LINUX

¡Supera tus tareas y exámenes ahora con Quizwiz!

The mkfs command can be issued with what switch in order to specify a filesystem type?

-t

When using the compress utility, each file specified for compression is renamed with what extension?

.Z

The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?

/boot

Under what directory is the Linux kernel stored?

/boot

Which device file below represents the first primary partition on the second PATA hard disk drive?

/dev/hdb1

What character device file represents the second serial port on a system (COM2)?

/dev/ttyS1

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?

/etc/profile

Where is the skeleton directory located on most Linux systems?

/etc/skel

To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?

/proc/meminfo

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?

/root

Under the root directory in Linux, which directory contains system commands and utilities?

/usr

What zone configuration file contains a PTR record used to identify the loopback adapter?

/var/named/named.local

​Where is the default document root directory for the Apache web server?

/var/www/html​

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?

0

In NTP, what stratum consists of atomic devices or GPS clocks?

0

On Linux, the root user always has a UID of what number?​

0

Processes are started with what nice value by default?

0

What number represents the stdin file descriptor?

0

By default, the shell on a Linux system limits the number of filehandles a program can have open to what value?

1024

In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?

1024

The first software RAID volume on a system will​ use a multiple disk device file that starts with what number?

127

What number indicates the lowest kernel priority (PRI) of a process possible?​

127

Most Parallel SCSI controllers are capable of supporting up to how many devices?

15

What is the maximum number of characters that can be used in a NetBIOS name?

15

In what year was the source code for the Linux kernel released?

1991

In Linux, what runlevel is also known as the multiuser mode?

2

What number represents the stderr file descriptor?

2

What is the recommended size for the /home directory?

200 MB

What is the subnet mask for a Class B IP address?

255.255.0.0

What is the subnet mask for a Class C IP address?

255.255.255.0

A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices?

4

The GUI components and related software take up how much space on a typical Linux installation?

4 GB

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent?

40-50

What is the default print job priority for all print jobs created by the lp command?

50

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?​

514

​Select the mode below that corresponds to setting r-x

5​

If no level of compression is specified, the gzip command assumes what compression level?

6

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?

60%-70%

How many different kill signals can be sent by the kill command to a given process?

64

In a SCSI chain the highest priority SCSI device is given what SCSI ID?

7

When using the chmod command, the mode rwx can be represented by which number?

7

Each octet in an IP address represents a binary number consisting of how many bits / bytes?

8-bit

What hex code is associated with a Linux swap type partition?​

82

IPv6 IP addresses are delimited by what character below?

:

What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output?

;

In order to redirect a file to the standard input of a command, what metacharacter should be used?

<

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?

>

When issuing the ls -F command, what special character indicates a linked file?

@

In the past, SATA hard disks were referred to as Integrated Drive Electronics (IDE).​

False

It is acceptable to use shell metacharacters when naming files.

False

On closed-source operating systems, hot fixes for software bugs are deployed very quickly.​

False

On most Linux systems, the logrotate utility is automatically scheduled to run weekly.

False

Performance problems are caused by hardware, not software.

False

Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.

False

Pressing the Esc key at the prompt while using the more command displays a help screen.

False

SLIP is a newer technology than PPP.

False

Shell scripts do not require the execute permission in order to be run the same way binary programs are run

False

The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory.

False

The command strings /bin/echo displays the raw binary characters inside the /bin/echo binary executable program.

False

The email command is an example of a Mail User Agent (MUA).​

False

The killall command uses the PID to kill a process.

False

The rmdir command automatically removes a directory and all of its subdirectories and files

False

The secure log file contains information regarding the last user to log in to a system.​

False

The term hacker refers to someone who illegally uses computers for personal benefit or to cause damage.

False

To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.

False

Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy

False

When a user interacts with his computer, he interacts directly with the kernel of the computer's operating system.

False

When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory.

False

When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.

False

You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.

False

​The minimum height of a rackmount server is 2 inches; this is called a 1U server.

False

The iptables software on Linux is an example of what kind of software?​

Firewall​

​Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stop daemons after system initialization.

True

​The database for the locate command can be updated manually by using the updatedb command

True

What port is used by the Network Time Protocol (NTP) for communication?

UDP 123

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?

awk

A calendar for the current month can be shown on the command line by issuing which command?

cal

To display the contents of a text file called data, what command should be used?

cat data

In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued?

cd ../..

Select the command that can be used to create partitions that will be stored in an MBR after installation

fdisk

After a background process has been started, what command below can be used to move it to the foreground?

fg

What command is most effective at identifying different types of files?​

file

Errors on a filesystem are common on most filesystems. What do these errors indicate?

filesystem corruption

​What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?

for

What command can be used to check different kinds of filesystems on Linux for errors?

fsck

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?

g+r-w

A device that transfers data in a character-by-character fashion is referred to as what type of device?

character

​What two commands below will grant only the execute permission to username bob on file1, assuming that bob is the file's owner?

chmod 777 file1

In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?

chmod 7777 filename

What character is used to delimit most Linux configuration files?

colon

In what mode does the vi editor open by default?​

command mode

What command can be used to copy files?

cp

Which command below can be used at a BASH command prompt to obtain a web page?

curl

In vi, using command mode, what ​series of key presses below will cause the line on which the cursor is on to be deleted?

dd

Which command below provides the easiest method for monitoring free space on mounted filesystems?

df

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?

echo $PS1

The quotas for certain users can be edited by using which command?

edquota

A list of all exported environment and user-defined variables in a shell can be viewed with what command below?

env

How often are sar commands scheduled to run on both Fedora 20 and Ubuntu Server 14.04?

every ten minutes

After a shell is no longer needed, what command can be given to exit the shell?

exit

An IPv6 IP address consists of 16-bit numbers in what numbering scheme?

hexadecimal

What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?

ifconfig

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?

image=

What file in the /proc directory contains a list of memory address ranges reserved for device use?

ioports

Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called?​

jabbering

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?

process state

​Asymmetric encryption uses a pair of keys that are unique generated on each system. What are these two keys called?

public key ​private key

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?

pwconv

What command can be issued to confirm what directory you are in at a command line prompt?

pwd

What permissions are required to execute a shell script in a manner similar to any other executable program on the system?

read and execute

What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?

rm

In what filesystem are most of the operating system files contained?

root

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?

secure

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

segmentation fault

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?

service

The environment variables that are set by default and their current values can be viewed with what command?

set

After logging into a terminal, a user will receive an interface known as which option below?

shell

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?

sixth

What file contains the DSA public key in the /etc/ssh directory?

ssh_host_dsa_key. pub

What section of a filesystem contains information about the filesystem in general?

superblock

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?

system-config-keyboard

What command can be used to display the last five lines of a text file?

tail -5

​What operator below is known as the NOT operator?

​!

A Class A network uses how many bits for the network ID, and how many bits for the host ID?

​8 ​24

At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes?

​:q!

How can you specify the intended DNS server to query with the dig command?​

​@server

What two resource record types map FQDNs to IPv4 and IPv6 addresses respectively?​

​A ​AAAA

Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?​

​Artistic

In order to switch between terminals in Linux, a user can press what two keys in combination with the F1-F6 keys?​

​Ctrl ​Alt

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?​

​Ctrl+k

What computer system was the first to run the UNIX operating system?​

​DEC PDP-7

The GNU General Public License (GPL) was developed by which organization?​

​Free Software Foundation (FSF)

What two commands below can be used to view the contents of a bzip2-compressed file page by page?​

​bzmore ​bzless

​What two commands below can be used to modify the password expiry information and a user's default shell?

​chage ​chsh

On Linux systems that use the traditional ​UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?

​chkconfig

​Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment.

​chroot

What two window managers is the Compiz Fusion window manager based upon?​

​compiz beryl​

​What two commands below will work recursively if specified with the -R option?

​cp ​rm

Which of the following is not one of the three main types of Linux commands?​

​device calls

​What command can be used to search for DPM package information?

​dpkg-query

Select the command below that shows the size of a directory and its contents in kilobytes

​du

In an if construct, what statements are optional?​

​elif ​else

What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?​

​execute

Which two filesystems below do not perform journaling?

​ext2 ​VFAT

​What two commands below can display memory information and swap usage?

​free ​vmstat

​What two commands below can be used to edit a GPT based hard disk's partitions?

​gdisk ​parted

What is the default target on a system with a GUI installed?​

​graphical.target

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​

​grub-mkconfig

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?​

​grub2-install

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?​

​grubby

What command can be used to view and modify the date and time within the BIOS?​

​hwclock

What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk?

​iSCSI initiator ​iSCSI target

What two daemons can be used to start and manage connections for smaller network daemons such as telnet and rlogin?​

​inetd ​xinetd

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes?

​init ​systemd

What utility in the sysstat package measures the flow of information to and from disk devices?​

​iostat

What two commands below can be used to manipulate the routing table?​

​ip route ​route

​In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?

​journald

The K desktop environment utilizes what window manager and toolkit below?​

​kwin ​Qt toolkit

​Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table

​l ​p

What command below can be used to uninstall the LILO bootloader from an active partition?​

​lilo -U

Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?​

​live media image

​What two commands below can be used to locate files on a filesystem?

​locate ​find

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

​login.defs

Select below the command and the associated alias available on most Linux systems that displays ​a long listing for each file in a directory?

​ls -l ​ll

What command is used to manage a software RAID configuration after installation?​

​mdadm

Select the utility below that when run will start and perform a thorough check of RAM for hardware errors:​

​memtest86

Select the two window managers that have been used in GNOME:​

​metacity ​mutter

Select the command that can be used to check an ext2, ext3, or ext4 filesystem

​mke2fs

​Select the two commands below that can be used to prepare a swap partition and then enable it for use

​mkswap ​swapon

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?​

​modules

The GNOME 3 desktop environment utilizes what window manager and toolkit below?

​mutter ​GTK+ toolkit

In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?​

​net.ipv4.ip_forward

​What two NTP daemons below are commonly used on Linux systems?

​ntpd ​chronyd

​What command can be used to see what actual time servers are being used for synchronization?

​ntpq

​RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?

​package dependency

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?​

​panic

What can be used on a Linux system to trace the lineage of each child process?​

​parent process ID

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?​

​pstree

​What command below can be used to create a new physical volume?

​pvcreate

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?​

​quiet

If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?​

​read ​write

An RPM package can be converted to a cpio archive using what command?

​rpm2cpio

The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?​

​rsyslog.conf ​rsyslog.d

​What two commands below will halt a Linux system immediately?

​shutdown -H now ​halt

In the event that you wish to disable a swap partition, what command must be used?​

​swapoff

​When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?

​systemctl

To display a text file in reverse order, what command should be used?​

​tac

Segmentation faults can sometimes be fixed by performing what two tasks below?​

​turn off CPU cache memory ​increase the number of memory wait states in BIOS

In order to change the time zone of a system after installation, what command must be used?​

​tzselect

What two commands can be used to show information about physical volumes and logical volumes respectively?​

​vgdisplay ​lvdisplay

​Select the commands that can be used to extend a volume group and logical volume respectively

​vgextend ​lvextend

In order to quickly create an empty file, what command can be used?​

​vim file1

What term describes the physical hardware and the underlying operating system upon which a virtual machine runs?​

​virtual host

Select the two commands below that will provide the number of lines in a file, and the number of characters in a file, respectively

​wc -l ​wc -c

​What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?

​write

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?​

​wtmp ​lastlog

​If X Windows fails to start, what command can be used to troubleshoot the issue?

​xwininfo

​What yum command below can display a list of package group names?

​yum grouplist

In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?​

​zfs get all

The ​state and performance of a RAID-Z volume can be viewed using what two commands?

​zpool status ​zpool iostat

What FTP command runs a shell on the local computer?

!

The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?

$

When killing a background job with the kill command, the background job ID must be prefixed by what character below?

%

What character, when appended to a command, causes the command to be run in the background?

&

What metacharacter indicates background command execution?

&

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.

*

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?

+

In a file's mode, a permission that is unavailable is represented by what character?

-

Select the option that, when used with the sar command, displays swap statistics

-B

Which switch below can be added to the ls command to show a list of files and their type?

-F

A user account can be locked with the usermod command using what option?

-L

What option for the iptables command can be used to specify the default policy for a certain chain type?

-P

What option can be specified with the rpm command to identify any missing files in a package or package dependency?

-V

When used with the uncompress command, what option displays the contents of the compress file to Standard Output?

-c

Select the iptables option that specifies the destination address of packets for a rule

-d

What option should be used in conjunction with the lp command in order to specify the destination printer name?

-d

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?

-e

What option, when added to the crontab command, opens the vi editor with a user's cron table?

-e

When used with the compress command, what option below can be used to compress symbolic links?

-f

In order to display a list of at job IDs, what option can be specified to the at command?

-l

Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed

-l

Select the option that can be used with the lpstat command to display a list of printers that are enabled

-p

Which sar command option is used to display statistics for the processor queue?

-q

What option can be added to the userdel command to remove the home directory of the target user?

-r

Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?​

C

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?

Ctrl+g

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?

DNS

Select the SQL statement below that can be used to delete a database

DROP DATABASE

What installation media source is the most common source for Linux packages?

DVD

What piece of software tells the operating system how to use a specific hardware device?

Device driver

What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document?

DirectoryIndex index.html

The LISP artificial intelligence programming language can be used with which text editor below?

Emacs editor

What service provides a method for the efficient transfer of files over the Internet?

FTP

A swap partition contains a filesystem.

False

Almost all hardware problems are the result of damaged hardwar

False

By default, Fedora 20 allows the root user to log into the GNOME desktop.​

False

Each device attached to a system can be represented by multiple device files

False

Fedora 20 makes use of the XFree86 ​implementation of X Windows.

False

Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully.

False

If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.

False

In Linux, you are restricted to using only one type of filesystem on a system

False

What software type is software that is distributed free of charge, but the source code is not available?

Freeware

What stipulates that the source code of any software published under its license must be freely available.

GNU Public License

When working with Sendmail, what command can be used to test SMTP support?

HELO

What is the most common hardware component to fail on a Linux system?

Hard disks

Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?​

Hardware Compatibility List (HCL)

Which of the following is the greatest expense for companies using Linux?

Hiring people to maintain the Linux system

​A file that can be executed by the Linux operating system to run in memory as a process and perform a useful function. → executable program​ ​The special metacharacters used to match patterns of text within text files; they are commonly used by text tool commands, including grep → regular expressions ​The joining of text together to make one larger whole. In Linux, words and strings of text are joined together to form a displayed file. → ​concatenation ​A Linux command that searches files for patterns of characters using regular expression metacharacters. The command name is short for "global regular expression print." → ​grep command ​A variant of the grep command that does not allow the use of regular expressions. → ​fgrep command ​A variant of the grep command used to search files for patterns, using extended regular expressions. → ​egrep command ​A temporary connection that sends information from one command or process in memory to another; it can also be represented by a file on the filesystem. → ​named pipe file ​The files that represent the same data as other files. → ​linked file One of the two modes in vi; it allows a user to perform any available text-editing task that is not related to inserting text into the document.​ → command mode​ ​The full pathname to a certain file or directory starting from the root directory. → ​Absolute pathname

In the definition

​The numeric labels used to define command input and command output. → ​file descriptors ​A file descriptor that represents the desired output from a command. → Standard Output (stdout) ​The process of changing the default locations of Standard Input, Standard Output, and Standard Error. → ​redirection ​A special construct used in a shell script to execute commands repetitively. Common decision constructs include for and while. → loop construct​ ​A file descriptor that represents any error messages generated by a command. → Standard Error (stderr)​ ​The variables that store information commonly accessed by the system or programs executing on the system; together, these variables form the user environment. → ​environment variables ​A variable that is altered by loop constructs to ensure that commands are not executed indefinitely. → ​counter variable ​A special construct used in a shell script to alter the flow of the program based on the outcome of a command or contents of a variable. Common decision constructs include if, case, &&, and ||. → decision construct​ ​The first line in a shell script, which defines the shell that will be used to interpret the commands in the script file. → ​hashpling ​A file descriptor that represents information input to a command during execution. → ​Standard Input (stdin)

In the term

The joining of text together to make on larger whole. In Linux, words and strings of text are joined together to form a displayed file. → ​concatenation ​A Linux command used to search for and display text characters in a binary file. → ​strings command A Linux command that displays the first set of lines of a text file.​ → head command​ A popular and widespread text editor more conducive to word processing that vi. It was originally developed by Richard Stallman.​ → Emacs (Editor MACroS) editor​ ​A named pipe connecting processes on two different computers; it can also be represented by a file on the filesystem. → ​socket file ​A powerful command-line text editor available on most UNIX and Linux systems. → vi editor ​A Linux command used to display the contents of a file in octal format. → od command​ A Linux command used to display lines of text at the end of a file.​ → ​tail command ​A common text editor used within GUI environments. → ​gedit editor ​The files that represent the same data as other files. → ​linked file

It's in the definition

​A physical division of a hard disk drive. → ​partition ​The process in which a filesystem is placed on a disk device. → ​formatting ​The process of writing data to the hard disk drive that was stored in RAM. → syncing A command used to identify any users or processes using a particular file or directory​ → ​fuser command ​A command used to re-create a device file, provided the major number, minor number, and type (character or block) are known. → ​mknod command ​The storage devices that transfer data to and from the system one data bit at a time. → character devices​ ​The filesystem that contains most files that make up the operating system; it should have enough free space to prevent errors and slow performance. → ​root filesystem ​A hard disk quota that the user cannot exceed. → hard limit​ ​The storage devices that transfer data to and from the system in chunks of many data bits by caching the information in RAM. → ​block devices A series of tracks on a hard disk that are written to simultaneously by the magnetic heads in a hard disk drive.​ → ​cylinder

It's in the definition

​The way in which a hard disk or SSD partition is formatted to allow data to reside on the physical media. → ​filesystem The channel that allows a certain user to log in and communicate with the kernel via a user interface​ → ​terminal ​A file that contains the content of a DVD. → ​ISO image ​The area of a typical hard disk (< 2TB) outside a partition that stores partition information and boot loaders → ​Master Boot Record (MBR) An improved version of the ext3 filesystem, with an extended feature set and better performance​ → ext4​ ​A filesystem function that keeps track of the information that needs to be written to the hard disk or SSD in a journal. → journaling​ ​Also known as the Bourne Again Shell, this is the default command-line interface in Linux → ​BASH shell ​The area of a large hard disk ( > 2TB) outside a partition that stores partition information and boot loaders → ​GUID Partition Table ​An area on a hard disk or SSD (swap partition) that can be used to store information that normally resides in physical memory (RAM), if the physical memory is being used excessively. → virtual memory ​A user interface that accepts input from the user and passes the input to the kernel for processing. → ​shell

It's in the definition

Term used to describe a device that exhibits a minimum of downtime in the event of a failure.​ → ​fault tolerant ​A type of RAID level 0 that allows two or more devices to be represented as a single large volume. → ​spanning ​A device used to terminate an electrical conduction medium to absorb the transmitted signal and prevent signal bounce. → terminator ​The most common boot loader used on Linux systems. It loads and executes the Linux kernel at boot time. → GRUB​ ​A SCSI technology that transfers data via TCP/IP networks. → ​Internet SCSI Term used to describe a CPU that runs faster than the clock speed for which it has been rated.​ → ​overclocked ​A term that refers to a storage device within an iSCSI SAN. → iSCSI target​ ​A RAID configuration consisting of two identical hard disks to which identical data are written in parallel, thus ensuring fault tolerance. Also known as RAID 1. → disk mirroring ​A high-performance filesystem and volume management software that is often used to create volumes from multiple storage devices on Linux and UNIX systems. → ​Zettabyte File System (ZFS) A RAID configuration in which a single file is divided into sections, which are then written to different hard disks concurrently to speed up access time; this type of RAID is not fault tolerant. Also known as RAID 0.​ → disk striping​

It's in the term

​A computer in an NIS domain that receives its configuration from an NIS master server or NIS slave server. → ​NIS client ​A DNS name resolution request whereby an IP address is resolved to a FQDN. → ​reverse lookup ​The most common Linux daemon used to provide IPv4 and IPv6 addresses to other computers on the network. → DHCPD daemon​ ​A protocol used by Windows computers that adds a unique 15-character name to file- and printer-sharing traffic. → NetBIOS​ ​A file that contains the IP addresses of top-level DNS servers. → ​DNS cache file The standard that all DNS servers and configuration files adhere to.​ → ​Berkeley Internet Name Domain (BIND) ​The process of copying resource records for a zone from a master to a slave DNS server. → zone transfer The difference in time between two computers that use the NTP protocol.​ → offset​ The most common protocol used to transfer files across networks such as the Internet.​ → File Transfer Protocol (FTP)​ ​The difference between time measurements from several different NTP servers. → ​jitter

Look <--

​A software program that can be used to automatically authenticate users using their private key. → ​SSH agent A daemon used on some Linux systems to provide for easier configuration of netfilter via the ipchains command.​ → ​firewall daemon (firewalld) A common IDS for Linux that monitors files and directories.​ → tripwire ​The connections that a program makes to files on a filesystem. → ​file handles ​A command that can be used to scan ports on network computers. → ​nmap command ​A measure of normal system activity. → ​baseline ​An attack in which a network service is altered in memory → buffer overrun​ ​The process of embedding network packets within other network packets. → ​tunneling ​A program that can be used to detect unauthorized access to a Linux system. → ​Intrusion Detection System (IDS) ​A command that lists the files that are currently being viewed or modified by software programs and users. → ​lsof command

Look at <--

When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?

Minor number

​The most common version of IP used on the Internet. It uses a 32-bit addressing scheme organized into different classes → ​IP version 4 (IPv4) ​A series of four 8-bit numbers that represent a computer on a network. → ​Internet Protocol (IP) address ​The TCP/IP communication destined for all computers on a network. → ​broadcast ​A table of information used to indicate which networks are connected to network interfaces. → route table ​A portion of an IP address that represents eight binary bits. → ​octet ​A notation that is often used to represent an IP address and its subnet mask. → ​classless interdomain routing (CIDR) notation ​The portion of an IPv6 address that refers to a unique computer. It is analogous to the host portion of an IPv4 address → link local​ ​A user-friendly name assigned to a computer. → ​host name ​The TCP/IP communication destined for a certain group of computers. → ​multicast ​A set of rules of communication used between computers on a network. → ​protocol

Look at <---

​The act of creating a new BASH shell child process from a parent BASH shell process. → ​forking ​A process that was started by another process. → ​child process ​A unique identifier assigned to every process as it begins. → ​process ID (PID) A file specifying tasks to be run by the cron daemon​ → cron table​ ​The amount of time a process is given on a CPU in a multiprocessing operating system. → ​time slice The command used to run a foreground process in the background.​ → background command​ ​A process that has started other processes. → ​parent process The process of ignoring a kill signal.​ → trapping ​The command used to schedule commands and tasks to run at a preset time in the future. → ​at command ​A system process that is not associated with a terminal. → ​daemon process

Look at term

​The act of verifying a user's identity by comparing a user name and password to a system database (/etc/passwd and /etc/shadow) → ​authentication The command used to modify the name or GID of a group on the system.​ → groupmod command​ ​the process of accepting a print job into a print queue. → ​spooling A group of CUPS printers that are treated as a single unit for the purposes of printing and management.​ → ​printer class ​The area of the system from which information is gathered when logging system events. → ​facility The command used to remove print jobs from the print queue in the CUPS print system → cancel command​ The command used to change the GECOS for a user.​ → ​chfn command The daemon responsible for printing in the CUPS printing system.​ → CUPS daemon​ ​The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user. → ​primary group ​A unique number assigned to each user account. → User Identifier (UID)

Look at the <---

A person who uses computer software maliciously for personal profit.​ → ​cracker ​The central, core program of the operating system. → ​kernel ​The software whose source code is not freely available from the original author; Windows 98 is an example. → Closed source software​ ​A program loaded into memory and running on the processor performing a specific task. → process ​A person who explores computer science to gain knowledge. → ​hacker ​An Internet protocol service accessed via an application program called a newsreader. → ​newsgroup ​A complete set of operating system software, including the Linux Kernel, supporting function libraries, and a variety of OSS packages that can be downloaded from the Internet free of charge. → ​distribution ​A popular and widespread method of clustering computers together to perform useful tasks using Linux. → ​Beowulf clustering ​A software license, ensuring that the source code for any OSS will remain freely available to anyone who wants to examine, build on, or improve upon it. → ​GNU General Public License (GPL) ​A term that refers to the specific type of UNIX operating system. → flavor

Look at the definition

A command used to view the contents of an archive created with compress or gzip to Standard Output in a page-by-page fashion.​ → zmore command ​A calculated value that is unique to a file's size and contents. → ​checksum ​The process whereby files are copied to an archive. → system backup ​A gzip-compressed tar archive. → ​tarball ​The amount of compression that occurred during compression algorithm. → compression ratio​ A group of RPM packages that are commonly installed to provide a specific function on the system.​ → ​package group ​A utility that can be used to manage DPM packages using a graphical interface. → ​Aptitude ​A command used to decompress files compressed by the bzip2 command → ​bunzip2 command ​A command used to decompress files compressed by the gzip command. → ​gunzip command ​A command used to extract archives created with the dump command. → ​restore command

Look in term

​A Systemd term that is used to describe the number and type of daemons running on a Linux system. It is functionally equivalent to the UNIX SysV term runlevel . → target unit​ ​A recent version of the UNIX SysV system initialization process used on modern Linux distributions. → ​upstart ​A Linux system process that provides a system service. → daemon​ ​A UNIX standard that is used to provide the structure of the system initialization process on Linux systems. → UNIX Sys V​ ​A relatively new software framework used on Linux systems that provides a system initialization process and system management functions. → ​Systemd ​The default window manager for the GNOME Desktop Environment in Fedora 13 → ​mutter window manager The component of X Windows that requests graphics to be drawn from the X server and displays them on the terminal screen. → ​X client The partition searched for an operating system after the MBR/GPT.​ → ​active partition A UNIX SysV term that defines a certain type and number of daemons on a Linux system.​ → runlevel​ ​The component of X Windows that draws graphics to windows on the terminal screen. → X server

Look in term

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:

Options

Most Linux distributions make use of what package manager?

RPM

What Linux distribution is the most commonly used distribution within organizations today?

Red Hat

What SCSI type supports speeds of up to 80 MB/second?

SCSI-3 Ultra2 Wide

If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below

SIGHUP

What kill signal stops a process, then restarts it with the same PID?

SIGHUP

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?

SIGQUIT

What tool below was designed as a secure remote access utility that encrypts information that passes across the network?

Secure Shell (SSH)

What stage of the GRUB boot loader typically resides on the MBR / GPT?

Stage1

The Apache daemon listens for HTTP requests on what port by default?

TCP 80

If network services that are started by inetd or xinetd are in use, what can be used to provide extra security?

TCP wrapper

What is the most commonly used LAN protocol?

TCP/IP

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?

Tab

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a

Tarball

You can use wildcard metacharacters with the find command

True

Zombie processes are also known as defunct processes.​

True

A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator.

True

A route table is a list of TCP/IP networks that is stored in system memory.

True

After a process has been started, you can change its priority by using the renice command.

True

All DNS servers contain a DNS cache file.

True

Any command that can be executed on the command line can also be placed inside any environment file.

True

At minimum, Linux typically requires only two partitions to be created: a partition that is mounted to the root directory, and a partition for virtual memory.​

True

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script.

True

By default, the smb.conf file shares all printers and home directories for recognized Windows users.

True

CUPS contains versions of the lpr, lpc, lpq, and lprm commands.

True

Class D addresses are used for multicasting.

True

Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.

True

Each process can start an unlimited number of other processes.

True

If the / filesystem becomes corrupted, the system is unstable and must be turned off.

True

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.

True

Linux uses a logical directory tree to organize files into different folders.

True

Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond

True

Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project.​

True

Most daemon scripts accept the arguments start, stop, and restart.

True

Open Source Software (OSS) is freely developed and continuously improved by a large community of software developers

True

Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.

True

RAID level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance ​and allows up to two simultaneous hard disk drive failures while remaining fault tolerant.

True

SCSI devices that act as a gateway are associated with a unique Logical Unit Number (LUN)​

True

The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length.​

True

The SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file

True

The Very Secure FTP daemon is a stand-alone daemon.

True

The compress utility preserves the original ownership, modification, and access time for each file that it compresses.

True

The cpio command has the ability to handle long filenames and can be used to back up device files.​

True

The more command should not be used on binary files.

True

The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations

True

The tar utility cannot back up device files or files with filenames longer than 255 characters.

True

When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD

True

When you print to a printer class, the print job is send to the first available printer in the printer class.

True

You can choose to use a window manager only, and not use a desktop manager.

True

You can use a small bootable Linux kernel (such as on a LiveCD) to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers.

True

You can use the sed command to remove unwanted lines of text.

True

In Linux, the core component of the GUI is known as

X Windows

Select the test statement that can be used to determine if A is numerically greater than B

[ A -gt B ]

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?

[1-4]

Select the escape sequence that is used for a form feed

\f

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?

alert

What two commands below can be used to stop a process, either by PID number or process name?​

kill​ ​killall

​What command can be used to view what shared libraries are required by a certain program?

ldd​

In order to create a hard link, what command must be used?

ln

Select the file in the /proc directory that contains statistics on the performance of the processor

loadavg

Select the command below that utilizes a premade database that contains a list of all the files on a system

locate

In order to send a print job to a printer using CUPS, what command must be used?

lp

Which command should be used to restrict access to printers?

lpadmin

Adding the -t option to what command below will provide a list of all printers on the system and their status?

lpstat

Select the command below that can be used to provide a long listing for each file in a directory

ls -l

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?

make

The apropos list command produces the same results as which command below?

man -k list

When displaying a large text file, what two commands provide the ability to show text in a page by page fashion?​

more less

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?

mount -a

What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.

mput filename

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database?

newaliases

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?

newgrp

The dump/restore utility is limited to a maximum of how many different incremental backups?

nine

Which command can be used to see what network services are running on your network?

nmap

Running background processes using what command allows you to exit your command-line shell without ending any background processes?

nohup

What PostgreSQL command-line utility backs up PostgreSQL database settings?

pg_dump

Select the command that can be used to send a small TCP/IP packet to another IP address and await a response

ping

What metacharacter can be used to refer to the current user's home directory?

˜

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?

target ID

The section of an inode that stores permissions is referred to as what?

the mode of the file

How many DNS servers can be configured in the /etc/resolv.conf file?

three

What command can be used to replace characters in a file sent via Standard Input?

tr

What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?

traceroute

Data is read from physical hard drives in concentric circles known as which of the following?

tracks

In Fedora 20, what terminal is used for graphical login?​

ttyl

What is the minimum number of user accounts that must be created at install time?

two

What file system below is used by software programs that write to a CD-RW or DVD-RW drive?

udf

What command can be used to change the maximum number of file handles that can be used by a program?​

ulimit

In order to create user accounts on a Linux system, what command should be utilized?

useradd

The Linux kernel exists as a file named

vmlinuz

​In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit?

w

Which command can be used to count the number lines, words, and characters in a file?

wc

Which Linux command can be utilized to display your current login name?

whoami

What permission grants a user the ability to open, read, and edit the contents of a file?

write

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?

xvidtune

What command can be used to display the contents of a file that was compressed with the compress utility?

zcat

Which character(s) below represent extended regular expression metacharacter(s)?

{}

Select the metacharacter that can be used to send the standard output of one command to another command as standard input

|

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?

​#!

What two characters below should not be used in filenames?​

​$ ​*

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.​

​(hd0,0)

Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?​

​--loop

​What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?

​-F

​What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?

​-P

What option can be used with ssh to enable tunneling of X Windows information?​

​-X

​What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

​-d ​-k

​What two ps options can be used to display a full list of information about each process, and a long list of information about each process?

​-f ​-l

What option can be added to the netstat command in order to display network statistics?​

​-i

What option can be added to the rpm command in order to query packages?​

​-q

What option, when added to the rm command, is commonly referred to as the -resume option?

​-r

What two iptables options are used to specify the source and destination ports for a rule?​

​-sport ​-dport

​Select the options to use with the cpio utility to cause the utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation

​-u ​-i

​What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?

​-z ​-Z

Select the two ​filename extensions that are associated with C++ programming language source code files

​.cc ​.cpp

Files with what two file extensions are commonly known as tarballs?​

​.tar.gz ​.tgz

What device file below indicates the first ATAPI IDE tape device (nonrewinding)?​

​/dev/nht0

What two device files below represent the first SCSI tape device, rewinding and non-rewinding?​

​/dev/st0 ​/dev/nst0

In Fedora 20, where are user configured settings for Xorg stored?​

​/etc/X11/xorg.conf.d/

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?​ Select one or more

​/etc/cups/cupsd.conf ​/etc/cups/printers.conf

Select below the configuration file that is used to configure the BIND / DNS server:​

​/etc/named.conf

What two files below are the first two BASH environment files to be executed?​

​/etc/profile ​/etc/bashrc

The sshd daemon is configured by editing what configuration file?​

​/etc/ssh/sshd_config

What file controls the default runlevel when using Systemd?​

​/etc/systemd/system/default.target

What file in the /proc directory contains information about a computer's CPU?​

​/proc/cpuinfo

What directory under / contains the log files and spools for a Linux system?​

​/var

In order to look up IPv4 and IPv6 DHCP leases, what two files should be viewed?​

​/var/lib/dhcpd/dhcpd.leases ​/var/lib/dhcpd/dhcpd6.leases

You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?​

​/var/log/boot.log

Where are the log files for the Samba daemon located?​

​/var/log/samba

​On a system that is not using Systemd, what two log files contain information related to PAM?

​/var/log/secure ​/var/log/auth.log

On a Fedora based system, where are the shell environment and scheduled commands for at stored?​

​/var/spool/at

What range of ports is considered to be "well-known"?​

​0-1023

What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?​

​0.0.0.0 ​255.255.255.255

What well-known TCP port is utilized by the SMTP service?​

​25

What is the Advanced Encryption Standard (AES) encryption algorithm​'s largest key length size?

​256-bit

Select the two numbers below that represent the number of bits needed to make an IPv4 or IPv6 IP address

​32 ​128

​The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below?

​631

What two FTP commands below can be used to close the ftp utility?​

​bye ​quit

The two main competing GUI environments available in Linux are

​GNU Network Object Model Environment (GNOME) ​K Desktop Environment (KDE)

What does the setfacl -b command do?​

​It removes all extra ACL assignments on a given file

​The QT toolkit is utilized by which GUI environment?

​KDE

The Linux kernel was developed and released in 1991 by

​Linus Torvalds

​What two Linux distributions below utilize the Debian package manager by default?

​Linux Mint ​Ubuntu Linux

What DNS resource record type is used to provide the IP address for the e-mail server for a zone?​

​MX

What two options below are examples of common UNIX flavors?​

​Macintosh OS X ​HP-UX

The mutt software is an example of what type of mail service software on Linux?​

​Mail User Agent

​Because Linux has the ability to manage thousands of tasks at the same time, including allowing multiple users to access the system simultaneously, it is referred to as an operating system that is

​Multiuser ​Multitasking

Proxy servers keep track of the information passed to each client by maintaining what type of table?​

​Network Address Translation (NAT)

What two protocols below are used for mail retrieval?​

​POP ​IMAP

​What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively?

​PWD ​SHELL

​A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as

​RAID-Z

​What RAID level is commonly referred to as disk striping with parity?

​RAID5

​What two RAID types below utilize disk striping with parity, providing protection against one or two drive failures respectively?

​RAID5 ​RAID6

Which filesystems below perform journaling?​

​REISER ​ext4

After downloading an installing any shared libraries, what should be done to ensure ​the list of shared library directories and the list of shared libraries are updated?

​Run the ldconfig command.

What two disk systems allow for the use of more than four hard drives or SSDs in a single system?​

​SATA ​SCSI

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?​

​SIGINT ​2

What signal name and number function as the absolute kill signal, and when issued, forces the Linux kernel to stop executing the process by sending the process's resources to /dev/null?​

​SIGKILL ​9

​What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file?

​SUID ​SGID

​What are the two most common technologies that provide asymmetric encryption on Linux systems?

​Secure Shell (SSH) ​GNU Privacy Guard (GPG)

What option can be used in the journald configuration file to specify a file size limit to the event log?​

​SystemMaxUse

​In the process state column, what does an "R" indicate?

​The process is currently running on the processor.

When viewing the output of the ps ax​ command, what does a < symbol in the STAT column indicate for a process?

​The process is high priority.

​The overall cost of using a particular operating system is known as?

​Total cost of ownership (TCO)

Assistive technologies are configured using what utility on Fedora 20 in GNOME?​

​Universal Access

The two different implementations of X Windows are called

​XFree86 ​X.org

What is the term for a ZFS managed filesystem that is created from ZFS pools?​

​ZFS volume

Select the escape sequence that starts a new line when used with echo

​\n

Select the two escape sequences that represent a horizontal tab and a vertical tab, respectively

​\t ​\v

What two regular expression characters can be used to match the characters at the beginning or end of a line, respectively?

​^ ​$

Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded:

​append= ​boot=

In order to download DPM packages, what command should be used below?​

​apt-get

Which two problems below are typically seen on large systems that write large amounts of data to a non-ZFS filesystem?​

​bit rot ​misdirected writes


Conjuntos de estudio relacionados

ECON 335 - The International Economy and Globalization

View Set

PHIL 102 - Final Exam Study Guide

View Set

Chapter 15- California Ethics and Laws- A.D Banker

View Set

Environmental Health: Epidemiology

View Set

Bio 11: Quiz on Water Properties

View Set