LINUX FINAL

¡Supera tus tareas y exámenes ahora con Quizwiz!

What two window managers is the Compiz Fusion window manager based upon?

'compiz' , 'beryl'

When used with the uncompress command, what option displays the contents of the compress file to Standard Output?

-c

What option should be used in conjunction with the lp command in order to specify the destination printer name?

-d

What two options are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

-d -k

What option, when added to the crontab command, opens the vi editor with a user's cron table?

-e

When used with the compress command, what option below can be sued to compress symbolic links?

-f

What two ps options can be used to display a full list of information about each process, and a long list of information about each process?

-f, -l

In order to display a list of job IDs, what option can be specified to the at command?

-l

Select the option that, when used with the gzip command, causes the compression ratios for files that have been compressed to be listed.

-l

What option can be added to the rpm command in order to query packages?

-q

What option(s) should you use with the cpio utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation?

-u; -i

4. Which file stores the TCP/IP addresses of the DNS servers used to resolve host names?

/etc/resolv.conf

17. Which file would you modify to change the TCP/IP address of the first wired NIC on the system the next time the system is booted or the card is brought up?

/etc/sysconfig/network-scripts/ifcfg-eth0

What is the default print job priority for all print jobs created by the lp command?

50

The CUPS web administration tool can be accessed via web browser by accessing what TCP port below?

631

19. Which of the following are stand-alone daemons? (Choose all that apply.)

Apache (httpd) telnet (in.telnetd)

3. Stand-alone daemons are started on demand using the Internet Super Daemon (xinetd). True or False?

False

The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/directory

False

__________ represents a text description of the user and is typically left blank.

GECOS

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?

SIGINT; 2

What signal name and number function as the absolute kill signal, and when issued, forces the Linux kernel to stop executing the process by sending the process's resources to /dev/null?

SIGKILL; 9

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?

SIGQUIT

What stage of the GRUB boot loader typically resides on the MBR /GPT?

Stage1

What option can be used in the journald configuration file to specify a file size to the event log?

SystemMaxUse

When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?

The processing is high priority

Most daemon scripts accept the arguments 'start', 'stop' and 'restart'.

True

11. Which of the following are graphical remote administration technologies? (Choose all that apply.)

X Windows VNC

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?

alert

In the process called __________, a user's username and password are checking against a system database that contains all user account information.

authentication

To view the contents of a file that was compressed with the bzip2 utility, you must use the _______ command.

bzcat

On the CUPS printing system, to remove a print job that is in the print queue, you can use the ________ command followed by the print job IDs of the jobs to remove.

cancel

18. Before a computer can use a router, what configuration information must it be provided?

default gateway

Which of the following is not one of the three main types of Linux commands?

device calls

What command below can be used to uninstall the LILO bootloader from an active partition?

lilo -U

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

login.defs

13. The TCP/IP address 127.0.0.1 is also referred to as the ________________.

loopback address

In order to send a print job to a printer using CUPS, what command must be used?

lp

To change the primary group temporarily to another group, that is listed in the output of the groups and id commands, you can use which command below?

newgrp

The ________ can be used to affect the process priority indirectly.

nice value

The dump/restore utility is limited to a maximum of how many different incremental backups?

nine

A set of information that is sent to a printer at the same time is called a(n) ____________.

print job

In the output of the ps -l command, what column is the most valuable to system administrators because it indicates what the process is currently doing?

process state

What command is used to display the lineage of a process by tracing its PPIDs until the init daemon?

pstree

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?

pwconv

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?

quiet

Processes that have encountered an error during execution and continuously use up system resources are referred to as ___________ processes.

rogue

An RPM package can be converted to a cpio archive using what command?

rpm2cpio

The Sys Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?

rsyslog.conf; rsyslog.d

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?

service

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?

sixth

The _____________ command can be used to start X Windows and the default window manager or desktop environment

startx

In order to change keyboard layout if X Windows cant detect the layout, you should use what CLI command?

system-config-keyboard

In the process state column, what does an "R" indicate?

the process is currently running on the processor

The amount of time a process has to use the CPU is called a(n) _________.

time slice

In order to create user accounts on a Linux system, what command should be utilized?

useradd

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?

wtmp, lastlog

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?

xvidtune

A user account can be locked with the usermod command using what option?

-L

Where is the skeleton directory located on most Linux system?

/etc/skel

On a Fedora based system, where are the shell environment and scheduled commands for at stored?

/var/spool/at

In order to download DPM packages, what command should be used below?

apt-get

What two commands below can be used to view the contents of a bzip2-compressed file page by page?

bzmore bzless

What two commands below can be sued to modify the password expiry information and a user's default shell?

chage, chsh

What command can be used to search for APM package information?

dpkg-query

The killall command uses the PID to kill a process.

false

What command below can be used to re-install GRUB2 in the event that the bootloader becomes corrupted?

grub2-install

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?

grubby

15. Which command would be used to activate the NIC aliased as eth0?

ifup eth0

What two commands below can be used to stop a process, either by PID number or process name?

kill, killall

Which command should be used to restrict access to printers?

lpadmin

Adding the -t option to what command below will provide a list of printers on the system and their status?

lpstat

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?

make

Select the two window managers that have been used in GNOME:

metacity mutter

What log file contains information and error messages regarding network access generated by daemons such as sad and xinetd?

secure

Zombie processes are also known as defunct processes.

true

When killing a background job with the kill command, the background job ID must be prefixed by what character?

%

What character, when appended to a command, causes the command to be run in the background?

&

the K desktop environment utilizes what window manager and toolkit below?

'kwin', 'Qt toolkit'

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?

+

Select the option that can be used with the lpstat command to display a list of printers that are enabled:

-p

What option can be added to the userdel command to remove the home directory of the target user?

-r

When using the compress utility, each file specified for compression is renamed with what extension?

.Z

At what run level does a Linux system have no daemons active in memory, allowing it to be safely powered off?

0

On Linux, the root user always has a UID of what number?

0

Processes are started with what nice value by default?

0

What number indicates the lowest kernel priority(PRI) of a process possible?

127

In Linux, what runlevel is also known as multiuser mode?

2

16. Which of the following port numbers is associated with telnet?

23

If no level of compression is specified, the gzip command assumes what compression level?

6

8. What are two means available to resolve a host name to the appropriate TCP/IP address? (Choose two answers.)

DNS /etc/hosts

Fedora 20 makes use of the XFree86 implementation of X Windows

False

When a computer first initialize, the system BIOZ perform an ________

POST

What kill signal stops a process, then starts it with the same PID?

SIGHUP

1. A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False?

True

14. The line that configures the host name for the computer at boot time can be found in /etc/sysconfig/network. True or False?

True

9. SSH encrypts all traffic that passes across the network, whereas telnet and rlogin do not. True or False?

True

Much like the SysV init daemon, the System init daemon is used to start daemons during system initialization as well as start and stop daemons after system initialization.

True

Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded:

append= boot=

The _______ utility uses the Burrows-Wheeler Sorting Huffman Coding algorithm when compressing files.

bzip2

On LINUX systems that use the traditional UNIX SysV init, what command can be used to list and modify the runlevels that a daemon is started in?

chkconfig

5. To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.)

dig hostname host hostname

On most Linux systems, the logrotate utility is automatically schedule to run weekly.

false

The secure log file contains information regarding the last user to log into a system.

false

When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.

false

What is the default target on a system with a GUI installed

graphical.target

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config file?

grub-mkconfig

In standard GRUb notation, select the option below that represent the first hard drive in a system, and the first partition on that hard drive.

hd0,0

20. Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)

ifconfig ping netstat -i

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?

image=

A(n) ____________ backup backs up only the data that has been changed since the last backup.

incremental

The first daemon process on a system is called the ______ daemon.

init

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes?

init systemd

The _______ facility used by the System Log Daemon specifies messages from the Linux kernel

kern

RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?

package dependency

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?

panic

What can be used on a Linux system to trace the lineage of each child process?

parent process ID

A _______ defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system

runlevel

When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?

systemctl

After a process has been started, you can change its priority by using the renice command.

true

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script.

true

Each process can start an unlimited number of other processes.

true

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.

true

Logs form the cron daemon (crond) can be viewed using the command journalctl_COMM=crond.

true

The compress utility preserves the original ownership, modifications, and access time for each file that it compresses.

true

The cpio command has the ability to handle long filenames and can be used to back up device files.

true

The tar utility cannot back up device files or files with filenames longer than 255 characters.

true

When you print to a printer class, the print job is sent to the fist available printer in the printer class.

true

You can choose to use a window manager only and not use a desktop manager

true

What command can be used to display the contents of a file that was compressed with the compress utility?

zcat

In Fedora 20, where are user configured settings for Xorg stored

/etc/X11/xorg.conf.d/

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?

514

the GUI components and related software take up how much space on a typical Linux installation

4 GB

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent?

40-50

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?

60-70

How many different kill signals can be sent by the kill command to a given process?

64

Files with what two file extensions are commonly known as tarballs?

.tar.gz, .tgz

Under what directory is the Linux kernel stored?

/boot

What device file below indicates the first ATAPI IDE tape device (non-rewinding)?

/dev/nht0

What two device files below represent the first SCSI tape device, rewinding and non-rewinding?

/dev/st0, /dev/nst0

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?

/etc/cups/cupsd.conf, /etc/cups/printers.conf

7. Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/hosts

the ______ file(give full path) often contains a single uncommented line that configures the default run level for a system.

/etc/inittab

6. Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)

route ip

10. What devices are used to transfer information from one network to another?

routers

2. Which networking service allows you to share files with other computers on the network?

NFS

12. The daemons associated with network services listen for network traffic associated with a particular ________________.

port

A(n) _____________ refers to a program that is running in memory and on the CPU.

process

The _________ command can be sued to search Internet software repositories for RPM packages that map to your architecture, and automatically install or upgrade those packages for you.

yum

What yum command below can display a list of package group name?

yum grouplist

After a background process has been started, what command below can be used to move it to the foreground?

fg

In a process referred to as ________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.

forking

Most Linux distributions make use of what package manager?

RPM (Red Hat Package Manager)

CUPS contains versions of the lpr, lpc, lpq, and lprm commands.

true


Conjuntos de estudio relacionados

Historical Theology Focus Questions

View Set

MACRO FINAL - ALL PREVIOUS TEST QUESTIONS]

View Set

29:Care of the Hospitalized Child PrepU's

View Set

Chapter 15: Introduction to Database Concepts

View Set

Brinkley APUSH Chapter 27 - The Cold War

View Set

TREC Promulgated Contract Forms #351 Final

View Set

Biology EOC (FL) Study Set (Vaughn)

View Set

WHOLE SCHOOL, WHOLE COMMUNITY, WHOLE CHILD (WSCC) -Previously the Coordinated School Health approach

View Set