.

usermod

The_____ is the name of a variable.

variable identifier

The _____ command is used to configure a password for the VNC connection.

vncpasswd

Other computers can connect to the VNC server using the _____ command.

vncviewer

The syntax of the while construct is as follows.

while this returns true do these commands done

Which command can be used to fine-tune the vsync and hsync of a video card for use in X Windows?

xvidtune

The command on the right of the _____ construct is executed only if the command on the left of the construct did not complete successfully.

||

The _____ file is typically used to set aliases and variables that must be present in each BASH shell. It is executed immediately after login for all users on the system as well as when a new BASH shell is created after login.

~/ .bashrc (BASH run-time configuration)

State some of the common BASH shell environment files and the order in which they are executed.

~/.bashrc /etc/profile ~/.bash_profile ~/.bash_login ~/.profile

3. When a printer is disabled, ________. a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable b. the print queue does accept jobs into the print queue and holds them there until the printer is enabled again c. the printer appears as off-line when a lp request is sent d. the print queue redirects all print jobs sent to it to /dev/null

b. the print queue does accept jobs into the print queue and holds them there until the printer is enabled again

Filter commands must be at the _____ of a pipe.

beginning

The _____ command is used to decompress files compressed via bzip2.

bunzip2

The _____ command is used to compress files using the Burrows-Wheeler Block Sorting Huffman Coding compression algorithm. It can't compress a directory full of files. The compression ratio is 50% to 75% on average.

bzip2

4. Files that have been compressed using the compress utility typically have the ______ extension. a. .tar.gz b. .gz c. .Z d. .bz2

c. .Z

3. Which filename extension indicates a tarball? a. .tar.gz b. .cpio c. .dump d. .tar

c. .dump

15. Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation? a. /etc/skel b. /etc/passwd c. /etc/login.defs d. /etc/default/useradd

c. /etc/login.defs

14. Most log files on the system are found in which directory? a. /etc/logfiles b. /etc/log c. /var/log d. /dev/log

c. /var/log

9. Which of the following file descriptor numbers represents stdout? a. 2 b. 0 c. 1 d. 3

c. 1

16. What is the most common method for obtaining Linux software? a. CD-ROM b. floppy disk c. Internet download d. e-mail

c. Internet download

11. What would be the effect of using the alias command to make an alias for the date command named cat in honor of your favorite pet? a. It cannot be done as there already is an environment variable cat associated with the cat command. b. It cannot be done as there already is a command cat on the system. c. When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead. d. There is no effect until the alias is imported as it is a user-declared variable.

c. When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead.

If you have read and execute permission to a shell script, you can execute the shell script like any other executable program on the system.

chmod a+x myscript (gives the file "myscript" execute permission) ./myscript

The _____ command changes a valid shell to an invalid shell.

chsh

State the syntax of these time saving shortcuts.

command && command command || command

chkconfig

command that can be used to configure daemon startup by runlevel

service

command that can be used to manually start, stop, and restart daemons.

dmesg

command that displays hardware-related messages generated by Linux kernal

telinit

command that is used as alias to init command

init command

command used to change the OS from one run level to another

system-config-keyboard

command used to configure a keyboard for use by X Windows

system-config-display

command used to configure a video adapter card and monitor for use by X Windows

mouse-test

command used to detect and configure your mouse

runlevel command

command used to display the current and most recent runlevel

grub-md5-crypt

command used to generate an encrypted password for use in the /etc/grub.conf file

grub-install

command used to install the GRUB boot loader

lilo

command used to reinstall the LILO boot loader based on the configuration information in /etc/lilo.conf

To compress a file using the compress utility, you can specify the files to compress as arguments to the _____ command. Each file is renamed with a .Z filename extension to indicate that it is compressed.

compress

State the three most common compression utilities.

compress gzip bzip2

A _____ is a standard set of instructions used to compress a file.

compression algorithm

The _____ is the amount of compression occurring during compression in relation to the original file size.

compression ratio

The ____ utility is another common backup utility that uses options similar to the tar utility. It has some added features including long filenames and the ability to back up device files. It uses absolute pathnames by default when archiving.

copy in/out (cpio)

The _____ assigns the print job a unique print job ID.

cups daemon

10. Which of the following operators reverses the meaning of a test statement? a. #! b. -o c. -a d. !

d. !

12. How do you indicate a comment line in a shell script? a. There are no comment lines in a shell script. b. Begin the line with #!. c. Begin the line with !. d. Begin the line with #.

d. Begin the line with #.

19. What does >> accomplish when entered on the command line after a command? a. It redirects both Standard Error and Standard Output to the same location. b. It does not accomplish anything. c. It redirects Standard Error and Standard Input to the same location. d. It appends Standard Output to a file.

d. It appends Standard Output to a file.

13. When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information. a. section, priority b. service, precedents c. process, degree d. facility, priority

d. facility, priority

6. Every if construct begins with if and must be terminated with? a. end b. endif c. stop d. fi

d. fi

12. When compiling source code into a binary program, which command copies compiled binary files to the correct location on the filesystem? a. tar b. ./configure c. make d. make install

d. make install

6. Which command can be used to alter the primary group associated with a given user temporarily? a. usermod b. chggrp c. gpasswd d. newgrp

d. newgrp

1. The process of sending print jobs from the print queue to the printer is called? a. spooling b. queuing c. redirecting d. printing

d. printing

18. Which of the following commands creates an archive? a. tar -cvf /dev/fd0 b. tar -xvf /dev/fd0 c. tar -tvf /dev/fd0 d. tar -zcvf /dev/fd0 *

d. tar -zcvf /dev/fd0 *

The _____ command receives TCP/IP configuration from a DHCP or Boot Protocol (BOOTP) server.

dhclient

The _____ utility can be used to back up files and directories to a device or to a file on the filesystem. It only works with files on ext2 and ext3 filesystems.

dump/restore

PS1="This is a new prompt: #"

echo $HOME echo $PWD echo $PATH

MYVAR="This is a sample variable."

echo $MYVAR

MYVAR="This is a sample variable."

echo $MYVAR This is a sample variable.

The _____ command lists all exported environment and user-defined variables in the shell.

env

The _____ store variables and values and are executed each time the BASH shell is started to ensure variables are always accessible. The user can put the values in a file to ensure that variables are accessible to a shell at all times.

environment files

The _____ command sets a user's password. If no arguments are included, it sets the current user's password.

etc/passwd

The _____ command is used to export user-defined variables to the subshells and it ensures that the programs started by the current shell have access to these variables.

export

Edit the environment file using the gedit editor and add the following line to the file.

export MYVAR2="This is another sample variable".

To make dual booting as easy as possible, Linux should be the second OS installed.

false

Command input and output are represented by labels known as _____

file descriptors

A _____ command is any command that can take standard input and transform it to standard output.

filter

The syntax of the for construct is as follows.

for var_name in string1 string2 ... ... do these commands done

A _____ archives all of the data on the filesystem.

full backup

Which two commands entered at a command prompt can be used to start X Windows, the window manager, and the default desktop environment?

gdm startx

The _____ command adds a group to the system.

groupadd

The _____command removes a group from the system.

groupdel

The _____ command is used to decompress the .gz files.

gunzip

A _____ is the first line in a shell script and it specifies the pathname to the shell that interprets the contents of the shell script.

hashpling

These _____ environment files allow a user to set customized variables independent of BASH shells used by other users on the system.

hidden

The _____ command is used to view or set a computer's host name.

hostname

The _____ command lists the GIDs of groups that a user belongs to.

id

The following is the format for the if construct.

if this is true then do these commands elif this is true then do these commands else do these commands fi

The _____command assigns a TCP/IP configuration to a NIC as well as views the configuration of all network interfaces in the computer.

ifconfig

The _____ command unconfigures a network adapter and the ifup command configures a network adapter using the /etc/sysconfig/network-scripts/ifcfg-interface file.

ifdown

An _____ backs up only data that has changed since the last backup of any type.

incremental backup

The first process generated on a Linux system is ________.

init

Which command causes the system to enter single user mode?

init1

Which command is used to reinstall LILO after its configuration has been altered?

lilo

Most daemons record system information and error messages to files stored on the filesystem. These files are referred to as _____.

log files

The _____ command backs up and clears the log files.

logrotate

The _____ command accepts information from standard input. Thus, you can place this command at the end of the pipe to print information.

lp

The _____ command can list print jobs in the queue for a printer.

lp

The _____ command is used to send a print job to a printer.

lp

The _____ command is used to print filename to a specified printer. If the -d option is omitted, it prints to the default printer.

lp -d printername filename

The _____ command is used to set the default printer and this information is stored in the /etc/cups/lpoptions file.

lpoptions -d printername

Each line of the /etc/group file has the following colon-delimited format:

name:password:GID:members

Each line of the /etc/passwd file has the following colon-delimited format:

name:password:UID:GID:GECOS:homedirectory:shell

The _____ command temporarily changes the user's primary group.

newgrp

The _____ command checks the TCP/IP connectivity on a network. The -c option limits the number of packets sent.

ping (Packet Internet Groper)

A _____ is a string of commands connected by the "|" metacharacters. The shell then sends the stdout on the left to the stdin on the right.

pipe

A _____ uniquely identifies each network service. They ensure that packets are delivered to each service.

port number

The cups daemon also places a copy of the print job into a temporary directory on the filesystem called the _____. This directory holds the print jobs that are waiting to be printed.

print queue

Sending print jobs from a print queue to a printer is called _____.

printing

The ____ command can be used to copy files between computers.

rcp

The _____ command takes user input from stdin and places it in a variable specified by an argument to the command.

read

The _____ command obtains a shell on a remote system.

rlogin

If a user enters single user mode, who is she automatically logged in as?

root

In /etc/password, the following two lines are of interest.

root:x:0:0:root:/root:/bin/bash user1:x:500:500:sample user one:/home/user1:/bin/bash

The _____ command can be used to execute a command on a remote computer.

rsh

The syntax of the sed filter command is

s/search/replace/.

The timeout value in the GRUB configuration file is measured in ___________.

seconds

The _____ filter command searches for a certain string of text and replaces that text string with another text string.

sed

initstate

see runlevel

The _____ command can be used to list all environment variables in the BASH shell including user-defined variables.

set

A _____ is a text file containing a list of commands or constructs for the shell to execute. It may contain any command that can be entered on the command line.

shell script

The _____ contains files that are copied to all new users' home directories when a home directory is created. It is usually /etc/skel directory and contains mostly environment files.

skeleton directory

A _____ is a shell created by current shell.

subshell

The _____ is a process whereby files and directories are copied and stored at an alternative location.

system backup

Which utility can be used to configure the video card and monitor used by X Windows in Fedora 13?

system-config-display

13. You have redirected Standard Error to a file called Errors. You view the contents of this file afterward and notice that there are six error messages. After repeating the procedure, you notice that there are only two error messages in this file. Why? a. After you open the file and view the contents, the contents are lost. b. The system generated different Standard Output. c. You did not append the Standard Error to the Error file and as a result, it was overwritten when the command was run a second time. d. You must specify a new file each and every time you redirect as the system creates the specified file by default.

c. You did not append the Standard Error to the Error file and as a result, it was overwritten when the command was run a second time.

2. Before a user-defined variable can be used by processes that run in subshells, that variable must be __________. a. imported b. validated by running the env command c. exported d. redirected to the BASH shell

c. exported

10. What is the name of the utility used to rotate log files? a. syslog b. jetpack c. logrotate d. logbackup

c. logrotate

6. When compiling source code into a binary program, which command does the compiling using the GNU C Compiler? a. tar b. ./configure c. make d. make install

c. make

11. Which of the following commands can be used to list the files contained within an installed RPM package? a. rpm -qa packagename b. rpm -qi packagename c. rpm -ql packagename d. rpm -q packagename

c. rpm -ql packagename

5. Which command could you use to see a list of all environment and user-defined shell variables as well as their current values? a. ls /var b. env c. set d. echo

c. set

20. Which command is used to delete a user account? a. usermod -d username b. del username c. userdel username d. rm username

c. userdel username

5. Which command can you use to lock a user account? a. lock username b. secure username c. usermod -L username d. useradd -L username

c. usermod -L username

17. Which command would you use to unlock a user account? a. unlock username b. open username c. usermod -U username d. useradd -U username

c. usermod -U username

The _____ construct compares a value of a variable with several different patterns of text or numbers.

case

The syntax for the case construct is as follows:

case variable in pattern1 ) do this ;; pattern2 ) do this ;; pattern3 ) do this ;; esac

The _____ command modifies the password expiration information.

change


Conjuntos de estudio relacionados

Lab Safety Review Quiz - Lab Flow

View Set

Microeconomics Chapter 5 Homework

View Set

Test - TST 102 Module 17 Exam: Test and Evaluation Planning

View Set

Socrative review for Med Surg Exam #3

View Set