unix 2 exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

daemon

A system process that is not associated with a terminal is called a(n) ____ process.

false

A user can only be a member of one group.

false

A value of 0 for a process priority indicates low priority

fg

After a background process has been started, it can be moved to the foreground by using the ____ command.

true

After a process has been started, you can change its priority by using the renice command

#

Any line that starts with a(n) ____ character is a comment in the /etc/rsyslog.conf file.

iso9660

CD-ROMs typically use the ____ filesystem type.

false

Can a process have multiple parent processes?

false

Can a user account be used to log in to the system before its password is set?

false

Can any existing directory can be used as a mount point?

false

Can several different devices share the same major number?

false

Can the SIGKILL kill signal be trapped by a process?

false

Can the top command be used to change the priority of processes?

false

Can the usermod command be used to modify the password expiration information stored in /etc/shadow?

tracks

Data is read off of hard disks in concentric circles called ____.

false

Did older Linux systems store encrypted passwords in the /etc/shadow file?

false

Do symbolic links share the same inode and inode number?

false

Does a negative nice value give a process a greater chance of a lower priority?

false

Does the find command use a pre-made index of files to locate a file?

true

Each process can start an unlimited number of other processes

corruption

Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems

false

If a device is mounted to a directory that contains files, are those files temporarily covered up until the device is unmounted?

write

If a user has ____ permission for a file, they can open, read, and edit the contents of a file.

true

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.

false

If you send a kill signal to a process that has children, are the child processes terminated?

false

In Linux, you must use only one type of filesystem on a system.

-

In a file's mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode.

/usr

In the FHS, the ____ directory contains most system commands and utilities.

/boot

In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader.

/root

In the FHS, the ____ directory is the root user's home directory.

process state

In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing

false

Is ext3 the traditional filesystem used on Linux?

2

Linux requires ____ partition(s) at minimum.

var/log

Log files are typically stored in the ____ directory.

true

Most commands such as ls, find, and grep are binary programs that exist on the filesystem until executed.

false

On most Linux systems, the logrotate utility is automatically scheduled to run weekly.

false

PATA hard disk drives typically have faster data transfer speeds, and most systems allow for the connection of more than four such hard disks.

0

Processes are started with a nice value of ____ by default.

true

The /etc/login.defs file contains parameters that set the default location for e-mail, password expiration information, minimum password length, range of UIDs and GIDs available for use.

true

The PATH variable lists directories that are searched for executable files if a relative or absolute pathname was not specified when executing a command on the command line

true

The SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file.

false

The SIGINT kill signal is the default kill signal used by the kill command

/dev/hbd1

The ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave)

/dev/ttyS1

The ____ device file represents the second serial port on the system (COM2).

sixth

The ____ field in a cron table contains the absolute pathname to the command to be executed.

root

The ____ filesystem contains most of the operating system files

sighup

The ____ kill signal stops a process and then restarts it with the same PID

sigquit

The ____ kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory.

secure

The ____ log file contains information and error messages regarding network access generated by daemons such as sshd and xinetd.

x

The ____ option to the ps command displays all processes that do not run on terminals.

superblocks

The ____ section of a filesystem is the section that contains information about the filesystem in general.

2

The chgrp command takes ____ argument(s) at minimum.

df

The easiest method for monitoring free space by mounted filesystems is to use the ____ command.

true

The execute permission for a file allows a user the ability to execute the file in memory (if it is a program file or a script).

locate

The fastest method to search for files in the Linux directory tree is to use the ____ command.

false

The killall command uses the PID to kill a process.

false

The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations.

false

The ps command is the only command that can view process information

mode

The section of an inode that stores permissions is called the ____ of the file.

/etc/skel

The skeleton directory on most Linux systems is ____.

64

There are ____ different kill signals that the kill command can send to a certain process.

false

There can be multiple device files per device.

newgrp

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the ____ command.

fsck

To check a filesystem for errors, you can use the ____ command, which can check filesystems of many different types.

true

To check whether the /mnt/floppy directory is being used by any users, you can use the fuser command with the -u option.

false

To clear a log file, you can use a(n) < redirection symbol.

pwconv

To convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.

ln

To create a hard link, you must use the ____ command.

-e

To create or edit a user cron table, you can use the ____ option to the crontab command.

fdisk

To create partitions after installation, you can use the ____ command

-l

To display a list of at Job IDs, you can specify the ____ option to the at command.

-e

To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.

-t

To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.

-L

To lock an account, you can use the usermod command with the ____ option.

mount -a

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, you can simply type the ____ command.

chmod 777 name

To set all of the special permissions on a certain file or directory, you can use the command ____, where name is the name of the file or directory.

true

To view the size of a directory and its contents in Kilobytes, you can use the du command.

true

When a device is mounted, it is attached to a certain directory on the directory tree called a(n) mount point.

%

When killing a background job with the kill command, you must prefix the background job IDs by a(n) ____.

+

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.

g+r-W

When using the chmod command for a specific file, the ____ argument would add read permission and remove write permission for the group permissions.

false

When using the chmod command, if there is no character specifying the category of user to affect, only the group category is affected.

7

When using the chmod command, the mode rwx can be represented by the number ____

false

When using the find command, the -size x criteria is used to search for files with a size greater than x.

&

When you append a(n) ____ to a command, the command is run in a background process.

true

When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD.

true

While a process is waiting for its parent process to release the PID, the process is said to be in a(n) zombie state.

useradd

You can create user accounts on the Linux system by using the ____ command.

edquota

You can edit the quotas for certain users by using the ____ command.

-r

You can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents.


Conjuntos de estudio relacionados

American Presidency Exam 1 Study Questions

View Set

HK: Motor Learning and Performance (Chapter 10)

View Set

Midterm Exam Questions // Smith // Ole Miss

View Set