Linux Professional Institute LPIC-1 and CompTIA Linux+

¡Supera tus tareas y exámenes ahora con Quizwiz!

1. What is the role of the BIOS during system boot? (Choose two.) A. It tests system hardware. B. It creates an initrd image in a ramdisk. C. It locates a bootable storage device. D. It provides a menu that lets you choose which operating system to boot. E. It points to your operating system kernel.

1. A, C. The BIOS tests your system hardware during the POST routine and then locates a bootable storage device.

1. What type of software can be managed with a graphical software utility, such as YaST? (Choose two.) A. RPM packages B. Text-based script files C. Software compiled from downloaded source code D. Debian packages

1. A, D. Most graphical software management utilities can manage RPM or Debian package files.

1. Which of the following hard drive parameters refers to a set of concentric, parallel tracks on all sides of all platters in a hard disk drive? A. Cylinders B. Heads C. Sectors Per Track D. Write Precompensation E. Landing Zone

1. A. Cylinders are composed of concentric, parallel tracks on all sides of all platters in a hard disk drive.

1. Which of the following are roles of the Linux file system? (Choose two.) A. Create automatic backups of system data. B. Make data easily locatable. C. Preserve data integrity. D. Provide the user with a command-line interface. E. Provide the user with a graphical user interface.

1. B and C. The role of the file system is to make data easily locatable and to preserve its integrity.

1. Which of the following elements must be included at the beginning of every shell script? A. #Comment B. #!/bin/bash C. exit 0 D. #begin script

1. B. The #!/bin/bash element must be included at the beginning of every bash shell script.

1. Which of the following best describes a multitasking operating system? A. An operating system that can run multiple tasks concurrently on multiple CPUs B. An operating system that can run a single task concurrently across multiple CPUs C. An operating system that runs multiple tasks concurrently on a single CPU D. An operating system that constantly switches CPU time between loaded processes

1. D. A multitasking operating system constantly switches CPU time between loaded processes, creating the impression that the CPU is actually executing processes concurrently.

10. You're using vi to edit a text file in insert mode. Because of the nature of the changes you're making to the file, you need to switch to replace mode. Which keystroke will do this? A. ESC B. CTRL-X CTRL-R C. : D. INSERT

10. D. Pressing INSERT while in insert mode will switch vi to replace mode.

10. When configuring your GRUB configuration file, which of the following points to /dev/sda2 on a SATA hard drive? A. hd1,2 B. hd0,2 C. sd0,2 D. hd0,1

10. D. The term hd0,1 in a GRUB configuration file points to the second partition on the first hard drive in the system.

10. Which configuration file is the first file read when a login bash shell is run? A. ∼/.bashrc B. ∼/.bash_profile C. ∼/.bash_login D. ∼/.profile E. /etc/profile

10. E. The /etc/profile file is read when a bash login shell is first opened.

11. Which command will provide you with a summary of inode consumption on your /dev/sda2 partition? A. df -i B. df -h C. df -hT D. du -inode E. df /dev/sda2

11. A. The df -i command displays summary of inode consumption for all mounted file systems.

11. Which component is used in the e-mail process to create or read an e-mail message? A. MTA B. MDA C. MUA D. Message Store

11. C. The Message User Agent refers to the e-mail client software used in the e-mail process to create or read an e-mail message.

11. The myapp process (PID 2345) is currently running on your system. Which of the following commands will reset its nice value to -5 without unloading the process? A. myapp -n -5 -p 2345 B. renice -n -5 2345 C. renice -5 2345 D. nice -n -5 2345

11. C. The renice -5 2345 command will reset the nice value of the myapp process while it's running.

11. Which of the following commands will remove a user named dnelson from a group named editors? A. groupadd -R ″dnelson″ editors B. groupmod -A ″dnelson″ editors C. groupmod editors -R ″dnelson″ D. groupmod -R ″dnelson″ editors

11. D. Entering groupmod -R ″dnelson″ editors will remove the dnelson user account from the editors group.

11. Which runlevel uses a graphical user interface by default? A. 2 B. 3 C. 4 D. 5

11. D. Runlevel 5 uses a graphical user interface by default.

11. You need to find all entries in your /var/log/messages file that contain the term "scsi." Which is the correct command to do this? A. grep /var/log/messages ″scsi″ B. grep -find ″scsi″ /var/log/messages C. grep /var/log/messages scsi D. grep scsi /var/log/messages

11. D. The grep scsi /var/log/messages command uses the correct syntax.

11. You've just created a DSA private/public key pair for use with SSH public key authentication. What is the name of the public key file? A. ∼/.ssh/id_rsa B. ∼/.ssh/id_dsa C. ∼/.ssh/id_rsa.pub D. ∼/.ssh/id_dsa.pub E. ∼/ssh_host_key.pub

11. D. The ∼/.ssh/id_dsa.pub file is the DSA public key that can be used for SSH public key authentication.

12. Which environment variable can be used on most Linux distributions to configure the display manager you want to use? A. WINDOWMANAGER B. DISPLAYMANAGER C. X11 D. XORG

12. A. The WINDOWMANAGER environment variable can be used on most Linux distributions to configure the display manager you want to use.

12. Which command is used to create quota files for the file system where quotas have been enabled. A. quotacheck -amvug B. quotaon -av C. repquota -av D. edquota -u

12. A. The quotacheck -amvug command is used to create quota files for the file system where quotas have been enabled.

12. The /dev/sda1 partition on your Linux system currently has no volume label. Given that it is an ext4 partition, which command will set the label to "DATA"? A. dumpe2fs -L DATA /dev/sda1 B. tune2fs -L DATA /dev/sda1 C. lsof /dev/sda1 --label "DATA" D. mkfs -t ext4 -L "DATA" /dev/sda1

12. B. The tune2fs -L DATA /dev/sda1 command will set the volume label to DATA.

13. You've used the rpm command with the -q --requires option to determine the components required by the rpm package. One of the required components is /usr/bin/perl. What command would you enter to find out which RPM package provides this component? A. rpm -q --whatprovides /usr/bin/perl B. rpm -qs --requires /usr/bin/perl C. rpm -qi --requires /usr/bin/perl D. rpm -q --provides perl

13. A. The rpm -q --whatprovides /usr/bin/perl command displays the name of the package that provides this component.

15. Which command can be used to process a text stream and remove all instances of the Tab character and replace them with eight spaces? A. cut B. replace -t 8 C. expand D. unexpand

15. C. The expand command can be used to process a text stream and remove all instances of the Tab character and replace them with eight spaces.

15. Which parameter can be added to the Xservers file to change the default color depth used by the display manager to 24-bit color? A. colors=24 B. --depth=24 C. -color_depth 24 D. -bpp 24

15. D. The -bpp 24 parameter can be added to the Xservers file to change the default color depth to 24-bit color.

16. You're working with a file in vi in command mode. You locate a word in the file that needs to be deleted and place your cursor at the beginning of that word. Which command will delete this word without deleting the space that follows the word? A. dw B. de C. d$ D. dd

16. B. Entering de in command mode will cause vi to delete the word without deleting the space that follows the word.

16. Which file is used to configure e-mail aliases? A. /etc/mail/aliases B. /var/spool/mail/aliases C. /etc/aliases D. /etc/postfix/aliases

16. C. The /etc/aliases file is used to configure e-mail aliases.

16. You need to mount a USB flash drive on your Linux system. Given that your Linux system currently has one SATA hard drive installed, which device file represents the flash drive? A. /dev/hdb B. /dev/usb0 C. /dev/sdb D. /dev/sda E. /dev/sdc

16. C. The device will be referenced by /dev/sdb because there is one other drive in the system.

16. Which I/O address is assigned, by default, to the Primary IDE hard disk controller in a PC system? A. 0040h B. 0060h C. 0170h D. 01F0h

16. D. Port 01F0h is assigned to the Primary IDE hard disk controller by default in a PC system.

16. Which option, when used with the tail command, will cause the utility to monitor a log file for new entries? A. - B. -l C. -m D. -f

16. D. The -f option, when used with tail, will cause it to monitor a file for changes and display them on the screen.

16. You've opened your /etc/sysconfig/network/resolv.conf file in the vi editor. You want to specify a DNS server address of 10.200.200.1. Which of the following directives would you enter in this file to do this? A. host 10.200.200.1 B. resolver 10.200.200.1 C. dnsserver 10.200.200.1 D. nameserver 10.200.200.1

16. D. The nameserver 10.200.200.1 directive specifies a DNS server with an IP address of 10.200.200.1.

16. Which command can process a file or text stream and add a number to the beginning of each new line? A. join B. paste C. fmt D. nl

16. D. The nl command can be used to process a file or text stream and add a number to the beginning of each new line.

17. You've just installed an older ISA network board in your Linux system. The kernel did not automatically detect the new device. How can you load a driver for this network board? (Choose two.) A. Load the appropriate driver from the BIOS. B. Insert the appropriate kernel module. C. Recompile the kernel and configure it to support the board. D. Load a Windows driver for the board using emulation mode. E. Embed the driver within a ROM chip on the board itself.

17. B, C. You can insert the appropriate kernel module or you can recompile the kernel and include support for the board.

17. Which command can be used to switch runlevels while the system is running? A. runlevel B. chrun C. mode D. init

17. D. The init command can be used to switch runlevels while the system is running.

19. You want to create a compressed cpio archive of all the files in the Projects directory within your home directory to /mnt/usbdrive/Projectsbackup.cpio.gz. Which command will do this? A. cpio -ov ∼/Projects | gzip > /mnt/usbdrive/Projectsbackup.cpio.gz B. ls ∼/ Projects | cpio -ovz | > /mnt/usbdrive/Projectsbackup.cpio.gz C. ls ∼/ Projects | cpio -ov | gzip > /mnt/usbdrive/Projectsbackup.cpio.gz D. cpio -ovz ∼/Projects > /mnt/usbdrive/Projectsbackup.cpio.gz

19. C. The ls ∼/ Projects | cpio -ov | gzip > /mnt/usbdrive/Projectsbackup.cpio.gz command will generate a listing of files in the Projects directory, send the list to the cpio command to create an archive, and send the archive to gzip for compression.

19. You need to learn about the options available for the chmod utility. Which command will display its manual page? A. gman chmod B. manual chmod C. man chmod D. man display chmod

19. C. The man chmod command will display the man page for chmod.

2. How many slave drives can be configured on the Secondary IDE channel? (Choose two.) A. 0 B. 1 C. 2 D. 4 E. 6 F. 8

2. A, B. Any IDE channel can have either 0 or 1 slave drive on the channel. If no master is implemented on the channel, then no slave drives can be implemented. If a master drive is implemented, then the channel can have one slave drive.

2. Which of the following can be used to secure users' workstations? (Choose two.) A. Screen-saver password B. Session lock C. Long screen-saver timeout period D. Passwords written on sticky notes and hidden in a drawer E. Easy-to-remember passwords

2. A, B. Screen-saver passwords and the session lock function offered by KDE and GNOME can be used to secure users' workstations.

2. Your Linux system uses X.org as its X server. Which configuration file is used to configure this service? A. /etc/X11/XF86Config B. /etc/X11/x11.conf C. /etc/X11/XFree86.conf D. /etc/X11/xorg.conf

2. D. X.org uses the /etc/X11/xorg.conf configuration file.

20. What does the make install command do when installing an application from source code? A. It compiles the source code into a binary executable. B. It checks the local system to verify that the necessary components are available. C. It copies the binary executable and other files, such as documentation, to the appropriate directories in the file system. D. It creates the Makefile file. E. It verifies that the installation files haven't been corrupted or tampered with.

20. C. The make install command actually installs the program and its associated support files (such as documentation and configuration files) into the appropriate directories in the file system.

20. You want to configure limits on the system resources your Linux users are allowed to consume using the pam_limits PAM module. Which file do you need to edit to set these limits? A. /etc/limits.conf B. /etc/pam_limits.conf C. /etc/security/limits.conf D. /etc/security/pam_limits.conf E. /etc/sysconfig/limits.conf

20. C. User limits enforced by the pam_limits module are configured in the /etc/security/limits.conf file.

20. You want to delete all records from a MySQL database table named clients whose status is Inactive (contained in the status column). Which SQL command will do this? A. DELETE * FROM clients; B. DELETE FROM clients status=′Inactive′; C. DELETE * status=′Inactive′ FROM clients; D. DELETE FROM clients WHERE status=′Inactive′;

20. D. The DELETE FROM clients WHERE status='Inactive'; SQL command can be used to delete all records from a MySQL database table named clients whose status is Inactive (contained in the status column).

20. You need to get specific information about the SATA hard drive in your system. Which command could you use from the shell prompt to do this? A. satadump B. lsusb C. sg_scan D. hdparm

20. D. The hdparm utility can be used to get hard disk information.

21. Which of the following commands will add a default gateway router address of 10.200.200.254 to your route table? A. route 10.200.200.254 B. route add default gw 10.200.200.254 C. netstat -a default 10.200.200.254 D. gateway 10.200.200.254

21. B. The route add default gw 10.200.200.254 command will add the specified IP address as the default gateway router.

22. You want to use apt-get to download and install the 3dchess package on your Linux system. Which command can you use to do this? A. apt-get install 3dchess B. apt-get -d install 3dchess C. apt-get upgrade 3dchess D. apt-get -s install 3dchess

22. A. The apt-get install 3dchess command can be used to download and install the 3dchess package on your Linux system, along with all other packages it is dependent upon.

22. You're using man to view the man page for the chown utility. Which keystroke will unload the current man page and exit man? A. CTRL-U B. X C. CTRL-X D. Q

22. D. Pressing Q will exit man.

24. Which locale variable overrides all other locale variables? A. LC_ALL B. LANG C. LANGUAGE D. LC_CTYPE

24. A. The LC_ALL locale variable overrides all other locale variables.

25. You need to search for man pages that relate to the Samba daemon. Which command will do this? A. man -s samba B. man -k samba C. search samba | man D. which samba

25. B. Entering man -k samba will search across man pages for the term "samba."

25. If you are using standard time in the U.S. Central Time zone and UTC is 5:00 P.M., what is the local time? A. 10:00 A.M. B. 12:00 P.M. C. 11:00 A.M. D. 11:00 P.M.

25. C. When it is 5:00 P.M. UTC/GMT, it is 11:00 A.M. CST because CST is six time zones behind UTC.

29. While viewing an info node, which keystroke can be used to navigate to the previous node? A. P B. /prev C. N D. /up

29. A. Pressing P will jump to the previous node.

3. Which utility could you use on a Fedora Linux system to configure the X server? (Choose two.) A. system-config-display B. xf86config C. YaST D. xorgcfg E. xf86cfg

3. A, D. The system-config-display and the xorgcfg utilities can be used to configure X on a Fedora system.

3. Your current shell session has a PID of 3456. You run the su command to change to the root user account. The su process has a PID of 3457. You then run vi from the shell prompt as root. The vi process has a PID of 3458. What is the PPID of the vi process? A. 3456 B. 3457 C. 3458 D. 3459

3. A. Because the command was entered from the shell prompt, its parent process is the bash process, which has a PID of 3456.

4. You need to find out what directories in the Linux file system are included in the path. What command can you use? (Choose two.) A. env B. show $PATH C. man path D. echo $PATH E. writeln PATH

4. A and D. Both of these commands will print the PATH environment variable on the screen.

4. Your system is configured to boot to runlevel 3 by default. You use the startx command to start your graphical environment. What file can you edit in your home directory to specify your default window manager? A. .xinitrc B. .Xsession C. .Xdefaults D. .Xclients

4. A. The .xinitrc file in your home directory is used to specify your default window manager when the startx command is used.

5. You've created a new swap partition (/dev/sdb1) using the fdisk utility. You need to format and enable this partition. Which commands should you use to do this? (Choose two.) A. mkswap /dev/sdb1 B. mkfs -t swap /dev/sdb1 C. swapon /dev/sdb1 D. swapon -a E. mkfs -t vfat /dev/sdb1 F. swapon --enable /dev/sdb1

5. A, C. The mkswap /dev/sdb1 command is used to create the swap file system, and the swapon /dev/sdb1 command enables it as a swap partition.

5. You're responsible for implementing five new Linux servers in your organization's Technical Support department. The Technical Support supervisor has asked that four additional servers be added to the project. Due to time constraints, he won't allow you to adjust the original schedule. Which of the following is the most appropriate response? A. Ignore the request. B. Inform the supervisor that additional resources will have to be added to the project. C. Resign in protest. D. Cheerfully agree to the request and then miss the deadline.

5. B. The best response to this situation is to have a frank discussion with the stakeholder and point out the consequences of the decision. Either the scale will have to be reduced or more resources must be added to the project to complete it in the same time frame.

5. From within a shell script, you need to prompt users to enter their phone number. You need to assign the value they enter into a variable named $PHONE. Which command will do this? A. read ″What is your phone number?″ $PHONE B. read $PHONE C. read PHONE D. ? ″What is your phone number?″ PHONE

5. C. The read PHONE command in a shell script will assign the value entered by the user into a variable named $PHONE.

5. A file named myapp has a mode of 755. If dnelson doesn't own this file and isn't a member of the group that owns the file, what can she do with it? A. She can change the group that owns the file. B. She can open the file, make changes, and save the file. C. She can change ownership of the file. D. She can run the file.

5. D. Because dnelson isn't the owner and isn't a member of the owning group, she is granted the rights assigned to Others, which are read (4) and execute (1). This allows her to run the file.

5. Which directive in the /etc/cups/cupsd.conf file specifies whether or not cupsd will announce its printers using broadcasts on the network? A. BrowseAddress B. BrowseAllow C. Broadcast D. Browsing

5. D. The Browsing directive in the /etc/cups/cupsd.conf file specifies whether cupsd will announce its printers using broadcasts on the network.

5. You need to generate a listing of files and directories within the /var directory, including files in subdirectories. Which command will do this? A. ls /var B. ls -l /var C. ls -f /var D. ls -R /var

5. D. The ls -R /var command will generate a listing of /var and its subdirectories.

6. Who initiated the GNU Project? A. Richard Stallman B. Andrew Tanenbaum C. Linus Torvalds D. Richard Berkley

6. A. Richard Stallman championed the freely distributable source code concept behind GNU.

6. Which command can be used to set the hardware clock on a Linux system to the system time? A. hwclock -w B. hwclock -s C. hwclock -set D. hwclock -r

6. A. The hwclock -w command can be used to set the hardware clock on a Linux system to the system time.

6. You've just downloaded an RPM package file named evolution-2.6.0-41.i586.rpm to your home directory. Assuming the current directory is ∼, what command could you use to check the digital signature of the downloaded file to verify that it hasn't been tampered with? A. rpm --checksig evolution-2.6.0-41.i586.rpm B. rpm --verify evolution-2.6.0-41.i586.rpm C. rpm -tamperproof evolution-2.6.0-41.i586.rpm D. rpm --signature evolution-2.6.0-41.i586.rpm

6. A. The rpm --checksig evolution-2.6.0-41.i586.rpm command would be used to check the file's digital signature.

7. You need to scan a Linux system with an IP address of 10.200.200.1 to determine what ports are currently open on it. What commands could you use at the shell prompt to do this? (Choose two.) A. nmap -sT 10.200.200.1 B. scan 10.200.200.1 -TCP C. scan 10.200.200.1 -UDP D. nmap -sU 10.200.200.1 E. nmap 10.200.200.1 -scan

7. A, D. The nmap -sT 10.200.200.1 command scans for open TCP ports. The nmap -sU 10.200.200.1 command scans for open UDP ports.

7. What is a zombied process? A. A process that has finished executing but whose parent process hasn't released the child process's PID B. A process that has stopped executing while waiting for user input C. A process that is being traced by another process D. A process that has gone to sleep and can't be interrupted

7. A. A zombied process is one where the process has finished executing, but the parent process wasn't notified and, therefore, hasn't released the child process's PID.

7. You want to use the netdate command to synchronize your local system time with a time server whose DNS name is time.mydom.com. Which command will do this? A. netdate time.mydom.com B. netdate -utc time.mydom.com C. netdate -u time.mydom.com D. netdate --sync time.mydom.com

7. A. The netdate time.mydom.com command can be used to synchronize your local system time with a time server whose DNS name is time.mydom.com.

7. Which section of the xorg.conf file is used to define a keyboard and a mouse for the X server to use? A. Modes B. InputDevice C. Module D. Monitor

7. B. The InputDevice section of the xorg.conf file is used to define a keyboard and a mouse for the X server to use.

8. You have been tasked with setting up an e-mail server for your organization of 150 people. You're considering using a Linux system to do this. Is this possible? A. Yes, Linux can be configured to provide e-mail services. B. No, while Linux can be configured to provide e-mail services, it's not recommended for more than 25 users. C. Yes, but you'll have to purchase special e-mail software that's compatible with Linux. D. No currently available commercial groupware software suite has been ported to run on Linux.

8. A. A variety of powerful e-mail packages are available for Linux that make it highly suitable for large organizations.

8. Which section of the xorg.conf file glues all of the various sections into a complete configuration for the X server? A. ServerLayout B. Module C. Files D. Modes

8. A. The ServerLayout section of the xorg.conf file glues all of the various sections into a complete configuration for the X server.

8. Which ps option can be used to display all currently running processes? A. -c B. -e C. -f D. -l

8. B. The ps -e command can be used to display a list of all running processes on the system.

8. You've opened a text file named list.txt in vi. You move the cursor using the arrow keys to the point in the file where you need to make several changes. You try to type, but nothing happens. Why is this happening? A. The vi editor is in insert mode. You need to switch to command mode. B. The vi editor is in command mode. You need to switch to insert mode. C. The vi editor is in insert mode. You need to switch to replace mode. D. The text file is corrupt.

8. B. The vi editor opens by default in command mode. You must press INSERT to switch to insert mode to start editing the file.

8. Which IP port does the NTP daemon use to synchronize time? A. 636 B. 80 C. 443 D. 123 E. 25

8. D. Port 123 is used by the NTP daemon to synchronize time.

8. When supporting an openSUSE Linux system, which file is used to configure the GRUB bootloader? A. /etc/menu.lst B. /etc/grub.conf C. /boot/grub/grub.conf D. /boot/grub/menu.lst

8. D. The /boot/grub/menu.lst file is used to configure GRUB on an openSUSE system.

9. Which Linux services can be used to configure shared network printing on a Linux server for both Linux and Windows client workstations? (Choose two.) A. MySQL B. NFS C. CUPS D. Samba E. NIS F. OpenPrint

9. C, D. The CUPS service provides network printing to other Linux systems. When combined with Samba, network printing can be extended to Windows systems (as well as any other operating system that supports Samba, including Linux and Mac OS X).

1. Which of the following are true of the MAC address? (Choose two.) A. It's hard coded in the network board. B. It's logically assigned by the operating system. C. MAC addresses are globally unique. D. The network administrator can configure its value. E. It is used by the DNS server to resolve domain names.

1. A, C. MAC addresses are hard coded into the firmware of every Ethernet network board. Theoretically, no two network boards in the world should have the same MAC address. There are a few types of network boards that do actually allow you to manually configure the MAC address.

1. When conducting a needs assessment, what questions should you ask? (Choose two.) A. What problem will this installation fix? B. Which distribution should I use? C. Where can I get the best price on a new server? D. Who is requesting the new systems?

1. A, D. You should determine why the new systems are needed and who will be using them.

1. Which of the following commands will display the UID of a user named dcoughanour when entered at the shell prompt? A. id dcoughanour B. finger dcoughanour C. UID dcoughanhour D. info dcoughanour

1. A. Entering id dcoughanour will display the UID of that user account.

1. How are operating system and application configuration parameters stored on a Linux system? A. In text files B. In the Registry C. In .ini files D. In the system database

1. A. Linux uses text files to store configuration parameters for both the operating system and applications or services running on the system.

1. Which of the following commands will print two copies of the /home/tux/employees.txt file to a CUPS printer named MIN2300W? A. lp -d MIN2300W -n 2 /home/tux/employees.txt B. lp -p MIN2300W -c 2 /home/tux/employees.txt C. lp /home/tux/employees.txt D. lp -d MIN2300W /home/tux/employees.txt

1. A. The lp -d MIN2300W -n 2 /home/tux/employees.txt command will print two copies of the /home/tux/employees.txt file to a CUPS printer named MIN2300W.

1. Which of the following is true of symmetric encryption? (Choose two.) A. It uses a private/public key pair. B. Both the sender and the recipient must have a copy of the same key. C. RSA is a form of symmetric encryption. D. Blowfish is a form of symmetric encryption. E. The private key is sent to the recipient to decrypt information encrypted with the public key.

1. B, D. With symmetric encryption, both the sender and the recipient must have a copy of the same key. Blowfish is a form of symmetric encryption.

1. You need to use fdisk to create a partition for the fourth SATA hard drive in your system. Which is the correct command to do this? A. fdisk /dev/hdd B. fdisk /dev/sdd C. fdisk /dev/sda4 D. fdisk /dev/sdb2

1. B. The fdisk /dev/sdd command uses the correct syntax to create a partition the fourth SATA hard drive in your system.

1. Which shell is the default shell for most Linux distributions? A. sh B. csh C. bash D. zsh

1. C. bash is the default shell used with most Linux distributions.

1. Which of the following would be the most secure place to locate a Linux server? A. On the receptionist's front desk B. In the CIO's office C. In an unoccupied cubicle D. In a locked room

1. D. A locked room would be the most secure place to locate a Linux server.

1. You need to change the owner of a file named /var/opt/runme from mireland, who is a member of the users group, to dnelson, who is a member of the editors group. Assuming you want to change both user and group owners, which command will do this? A. chown mireland dnelson /var/opt/runme B. chown -u ″dnelson″ -g ″editors″ /var/opt/runme C. chown dnelson /var/opt/runme D. chown dnelson.editors /var/opt/runme

1. D. Entering chown dnelson.editors /var/opt/runme will change the user and group owners of the runme file to dnelson and editors.

1. Your company recently purchased 12 new computer systems. The computers have Intel Pentium D 2.8 GHz CPUs and 500MB hard drives. Your deployment plan calls for Linux to be installed on them, but the department manager who requested the computers is concerned that this can't be done because they already have Windows 7 preinstalled. Can this be done? A. Yes, but you must install a new hard drive for Linux. B. No, the hardware is probably optimized for Windows and won't support Linux. C. No, modern motherboards are hard coded to recognize your Windows Certificate of Authority. If it doesn't find it, the system won't boot. D. Yes, you can erase the hard drive and install Linux.

1. D. Hardware and operating systems are modular. As long as the hardware is supported, you can install any operating system designed for your specific CPU architecture.

1. Which of the following draws graphical windows on the display? A. KDE B. fvwm C. sawfish D. X.org

1. D. The X.org X server graphically draws windows on the display.

10. Which NTP concept refers to situations where the time on the consumer and the time on the provider are more than 17 minutes apart? A. Insane time B. Slewing C. Drift D. Jitter

10. A. The NTP concept of insane time refers to situations where the time on the consumer and the time on the provider are more than 17 minutes apart.

10. You need to find a file named myfile.txt somewhere in your Linux file system. Which is the correct command to do this? A. find / -name ″myfile.txt″ B. find ″myfile.txt″ C. find / -n myfile.txt D. find -name ″myfile.txt″

10. A. The find / -name ″myfile.txt″ command uses the correct syntax.

10. You want to configure your SSH server to use public key authentication. Which command can you use at the shell prompt of the SSH client system to create an RSA private/public key pair for this purpose? A. ssh-keygen -t rsa B. ssh-keygen -t dsa C. ssh-rsakeygen D. rsakeygen -ssh

10. A. The ssh-keygen -t rsa command can be used at the SSH client to create an RSA private/public key pair for SSH public key authentication.

10. Which mount options need to be included in /etc/fstab to enable quotas when a file system is mounted? (Choose two.) A. groupquotas=on B. usrquota C. grpquota D. userquotas=on E. fsquota

10. B, C. You need to add the usrquota and grpquota options to the mount options for the file system.

10. Which services can be used to configure shared file storage on a Linux server for network users using Windows or Linux workstations? (Choose two.) A. MySQL B. NFS C. PostgreSQL D. Samba E. NIS F. FileManager

10. B, D. The NFS service can be used to provide file sharing for systems running an NFS client. The Samba service can also be used to support Samba-compatible clients, such as Windows, Mac OS X, and Linux systems.

10. Which of the following commands can be used to add the users mhuffman, dnelson, and jcarr to a group named editors on a Linux system? A. groupadd -A ″mhuffman,dnelson,jcarr″ editors B. groupmod -A ″mhuffman,dnelson,jcarr″ editors C. groupmod editors -A ″mhuffman,dnelson,jcarr″ D. groupmod -R ″mhuffman,dnelson,jcarr″ editors

10. B. Entering groupmod -A ″mhuffman,dnelson,jcarr″ editors at the shell prompt will add the mhuffman, dnelson, and jcarr user accounts to the editors group.

10. You just installed a second Ethernet board in your Linux system. What alias is assigned to this interface by default? A. eth0 B. eth1 C. eth2 D. eth3

10. B. The second Ethernet board in your Linux system is assigned an alias of eth1 by default.

10. Which fstab mount option causes pending disk writes to be committed immediately? A. async B. sync C. rw D. auto E. exec

10. B. The sync option causes pending disk writes to be written immediately.

10. You want to install a font file on your Linux X font server. The font file name has a .pfa extension. Where should it be copied to? A. /usr/share/fonts/100dpi B. /usr/share/fonts/truetype C. /usr/share/fonts/Type1 D. /usr/share/fonts/75dpi

10. C. Font files whose names have a .pfa or .pfb extension are PostScript Type 1 fonts and should be copied to /usr/share/fonts/Type1.

10. Which log file contains a list of all users who have authenticated to the Linux system, when they logged in, when they logged out, and where they logged in from? A. /var/log/faillog B. /var/log/last C. /var/log/wtmp D. /var/log/login

10. C. The /var/log/wtmp log file contains a list of all users who have authenticated to the Linux system, when they logged in, when they logged out, and where they logged in from.

10. Which control structures are considered to be branching structures? (Choose two.) A. while loop B. for loop C. until loop D. if/then/else E. case

10. D, E. The if/then/else and case structures are considered to be branching structures because they branch the script in one of several directions based on how a specified condition evaluates.

10. What is the maximum number of USB devices that can be connected to a single USB bus? A. 8 B. 24 C. 63 D. 127 E. 256

10. D. By cascading multiple USB hubs together, you can create a USB bus that can accommodate up to 127 devices. Be aware that the hubs used to create the bus, including the root hub, each count as one device.

10. You're planning to install Fedora on a system that uses a Pentium 4 Celeron CPU. Which distribution architecture should you download? A. IA-64 B. x86-Celeron C. x86-64 D. x86 E. PPC

10. D. The Pentium 4 Celeron CPU uses the Intel x86 architecture.

10. Which of the following shell commands will load the myapp program with a nice value of -5? A. myapp -n -5 B. nice -5 myapp C. renice -5 myapp D. nice -n -5 myapp

10. D. The nice -n -5 myapp command will load myapp with a nice value of -5.

10. You've installed an RPM package file named evolution-2.6.0-41.i586.rpm on your Linux system. What command would you use to uninstall this package? A. rpm -U evolution B. rpm -U --remove evolution C. rpm -i --remove evolution D. rpm -e evolution

10. D. To erase the rpm from the system, you would enter rpm -e evolution.

11. Which services can be installed on Linux to configure the system as a database server? (Choose two.) A. MySQL B. NFS C. PostgreSQL D. Samba E. NIS F. Microsoft SQL

11. A, C. MySQL and PostgreSQL are both powerful Linux database services.

11. With the quota package installed on your Linux system, what parameters can you set quotas for in the file system? (Choose two.) A. Blocks B. Permissions C. Inodes D. Ownership E. Number of Users F. Number of Groups

11. A, C. The quota package can set quotas on blocks and inodes in the file system.

11. Which log file contains a list of failed login attempts? A. /var/log/faillog B. /var/log/last C. /var/log/wtmp D. /var/log/login

11. A. The /var/log/faillog log file contains a list of failed login attempts.

11. You need to use ifconfig to assign an IP address of 176.23.0.12 and a subnet mask of 255.255.0.0 to your eth0 interface. Which of the following commands will do this? A. ifconfig eth0 176.23.0.12 netmask 255.255.0.0 B. ifconfig 176.23.0.12 netmask 255.255.0.0 C. ifconfig eth0 176.23.0.12 mask 255.255.0.0 D. ifconfig dev=eth0 ipaddr=176.23.0.12 subnetmask=255.255.0.0

11. A. The ifconfig eth0 176.23.0.12 netmask 255.255.0.0 command will assign the IP address and subnet mask to the eth0 interface.

11. You want to configure a Linux system to function as an X font server for remote X server client systems. Which line in the /etc/X11/fs/config file needs to be commented out to enable this? A. no-listen tcp B. clone-self on C. deferglyphs 16 D. catalogue /usr/share/fonts/misc:unscaled,

11. A. The no-listen tcp directive in the /etc/X11/fs/config file needs to be commented out to enable an X font server to allow remote X server connections.

11. You currently have an RPM package file named evolution-2.2.0-2.i586.rpm installed on your Linux system. You've recently downloaded the evolution-2.6.0-41.i586.rpm package from http://www.sourceforge.net. What command would you use to install the newer version of this package? A. rpm -U evolution-2.6.0-41.i586.rpm B. rpm -i evolution-2.6.0-41.i586.rpm C. rpm -i --upgrade evolution-2.6.0-41.i586.rpm D. rpm -e evolution-2.2.0-2.i586.rpm

11. A. The rpm -U evolution-2.6.0-41.i586.rpm command will upgrade the existing rpm to the newer version.

11. Which file contains a list of your most recently entered shell commands? A. ∼/.history B. ∼/.bash_history C. /etc/bash_history D. ∼/.bash_commands

11. B. The ∼/.bash_history file contains a list of your most recent shell commands.

11. How fast does FireWire transfer data? A. 12 Mbps B. 64 Mbps C. 400 Mbps D. 480 Mbps

11. C. A FireWire bus transfers data at 400 Mbps.

11. You're using vi to edit a file in insert mode. You need to switch back to command mode. Which keystroke will do this? A. INSERT B. : C. ESC D. BACKSPACE

11. C. Pressing ESC while in insert mode switches vi to command mode.

11. You're planning to install Fedora on a system that uses a 64-bit AMD Phenom multicore CPU. Which distribution architecture should you download? A. IA-64 B. x86-AMD C. x86-64 D. x86 E. PPC

11. C. The 64-bit AMD CPU uses a 64-bit x86 architecture.

11. Which control structure will keep processing over and over as long as the specified condition evaluates to false? A. while loop B. for loop C. until loop D. if/then/else E. case

11. C. The until loop control structure will keep processing over and over as long as the specified condition evaluates to false.

12. Which postfix daemon accepts an e-mail message that is sent to the Postfix MTA by a user using the shell prompt on the local system? A. postdrop B. pickup C. cleanup D. qmgr

12. A. The postdrop daemon accepts an e-mail message that is sent to the Postfix MTA by a user using the shell prompt on the local system.

12. You've copied your RSA public key to the home directory of a user on an SSH server. Which file do you need to add the public key to in order to enable public key authentication? A. ∼/.ssh/authorized_keys B. /etc/ssh/authorized_keys C. ∼/.ssh/id_rsa D. ∼/ssh_host_key.pub E. /etc/ssh/ssh_host_rsa_key.pub

12. A. You need to add the public key to the ∼/.ssh/authorized_keys file in the home directory of the user you want to authenticate as using public key authentication.

12. Which runlevels use a command-line user interface by default? (Choose two.) A. 0 B. 2 C. 3 D. 5 E. 4

12. B, C. Runlevels 2 and 3 use a command-line interface by default.

12. Which log file contains messages from all services running on the system? A. /var/log/faillog B. /var/log/messages C. /var/log/wtmp D. /var/log/services

12. B. The /var/log/messages log file contains messages from all services running on the system.

12. Which control structure will process a specified number of times? A. while loop B. for loop C. until loop D. if/then/else E. case

12. B. The for loop control structure will process a specified number of times.

12. You want to load the myapp program from the shell prompt and run it in the background. Which command will do this? A. myapp -b B. myapp & C. myapp -bg D. load myapp into background

12. B. The myapp & command will cause myapp to run in the background.

12. You need to make a permanent, static IP address assignment for your eth0 network interface, which has a MAC address of 00:0C:29:B1:50:A4. Which file do you need to edit to do this, depending upon your particular distribution? (Choose two.) A. /etc/sysconfig/network/eth0/ifcfg-eth-id-00:0C:29:B1:50:A4 B. /etc/sysconfig/network/00:0C:29:B1:50:A4/eth0 C. /etc/sysconfig/network/ifcfg-eth0 D. /etc/sysconfig/network/ifcfg-eth-id-00:0C:29:B1:50:A4 E. /etc/sysctl/network/ifcfg-eth-id-00:0C:29:B1:50:A4

12. C, D. Depending upon which distribution you're using, you can make persistent IP address assignments using either the /etc/sysconfig/network/ifcfg-eth0 or the /etc/sysconfig/network/ifcfg-eth-id-00:0C:29:B1:50:A4 file.

12. You currently have an external FireWire hard drive connected to the FireWire port in your computer. You need to disconnect the hard drive and connect a FireWire digital video camera to your FireWire port. Can you do this without rebooting the system? A. No, you must bring the system down to do this. B. No, you can't connect a FireWire digital video camera to a FireWire port used by an external hard drive. C. Yes, you can shut down the hard drive and connect the camera. D. Yes, but you must use a different port for each device.

12. C. FireWire devices are self-identifying, self-configuring, and hot-swappable.

12. You're using vi to edit a file in command mode. You try to use the BACKSPACE key to delete a word, but nothing happens. What's wrong with the system? A. You need to switch to normal mode. B. You need to press CTRL-BACKSPACE. C. Nothing is wrong. BACKSPACE doesn't work in command mode. D. You need to switch to command-line mode.

12. C. The BACKSPACE key doesn't work in command mode. You must first switch to insert or replace mode.

12. Which keystroke is used for the command completion feature of bash? A. ENTER B. F1 C. TAB D. UP ARROW

12. C. The TAB key is used with command completion.

12. You're installing a new Linux system. This system will be used by a civil engineer to model the behavior of buildings and bridges during an earthquake. This system must run as fast as possible. It must protect the integrity of the data if the system goes down unexpectedly. If it does go down, the system needs to be back up and running as quickly as possible. Which file system would be the best choice? A. VFAT B. FAT32 C. ext4 D. ext3 E. ext2

12. C. The ext4 file system is the fastest, and it uses enhanced journaling to speed crash recovery while maintaining the overall integrity of the system.

12. You currently have an RPM package file named evolution-2.6.0-41.i586.rpm installed on your Linux system. What command would you enter to display summary information about the package? A. rpm -s evolution B. rpm -qs evolution C. rpm -qi evolution D. rpm -V --summary evolution

12. C. The rpm -qi evolution-2.6.0-41.i586.rpm command will query the package and display summary information on the screen.

12. Which service can be used to turn a Linux system into an application-level gateway? A. MySQL B. NFS C. Samba D. NIS E. Squid

12. E. The Squid service can turn a Linux system into an application-level gateway.

13. Which utility is used to view manual pages? A. man B. manual C. gman D. Kwrite

13. A. The man utility is used to view man pages. If an info node isn't available for a particular command or utility, then info may actually display a man page as well.

13. Consider the following use of the seq command: "seq 3 9." What sequence of numbers will this command generate? A. 3, 4, 5, 6, 7, 8, 9 B. 3, 6, 9 C. 1, 4, 7, 10, 13, 16, 19, 22, 25 D. 9, 18, 27

13. A. The seq 3 9 command will generate the following sequence of numbers: 3, 4, 5, 6, 7, 8, 9. The first number specifies the starting number, while the second number specifies the ending number in the sequence. Because an increment is not specified, the sequence increments by 1.

13. To which file can you add commands that you want executed each time the system boots? (Choose two.) A. rc B. boot.local C. rc.local D. rc.systinit E. boot

13. B, C. You can enter commands in boot.local on BSD-type systems or rc.local on System V-type systems to have them automatically run each time the system boots.

13. You've created a new file using vi and now need to save the file without exiting the editor. Which command will do this? A. :s B. :w C. :save D. :exit

13. B. Entering :w will save the current memory buffer to disk without exiting the editor.

13. Which partition is used for virtual memory by a Linux system? A. pagefile B. swap C. /swap D. /boot E. /tmp

13. B. Linux systems use a dedicated swap partition by default for virtual memory.

13. Which option in your eth0 network interface configuration file should you use to configure the NIC to get its IP address information dynamically from a DHCP server? A. STARTMODE B. BOOTPROTO C. IPADDR D. DHCP

13. B. The BOOTPROTO option is used to specify whether the interface uses a static or dynamic IP address assignment.

13. Which kill signal sends a CTRL-C key sequence to a running process? A. SIGHUP B. SIGINT C. SIGKILL D. SIGTERM

13. B. The SIGINT kill signal sends a CTRL-C key sequence to the specified process.

13. You want to use GPG to encrypt files. Which command should you use to create your GPG private/public key pair? A. gpg -e -r key_user_name filename B. gpg --gen-key C. gpg --export key_user_name > public_key_filename D. gpg --import public_key_filename

13. B. The gpg --gen-key command is used to create a GPG private/public key pair.

13. Which configuration file is used by the xdm display manager? A. /etc/kde/kdm B. /etc/X11/kdm C. /etc/X11/xdm/xdm-config D. /etc/X11/gdm

13. C. The /etc/X11/xdm/xdm-config configuration file is used by the xdm display manager.

13. Which qmail protocol allows the sharing of e-mail queues between multiple MTAs? A. QMTP B. QSNMP C. QPOP D. QMQP E. QMTA

13. D. The QMQP qmail protocol allows the sharing of e-mail queues between multiple MTAs.

13. Which utility can you use to view your /var/log/lastlog file? A. cat B. last C. grep D. lastlog

13. D. The lastlog command can be used to view your /var/log/lastlog file.

13. You're installing two ISA expansion boards in an older PC system. One is a sound board, the other a network board. The system has INT 2 and INT 9 available. Can you assign these interrupts to these two boards? A. Yes, either board can use either interrupt. B. Yes, but the sound board must use INT 2 and the network board must use INT 9. C. No, sound boards can't use INT 2 or INT 9. D. No, network boards can't use INT 2 or INT 9. E. No, INT 2 and INT 9 can't be used at the same time.

13. E. Because of the way the system's PIC chips are cascaded, INT 2 and INT 9 are actually the same interrupt.

13. You are concerned about the condition of a hard drive containing a heavily used ext3 disk partition (/dev/sda2). To ensure data integrity, you want to increase the frequency of automatic fsck checks. Which utility should you use to configure this? A. dumpe2fs B. debugfs C. e2fsck D. fsck E. tune2fs

13. E. The tune2fs command with the -c option can be used to customize the frequency of automatic fsck checks.

14. You've used the rpm command with the -V option to verify an rpm package installed on your system. The output from the command listed the following error code: What does this error code indicate? (Choose two.) A. There's a problem with the size of the file. B. There's a problem with the mode of the file. C. There's a problem with the timestamp of the file. D. There's a problem with a file's revision numbers. E. There's a problem with a file's ownership.

14. A, C. The S, 5, and T in the error code indicate that there is a problem with the file's size, MD5 checksum, and timestamp. The c indicates that the file is a configuration file, so these errors may or may not be significant.

14. You need to view the first few lines of the /var/log/boot.msg file. Which of the following commands will do this? (Choose two.) A. head /var/log/ boot.msg B. tail /var/log/ boot.msg C. grep -l 10 /var/log/boot.msg D. less /var/log/boot.msg E. cat /var/log/boot.msg

14. A, D. The head /var/log/boot.msg and less /var/log/boot.msg commands will display the first few lines of the file on screen.

14. Which command can be used to print columns or fields that you specify from a file to the standard output using the Tab character as a delimiter? A. cut B. pr C. fmt D. sort

14. A. The cut command can be used to print columns or fields that you specify from a file to the standard output using the Tab character as a delimiter.

14. Where are the init scripts stored on a Fedora Linux system? A. /etc/rc.d/init.d B. /etc/init.d C. /etc/init D. /etc/rc.d/init.d/rcx.d

14. A. The init scripts on a Fedora system are stored in /etc/rc.d/init.d.

14. You need to kill a hung process. You know its process name, but you don't know its PID. Which utility can you use? A. killall B. kill C. hangup D. SIGKILL

14. A. The killall utility uses the process name in the command line and can be used to kill the process in this scenario.

14. You need to mount an optical disc in /media/dvd. Which command will do this? A. mount -t iso9660 /dev/cdrom /media/dvd B. mount -t dvd /dev/cdrom /media/dvd C. dvdmount -t iso9660 /dev/cdrom /media/dvd D. mount -t iso9660 /dev/cdrom ∼/dvd

14. A. The mount -t iso9660 /dev/cdrom /media/dvd command uses the correct syntax on most distributions; assuming a symbolic link named /dev/cdrom has been created that points to /dev/sr0.

14. What is the default assignment for IRQ 0 on an x86 system? A. System Timer B. Keyboard C. COM 1 D. Floppy Drive

14. A. The system timer is hardwired to interrupt 0 on a PC system.

14. Which parameters in your eth0 network interface configuration file are required to assign an IPv6 address to the host? (Choose two.) A. ETHTOOL_OPTIONS B. PREFIXLEN C. IPADDR D. MTU E. REMOTE_IPADDR F. USERCONTROL

14. B, C. The PREFIXLEN and IPADDR directives are used along with the LABEL directive in a network interface configuration file to assign an IPv6 address to a NIC that also has an IPv4 address assigned.

14. Which xdm configuration file is used to customize the login interface presented to the end user after the display manager has booted? A. Xlogin B. Xresources C. Xstartup D. Xsession

14. B. The Xresources configuration file is used to customize the login interface presented to the end user after the display manager has booted.

14. You need to import another user's GPG public key into your keyring so that you can decrypt files she sends you. Which command will do this? A. gpg -gen-key B. gpg --import public_key_filename C. gpg --list-keys D. gpg --export key_user_name > public_key_filename

14. B. The gpg --import public_key_filename command can be used to import another user's GPG public key into your keyring so that you can decrypt files she sends you.

14. You've created a new file using vi and need to save the file to disk and exit the program. Which command will do this? (Choose two.) A. :w B. :e! C. :wq D. :exit E. :q

14. C, D. Entering :exit will cause vi to save the current file and exit the program, as will entering :wq.

14. Which environment variable contains the directory where man page files are located? A. MANUAL B. MANUALPATH C. MANPAGEPATH D. MANPATH

14. D. The MANPATH environment variable stores the path to the man pages on most Linux distributions.

14. If your system has 1GB of RAM installed, how big should your swap partition be? A. 256MB B. 1GB C. 512GB D. Depends on what the system will be used for.

14. D. The optimal size of the swap partition depends on what the system will be used for. A workstation running lots of applications at once will need a large swap partition. A server providing network services may not need one as large.

14. Where are your users' mail queues stored on a Linux system running postfix? A. /var/queues/mail B. /opt/postfix/mail/queues C. /var/mail/queues D. /var/spool/mail

14. D. Your users' mail queues on a Linux system running postfix are stored in /var/spool/mail.

15. Which interrupts are hardwired on a PC system? (Choose two.) A. 0 B. 1 C. 2 D. 3 E. 4 F. 5

15. A, B. Interrupts 0, 1, and 8 are hardwired on a PC system. They can't be assigned to any other devices.

15. You've made several changes to a configuration file using vi. You realize that you've made a myriad of mistakes and want to quit without saving the changes so that you can start over. Which command will do this? A. :q! B. :exit C. :q D. :exit!

15. A. Entering :q! will exit vi without saving changes to the current file.

15. You've opened your /etc/sysconfig/network/routes file in the vi editor. You want to specify a default gateway router address of 10.200.200.254. Which of the following directives would you enter in this file to do this? A. default 10.200.200.254 B. gw_addr 10.200.200.254 C. gateway 10.200.200.254 D. router 10.200.200.254

15. A. The default 10.200.200.254 directive specifies a default gateway router address of 10.200.200.254.

15. An associate has just sent you a GPG-encrypted file, and you need to decrypt it. Assuming you've already imported this associate's GPG public key into your keyring, which command can you use to decrypt the file? A. gpg --output output_filename --symmetric encrypted_filename B. gpg --export encrypted_filename > output_filename C. gpg --output output_filename --decrypt encrypted_filename D. gpg --import encrypted_filename output_filename

15. A. The gpg --output output_filename --symmetric encrypted_filename command can be used to decrypt a file sent to you by someone else (assuming you've already imported this person's GPG public key into your keyring).

15. You need to send a message to the ksanders user on your Linux system. Given that your user account and the ksanders account both reside on the same system, what command can you use to do this? A. mail ksanders B. send ksanders C. mailq ksanders D. newmail ksanders

15. A. The mail ksanders command can be used to send a message to the ksanders user on your Linux system.

15. Which file can be used to configure the path to the man page files? A. /etc/man_db.conf B. /etc/man.conf C. /etc/man.txt D. /etc/manual.conf

15. A. You can use the /etc/man_db.conf file to specify the path to the man files on some Linux distributions.

15. Which of the following directories should have their own partition? (Choose three.) A. /bin B. /boot C. /etc D. /usr E. /home F. /root G. /dev

15. B, D, E. You should consider creating separate partitions for /boot, /usr, and /home.

15. Which command can be used on an openSUSE Linux system to start the Secure Shell server (sshd) daemon? (Choose two.) A. /etc/rc.d/init.d/sshd start B. /etc/init.d/sshd restart C. /etc/rc.d/init.d/sshd reload D. /etc/init.d/sshd start E. /etc/init.d/sshd reload F. /etc/rc.d/init.d/sshd restart

15. B, D. Either the /etc/init.d/sshd restart or the /etc/init.d/sshd start command can be used on an openSUSE Linux system to start the Secure Shell server (sshd) daemon.

15. You've noticed that a renegade executable has been installed on your Linux server and that it is currently running. You need to: 1) identify the process using the file so that you can kill it and 2) determine which user account is being used to run it. Which fuser command options should you use to do this? (Choose two.) A. -a B. -k C. -i D. -u E. -p

15. B, D. The -k option for the fuser command kills the process, while the -u option shows which user owns the process.

15. You're configuring the /etc/logrotate.d/ntp file to customize logging from the Network Time Protocol daemon on your system. You want old, archived logs to be saved using the current date in the filename extension. Which directive in the ntp file will do this? A. notifempty B. dateext C. rotate D. create

15. B. The dateext directive will cause old, archived log files to be saved using the current date in the filename extension.

15. You want to run the rsync command to synchronize your home directory with another server on the network. You know this command will take several hours to complete and you don't want to leave your system logged in during this time. Which command can you use to leave rsync running after your log out? A. SIGHUP B. nohup C. stayalive D. kill -NOHUP

15. B. The nohup command can be used to load a program so that it will ignore the SIGHUP signal that is sent when the user logs out, allowing the process to remain running.

15. You need to extract a single file out of an RPM package. Which utility can be used to do this? A. tar B. rpm C. dpkg D. rpm2cpio

15. D. The rpm2cpio utility can be used to create a cpio archive file from the RPM package. You can then extract individual files from the archive using the cpio utility.

16. You're installing a new Linux server. This system will function as an e-mail server for your organization. What ports should you open on its host firewall? (Choose three.) A. 110 B. 80 C. 25 D. 143 E. 443

16. A, C, and D. Port 110 is used by the POP3 e-mail protocol. Port 25 is used by the SMTP e-mail protocol. Port 143 is used by the IMAP e-mail protocol.

16. It's currently 1:00 in the afternoon. You want to schedule the myapp program to run automatically tomorrow afternoon at 12:00. Which of the following at commands could you use? (Choose two.) A. at 12 pm tomorrow B. at tomorrow -1 hour C. at now +1 day D. at today +23 hours E. at now +23 hours

16. A, E. You can enter at 12 pm tomorrow or at now +23 hours to cause the atd daemon to run the specified command at 12:00 on the following day.

16. Which parameter must be removed from the Xservers file on a system running the xdm display manager to enable remote access to the X server? A. -nolisten tcp B. -remote on C. DisallowTCP=false D. DISPLAYMANAGER_REMOTE_ACCESS="yes"

16. A. The -nolisten tcp parameter must be removed from the Xservers file on a system running the xdm display manager to enable remote access to the X server.

16. Which file is used to set the default runlevel of a Linux system? A. /etc/inittab B. /etc/runlevel.conf C. /etc/init.conf D. /etc/sysconfig/init

16. A. The /etc/inittab file is used to set the default runlevel of a Linux system.

16. You need to install the GNU C Compiler (gcc) package on your system. Which yum command will do this? A. yum gcc B. yum install gcc C. yum update gcc D. yum installpkg gcc

16. B. The yum install gcc command can be used to download and install the gcc package on your Linux system, including all packages it is dependent upon.

16. Which of the following manual sections contains man pages for administrative utilities used by the root user? A. 1 B. 3 C. 8 D. 9

16. C. Section 8 of the manual contains man pages for utilities and commands used by root.

17. You want to send the contents of the logfile.txt file in the current directory to the sort command to sort them alphabetically and display them on the screen. Which commands will do this? (Choose two.) A. sort < logfile.txt B. sort logfile.txt C. sort < logfile.txt -o ″screen″ D. sort < logfile.txt > screen E. sort -n logfile.txt

17. A, B. The sort < logfile.txt command and the sort logfile.txt command will both send the contents of the logfile.txt file to the sort command to sort its lines alphabetically and display them on the screen.

17. You're viewing a configuration file in vi in command mode. You need to locate a directive named server in the file. However, the file is very long and you don't want to scan through it line by line. What command can you use in command mode to search for this term? A. /server B. search=server C. /″server″ D. find ″server″

17. A. Entering /server in command mode will search for the expression server in the file.

17. Which of the following crontab lines will cause the /usr/bin/myappcleanup process to run at 4:15 A.M. on the first of every month? A. 15 4 1 - - /usr/bin/myappcleanup B. 15 4 - 1 - /usr/bin/myappcleanup C. 1 4 15 - - /usr/bin/myappcleanup D. 4 1 - - 15 /usr/bin/myappcleanup

17. A. The 15 4 1 - - /usr/bin/myappcleanup crontab line will cause the myappcleanup process to be run at 4:15 A.M. on the first day of every month no matter what day of the week it is.

17. Which xdm display manager file is used to configure access controls for XDMCP connections? A. Xaccess B. Xsession C. xdm-config D. Xresources

17. A. The Xaccess file is used to configure access controls for XDMCP connections.

17. Which yum command generates a list of available updates for all installed packages on a Linux system? A. yum list updates B. yum info C. yum list available D. yum list all

17. A. The yum list updates command can be used to generate a list of available updates for all installed packages on a Linux system.

17. Which of the following manual sections contains man pages for utilities and commands that can be used by any user? A. 9 B. 1 C. 3 D. 7

17. B. Section 1 of the manual contains man pages for commands that can be used by any user.

17. Which of the following directories contains configuration files that the xinetd daemon uses to manage network daemons (by default)? A. /var/lib/xinetd.d B. /etc/xinetd.d C. /etc/xinetd D. /srv/xinetd.d

17. B. The /etc/xinetd.d directory contains the configuration files that the xinetd daemon uses to manage network daemons.

17. Which SQL command can be used to retrieve information from a database table? A. QUERY B. SELECT C. FIND D. UPDATE

17. B. The SELECT command can be used to retrieve information from an SQL database table.

17. You want to use your organization's DHCP server to dynamically assign an IP address to your eth0 network interface. Which of the following commands would you enter at the shell prompt to do this? A. dhcp eth0 B. dhclient eth0 C. get address dynamic eth0 D. ip address=dhcp dev=eth0

17. B. The dhclient eth0 command will configure the eth0 interface with IP address information from a DHCP server.

17. Which type of backup backs up all files modified since the last full backup and does not flag the files as having been backed up? A. Full B. Incremental C. Differential D. Partial

17. C. A differential backup backs up all files modified since the last full backup and does not flag the files as having been backed up.

17. You need to install Linux on a workstation. The hard drive has been wiped and is ready for the new operating system. You insert your Linux installation DVD in the optical drive and boot the system. Instead of starting the installation routine, the screen displays an error message indicating that an operating system couldn't be found. What's the most likely cause of the problem? A. Your Linux DVD is damaged. B. The hard drive is failing and needs to be replaced. C. The DVD drive is malfunctioning. D. The boot device order is set incorrectly in the BIOS.

17. D. The most likely cause of this problem is that the system is set to boot off the hard drive first. When it can't find the operating system on the hard drive, the error message is displayed.

19. Which mouse accessibility option allows you to complete a certain task when you move the mouse in a specific way? A. MouseKeys B. Mouse Gestures C. Dwell Click D. Simulated Secondary Click

19. B. Mouse gestures allow you to complete a certain task when you move the mouse in a specific way.

18. You need to scan your Linux file system to locate all files that have either the SUID or SGID permission set. Which commands can you use to do this? (Choose two.) A. find / -type f -perm -u=s -ls B. find / -type f -perm -g=s -ls C. audit -p=SUID D. audit -p=SGID E. find / -p=s F. find / -p=g

18. A, B. The find / -type f -perm -u=s -ls command locates all files that have the SUID permission set. The find / -type f -perm -g=s -ls command locates all files that have the SGID permission set.

18. You want to display on screen the sixth, seventh, and eighth words in any line of /var/log/messages that has the term "syslog" in it. Which of the following commands will do this? A. cat /var/log/messages | awk ′/syslog/ {print $6,$7,$8}′ B. cat /var/log/messages | awk ′/syslog/ {print 6,7,8}′ C. cat /var/log/messages | awk /syslog/ {print $6,$7,$8} D. cat /var/log/messages | awk ′syslog {print 6,7,8}′

18. A. The cat /var/log/messages | awk ′/syslog/ {print $6,$7,$8}′ command will find instances of "syslog" in the stdout of cat and print the sixth, seventh, and eighth words in each matching line.

18. You want to temporarily disable the second interface in your Linux system. Which of the following commands would you enter at the shell prompt to do this? A. ifdown eth1 B. ifdown eth0 C. ifdown eth2 D. ifconfig disable dev eth1

18. A. The ifdown eth1 command will disable the second Ethernet interface in the system.

18. Which command can be used to view all of the databases defined on a MySQL server? A. mysqlshow B. mysqladmin C. mysql_install_db D. mysqldatabase

18. A. The mysqlshow command can be used to view all of the databases defined on a MySQL server.

18. You need to create a backup of /etc to a removable hard disk drive mounted at /mnt/USB. Which tar command will do this? A. tar -cfv /mnt/USB/backup.tar /etc B. tar -xfv ∼/backup.tar /etc C. tar -xzf /mnt/USB/backup.tar /etc D. tar -cfv /mnt/USB/backup.tar ∼/etc

18. A. The tar -cfv /mnt/USB/backup.tar /etc command uses the correct syntax.

18. In which directory can you find your kernel modules? A. /lib/modules/version/kernel/drivers B. /lib/modules/version/drivers C. /boot/ D. /usr/modules/version/drivers/kernel

18. A. Your kernel modules are stored in /lib/modules/version/kernel/drivers.

18. What does the configure script do in an application's installation directory? (Choose two.) A. It compiles the source code into a binary executable. B. It checks the local system to verify that the necessary components are available. C. It copies the binary executable and other files, such as documentation, to the appropriate directories in the file system. D. It creates the Makefile file. E. It verifies that the installation files haven't been corrupted or tampered with.

18. B, D. The configure script is used to check the local system to make sure it has the components required to install and run the software. It also creates the Makefile file.

18. The following link files are located in the /etc/init.d/rc3.d directory. If the system is configured to boot into runlevel 3 by default, which file is run by init before any of the others? A. S09cups B. S05cifs C. S06kbd D. S10cron

18. B. The S05cifs link file (which starts the cifs daemon) is run before any of the other files due to the number assigned to the file.

18. Your Linux system uses two SATA hard disk drives. Which of the following refers to the second SATA drive in the system? A. /dev/sda B. /dev/sdc C. /dev/sdb D. /dev/sdd

18. C. /dev/sdb points to the second hard drive installed in a system.

18. Which keyboard accessibility option allows users to lock modifier keys, enabling them to complete keyboard tasks with just one finger that would normally require two or more fingers? A. MouseKeys B. SlowKeys C. StickyKeys D. ToggleKeys

18. C. StickyKeys allows users to lock modifier keys, enabling them to complete keyboard tasks with just one finger that would normally require two or more fingers.

18. You need to learn about the options available for the mkdir utility. Which command will display its manual page? A. gman mkdir B. cat mkdir | man C. manual mkdir D. man mkdir

18. D. The man mkdir command will display the man page for mkdir.

19. Your Linux system uses a single IDE (PATA) hard disk drive. Which of the following refers to the first partition on the drive? A. /dev/sda1 B. /dev/sdb1 C. /dev/sda2 D. /dev/pdb2

19. A. /dev/sda1 points to the first partition on the first hard drive in the system.

19. Your openSUSE Linux system is currently in runlevel 5. You enter the init 3 command at the shell prompt as root to switch to runlevel 3. There is a kill script for the cups service in the /etc/init.d/rc3.d directory and a start script for the same service in the rc5.d directory. What happens to the cups service as the runlevel is changed? A. The rc script leaves the service running because it is configured to run in both runlevels. B. The rc script runs the kill script to stop the service but does not run the start script to run it. C. The rc script runs the start script to start the service but does not run the kill script to stop it. D. The rc script runs the kill script to stop the service and then runs the start script to restart the service.

19. A. Because cups is configured to run in both runlevels (and is therefore assumed to be running currently), then the rc script does nothing. It just leaves the daemon running.

19. You want to query a MySQL database table named clients and find all records whose last name (contained in the last column) is Jones. Which SQL command will do this? A. SELECT * FROM clients WHERE last=′Jones′; B. SELECT * FROM clients last=′Jones′; C. QUERY * FROM clients WHERE last=′Jones′; D. SELECT last=′Jones′ FROM clients;

19. A. The SELECT * FROM clients WHERE last=′Jones′; SQL command can be used to query a MySQL database table named clients and find all records whose last name (contained in the last column) is Jones.

19. What does the make command do when installing an application from source code? A. It compiles the source code into a binary executable. B. It checks the local system to verify that the necessary components are available. C. It copies the binary executable and other files, such as documentation, to the appropriate directories in the file system. D. It creates the Makefile file. E. It verifies that the installation files haven't been corrupted or tampered with.

19. A. The make command compiles the text-based source code into a binary executable that can be run on the system.

30. While viewing an info node, which keystroke can be used to navigate to the beginning of the node? A. B B. /top C. HOME D. T

30. C. Pressing the HOME key will take you to the first line in an info node.

19. The existence of which file prevents all users except root from logging in to a Linux system? A. /root/nologin B. /etc/nologin C. /var/log/nologin D. /tmp/nologin E. /usr/sbin/nologin

19. B. The existence of the /etc/nologin file prevents all users except root from logging in to the Linux system.

19. You need to verify that a remote host with a hostname of fs1.mycorp.com is up and running. Which of the following commands would you enter at the shell prompt to do this? A. finger fs1.mycorp.com B. ping fs1.mycorp.com C. netstat -s fs1.mycorp.com D. verify fs1.mycorp.com

19. B. The ping fs1.mycorp.com command will test communications between your system and the specified host.

19. In which directory would you find information about how IRQ channels have been assigned in your system? A. /proc/devices B. /proc/dma C. /proc/interrupt D. /proc/iomem

19. C. Information about IRQ assignments are found in /proc/interrupt.

2. You've created a shell script in your home directory named myscript. How can you execute it? (Choose two.) A. Enter /bin/bash ∼/myscript at the shell prompt. B. Enter myscript at the shell prompt. C. Select Computer | Run in the graphical desktop; then enter ∼/myscript and select Run. D. Enter run ∼/myscript at the shell prompt. E. Enter chmod u+x ∼/myscript; then enter ∼/myscript at the shell prompt.

2. A, E. You can enter /bin/bash ∼/myscript or chmod u+x ∼/myscript to make the script execute.

2. You just entered vi at the shell prompt. What type of process was created on your Linux system? A. User B. System C. Daemon D. System V

2. A. Because the command was entered from the shell prompt, a user process was created.

2. Which directory contains file system management utilities such as cp or rm? A. /bin B. /dev C. /var D. /usr

2. A. File system utilities are located in /bin.

2. Which transport protocol is used by network applications that need very low latency and can tolerate a certain degree of unreliability? A. User Datagram Protocol B. Transmission Control Protocol C. Internet Protocol D. Internet Control Message Protocol

2. A. The User Datagram Protocol is an unacknowledged, connectionless protocol that sends packets without requesting a confirmation of receipt. This makes it ideal for network applications that need very low latency but can tolerate a certain degree of unreliability, such as streaming video.

2. Which of the following is true of asymmetric encryption? (Choose two.) A. The private key is sent to the recipient. B. The public key is sent to the recipient. C. Information encrypted with the public key can only be decrypted with the private key. D. Information encrypted with the public key can be decrypted with the public key. E. Information encrypted with the private key can be decrypted with the private key.

2. B, C. With asymmetric encryption, the public key is sent to the recipient. Information encrypted with the public key can only be decrypted with the private key.

2. Which of the following represents the actual operating system component within a Linux system? A. Libraries B. Kernel C. Desktop environment D. bash shell functions

2. B. The Linux kernel is the component that handles operating system functions.

2. You've just downloaded a file named FC-6-i386-DVD.iso to the /home/tux directory on your Linux system. What command would you use to generate a checksum value? A. checksum /home/tux/FC-6-i386-DVD.iso B. sum /home/tux/FC-6-i386-DVD.iso C. verify /home/tux/FC-6-i386-DVD.iso D. rpm -V /home/tux/FC-6-i386-DVD.iso

2. B. The sum /home/tux/ FC-6-i386-DVD.iso command will generate a checksum value for the file specified.

2. You've used fdisk to create a new partition on the second hard drive in your Linux system. You want to use the partition as a second swap partition for your system. Which partition type do you need to change it to? A. 83 B. 82 C. 85 D. 1 E. You can't use two swap partitions on the same system.

2. B. Type 82 defines a Linux swap partition.

2. Where can your Linux bootloader reside? (Choose two.) A. In the BIOS B. In an initrd image C. In the MBR of a storage device D. In the bootable partition E. In the system chipset

2. C, D. The Linux bootloader can be stored in the MBR of the storage device and in the bootable partition on the disk.

2. You are working at the bash shell in a CLI-only environment on a Linux system. You have a program currently running when you discover that you need to access to the shell prompt to perform another task. You don't want to halt the first program to do this. What can you do? A. Nothing, you must halt the first program to access the shell prompt. B. You can press CTRL-PAUSE on the keyboard. This will pause the running program while you access the shell prompt. C. You can press ALT-F2 to open an alternate console screen and access a new shell session. D. Press CTRL-SHIFT-F6. This will automatically open a new shell session without pausing the running program.

2. C. Pressing ALT-F2 will open an alternate console. You can use this console to perform other tasks without stopping the program running in the first console screen. You can switch back by pressing ALT-F1.

2. Which of the following files is used to store user accounts on a Linux system that has been configured to use local authentication? A. /etc/shadow B. /etc/users C. /etc/passwd D. /etc/local/accounts

2. C. The /etc/passwd file stores user account information.

2. Which permission, when applied to a directory in the file system, will allow a user to enter the directory? A. Read B. Write C. Execute D. Access Control

2. C. The execute permission allows a user to enter a directory in the file system.

2. Where are most configuration files stored in the Linux file system? A. /boot B. /var C. /usr D. /etc

2. D. Most Linux configuration files are stored in the /etc directory or in a subdirectory of /etc.

2. Which of the following commands sets the default printer on a Linux system to a printer named MIN2300W? A. lpoptions MIN2300W B. lpstat -d MIN2300W C. lp default MIN2300W D. lpoptions -d MIN2300W

2. D. The lpoptions -d MIN2300W command will set the default printer on a Linux system to a printer named MIN2300W.

2. Which of the following is a properly stated goal in a needs assessment? A. Mike's boss wants a new server, so we're going to install it. B. We're going to install Linux on everyone's desktop. C. We need a new Linux server. D. The new Linux system will provide a network database to increase the documentation team's productivity by an anticipated 20 percent.

2. D. This response clearly states the goal of the project and is measurable.

20. Your users can't access your organization's e-mail server, which is hosted by a third-party vendor. You suspect that a router may be down somewhere within your organization. Given that the hostname of the e-mail server is pop.mymail.com, which of the following commands would you enter at the shell prompt to test this? (Choose two.) A. traceroute pop.mymail.com B. netstat -r pop.mymail.com C. finger pop.mymail.com D. verify pop.mymail.com E. tracepath pop.mymail.com

20. A, E. The traceroute pop.mymail.com and the tracepath pop.mymail.com commands will list all of the routers between the source and destination hosts, allowing you to identify a router that isn't working correctly.

20. Which command can be used to create an image of your /dev/sda2 partition in the /mnt/usb/volback file? A. dd if=/dev/sda2 of=/mnt/usb/volback B. cp /dev/sda2 /mnt/usb/volback C. dd if=/mnt/usb/volback of=/dev/sda2 D. dd if=/dev/sda of=/mnt/usb/volback

20. A. The dd if=/dev/sda2 of=/mnt/usb/volback command creates an image of the /dev/sda2 partition in the /mnt/usb/volback file.

20. Which section in a man page provides a brief review of the syntax used for a particular command or utility? A. REVIEW B. SYNOPSIS C. DESCRIPTION D. SYNTAX

20. B. The SYNOPSIS section of a man page provides a review of the syntax used for a command or utility.

20. Which Linux daemon must be loaded to allow Orca to communicate with Braille devices? A. brailled B. brltty C. orcad D. braillettyd

20. B. The brltty daemon must be loaded to allow Orca to communicate with Braille devices.

20. The ntp daemon on your Linux system is currently configured to run in runlevels 3 and 5. You want to remove all kill and start scripts for the ntp daemon in the various rcx.d directories. Which command will do this? A. insserv ntp B. insserv -r ntp C. /etc/init.d/ntp stop D. chkconfig -l ntp E. chkconfig -s ntp 35

20. B. The insserv -r ntp command will disable the ntp service by removing all links for the ntp daemon in all of the rcx.d subdirectories within your init script directory.

20. Your Linux system uses a single IDE (PATA) hard disk drive. Which of the following refers to the second partition on the IDE drive? A. /dev/sda1 B. /dev/hdb1 C. /dev/sda2 D. /dev/hdb2

20. C. /dev/sda2 points to the second partition on the first hard drive in the system.

21. Which commands can be used to insert a kernel module? (Choose two.) A. insmod B. modinfo C. modprobe D. rmmod E. depmod

21. A, C. You can use insmod or modprobe to insert a kernel module.

21. Your Linux system uses two SCSI hard disk drives. The first drive is assigned SCSI ID 0; the second drive is assigned SCSI ID 1. Which of the following refers to the first partition on the second SCSI drive in the system? A. /dev/sda1 B. /dev/sdc1 C. /dev/sdb1 D. /dev/sdd1

21. C. /dev/sdb 1 points to the first partition on the second hard drive in the system.

21. Which action, when used with the dpkg command, uninstalls a specified package and deletes all of its configuration files? A. -r B. -p C. -P D. -U

21. C. The -P option, when used with the dpkg command, uninstalls a specified package and deletes all of its configuration files.

21. Which section in a man page provides a list of man pages or other resources related to the particular command or utility? A. DESCRIPTION B. VERSION C. SEE ALSO D. REFERENCES

21. C. The SEE ALSO section of a man page provides a list of related resources.

22. Which locale environment variable configures your default character encoding? A. LC_NUMERIC B. LC_CTYPE C. LC_MEASUREMENT D. LC_CHAR

22. B. The LC_CTYPE environment variable configures the default character encoding.

23. Which locale value specifies French Canadian using Unicode encoding? A. en_US.UTF-8 B. fr_CA.UTF-8 C. fr_CA.ASCII D. en_CA.ASCII

23. B. The fr_CA.UTF-8 locale value specifies French Canadian using Unicode encoding.

23. Which type of shared library is integrated directly into an executable file when it is initially compiled? A. Dynamic B. Shared C. Static D. Linked

23. C. Static shared libraries are integrated directly into an executable file when it is initially compiled.

23. You're using man to view the man page for the Samba daemon. Which keystrokes can you use to search for the term "password" in the man page? A. /″password″ B. CTRL-S C. /password D. CTRL-F

23. C. To search for the expression "password" in a man page, you enter /password.

24. Which file is checked by applications on startup for the location of shared libraries on the Linux system? A. /etc/ld.so.conf B. /etc/ld.so.cache C. /lib/ld.so D. /usr/lib/ld.so

24. B. The /etc/ld.so.cache file is checked by applications on startup for the location of shared libraries on the Linux system.

24. After searching for a term within a man page, you need to jump to the next instance of the term in the page. Which keystroke will do this? A. Q B. P C. N D. S

24. C. After entering a search term, pressing N will take you to the next instance of that term in a man page.

26. Which directive in the /etc/sysconfig/clock file configures the time zone a Linux system will use? A. TIMEZONE B. ZONE C. UTC D. HWCLOCK

26. A. The TIMEZONE directive in the /etc/sysconfig/clock file specifies which time zone a Linux system uses.

26. You need to search for man pages that relate to the PAM service. Which command will do this? A. which pam B. man -s pam C. search pam | man D. apropos pam

26. D. Entering apropos pam will search across man pages for the term "pam."

27. Which environment variable can be used to set the current time zone on a Linux system? A. TIMEZONE B. UTC C. TZ D. TIME

27. C. The TZ environment variable can be used to set the current time zone on a Linux system.

27. You need to use info to view information about using the smbpasswd utility. Which command will do this? A. info /smbpasswd B. info ″smbpasswd″ C. show info smbpasswd D. info smbpasswd

27. D. Entering info smbpasswd will cause info to display information about the smbpasswd utility.

28. While viewing an info node, which keystroke can be used to navigate to the next node? A. /next B. P C. N D. L

28. C. Pressing N will jump to the next node.

3. Suppose Karen from Customer Service approaches you and asks for a new Linux server for her team. Who else should you talk to as a part of your needs assessment? (Choose two.) A. Karen's boss B. Karen's coworkers C. The Technical Support supervisor D. Your hardware vendor

3. A, B. Karen's boss and her coworkers are key stakeholders in the project.

3. A user needs to open a file, edit it, and then save the changes. What permissions does he need to do this? (Choose two.) A. Read B. Write C. Execute D. Modify

3. A, B. The user must have read and write permissions to open and modify a file.

3. Where can you find the vi symbolic link file on most Linux distributions? A. /usr/bin B. /usr C. /sys D. /sbin

3. A. Depending upon your distribution, either the vi program itself or a symbolic link to the vim program will be stored in /usr/bin.

3. Which of the following files is used to store user passwords on a Linux system that has been configured to use local authentication? A. /etc/shadow B. /etc/users C. /etc/passwd D. /etc/local/accounts

3. A. The /etc/shadow file stores user passwords.

3. Which CUPS component handles IPP printing requests from CUPS clients? A. CUPS Scheduler B. PDLs C. CUPS Backends D. PPDs

3. A. The CUPS Scheduler handles IPP printing requests from CUPS clients.

3. Where does the Linux kernel reside? A. In /boot B. In the MBR C. In /proc D. In /kernel

3. A. The Linux kernel resides in /boot in the file system.

3. You've copied down an executable file named runupdate.sh from your company's server to the /tmp directory on your Linux system. You change to the /tmp directory at the shell prompt. When you enter runupdate.sh, the shell indicates that it can't find the file. What can you do? A. Enter the filename in all capital letters. B. Add a ./ before the filename when entering it at the prompt. C. Enter the filename without the .sh extension. D. Move the file to your home directory and then execute it.

3. B. Adding ./ before the filename tells the shell that the file resides in the current directory.

3. If there are two hard drives on a Primary IDE channel, how many master drives must be configured on the channel? A. 0 B. 1 C. 2 D. Unlimited

3. B. If there are two hard drives on an IDE channel, one of them has to be set to be a master drive. The other must be a slave drive.

3. Which layer of the OSI model enables the routing of data? A. Data Link B. Network C. Transport D. Session E. Application

3. B. The Network layer of the OSI model enables the routing of data between networks. In an IP network, this functionality is provided by the Internet Protocol (IP itself).

3. Which command will create a new variable named TOTAL and set its type to be "integer"? A. variable -i TOTAL B. declare -i TOTAL C. declare TOTAL -t integer D. TOTAL=integer

3. B. The declare -i TOTAL command will create the TOTAL variable and type it as integer.

3. You need to format the first partition on the slave drive on the secondary IDE channel using the ext3 file system. Which is the correct command to do this? A. mkext3fs /dev/sdd1 B. mkfs -t ext3 /dev/sdd1 C. mkfs -t ext3 /dev/sda4 D. mkreiserfs -t ext3 /dev/sdd1

3. B. The mkfs -t ext3 /dev/sdd1 command uses the correct syntax to format the first partition on the slave drive on the secondary IDE channel using the ext3 file system.

3. You've just downloaded a file named FC-6-i386-DVD.iso and have generated a checksum value. The value generated is slightly different from that shown on the download web site. What does this imply? A. The downloaded copy is different than the original, but the download is still usable as long as the differences are minor. B. The version number is incremented by 1 when the file was downloaded. C. The downloaded copy is different than the original copy and shouldn't be used. D. The downloaded copy is exactly the same as the original copy.

3. C. A variance in the checksum values indicates the two copies of the file are different in some way. You shouldn't use the file in this situation because it probably is corrupt.

3. Which of the following provides prewritten code elements that programmers can call when writing Linux programs? A. The kernel B. Kernel modules C. Libraries D. bash shell profiles

3. C. Libraries contain prewritten code that programmers can reuse in their applications.

3. Which directory is a pseudo-file system that is dynamically created when it is accessed? A. /var B. /opt C. /proc D. /srv

3. C. The /proc file system is a pseudo-file system.

3. Which host key files store the private keys used by the SSH version 2 server? (Choose two.) A. /etc/ssh/ssh_host_key B. /etc/ssh/ssh_host_key.pub C. /etc/ssh/ssh_known_hosts D. /etc/ssh/ssh_host_rsa_key E. /etc/ssh/ssh_host_dsa_key

3. D, E. The private keys used by the SSH version 2 server are stored in /etc/ssh/ssh_host_rsa_key and /etc/ssh/ssh_host_dsa_key.

3. Which of the following commands will load the updatedb process and leave it running even if the user logs out of the shell? A. updatedb B. updatedb & C. updatedb -nohup D. nohup updatedb &

3. D. The nohup updatedb & command will load the updatedb process and leave it running even if the user logs out of the shell.

31. You want to add the ∼/temp directory to your system's PATH environment variable. You want to be sure you don't overwrite the existing directories in your path, so you enter PATH=PATH:∼/temp at your shell prompt. Did you do this correctly? A. Yes, this command will work correctly. B. No, you must first export the variable before you set it. C. No, you must use a $ before each PATH variable name in the command. D. No, you must use a $ before the second PATH variable name in the command.

31. D. You must reference the PATH variable using $PATH after the sign. Otherwise, PATH will be interpreted as a literal string of text.

32. Which commands can you use to view the values currently assigned to your environment variables? (Choose two.) A. set B. display C. var D. show E. env

32. A and E. You can use the set command or the env command to view your variables.

33. You want to view a list of the aliases currently defined on your Linux system. What command can you issue at the shell prompt to do this? A. alias B. alias -l C. alias -a D. env alias

33. A. The alias command is used to view your system's aliases.

34. Which file descriptor refers to the text a command displays on the screen after the command has finished processing? (Choose two.) A. stdin B. stdout C. stdisplay D. stdoutput E. stderr

34. B and E. The stdout and stderr file descriptors represent output displayed on screen (by default) by most commands.

35. You want to send the standard output and the standard error from the tail / var/log/firewall command to a file named lastevents in the current directory. Which command will do this? A. tail /var/log/firewall 1> lastevents 2> lastevents B. tail /var/log/firewall > lastevents C. tail /var/log/firewall 1> lastevents 2> &1 D. tail /var/log/firewall 1&2>l asteventss

35. C. The tail /var/log/firewall 1> lastevents 2> &1 command will send both stdout and stderr to the same file.

36. You want to send the contents of the logfile.txt file in the current directory to the sort command to sort them alphabetically and display them on the screen. Which command will do this? A. sort < ./logfile.txt B. sort -i ./logfile.txt C. sort < ./logfile.txt -d ″screen″ D. sort < ./logfile.txt > screen

36. A. The sort < ./logfile.txt command will send the file to the stdin of the sort command.

4. A file named employees.odt has a mode of rw-r- -r- -. If mhuffman is not the file's owner but is a member of the group that owns this file, what can he do with it? A. He can open the file and view its contents, but he can't save any changes. B. He can open the file, make changes, and save the file. C. He can change ownership of the file. D. He can run the file if it's an executable.

4. A. In the mode shown, Group is given the read permission only. Because mhuffman is a member of the group, he can only open and view file contents. He can't modify and save the file.

4. You need to display the text "Hello world" on the screen from within a shell script. Which command will do this? A. echo ″Hello world″ B. read Hello world C. writeln ″Hello world″ D. print ″Hello world″

4. A. The echo ″Hello world″ command will display the text "Hello world" on the screen from within a shell script.

4. Which of the following commands can be used to switch to the root user account and load root's environment variables? A. su - B. su root C. su root -e D. su -env

4. A. The su - command switches to the root user account and loads root's environment variables.

4. Which parameter in the /etc/ssh/sshd_config file specifies which version of SSH the sshd daemon should use? A. HostKey B. Protocol C. SSHVersion D. ListenAddress

4. B. The Protocol parameter in the /etc/ssh/sshd_config file specifies which version of SSH the sshd daemon should use.

4. Which directive within the /etc/lilo.conf file can be used to specify the menu item that will be automatically loaded if the user doesn't make a selection? A. prompt B. default C. image D. boot

4. B. The default directive is used to specify the LILO menu label that will be loaded automatically if the user doesn't make a selection.

4. On which block is the first redundant copy of a partition's superblock stored by default on an ext4 file system? A. 0 B. 32768 C. 98304 D. 163840

4. B. The first redundant copy of a partition's superblock is stored on block 32768 by default on an ext4 file system.

4. Which process is the grandparent of all processes running on your Linux system? A. bash B. init C. sh D. ps

4. B. The init process is the grandparent of all other Linux processes on the system. All other processes can trace their heredity to init.

4. You've just set up an e-mail server on your Linux system and enabled the SMTP and POP3 daemons to allow users to send and receive mail. Which ports must be opened in your system's host firewall to allow this? (Choose two.) A. 20 B. 21 C. 25 D. 110 E. 119 F. 80

4. C, D. The SMTP daemon uses port 25 by default, while the POP3 daemon uses port 110 by default.

4. Which of the following are components of your project scope? (Choose two.) A. Customer demands B. Management decision-making C. Schedule D. Scale

4. C, D. The project scope is composed of schedule, scale, and resources.

4. Your Linux system has an IP address of 192.168.1.20. What URL should you use in a browser to access the CUPS web-based administration utility? A. http://192.168.1.20 B. https://192.168.1.20 C. http://192.168.1.20:631 D. http://192.168.1.20/cups

4. C. The http://192.168.1.20:631 URL can be used to access the CUPS administration utility on a Linux system with an IP address of 192.168.1.20.

4. Suppose you have an IDE DVD drive and an IDE hard drive connected to the Secondary IDE channel. The DVD drive is connected to the first connector on the ribbon cable; the hard drive is connected to the second connector. Which drive must be set to be the master drive? A. The DVD drive B. The hard drive C. Either device can be the master. D. Neither device can be the master if dissimilar devices are connected to the same IDE channel.

4. C. The location on the IDE cable has no bearing on whether a drive is a master device or a slave device.

4. Which directory does the ∼ character represent when used with file system commands? A. /var B. The current directory C. The current user's home directory D. The root user's home directory

4. C. The ∼ character points to the home directory of the current user.

4. Consider the following entry in /etc/passwd: ksander:x:1001:100:Kimberly Sanders:/home/ksanders:/bin/bash What is the primary group for this user? (Choose two.) A. ksanders B. home C. 1001 D. 100 E. users F. video

4. D, E. The GID of ksander's primary group is 100. On most distributions, this is the users group.

4. What was the name of the UNIX clone written by Andrew Tanenbaum? A. CPM B. DR-DOS C. Linux D. Minix E. Solaris

4. D. Andrew Tanenbaum wrote the Minix operating system when universities were no longer allowed access to the UNIX source code.

4. Which command-line command can be used to enable syntax checking of a script while editing it in the vi editor? A. :syntax_checking on B. :syntax=enabled C. :syntax=script D. :syntax on

4. D. The :syntax on command is used to turn syntax checking on in the vi editor.

4. You've just downloaded a file named BitTorrent-5.0.1.tar.gz to your home directory. Assuming the current directory is ∼, what command would you enter at the shell prompt to extract all of the files from this archive? A. gzip -d ./BitTorrent-5.0.1.tar.gz B. tar -axvf ./BitTorrent-5.0.1.tar.gz C. tar -xvf ./BitTorrent-5.0.1.tar.gz D. tar -zxvf ./BitTorrent-5.0.1.tar.gz

4. D. To extract the file, you would enter tar -zxvf ./BitTorrent-5.0.1.tar.gz.

5. Which of the following are valid IP addresses that can be assigned to a network host? (Choose two.) A. 192.168.254.1 B. 11.0.0.0 C. 257.0.0.1 D. 192.345.2.1 E. 10.200.0.200

5. A, E. 192.168.254.1 and 10.200.0.200 are both valid IP addresses that can be assigned to network hosts.

5. What is the maximum number of devices that can share the same SATA bus? A. 1 B. 2 C. 4 D. Varies by manufacturer

5. A. Each SATA devices has its own dedicated data channel to the SATA controller. The controller itself may provide multiple SATA data channels to support multiple devices, however.

5. You've copied an executable file named update1.sh from your company's server to /tmp on your Linux system. You open a shell and change to the /tmp directory. When you enter ./Update1.sh, the shell indicates that it can't find the file. What can you do? A. Enter the filename in all lowercase letters. B. Add a .\ before the filename when entering it at the prompt. C. Enter the filename without the .sh extension. D. Move the file to your home directory and then execute it.

5. A. Linux is case-sensitive. The command in the question uses an uppercase U.

5. Which section of the xorg.conf file tells the X server where to find font files? A. Files B. Fonts C. InputDevice D. Modes

5. A. The Files section of the xorg.conf file tells the X server where to find font files.

5. Where does the RPM store its database of installed packages? A. /var/lib/rpm B. /etc/rpm C. /var/rpmdb D. /tmp/rpm

5. A. The RPM database is stored in /var/lib/rpm.

5. Which parameter in the /etc/ssh/ssh_config file configures the ssh client to only establish connections with SSH servers whose public key has already been added to either the ∼/.ssh/known_hosts or the /etc/ssh/ssh_known_hosts file? A. StrictHostKeyChecking B. HostKey C. Protocol D. User

5. A. The StrictHostKeyChecking parameter in the /etc/ssh/ssh_config file configures the ssh client to only establish connections with SSH servers whose public key has already been added to either the ∼/.ssh/known_hosts or the /etc/ssh/ssh_known_hosts file.

5. Which directive within the /etc/lilo.conf file can be used to specify the device that should be mounted at / ? A. root B. initrd C. image D. default

5. A. The root directive in lilo.conf specifies the device that should be mounted at /.

5. Which of the following is a strong password? A. Bob3 B. TuxP3nguin C. penguin D. Castle

5. B. The TuxP3nguin password meets the basic requirements for a strong password.

5. You're running a Fedora Linux system that uses System V init scripts. Where are these scripts stored in your file system? A. /etc/init.d B. /etc/rc.d/init.d C. /etc/sysv/init.d D. /etc/init.d/rc.d

5. B. The init scripts for distributions that use System V init scripts are stored in /etc/rc.d/init.d.

5. Consider the following entry in /etc/shadow: How often must this user change her password? A. Every 30 days B. Every 60 days C. Every 7 days D. This feature is disabled. The user isn't required to change her password.

5. B. The user must change her password every 60 days. The value of 60 in the record shown specifies that the maximum age of a password is 60 days. After that, the user must change to a new password.

5. You have a terminal window open on your Linux system, and the current directory is /tmp. You need to use vi to edit a text file named vnc in the /etc/xinetd.d directory on your system. Which of the following commands will do this? A. vi vnc B. vi /tmp/vnc C. vi /etc/xinetd.d/vnc D. vi /etc/xinetd.d

5. C. Because the file to be loaded doesn't reside in the current directory, you have to provide the full path to the file along with its filename when starting vi.

5. What did Linus Torvalds do with the source code for Linux? A. He sold it to IBM. B. He gave it to Microsoft for free. C. He developed Minix. D. He patented and copyrighted it. E. He posted it on the Internet for anyone who wanted a copy.

5. E. Linus Torvalds posted the source code for his Linux kernel on the Internet and invited other programmers to modify and enhance it.

6. Which of the following is the default subnet mask for a Class B network? A. 255.255.0.0 B. 255.0.0.0 C. 255.255.255.0 D. 255.255.255.252

6. A. 255.255.0.0 is the default subnet mask for a Class B network.

6. You need to change the permissions of a file named schedule.odt so that the file owner can edit the file, users who are members of the group that owns the file can edit it, and users who are not owners and don't belong to the owning group can view it but not modify it. Which command will do this? A. chmod 664 schedule.odt B. chmod 555 schedule.odt C. chmod 777 schedule.odt D. chmod 644 schedule.odt

6. A. Entering chmod 664 schedule.odt will grant Owner and Group read (4) and write (2) permissions. It will also grant Others read (4) permission.

6. You need to create a new user account on a Linux system for Mike Huffman named mhuffman. Mike's password should be set to "3X.N3pL9U8HNM," and he needs a home directory created in /home/mhuffman. Which of the following commands will do this? A. useradd -c ″Mike Huffman″ -m -p ″3X.N3pL9U8HNM″ mhuffman B. usermod ″Mike Huffman″ -p ″3X.N3pL9U8HNM″ mhuffman C. useradd mhuffman D. useradd mhuffman -c ″Mike Huffman″ -m -p 3X.N3pL9U8HNM

6. A. Entering useradd -c ″Mike Huffman″ -m -p ″3X.N3pL9U8HNM″ mhuffman will create the user mhuffmann, set its full name to Mike Huffman, create a home directory (-m), and set the user's encrypted password to 3X.N3pL9U8HNM.

6. You need to view the last few lines of your /var/xinetd.log file. Which is the best command to do this? A. tail /var/xinetd.log B. cat/var/xinetd.log |more C. head /var/xinetd.log D. less /var/xinetd.log

6. A. The tail utility is the best choice to display the last few lines of the file.

6. You created an ext4 file system on the first partition on the second hard disk in your system and now need to mount it in /mnt/extraspace in read-write mode. Which commands will do this? (Choose two.) A. mount -t ext4 /dev/sda1 /mnt/extraspace/ B. mount -t ext4 /dev/sdb1 /mnt/extraspace/ C. mount -a /dev/sdb1 /mnt/extraspace/ D. mount -t ext /dev/sdb1 /mnt/extraspace/ E. mount -t ext4 -o ro /dev/sdb1 /mnt/extraspace/

6. B, C. Either the mount -t ext4 /dev/sdb1 /mnt/extraspace/ command or the mount -a /dev/sdb1 /mnt/extraspace/ command will mount the /dev/sdb1 partition in /mnt/extraspace/.

6. Which port does the sshd daemon listen on by default for incoming SSH connections? A. 20 B. 22 C. 389 D. 631 E. 80 F. 443

6. B. The sshd daemon listens on port 22 by default for incoming SSH connections.

6. You're installing new Linux systems that will be used by software engineers to develop advanced computer-aided design applications. Which distributions would be the best choice for this deployment? (Choose two.) A. Red Hat Enterprise Linux B. Red Hat Client C. Red Hat Enterprise Linux Workstation D. SUSE Linux Enterprise Server E. SUSE Linux Enterprise Desktop

6. C, E. Technically, any Linux distribution could be used in this role. However, options C and E are specifically optimized for these kinds of tasks.

6. You've just finished making several changes to your /etc/lilo.conf file. What should you do next? A. Reboot the system. B. Change to runlevel 3. C. Run lilo from the shell prompt. D. Restart the lilo service.

6. C. After making changes to /etc/lilo.conf, you need to run lilo from the shell prompt to reinstall LILO.

6. You want to use ps to display extended information about only the processes associated with your current terminal session. Which command will do this? A. ps B. ps -e C. ps -f D. ps -ef

6. C. The ps -f command will display extended information about processes associated with the current shell session.

6. Which command can be used from within an if/then/else structure to evaluate whether or not a specified condition is true? A. eval B. == C. test D. <>

6. C. The test command can be used from within an if/then/else structure to evaluate whether or not a specified condition is true.

6. You have a terminal window open on your Linux system, and the current directory is your user's home directory. You need to create a new file in your home directory named resources.txt using vi. Which of the following commands will do this? A. vi resources.txt -new B. vi resources C. vi ∼/resources D. vi resources.txt

6. D. Because you haven't specified a path, vi will create the file in the current directory, which is what you want.

6. Which section of the xorg.conf file defines video modes for the X server? A. Files B. Screen C. Monitor D. Modes

6. D. The Modes section of the xorg.conf file defines video modes for the X server.

6. You need to set password age limits for the ksanders user account. You want the minimum password age to be one day, the maximum password age to be 45 days, and the user to be warned five days prior to password expiration. Which command will do this? A. usermod -m 1 -M 45 -W 5 ksanders B. useradd -m 1 -M 45 -W 5 ksanders C. chage -M 1 -m 45 -W 5 ksanders D. chage -m 1 -M 45 -W 5 ksanders

6. D. The chage -m 1 -M 45 -W 5 ksanders command will set the minimum password age to be one day, the maximum password age to be 45 days, and the user to be warned five days prior to password expiration.

6. Which Linux utility can be used to display a list of all running processes on your system? A. env B. procman C. processes D. top E. echo $PROCESSES

6. D. The top utility displays running processes.

6. Which SCSI ID has the highest priority? A. 0 B. 1 C. 3 D. 5 E. 7

6. E. The higher the SCSI ID, the higher the device priority.

7. Suppose you have a SCSI chain with four devices connected on an internal ribbon cable: an internal hard drive (hd0) at the end of the cable followed by a second hard drive (hd1), an internal CD drive (cd0), and then the SCSI controller (sc0). Which devices should have termination enabled? (Choose two.) A. hd0 B. hd1 C. cd0 D. sc0

7. A, D. Because the first hard drive and the SCSI controller are located at the ends of the SCSI chain, they must have termination enabled. No devices in between should have termination enabled.

7. You've just downloaded an RPM package file named evolution-2.6.0-41.i586.rpm to your home directory. Assuming the current directory is ∼, what command could you use to install the package on your system, displaying a progress indicator as the installation is completed? (Choose two.) A. rpm -i evolution-2.6.0-41.i586.rpm B. rpm -ihv evolution-2.6.0-41.i586.rpm C. rpm -U evolution-2.6.0-41.i586.rpm D. rpm -install --progress evolution-2.6.0-41.i586.rpm E. rpm -Uhv evolution-2.6.0-41.i586.rpm

7. B, E. Either the rpm -ihv evolution-2.6.0-41.i586.rpm command or the rpm -Uhv evolution-2.6.0-41.i586.rpm command will install the file and display a progress indicator composed of hash marks on the screen as the installation progresses.

7. You're installing a new Linux system that will be used by an administrative assistant to type documents, create presentations, and manage e-mail. Which distribution would be the best choice for this deployment? (Choose two.) A. Red Hat Enterprise Linux B. Red Hat Client C. Red Hat Enterprise Linux Workstation D. SUSE Linux Enterprise Server E. SUSE Linux Enterprise Desktop

7. B, E. Red Hat Client and SLED are optimized for basic workstation tasks such as word processing.

7. A user named Diana Grow has recently married and changed her last name to Nelson. You need to change her username on her Linux system. Which command will do this? A. usermod -l ″dgrow″ -c ″Diana Nelson″ dnelson B. usermod -l ″dnelson″ -c ″Diana Nelson″ dgrow C. useradd dnelson D. usermod -c ″dgrow″ -l ″dnelson″ Diana Grow

7. B. Entering usermod -l ″dnelson″ -c ″Diana Nelson″ dgrow at the shell prompt will rename the dgrow user account to dnelson.

7. You want to install GRUB into the first partition on the first SATA hard disk drive of your system. Which shell command will do this? A. grub /dev/sda1 B. grub-install /dev/sda1 C. grub-install /dev/sda D. grub /dev/hda1

7. B. The grub-install /dev/sda1 command will install GRUB into the first partition on the first hard disk drive.

7. Which mode does vi open in by default? A. Command-line mode B. Insert mode C. Command mode D. Replace mode

7. C. By default, vi opens in command mode.

7. Which Linux utility can be used to display your network board configuration? A. netstat B. route C. ifconfig D. ipconfig E. echo $NETWORK_CONFIG

7. C. The ifconfig command is used to view and modify your network board configuration.

7. You've configured three hosts on your network with the following IP addresses and subnet masks: • Host A IP 23.0.0.1, Mask 255.0.0.0 • Host B IP 23.0.0.3, Mask 255.255.0.0 • Host C IP 23.0.0.4, Mask =255.255.0.0 Is this network configured properly? A. Yes, this network is configured properly. B. No, the 23.0.0.1 IP address used by Host A is a reserved IP address. C. No, Host A uses the wrong subnet mask. D. No, Host B and Host C must use the default Class A subnet mask.

7. C. The network isn't configured properly because Host A uses the wrong subnet mask.

7. Which of the following shell commands will load the ssh client and connect as the ksanders user to an SSH server with an IP address of 10.0.0.254? A. sshd -l ksanders 10.0.0.254 B. ssh -u ksanders 10.0.0.254 C. ssh -l ksanders 10.0.0.254 D. ssh user=ksanders 10.0.0.254

7. C. The ssh -l ksanders 10.0.0.254 command will load the ssh client and connect as the ksanders user to an SSH server with an IP address of 10.0.0.254.

7. Which command will evaluate to True within an if/then/else structure in a shell script if the variable num1 is less than the variable num2? A. eval num1 < num2 B. test num1 < num2 C. test num1 -lt num2 D. test ″num1″ !″num2″ E. eval ″num1″ !″num2″

7. C. The test num1 -lt num2 command will evaluate to True within an if/then/ else structure if the variable num1 is less than the variable num2.

7. Your Linux system's umask variable is currently set to a value of 077. A user named jcarr (who is a member of the users group) creates a file named mythoughts.odt. What can users who are members of the users group do with this file? A. They can view the file, but they can't modify or save it. B. They can open, modify, and save the file. C. They can open, modify, and save the file. They can also execute the file if it is an executable. D. They have no access to the file at all.

7. D. Because umask is set to 077, all permissions (read=4, write=2, execute=1) are removed from Group and Others. Therefore, members of the owning group have no access to the file.

7. You have an ISO image file named discimage.iso in your home directory, and you want to mount it in the /mnt directory in your Linux file system so that you can extract several files from it. Which command will do this? A. mount ∼/discimage.iso /mnt B. mount -a ∼/discimage.iso /mnt C. mount -t iso9660 ∼/discimage.iso /mnt D. mount -o loop ∼/discimage.iso /mnt

7. D. The mount -o loop ∼/discimage.iso /mnt command mounts the image file in the /mnt directory.

7. You need to delete the Temp directory within your user's home directory. Given that Temp has files in it, which is the best command to do this? A. rmdir Temp B. rmdir ∼/Temp C. rm Temp D. rm -r ∼/Temp

7. D. The rm -r command will delete the Temp directory and its contents.

7. You are a computer programmer. Your supervisor wants you to download the source code for the latest Linux kernel and modify it to support a custom application your company is developing for use in-house. Can you do this? A. No, the source code for Linux is no longer available on the Internet. B. No, the copyright on the source code won't permit it. C. Yes, but you must pay a royalty to the GNU Project. D. Yes, you can create a new Linux flavor and even redistribute it as long as the source code remains freely available.

7. D. Under the GPL, you are free to download the Linux source code and modify it.

8. You've just downloaded an RPM package file named evolution-2.6.0-41.i586. rpm to your home directory. Assuming the current directory is ∼, what command could you use to check the package for dependencies? (Choose two.) A. rpm -i evolution-2.6.0-41.i586.rpm B. rpm -i --test evolution-2.6.0-41.i586.rpm C. rpm -V evolution-2.6.0-41.i586.rpm D. rpm --deps evolution-2.6.0-41.i586.rpm E. rpm --checkdeps evolution-2.6.0-41.i586.rpm

8. A, B. Both the rpm -i evolution-2.6.0-41.i586.rpm command and the rpm --test evolution-2.6.0-41.i586.rpm command will automatically check the package for required dependencies and prompt you if any are missing.

8. You have mounted the /dev/sdb1 partition in the /mnt directory and now need to unmount it. Which commands will do this? (Choose two.) A. umount /mnt B. unmount /mnt C. umount /dev/sdb1 D. mount --unmount /dev/sdb1 E. unmount /dev/sdb1

8. A, C. Either the umount /mnt command or the umount /dev/sdb1 command will unmount the partition from the file system.

8. You're installing a new Linux server that will be used to host mission-critical database applications. This server will be heavily utilized by a large number of users every day. Which distributions would be the best choice for this deployment? (Choose two.) A. Red Hat Enterprise Linux B. Red Hat Client C. Red Hat Enterprise Linux Workstation D. SUSE Linux Enterprise Server E. SUSE Linux Enterprise Desktop

8. A, D. These distributions are designed for high-demand network servers.

8. You want to configure an SSH tunnel between a POP3 mail server running the sshd daemon and your local ssh client system running the Mozilla Thunderbird e-mail client. Which parameter in the /etc/ssh/sshd_config file must be set to a value of yes to enable the tunnel? A. AllowTcpForwarding B. AllowTcpTunneling C. AllowSSHTunnel D. AllowPop3Tunnel E. AllowPop3ImapForwarding

8. A. The AllowTcpForwarding parameter in the /etc/ssh/sshd_config file must be set to a value of yes to enable an SSH tunnel between the SSH client and the SSH server.

8. You need to configure your /etc/hosts.allow file to allow only the linux1, linux2, and linux3 systems to access the vsftpd daemon on your system. Which of the following lines in the file will do this? A. vsftpd: ALL B. vsftpd: linux1, linux2, linux3 C. vsftpd: ALL EXCEPT linux1, linux2, linux3 D. vsftpd linux1, linux2, linux3

8. B. Assuming deny all access has been configured in /etc/hosts.deny, the vsftpd: linux1, linux2, linux3 line in /etc/hosts.allow will configure the tcpd daemon to allow only these hosts access to the vsftpd daemon.

8. You need to copy the Documents directory within your user's home directory to the /tmp directory. Given that Documents has files and subdirectories within it, which is the correct command to do this? A. cp ∼/Documents /tmp B. cp -R ∼/Documents /tmp C. cp ∼/Documents ∼/tmp D. cp -R ∼/Documents ∼/tmp

8. B. The cp -R∼/Documents/tmp command copies data recursively from the Documents directory within your user's home directory to the /tmp directory.

8. You need to delete a user account named jcarr from your Linux system and remove his home directory contents. Which of the following commands will do this? A. userdel jcarr B. usermod --delete --rmhome jcarr C. userdel -r jcarr D. userdel --rmhome jcarr

8. C. Entering userdel -r jcarr will delete jcarr's account and remove his home directory.

8. An executable file has the SUID permission set. If this file is run on the system, who owns the file? A. The user who created the file remains the owner. B. The user who ran the file becomes the file's permanent owner. C. The user who ran the file becomes the file's temporary owner. D. The root user becomes the file's owner.

8. C. The SUID permission causes the user who runs the file to temporarily become the file's owner.

8. Your network interface has been assigned an IP address of 10.0.0.1. What is this binary equivalent of this decimal address? A. 10001010.00000000.00000000.00000001 B. 00001010.00000001.00000001.00000001 C. 10100000.00000000.00000000.00000001 D. 00001010.00000000.00000000.00000001

8. D. The binary equivalent of the first octet (10) is 00001010. The binary equivalent of the second and third octets (0) is 00000000 each. The binary equivalent of the fourth octet (1) is 00000001.

8. Which Linux utility can be used to change to a different user account at the shell prompt? A. user B. chuser C. swuser D. su

8. D. The su command can be used to change to a different user account at the shell prompt. The syntax is su username. If you omit the username, the su command assumes you want to switch to the root superuser account.

8. Which of the following parameters are used to configure solid-state drives? (Choose two.) A. Master B. Slave C. Primary D. Secondary E. Cylinders F. Sectors per track

8. E, F. Because SSDs are block devices that generally use a SATA interface, they are addressed using the same drive geometry settings (CHS) as mechanical hard disks.

8. In a shell script, you need to prompt the user to select from one of seven different options presented with the echo command. Which control structure would best evaluate the user's input and run the appropriate set of commands? A. while loop B. for loop C. until loop D. if/then/else E. case

8. E. The case structure is the best option presented to evaluate the user's choice of multiple selections and run the appropriate set of commands as a result.

9. The myapp process has a nice value of 1. Which of the following nice values would increase the priority of the myapp process? (Choose two.) A. -15 B. 5 C. 19 D. 0 E. 2

9. A, D. The lower the nice value, the higher the priority of the process. Therefore, nice values of 0 and -15 will increase the priority of the myapp process.

9. Which configuration file is read when a non-login bash shell is run? A. .bashrc B. .bash_profile C. .bash_login D. .profile

9. A. A non-login shell reads the ∼/.bashrc file to define the user's shell environment.

9. Which control structure will keep processing over and over until a specified condition evaluates to false? A. while loop B. for loop C. until loop D. if/then/else E. case

9. A. A while loop will keep processing over and over until the specified condition evaluates to false.

9. You need to uninstall the Pure-FTPd service from your Linux system. You've switched to the directory where the original installation files are located. What's the first command you need to enter to uninstall this package? A. ./configure B. make C. make remove D. make uninstall

9. A. The ./configure command would be used first to generate the Makefile file. This file contains the UNINSTALL target that can then be used with the make utility to uninstall the software.

9. A directory is owned by the users group and has a mode of rwxrwxr- - permissions assigned to that group. It also has the Sticky Bit permission set. What effect does this have on files within the directory? A. Users who are members of the users group can only delete files within the directory for which they are the owner. B. No user is allowed to delete files in this directory. C. Users who are members of the users group can delete any file within the directory. D. Others can enter the directory and delete files within the directory for which they are the owner.

9. A. The Sticky Bit permission negates the effect of the group write permissions. As a result, users who are members of the users group can only delete files within the directory for which they are the owner.

9. Which command will automatically detect all of your video subsystem hardware and create a configuration file named /root/xorg.conf.new for you? A. Xorg -configure B. XFree-86 -configure C. Xorgcfg D. system-config-display

9. A. The Xorg -configure command will automatically detect all of your video subsystem hardware and create a configuration file named /root/xorg.conf.new.

9. You want to create a symbolic link in your home directory that will link the manual file to the /usr/share/doc/manual directory. Which is the correct command to do this? A. ln -s /usr/share/doc/manual ∼/manual B. ln /usr/share/doc/manual ∼/manual C. ln -s ∼/manual /usr/share/doc/manual D. ln ∼/manual /usr/share/doc/manual

9. A. The ln -s/usr/share/doc/manual∼/manual command creates a symbolic link from the manual file in your home directory to the /usr/share/doc/ manual directory.

9. Which of the following GRUB configuration file directives points to the partition on the hard drive where /boot resides? A. root B. boot C. kernel D. partition

9. A. The root directive in the GRUB configuration file specifies the partition on the hard drive where /boot resides.

9. Which files can you check on some distributions to verify that a kernel module has been loaded and an alias created for a newly installed network board? (Choose two.) A. /etc/sysctl.conf B. /etc/modprobe.conf C. /etc/modules.conf D. /etc/drivers E. /etc/aliases

9. B, C. You can check the /etc/modprobe.conf or the /etc/modules.conf file on some distributions to verify that the correct module has been loaded and an alias has been created.

9. Which USB category includes devices such as printers, scanners, and hard drives? A. Hub B. Function C. Hub and Function D. Terminal Device

9. B. USB functions include end devices, such as printers, scanners, and hard drives, that don't include USB hub functionality. Be aware that manufacturers of some of these devices do include hub functionality, making them a Hub and Function.

9. Which keystroke will switch vi from command mode to insert mode? (Choose two.) A. DELETE B. ESC C. INSERT D. S E. F1

9. C, D. Pressing INSERT or S switches vi from command mode to insert mode.

9. You want to establish a secure SSH tunnel for X server traffic. Which parameter in the /etc/ssh/ssh_config file on the X client system and in the /etc/ssh/sshd_config file on the X server system can be used to enable this functionality? A. AllowTcpForwarding B. AllowX11Tunnel C. ForwardX11 D. AllowSSHTunnel

9. C. The ForwardX11parameter in the /etc/ssh/ssh_config file on the X client system and in the /etc/ssh/sshd_config file on the X server system can be used to enable a secure SSH tunnel for X server traffic.

9. Which NTP concept refers to gradual time adjustments that occur when the time difference between the provider and the consumer is less than 128 milliseconds? A. Stratum B. Stepping C. Slewing D. Drift

9. C. The NTP concept of slewing refers to gradual time adjustments that occur when the time difference between the provider and the consumer is less than 128 milliseconds.

9. You're planning to install Linux on a system that you've built out of spare parts. Several components in the system aren't listed on your distribution's HCL. This system will be used by your team's administrative assistant to manage employee schedules, send and receive e-mail, and track employee hours. What should you do? A. Install the distribution anyway and hope for the best. B. Install the distribution and then install the latest product updates. C. Replace the incompatible parts with supported hardware. D. Spend three days scouring the Internet looking for drivers.

9. C. The best approach is to use supported hardware.

9. Which file is used to automatically mount file systems when the system initially boots? A. /etc/mtab B. /proc/mounts C. /etc/inittab D. /etc/fstab

9. D. The /etc/fstab file is used to automatically mount file systems at boot.

9. Which file is used to store group information on a Linux system that has been configured to use local authentication? A. /etc/groups B. /etc/local/group C. /etc/groupinfo D. /etc/group

9. D. The /etc/group file stores group information.

9. You need to configure your Linux firewall to allow all network traffic addressed to the DNS service on the local system. Which command will do this? A. iptables -t filter -A INPUT -s 0/0 -p tcp -dport 53 -j DROP B. iptables -t filter -A OUTPUT -s 0/0 -p tcp -dport 53 -j ACCEPT C. iptables -t filter -A INPUT -s 0/0 -p tcp -dport 80 -j DROP D. iptables -t filter -A INPUT -s 0/0 -p tcp -dport 53 -j ACCEPT

9. D. The iptables -t filter -A INPUT -s 0/0 -p tcp -dport 53 -j ACCEPT command configures your Linux firewall to allow all network traffic addressed to the DNS service on the local system.


Conjuntos de estudio relacionados

Thermoregulation, Chemical Communication, Immune Defense, Reproduction, Comparative Physiology - Arid, Comparative Physiology - Cold

View Set

Ch 2 The Process of Corporate Innovation

View Set

Chapter 14 : Interpersonal Conflict

View Set

Web Design - Chapter 3: Planning a Successful Website: Part 1

View Set