LPIC-1

¡Supera tus tareas y exámenes ahora con Quizwiz!

In TCP/IP over Ethernet networks, the term "host" refers to any device that has _____. Selected Answer: all of the above Answers:

All of the above (a hardware address, an IP address, a routing table)

Which of the following commands will switch you from command to insert mode?

All of the above. (a,i,o)

Which of the following devices would normally be assigned to a Small Computer Systems Interface (SCSI) hard drive, although it could also be assigned to a Serial Advanced Technology Attachment (SATA) hard drive?

/dev/sda1

A _____ contains the names of other files and/or directories.

Directory

All users of a Linux system must use the same shell.

False

Which of the following is true of redirection?

It can redirect standard input, standard output, and standard error to the same file.

Every unique file on a Unix partition has a unique inode.

True

Grep searches for files that contain a specific string, and returns the name of the file, and if the file is a text file, a line of context for the string.

True

In a UNIX system, everything is a file; if something is not a file, it is a process.

True

In practice, the X configuration file (xorg.conf for Fedora) is configured automatically at launch time and doesn't need to be manually re-configured.

True

In vi, each key most likely has two meanings: it can represent a command when vi is in command mode or a character when vi is in insert mode.

True

The "updated" (update database) command is used to update the locate database so that it contains the most current information on the location of files and directories.

True

The /etc/fstab contains static information that can be used to mount devices to the Linux filesystem during the boot process.

True

The Third Extended File System (ext3) is basically the same as the Second Extended File System (ext2) with a journal added that permits it to recover from power outages and system crashes more quickly.

True

The X Display Manager Control Protocol (XDMCP) server handles both local and remote logins for X-Windows.

True

The chmod (Change Mode) command is used to set or alter the read, write, and execute permissions for a user, group, or others that are associated with a file or directory, or a group of files or directories.

True

The command Is-al will give you a long list of the contents of the current working directory that includes hidden files and the attributes for each file and directory.

True

The command lsusb will list all usb devices detected by Linux.

True

The execute permission on a script file must be enabled before the script will run.

True

The insmod command is used to install modules in the Linux kernel, and the rmmod command is used to unload them.

True

The netstat command can be used to look for network activity or open ports on a computer.

True

The purpose of an IP routing table is to obtain the IP address of the next link from a destination IP address.

True

What sequence of keystrokes will stop a job running in the foreground?

<Ctrl> z

The dd utility can make a low level copy of a filesystem.

True

What command would be used to check the gpg signature on a downloaded source file?

gpg

Which of the following should not be used as passwords?

All of the above (Pets, books, a dictionary word)

Which of the following commands can be used to shut down Linux?

Any one of the three sets of commands will shut down Linux. (sync, halt, poweroff)

The work of Project ____ was eventually called the X Window System.

Athena

Linux is case insensitive (it behaves the same way whether commands are entered as upper or lower case characters).

False

Maintaining system security on Linux is neither difficult nor time consuming.

False

One of the advantages of shadow passwords is that they support password aging and account expiration features.

True

What is the result of executing the following vi command while editing a text file? 20 dd

You will delete 20 lines starting from the current cursor position.

In Linux, ________ is a standard feature that allows you to plug in new devices and use them immediately

hotplugging

The command used to rename a file in Linux is ____.

mv

Undelivered remote mail would be stored in the ____ directory.

/var/spool/mqueue

Which of the following terms refers to a unique 48 bit binary address, expressed in hexadecimal, that is assigned to each Network Interface Card during its manufacturing process?

All of the above refer to the same address. (Physical Address, Hardware Address, Media Access Control (MAC) Address)

By default, the desktop configuration is saved between logins.

False

Commands in the vi editor can be entered from the keyboard, or by using the mouse.

False

Copy of Commands in the vi editor can be entered from the keyboard, or by using the mouse.

False

In Linux, Direct Access Memory (DMA) allows a maximum of 1024 bytes of memory to be allocated per direction (input/output) per device.

False

In Linux, the ipconfig command is used to examine current IP address settings.

False

In an enterprise network, a "best practice" is to assign static IP addresses to all pcs

False

Passwords should be easy to guess and hard to remember.

False

Structured Query Language (SQL) can be interpreted and executed by several different Linux shells.

False

The /etc/fstab file contains settings that tell the init process how to handle each runlevel.

False

The job command and the ps command both return the same information.

False

The nohup command can only be used with processes that take a short time to complete and must be executed at a very high priority.

False

The priority or importance of a job is defined by its nice number. The higher the nice number is, the more important a job is and the more resources it will take without sharing them.

False

The yellowdog updater, modified (yum), Red Hat package manager (rpm), and apt-get are package managers. By default, all three are included with all current distributions of Linux.

False

To keep things simple, Linux only provides a single method to solve a given problem.

False

The procedure used to create a process is called _____.

Forking

Using the default Fedora shell, which of the following commands would display the path to your home directory?

None of the above. (echo $PATH, echo $Home, echo $SHELL)

When running the Bourne Again SHell (BASH), the _____ environment variable contains the path information for the current session.

PATH

The kill command is used to ______.

Send a signal to a process to terminate that process

What is the best way to prevent a single user from consuming all available disk space on a Linux filesystem?

Set a size limit of 100 GBytes on the total amount of storage that can be used by a single user. Warn users when they are approaching the limit, and prevent them from saving additional files if they exceed it.

Which of the following commands will display the last ten lines of a file by default?

Tail

In the following directory listing, which attribute contains the access permissions for owner, group, and others?

The first field (-rwxr- - r- -)

Which of the following steps comes first in the boot process?

The hardware completes a Power On Self-Test (POST).

A Daemon is a server process that usually is initialized at startup and runs continuously in the background.

True

A Variable is a placeholder in a script for a value that will be determined when the script runs

True

A shell is a command interpreter.

True

A super server is a program that listens for network connections on behalf of another program. When a connection is initiated, it hands off control of that connection to the intended server.

True

An IPv4 subnet mask is a 32 bit binary number, commonly expressed as decimal, that is used to differentiate the network part from the host part of an IP address.

True

The while loop ends with the done command.

True

Transmission Control Protocol (TCP) Port 80 is used as a listener for HyperText Transport Protocol (HTTP) traffic.

True

When working in a shell, you can interact with any file that you have permission to access, you can start any program on the system, and you can use special features of the shell.

True

When you are in insert mode in vi, pressing the Esc key will switch you back to command mode.

True

Which of the following SQL commands could update an existing record in a table?

UPDATE mytable SET STREET_ADDRESS='404 Error Message Lane', CITY='Internet City' WHERE LastName='Hacker' AND FirstName='Ima';

How would you enable routing in a Linux system?

You would edit the appropriate configuration file to enable IP forwarding.

When adding a new font to X's font path that you want to take precedence over other fonts in the existing path that have the same name, you would ____.

add the new font path to the top of the Files list in the SF86Config or xorg.conf file

The /proc/bus/usb/devices devices file contains ______.

detailed information about each connected USB device

Which of the following commands can be used to non-destructively test a hard drive for bad blocks?

e2fsck

The ___ editor is the original text editor on Unix machines. It is line-oriented and used to create, display, modify and otherwise manipulate text files.

ed

The command used to start a suspended job in the foreground is _____.

fg

A process by which a fully qualified domain name is resolved to an IP address using the Domain Name System (DNS) is known as ____.

forward lookup

Which command can be used to stop Linux?

halt

In shell scripting, the ___ command uses conditional expressions to take one of two actions.

if

A(n) ____ is like a version of a printer definition with particular options set

instance

When the ____ option is selected, the user must enter his or her password to clear the screensaver, once it starts.

lock

Which of the following would be the most likely tool to use when searching for unnecessary active network connections?

netstat -ap, because it would display all of the open ports on the system, as well as their associated process IDs.

It can redirect standard input, standard output, and standard error to the same file.

redirection

A process by which an IP address is resolved to a fully qualified domain name using the Domain Name System (DNS) is known as ____.

reverse lookup

How would you enable routing in a Linux system?

route add

Which of the following commands can be used to manage dynamic devices on Linux?

udev

The ____ tool allows you to produce an X-windows configuration file when no X server is running.

xorg with the -configure option


Conjuntos de estudio relacionados

2.4 assessment types / special considerations

View Set

Unit 4 Guide- Chapter 8 (Physio honors)- STUDY QUESTIONS

View Set