Linux Chapters 8-14 (Final Review)

¡Supera tus tareas y exámenes ahora con Quizwiz!

*Which file stores the Apache configuration in Fedora 13? a.) /etc/apache/httpd.conf b.) /etc/apache.conf c.) /etc/httpd.conf d.) /etc/httpd/conf/httpd.conf

/etc/httpd/conf/httpd.conf

*What kill level signal cannot be trapped? a. 1 b. 3 c. 9 d. 15

9

*Which DNS resource record is an alias to other records? a.) A b.) AAAA c.) CNAME d.) NS

CNAME

*What command is used to view and modify user jobs scheduled to run with cron? a. crontab b. sched c. cron d. ps

Crontab

*Which of the following steps is not a common troubleshooting procedure? a. Delegate responsibility. b. Test the solution. c. Isolate the problem. d. Collect information

Delegate responsibility

*Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry. True or False?

False

*The bzip2 and gzip utilities use similar compression algorithms. True or False?

False

*UIDs and GIDs are unique to the system and once used can never be reused. (True or False?)

False

*Which filename extension indicates a tarball? a. .tar.gz b. .cpio c. .dump d. .tar

a) .tar.gz

*Which dump level indicates a full backup? a. 0 b. 9 c. 1 d. f

a) 0

*You have created a full backup and four incremental backups. In which order must you restore these backups? a. 0, 1, 2, 3, 4 b. 0, 4, 3, 2, 1 c. 4, 3, 2, 1, 0 d. 1, 2, 3, 4, 0

a) 0, 1, 2, 3, 4

*In what directory is Stage2 of the GRUB2 boot loader stored? a. /boot b. /root c. /bin d. /

a. /boot

*What is the name of the directory that contains symbolic links to UNIX SysV rc scripts for runlevel 2? a. /etc/rc2.d b. /etc/init.d/rc2.d c. /etc/runlevel/2 d. /etc/inittab/rc2/d

a. /etc/rc2.d

*What Systemd target corresponds to runlevel 5? a. multi-user.target b. graphical.target c. system.target d. runlevel5.target

b. graphical.target

*Which command causes the system to enter Single User Mode? a. init 0 b. init 1 c. init 6 d. inistate 5

b. init 1

*Which command can be used to see processes running in the background? a. ps -% b. jobs c. fg d. bg

b. jobs

*Which of the following commands will most likely increase the chance of a process receiving more time slices? a. renice -12 b. renice 15 c. renice 0 d. renice 19

renice -12

*Which of the following files is likely to be found in the /var/log/sa directory on a Fedora 20 system over time? a. sa39 b. sa19 c. 15 d. 00

sa19

*Which command can increase the number of filehandles that programs can open in a shell? a. top b. lba32 c. ldd d. ulimit

ulimit

*To install a new program from RPM software repositories on the Internet, you can use the yum update programname command. True or False?

False

*To kill a process running in the background, you must place a % character before its process ID. True or False?

False

*When the fsck command cannot repair a nonroot filesystem, you should immediately restore all data from tape backup. True or False?

False

*The TCP/IP address of 127.0.0.1 is also referred to as the _____. a. local address b. local host c. loopback address d. lookup address

loopback address

*On which part of the maintenance cycle do Linux administrators spend the most time? a. monitoring b. reactive maintenance c. documentation d. proactive maintenanc

monitoring

*Which of the following commands can be used to scan the available ports on computers within your organization? a. traceroute b. sudo c. tracert d. nmap

nmap

*Which command can be used to synchronize your computer with an NTP time source? a.) ntp b.) ntpquery c.) ntpq d.) hwclock

ntpq

*A subnet Mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False?

True

*Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specifie within the network configuration file for the NIC? a. /etc/resolv.conf b. /etc/host.conf c. /etc/hosts d. etc/resolve

/etc/resolv.conf

*Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted? a. firewall-cmd --add-service ssh b. firewall-cmd --add-port 22/tcp c. firewall-cmd --add-port 22/udp d. firewall-cmd --add-service ssh -permanent

firewall-cmd --add-service ssh -permanent

*Which two implementations of X Windows are commonly used in Linux? (Choose two answers.) a. X.org b. XFce c. Xconfigurator d. XFree86

a. X.org d. XFree86

*Which command can be used to alter the primary group associated with a given user temporarily? a.) usermod b.) chggrp c.) gpasswd d.) newgrp

d.) newgrp

*Which command entered without arguments is used to display a list of processes running in the current shell? a. ps b. pid c. ppid d. list

ps

*RSA is a common symmetric encryption algorithm used by SSH and GPG. True or False?

False

*Stand-Alone daemons are started on demand using inetd or xinetd. True or False?

False

*Which of the following are common assistive technologies? (Choose all that apply.) a. high contrast b. on-screen keyboard c. sticky keys d. mouse keys

-high contrast -on-screen keyboard -sticky keys -mouse keys

*Which of the following port numbers is associated with telnet? a. 49 b. 20 c. 137 d. 23

23

*You have opened a telnet session on port 25 with your email server. What command can you type within your telnet session to start an email session? (Choose all that apply.) a. START b. HELO c. EHLO d. WAZUP

HELO EHLO

*Which of the following are graphical remote administration technologies? (choose all that apply) a. ssh -X b. telnet c. ssh d. VNC

ssh -X VNC

*You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it can not be delivered. What should you do? a.) Add the line to the /etc/aliases.db file instead. b.) Run the newaliases command. c.) Restart the Sendmail daemon. d.) Log out of the system and then log back into the system and resend the email.

Run the newaliases command.

*Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (choose all that apply.) a. ipconfig b. ifconfig c. ping d. netstat -i

ifconfig ping netstat -i

*What command can you use to view journald log entries on a system that uses Systemd? a. catlog b. journalctl c. less d. syslog

journalctl

*Which command indicates the shared libraries required by a certain executable program? a. rpm -V b. ldd c. slconfig d. ldconfig

ldd

*What devices are used to transfer information from one network to another? a. DNS servers b. LANs c. DHCP servers d. routers

routers

*When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information. a.) section, priority b.) service, precedents c.) process, degree d.) facility, priority

d.) facility, priority

*To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? a. dig hostname b. host hostname c. nslookcup hostname d. resolve hostname

dig hostname host hostname nslookcup hostname

*Which of the following are stand-alone daemons? (choose all that apply) a. telnet (in.telnetd) b. Apache (httpd) c. DNS (named) d. Washington University FTP (in.ftpd)

Apache DNS

*Which command within the command-line FTP utility can be used to change the current directory on the local computer? a.) cd b.) dir c.) lcd d.) get

lcd

*Which of the following commands can be used to display memory statistics? (Choose all that apply.) a. sar b. vmstat c. free d. iostat

-sar -vmstat -free

*The killall command terminates _____________. a. all instances of a process with the same name. b. all instances of a process with the same priority c. all instances of a process with the same PPID d. all instances of a process with the same PID

a. all instances of a process with the same name.

*Nice values are used to affect process priorities using a range between _____________. a. -19 and 20 b. -20 and 19 c. 0 and -19 d. 0 and 20

b. -20 and 19

*Which of the following statements is true? a. The boot loader points to the MBR/GPT b. Either the MBR/GPT or the active partition can contain the boot loader c. Both the MBR/GPT and the active partition point to the boot loader d. The boot loader points to the active partition

b. Either the MBR/GPT or the active partition can contain the boot loader

*What keyword can be specified within a boot loader to force the system to boot to Single User Mode? a. init b. rescue c. single d. telinit

c. single

*Which file does the UNIX SysV init daemon reference on startup to determine the default runlevel? a. /etc/inistate b. /inittab c. /etc/init d. /etc/inittab

d. /etc/inittab

*Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system? a. /var/spool/cron/(the user's login name) b. /var/spool/cron c. /etc/crontab d. /etc/cron/(the user's login name)

/var/spool/cron/(the user's login name)

*The Debian Package Manager (DPM) is the default package manager used by Fedora 20. True or False?

False

*The daemons associated with network services listen for network traffic associated with a particular___. a. port b. allocation number c. station d. TCP/IP address

Port

*Which Windows program is often used to connect to a Linux server via SSH? a. putty b. mstsc c. SSHD d. Rdesktop

Putty

*Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do? a.) Log in as the root user and reedit the configuration file. b.) Run the dhcpconf command to edit the configuration file. c.) Restart the DHCP daemon. d.) Restart the xinetd daemon.

Restart the DHCP daemon.

*The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?

True

*Files that have been compressed using the compress utility typically have the extension. a. .tar.gz b. .gz c. .Z d. .bz2

c) .Z

*When compiling source code into a binary program, which command does the compiling using the GNU C Compiler? a. tar b. ./configure c. make d. make install

c) make

*Which file holds the methods to be used and the order in which they will be applied for host name resolution? a. /etc/nsswitch.conf b. /etc/hosts c. /etc/resolve.conf d. /etc/dns.conf

/etc/nsswitch.conf

*Which file would you modify to permanently change the TCP/IP address of the first NIC on a Fedora 20 system? a. /etc/sysconfig/network-scripts/ifcfg-eth1 b. /etc/sysconfig/network-scripts/ifcfg-eth0 c. /etc/sysconfig/network-scripts/ipcfg-eth0 d. /etc/sysconfig/network-scripts/ipcfg-eth1

/etc/sysconfig/network-scripts/ifcfg-eth0

*What are two means available to resolve a host name to the appropriate TCP/IP address? a. /etc/resolve.conf b. /etc/hosts c. DNS d. DHCP

DNS /etc/hosts

*The lspci command can be used to isolate problems with X Windows. True or False?

False

*What type of iptables chain targets traffic that is destined for the local computer? a. OUTPUT b. FORWARD c. INPUT d. ROUTE

INPUT

*A runaway process that is faulty and consuming mass amounts of system resources ___________. a. is an orphaned process b. has a PPID of Z c. is a zombie process d. is a rogue process

Is a rogue process

*The at command is used to _______________. a. schedule processes to run in the foreground b. schedule processes to run periodically on a recurring basis in the future c. schedule processes to run periodically in the background d. schedule processes to run at a single instance in the future

Schedule processes to run at a single instance in the future

*What will the command sar -W 3 50 do? a. Take 3 CPU statistics every 50 seconds. b. Take 50 swap statistics every 3 seconds. c. Take 3 swap statistics every 50 seconds. d. Take 50 CPU statistics every 3 seconds.

Take 50 swap statistic every 3 seconds

*When you run the ps command, how are daemon processes recognized? a. There is a "d" for daemon in the terminal identification column. b. There is a question mark in the TTY column c. There is an asterisk in the STIME column. d. The terminal is listed as tty0.

There is a question mark in the TTY column

*As daemon processes are not associated with terminals, you must use the -e switch with the ps command to view them. True or False?

True

*Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or false?

True

*DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?

True

*Most source code is available on the Internet in tarball format. True or False?

True

*SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

True

*Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?

True

*The -9 option to the gzip command results in a higher compression ratio. True or False?

True

*The line that configures the host name for the computer at boot time can be found in /etc/hostname? True or False?

True

*The private key is used when creating a digital signature. True or False?

True

*You can clear a log file simply by redirecting nothing in to it. True or False?

True

*You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

True

*You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue? a.) cancel Printer1-17 Printer1-21 b.) cancel -u Printer1-17 Printer1-21 c.) cancel -a Printer1-17 Printer1-21 d.) cancel 17 21

a.) cancel Printer1-17 Printer1-21

*What is the name used to describe a user providing a user name and password to log in to a system? a.) validation b.) authorization c.) login d.) authentication

authentication

*Which option to the dpkg command can be used to list the files that comprise a package? a. -l b. -L c. -s d. -i

b. -L

*How can you bypass the wait function and send a user process to the background? a. This cannot happen; only daemon processes can run in the background. b. You can use the Ctrl+z key combination and the bg command. c. You can use the ps command. d. This cannot happen once a process is executing; it can only be done when the command is started by placing an ampersand (&) after it.

b. You can use the Ctrl+z key combination and the bg command.

*Which directory stores most UNIX SysV rc scripts? a. /etc/rc5.d b. /etc/rc.d c. /etc/init.d d. /usr/local/systemd

c. /etc/init.d

*Which runlevel halts the system? a. 1 b. 6 c. 0 d. 5

c. 0

*You wish to configure the runlevels that a particular upstart daemon is started in. What should you do? a. Run the appropriate update-rc.d command b. Modify the contents of the /etc/rc[runlevel].d directories c. Modify the daemon configuration file within the /etc/init directory d. Run the appropriate systemctl command

c. Modify the daemon configuration file within the /etc/init directory

*Which of the following commands can be used to list the files contained within an installed RPM package? a. rpm -qa packagename b. rpm -qi packagename c. rpm -ql packagename d. rpm -q packagename

c. rpm -ql packagename

*Which command can be used to start X Windows, the window manager, and the default desktop environment? a. startgui b. startgdm c. startx d. gstart

c. startx

*Which command can be used to fine-tune the vsync and hsync of a video card for use in X Windows? a. vidtune b. synctune c. xvidtune d. vhtune

c. xvidtune

*The process of sending print jobs from the print queue to the printer is called? a. spooling b. queuing c. redirecting d. printing

d. printing

*Which of the following statements is true? a. If /etc/at.allow exists, only users listed in it can use the at command. b. If /etc/cron.allow and /etc/cron.deny exist, only users listed in the former can use the cron command and any listed in the latter are denied access to the cron command. c. If /etc/cron.allow exists, only users listed in it can use the cron command. d. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command.

a. If /etc/at.allow exists, only users listed in it can use the at command. b. If /etc/cron.allow exists, only users listed in it can use the cron command. d. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command.

*Which of the following commands can be used to start a UNIX SysV daemon called lala in runlevels 1, 2, and 3? a. chkconfig --level 123 lala on b. update-rc.d lala defaults c. systemctl enable lala 123 d. service enable lala 123

a. chkconfig --level 123 lala on

*The timeout value in the GRUB configuration file is measured in? a. seconds b. 1/10 of minutes c. 1//10 of seconds d. 1/100 of seconds

a. seconds

*Which of the following commands can be used to search for packages that contain the word "oobla" on RPM software repositories? a. yum search oobla b. rpm -qS oobla c. yum list oobla d. rpm -ql oobla

a. yum search oobla

*What is the name of the file that contains a listing of all users on the system and their home directories? a.) /etc/passwd b.) /etc/users c.) /etc/shadow d.) /etc/password

a.) /etc/passwd

*When a printer is rejecting requests,____________. a.) the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable b.) the print queue does accept jobs into the print queue and holds them there until the printer is accepting requests again c.) the printer appears as off-line when a lp request is sent d.) the print queue redirects all print jobs sent to it to /dev/null

a.) the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

*When compiling source code into a binary program, which command performs a system check and creates the Makefile? a. tar b. ./configure c. make d. make install

b. ./configure

*Which of the following statement is true? a. The GRUB boot loader is stored in the /usr/grub directory. b. LILO needs to be reinstalled after it has been modified. c. The GRUB2 boot loader is often used on legacy Linux systems. d. GRUB needs to be reinstalled after it has been modified.

b. LILO needs to be reinstalled after it has been modified

*Every process has a process ID and a__________. a. child process b. daemon c. parent process ID d. fork process

c. Parent process ID

*The first daemon loaded on a Linux system is _________. a. initstate b. inittab c. init d. linux

c. init

*Which of the following indicates the second partition on the third hard disk drive to GRUB? a. (hd3,2) b. (hd4,3) c. (hd2,3) d. (hd2,1)

d. (hd2,1)

*You have recently modified the options within the /etc/default/grub file. What command can you use next to rebuild the GRUB2 configuration file? a. grub2-install b. grub-install c. grubby d. grub2-mkconfig

d. grub2-mkconfig

*Before a computer can use a router, with what configuration information must it be provided? a. default router b. default gateway c. routing table d. subnet mask

default gateway

*The term used to describe a process spawning or initiating another process is referred to as_________. a. forking b. a child process c. branching d. parenting

a. forking

*Which file contains full and incremental back-up information for use with the dump/ restore utility? a. /etc/dumps b. /etc/dumpdates c. /etc/dumpfile d. /etc/dump.conf

b. /etc/dumpdates

*Which command is used to delete a user account? a.) usermod -d username b.) del username c.) userdel username d.) rm username

c.) userdel username

*Which command can you use to lock a user account? a.) lock username b.) secure username c.) usermod -L username d.) useradd -L username

c.) usermod -L username

*Which command would you use to unlock a user account? a.) unlock username b.) open username c.) usermod -U username d.) useradd -U username

c.) usermod -U username

*Which of the following represents the first non-rewinding SCSI tape device on a system? a. /dev/st0 b. /dev/ht0 c. /dev/nht0 d. /dev/nst0

d. /dev/nst0

*Which of the following command can be used to remove the test DPM package, including any test configuration files? a. dpkg remove test b. apt-get remove test c. dpkg purge test d. apt-get purge test

d. apt-get purge test

*What is the name given to a process not associated with a terminal? a. daemon process b. child process c. user process d. parent process

daemon process

*Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? a. AIDE b. Snort c. tripwire d. SWATCH

-AIDE -tripwire

*What must you do in order to become a DNS server? (Choose all that apply.) a.) Create zone files. b.) Create resource records for DNS lookups. c.) Create NIS maps. d.) Run the name daemon (named).

-Create zone files. -Run the name daemon (named). -Create resource records for DNS lookups.

*Which of the following actions should you first take to secure your Linux computer against network attacks? a. Run a checksum for each file used by network services. b. Configure entries in the /etc/sudoers file. c. Ensure that only necessary services are running. d. Change permissions on key system files.

Ensure that only necessary services are running.

*NFS can be used to share files natively with computers running the Microsoft Windows operating system. True or False?

False

*NIS clients use NIS records to access their configuration information. True or False?

False

*When a printer is disabled, ________. a.) the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable b.) the print queue does accept jobs into the print queue and holds them there until the printer is enabled again c.) the printer appears as off-line when a lp request is sent d.) the print queue redirects all print jobs sent to it to /dev/null

b. the print queue does accept jobs into the print queue and holds them there until the printer is enabled again

*Which command is used to gain real-time information about processes running on the system with the most processor-intensive processes listed at the beginning of the list? a. ps -elf b. top c. ps d. top -l

b. top

*Which command would be used to activate the NIC aliased as eth0? a. ifup eth0 b. ifdown eth0 c. ifup d. ipup eth0

ifup eth0

*Which of the following must you perform to share a directory using NFS? (Choose all that apply.) a.) Edit the /etc/exports file. b.) Mount the directory to the /etc/exports directory using the mount command. c.) Run the exportfs -a command. d.) Start or restart the NFS daemons.

-Edit the /etc/exports file. -Run the exportfs -a command. -Start or restart the NFS daemons.

*What are best practices for securing a local Linux server?\ a. Set the default run level to 1 (Single User Mode). b. Lock the server in a server closet. c. Ensure that you are logged in as the root user to the server at all times. d. Ensure that SELinux or AppArmor is used to protect key services.

-Ensure that SELinux or AppArmor is used to protect key services. -Lock the server in a server closet.

*Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.) a.) The CREATE DATABASE statement within the PostgreSQL utility. b.) The ADD DATABASE statement within the PostgreSQL utility. c.) The adddb command. d.) The createdb command.

-The CREATE DATABASE statement within the PostgreSQL utility. -The createdb command.

*Which file contains information regarding the users, computers, and commands used by the sudo command? a. /etc/sudo b. /etc/sudoers c. /etc/su.cfg d. /etc/sudo.cfg

/etc/sudoers

*What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 14.04 FTP server? a.) /srv/ftp b.) /var/www/ftp c.) /home/anonymous d.) /var/ftp/pub

/srv/ftp

*Which SQL statement key word can be used to delete a record within a table? a.) DELETE b.) DROP c.) REMOVE d.) CLEAR

DELETE

*Which of the following Systemd commands can be used to stop a daemon called lala? a. service stop lala b. systemctl stop lala.service c. chkconfig stop lala d. stop lala

b. systemctl stop lala.service

*Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.) a.) lp -d Printer1 file b.) lp Printer1 file c.) lp file d.) lp -m Printer1 file

a.) lp -d Printer1 file c.) lp file

*Which of the following commands extracts an archive? a. cpio -vocBL /dev/fd0 b. cpio -vicdu -I /dev/fd0 c. cpio -vicdu -O /dev/fd0 d. cpio -vti -I /dev/fd0

b. cpio -vicdu -I /dev/fd0

*Which option to the rpm command can be used to remove a package from the system? a. r b. e c. u d. U

b. e

*When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad? a. good, because the processor is idle 90% of the time b. bad, because the processor is idle 10% of the time and perhaps a faster CPU is required c. bad, because the processor is idle 10% of the time and perhaps a new hard disk is required d. good, because the processor should be idle more than 5% of the time

bad, because the processor is idle 10% of the time and perhaps a faster CPU is required

*Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation? a.) /etc/skel b.) /etc/passwd c.) /etc/login.defs d.) /etc/default/useradd

c.) /etc/login.defs

*Most log files on the system are found in which directory? a.) /etc/logfiles b.) /etc/log c.) /var/log d.) /dev/log

c.) /var/log

*What is the name of the utility used to rotate log files? a.) syslog b.) jetpack c.) logrotate d.) logbackup

c.) logrotate

*Which of the following commands creates an archive? a. tar -cvf /dev/st0 b. tar -xvf /dev/st0 c. tar -tvf /dev/st0 d. tar -zcvf /dev/st0 *

d. tar -zcvf /dev/st0 *

*Which command can be used to connect to a remote Windows share called data on the server called fileserver? a.) smbclient -L fileserver:data b.) smbclient -L //fileserver/data c.) smbclient //fileserver/data d.) smbclient \\fileserver\data

smbclient //fileserver/data

*Which process will always have a PID of 1 and a PPID of 0? a. The kernal itself b. top c. ps d. init

init

*Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors? a.) apachectl b.) sambactl c.) testparm d.) psql

testparm

*Which two commands can be used to modify the route table on a Linux computer? a. route b. ip c. traceroute d. ipconfig

route ip


Conjuntos de estudio relacionados

Cybersecurity Essentials Final Exam

View Set

APUSH AMSCO Ch. 1-24 (USH can use too)

View Set

Mid-Term Secure Communication (Chapter 1 - 6)

View Set

Shampooing, rinsing, and conditioning

View Set

Cold war - Unit 8 Progress check

View Set

Finish Economics Chapter 5 assignment

View Set