Linux+ Final Exam Study Guide

¡Supera tus tareas y exámenes ahora con Quizwiz!

By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.

10

The shell restricts the number of file handles that programs can open to ____ by default

1024

If a Linux installation ends abnormally and the screen displays a "fatal signal ____" error message, it indicates an error known as a segmentation fault.

11

NTP uses port ____.

123 UDP

The file descriptor stderr is represented by the number ____.

2

Hard disks can contain a maximum of ____ major partitions.

4

The compression algorithm used by the compress utility has an average compression ratio of ____%.

40-50

If no level of compression is specified, the gzip command assumes the number ____.

6

The highest priority SCSI device is given a SCSI ID of ____.

7

When using the chmod command, the mode rwx can be represented by the number ____.

7

You can redirect a file to the standard input of a command using the ____ metacharacter.

<

The ____ SQL statement is used to delete a database.

DROP DATABASE

A user can only be a member of one group. T/F

F

Are hardware-related problems typically more difficult to identify and resolve than software-related problems? T/F

F

Can there be more than one active partition on a hard disk? T/F

F

Did older Linux systems store encrypted passwords in the /etc/shadow file? T/F

F

Do symbolic links share the same inode and inode number? T/F

F

Does a negative nice value give a process a greater chance of a lower priority? T/F

F

Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully. T/F

F

If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command. T/F

F

In Linux, the root directory is represented by a \ character. T/F

F

Most printers are Plug and Play compatible and must be manually configured when they are plugged into the system. T/F

F

Performance problems are caused by hardware, not software. T/F

F

The killall command uses the PID to kill a process. T/F

F

The ssh command has traditionally been used to obtain a command-line shell on remote Linux servers. T/F

F

To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor. T/F

F

Users can create their own custom variables, called shell variables. T/F

F

The ____ stipulates that the source code of any software published under its license must be freely available.

GPL

The two most common desktop environments that are used on Linux are ____ and ____.

Gnome KDE

IPv6 IP addresses are written using eight 16-bit ____ numbers.

Hexadecimal

To see what network services are running on your network, you can run the ____ command.

Netstat

Client computers can retrieve e-mail from e-mail servers via ____ or ____.

POP IMAP

In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.

S

____ of the GRUB boot loader typically resides on the Master Boot Record.

Stage 1

A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator. T/F

T

A room where you lock important computers, such as Linux servers, and to which only Linux administrators or trusted users have key access is commonly called a(n) server closet. T/F

T

A route table is a list of TCP/IP networks that is stored in system memory. T/F

T

Can several different devices share the same major number? T/F

T

Can you combine redirection and piping together? T/F

T

The PATH variable lists directories that are searched for executable files if a relative or absolute pathname was not specified when executing a command on the command line. T/F

T

The SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file. T/F

T

To perform a Linux installation over a network, you can connect to a server with the appropriate installation files via FTP. T/F

T

To see the current runlevel of the system and the previous runlevel (if runlevels have been changed since system startup), you can use the runlevel command. T/F

T

When a device is mounted, it is attached to a certain directory on the directory tree called a(n) mount point. T/F

T

A(n) ____ is a program that can start a network daemon.

TCP wrapper

The ____ filesystem is compatible with the Windows FAT filesystem.

VFAT

The core component of the GUI in Linux is referred to as ____.

X Windows

The ____ priority used by the System Log Daemon indicates an error that should be rectified immediately, such as a corrupt system database.

alert

Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.

corruption

A system process that is not associated with a terminal is called a(n) ____ process.

daemon

The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.

echo $PS1

In the /etc/lilo.conf file, the ____ keyword specifies the file that contains the physical layout of the disk drive.

install=

In Fedora Linux, a ____ file is a script file that specifies the choices that you would normally choose when you install the operating system.

kickstart

To find all of the commands that have the word "list" in their name or description, you would type ____.

man -k list

If you do not know the type, major, or minor number of a device, you can use the ____ command to re-create the device based on the common name.

mknod

If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.

read and execute

In Linux, a(n) ____ is used to accept input from the user and pass the input to the kernel for processing.

shell

In SSH, the /etc/ssh directory stores the DSA public key in the ____ file.

ssh_host_dsa_key

Databases store information in the form of ____, each of which contains ____.

tables; fields

The ____ metacharacter can also be used to refer to the current user's home directory.

~

When killing a background job with the kill command, you must prefix the background job IDs by a(n) ____.

%

When you append a(n) ____ to a command, the command is run in a background process.

&

To lock an account, you can use the usermod command with the ____ option.

-L

The ____ option to the iptables command can be used to specify the default policy for a certain chain type.

-P

To view a list of files and their type, use the ____ switch to the ls command.

-a

To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.

-t

If your system uses the X.org implementation of X Windows, the mouse, keyboard, monitor, and video adapter card information is stored in the ____ file in text format.

/etc/X11/xorg.conf

After the entries in /etc/inittab have been executed, the ____ file is executed to perform tasks that must occur after system startup.

/etc/rc.d/rc.sysint

The ____ file in the /proc directory contains statistics on the performance of the processor.

/proc/cpuinfo

You can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command.

$


Conjuntos de estudio relacionados

Databases Chapter 2- Concept Exam

View Set

Topic 2: Foundations of Government (SS.7.CG.1.2, SS.7.CG.1.3, SS.7.CG.1.4, SS.7.CG.1.5, SS.7.CG.1.6)

View Set

Calvin Cycle (Mastering Biology) (Exam3)

View Set

Developmental Psychology Exam 3 Review

View Set

Midterm Net & Web Security Analysis

View Set