linux+ comptia ALL
DPKG force install a dependacy FLAG
--force
RPM command to ignore any errors with dependicies COMMAND
--force-nodeps
find information for a dpkg package FLAG
--info
TAR Removes the specified files from the filesystem after they have been added to the archive FLAG
--remove-flags
proces priority range
-20 19
RSYNC Copies block device contents to another device FLAG
-D
AWK show different field delimiters FLAG
-F
TAR Sets the tape length so multiple tapes can be used for an archive FLAG
-L
DPKG list information about a package FLAG
-l
RSYNC follows links to their destination FLAG
-l
TAR stays on the local file system FLAG
-l
Free Command more detailed summary FLAG
-lohi
TAR specifies multiple archive targets or spreads a large archive across multiple tapes or media FLAG
-m
CPIO copy files to an acrchive FLAG
-o
CPIO This copies files from one directory tree to another without the use of an archive FLAG
-p
RSYNC preserves permissions FLAG
-p
FIND what is the flag for permision searches FLAG
-perm
APT remove a package and delete config files
-purge
RPM show all the Config files for a package FLAG
-ql
DPKG remove a package FLAG
-r
RSYNC replicates recursively FLAG
-r
SYSLOG add remote logging flag
-r
journalctl in reverse order pipe
-r
APT remove a package but keep config files
-remove
RSYNC preserves modify times FLAG
-t
hidden files start with what character?
.
what a hidden folder or file starts with
.
run a file as absolute path
./
automount point on a systemd units
.automount
Which of the following user environment files is executed first if found in the user's home directory
.bash_profile
file is a personal initialization file for configuring the user environment. The file is defined in you're home directory and can be used for the following: Modifying you're working environment by setting custom environment variables and terminal settings. Instructing the system to initiate applications.
.bash_profile
what must be run first in order to customize the makefile for your system?
.configure
What filename extension do UEFI bootloader files use?
.efi
GIT the staging area's index file name is called
.git/
GIT If you have files in your working directory that you do not want added to the staging area index, create a file called
.gitignore
gzip file extension name
.gz
BASH variables are edited in what file
.profile
controls variables for profile of all users of the system whereas, . profile allows you to customize you're own environment
.profile
What file name extension does the CentOS Linux distribution use for packages?
.rpm
shared libary extension
.so
target file extensions (RUNLEVELS)
.target
tar extension name
.tgz
starting point of the virtual file system
/
The public key is copied to the SSH sever system and placed in the LOCATION
/.ssh/authorized_keys
Contains openssh client configuartions LOCATION
/.ssh/config
The OpenSSH application keeps track of any previously connected hosts and their public keys in each user LOCATION
/.ssh/known_hosts
Contains executables LOCATION
/bin
folder contains bootloader files LOCATION
/boot
holds files used in booting the operating system LOCATION
/boot
The EFI System Partition (ESP) is stored LOCATION
/boot/efi
where are grub legacy store its menu commands LOCATION
/boot/grub
where is the grub2 configuration file found?
/boot/grub
is the program which makes the computer just smart enough to find the operating system kernel and load it into memory LOCATION
/boot/grub2
Contains device files for all the hardware devices on the machine LOCATION
/dev
is the location of special or device files LOCATION
/dev
location of devices LOCATION
/dev
links storgage devices by their manufacture make,model, and serial number LOCATION
/dev/disk/by-id
links storage devices by the label assigned to them LOCATION
/dev/disk/by-label
links storageg devices by the physical hardware port they are connected to LOCATION
/dev/disk/by-path
links storage devices by the 128 bit universally unique indefier (UUID) assigned to the deivce LOCATION
/dev/disk/by-uuid
all devices on your computer can be found here LOCATION
/dev/mapper
logical volumes are stored in LOCATION
/dev/mapper
to create virtual files that interface with applications that manipulate data on a virtual LVM volume before being sent to a physical hard drive device LOCATION
/dev/mapper
blackhole because it immediately discards anything written to it and only returns an end-of-file EOF when read LOCATION
/dev/null
name fo the file that is your terminal LOCATION
/dev/tty
Where are your config files stored? LOCATION
/etc
Apparmor Profiles are defined for each application in the LOCATION
/etc/apparmor.d
Apparmor variables are then defined in files contained in the LOCATION
/etc/apparmor.d/turntables
debian repository LOCATION
/etc/apt/sources.list
default repositories LOCATION
/etc/apt/sources.list
file to change aliases
/etc/bashrc
systemwide bash per-interactive-shell startup file. Is is used system wide functions and aliases. LOCATION
/etc/bashrc
encrypted file that is a table that indicates the drive device file LOCATION
/etc/crypttab
location for grub global command configuration LOCATION
/etc/default/grub
UFW configuration file LOCATION
/etc/default/ufw
checked to see what partitions should be automatically mounted. LOCATION
/etc/fstab
file is a table that indicates the drive device file LOCATION
/etc/fstab
folder to modify to eanble filesystem quota support LOCATION
/etc/fstab
is a text file which defines the groups to which users belong under Linux and UNIX operating system LOCATION
/etc/group
symbolic link to the grub.cfg file LOCATION
/etc/grub2.cfg
file contains secure info for encrpted passwords for groups LOCATION
/etc/gshadow
is an operating system file that translate hostnames or domain names to IP addresses LOCATION
/etc/hosts
most basic network security feature you can implement is to use the LOCATION
/etc/hosts.deny
This file turns scripts on and off LOCATION
/etc/init.d
Which directory on an old SysV init system stores the service startup scripts? LOCATION
/etc/init.d
For SysV init systems, the default runlevel is stored within the LOCATION
/etc/inittab
This file sets default runlevel LOCATION
/etc/inittab
Which of the following configuration files should be modified to disable Ctrl-Alt-Del in Linux? LOCATION
/etc/inittab
message to come up when users first login LOCATION
/etc/login.warn
modprobe configuration file LOCATION
/etc/modprobe.conf
Contains configuariton files generated at system installation or created by an administraotr LOCATION
/etc/modprobe.d
quota files are mounted in LOCATION
/etc/mtab
is a command line utility for the configuration of networking on certain Linux distributions LOCATION
/etc/netplan
in which file is network bonding configured? LOCATION
/etc/network/interfaces
Which file is consulted first when a hostname lookup occurs?
/etc/nsswitch.conf
file is used to configure which services are to be used to determine information such as hostnames, password files, and group files LOCATION
/etc/nsswitch.conf
PAM confiuration files are located in LOCATION
/etc/pam.d
location of where account infoformation is stored LOCATION
/etc/passwd
bash variables, path, and settings are in what file
/etc/profile
contains Linux system wide environment and startup programs. It is used by all users with bash, ksh, sh shell. LOCATION
/etc/profile
directory contains other scripts that contain application-specific startup files, which are also executed at startup time by the shell. LOCATION
/etc/profile.d
Location of runlevels for inits LOCATION
/etc/rc.d
Init file used by system Administrator LOCATION
/etc/rc.local
Which file contains a list of DNS servers the Linux system can use to resolve hostnames? LOCATION
/etc/resolv.conf
resolver configuration file for Linux and UNIX like operating systems. It is used to configure dns name servers LOCATION
/etc/resolve.conf
this logs system messages
/etc/rsylog.conf
ryslog configuration file LOCATION
/etc/rsyslog.conf
file provides a list of locations from which users can't log in using the root user account, LOCATION
/etc/securetty
Checking DNS's protocols in the LOCATION
/etc/services
file documents the different standard application services names and their corresponding port numbers and protocols as well as any aliases. LOCATION
/etc/services
firewall file location LOCATION
/etc/services
a system file in which encryption user password are stored so that they aren't available to people who try to break into the system LOCATION
/etc/shadow
In which directory are time zone files found? LOCATION
/etc/share/zoneinfo
skeleton directory for where temporary files are held LOCATION
/etc/skel
contains openssh client configurations LOCATION
/etc/ssh/ssh_config
contains the opennssh daemon configurations LOCATION
/etc/ssh/sshd_config
Which file would you edit to give root user privledges to someone else
/etc/sudoers
file is used to specify information about the desired network configuration on you're server LOCATION
/etc/sysconfig/network
What folder does Red Hat-based systems use to store network configuration files? LOCATION
/etc/sysconfig/network-scripts
Permanent changes go in LOCATION
/etc/sysctl
can configure various Linux networking and system settings. allows you to make changes to a running Linux kernel LOCATION
/etc/sysctl.conf
SYSTEMD Units that are controlled by the sysadmin and have ultimate precedence over all the other units LOCATION
/etc/systemd/system
time zone file location LOCATION
/etc/timezone
udev local adminstartion rules highest priority LOCATION
/etc/udev/rules.d
UFW rules are stored in the LOCATION
/etc/ufw
directory contains configuration files used by both the X.org and XFree86 applications for controlling the X Windows graphical environment on the Linux system LOCATION
/etc/x11
red hat repository LOCATION
/etc/yum.repos.d
Which directory should you place on a separate partition to separate user data from system data? LOCATION
/home
bash is found in what folder LOCATION
/home
folder contains user data files LOCATION
/home
Where are your files for executables? LOCATION
/lib
Modules required to support a kernel are stored in the LOCATION
/lib/modules
used as a mount point for removable media devices LOCATION
/media
also used as a mount point for removable devices LOCATION
/mnt
contains data for optional third party programs LOCATION
/opt
Changes in this section do not show up after reboot LOCATION
/proc
Dynamically created section for devices LOCATION
/proc
is virtual file system created on fly when system boots and is dissolved at time of system shut down. LOCATION
/proc
system's current processors' information LOCATION
/proc/cpuinfo
problems with RAID, check which file LOCATION
/proc/mdstat
to view detatiled system RAM infoformation, look at the LOCATION
/proc/meminfo
mount points are found LOCATION
/proc/mounts
mount points are found LOCATION
/proc/partitions
system partitions are found where LOCATION
/proc/partitions
ip forwarding files ip4 LOCATION
/proc/sys/net/ipv4/ip_forward
ip forwarding files ip6 LOCATION
/proc/sys/net/ipv6/conf/all/forwarding
SYSTEMD Units that have been created at runtime; may have precedence over non-runtime or installed units LOCATION
/run/systemd/system
udev Volatile rules LOCATION
/run/udev/rules.d
Where are system binaries stored
/sbin
first program that is started at boot time by the Linux kernel LOCATION
/sbin/init
libary of time zone files LOCATION
/share/zoneinfo
Database of everything connected to your computer LOCATION
/sys
stores and allows modification of the devices connected to the system LOCATION
/sys
fold that contains folders for each mounded drive LOCATION
/sys/block
SCSI problems, check which file LOCATION
/sys/class/scsi_host/host#/scan
contains temporary files created by system users LOCATION
/tmp
contains data for standard linux programs LOCATION
/usr
contains local user programs and data LOCATION
/usr/bin
In which directory structure are kernel modules typically found? LOCATION
/usr/lib
In which directory structure are kernel modules typicallyfound? LOCATION
/usr/lib
Kernel modules files LOCATION
/usr/lib/modules
SYSTEMD Units that have been installed with the distribution LOCATION
/usr/lib/systemd/system/
udev system rules LOCATION
/usr/lib/udev/rules.d
contains data for programs unique to the local installation LOCATION
/usr/local
contains data for system programs and data LOCATION
/usr/sbin
Which folder contains template files for each time zone that Linux supports?
/usr/share/zoneinfo
Most log files are kept in what folder LOCATION
/var
What folder do most Linux distributions use to store boot logs? LOCATION
/var/log
most Linux distributions create log fi les in the LOCATION
/var/log
file to check for printer errors LOCATION
/var/log/cups/error_log
The log file that dmesg uses to display the boot messages from the most recent system bootup LOCATION
/var/log/kern.log
stores Kernel logs and warning data. This log is valuable for troubleshooting custom kernels as well LOCATION
/var/log/kernel
stores Kernel logs and warning data. This log is valuable for troubleshooting custom kernels as well
/var/log/kernel.log
This file has all the global system messages located inside, including the messages that are logged during system startup. LOCATION
/var/log/messages
It is mainly used to track the usage of authorization systems. LOCATION
/var/log/secure
Nice default start level
0
Runlevel order for halt
0
run level for shut down the system
0
setsebool turn off
0
what number account denotes the root user
0
Runlevel order for single user
1
Sitcky Bit number set
1
run level for single user mode
1
setsebool turn on
1
what number account denotes which is responsible for some binaries and nologin accounts
1
uptime shows usage over what intervals in minutes
1 5 15
a remote desktop for linux
VNC
BASH symbol for escaping characters
\
command to print a new line
\n
GREP what to type to search for the begining of a line TEXT
^
symbol to search for text WITHIN a file
^
BASH different way of using $() SYMBOL
`
AA turn off a specific profile, use the COMMAND
aa-complain
If you need to troubleshoot an AppArmor profile, do this COMMAND FLAG
aa-complain
AA If you want to completely disable an individual profile use COMMAND
aa-disable
command to list processes that are not restricted by the AppArmor profiles. COMMAND
aa-unconfined
AA view a listing of active network ports on your system that don't have a profile defined by using the COMMAND
aa-unconfirmed
to create a report if any kernel-level hardware errors are detected (RED HAT) COMMAND
abrt
mode uses octal (base-8) numbers to specify permissions. DEFINITION
absolute mode
name of using the fulll path when navigating directories DEFINITION
absolute path
IPTABLES Allow the packet to continue to the next step (filtering point, routing decision, and so on).
accept
one network interface is live while the other is use as a backup for fault tolerance DEFINITION
active/passive
udevadm default value
add
add a repostiory COMMAND
add-apt-repository
are orchestration utilities that require software to be installed in the app container being monitored. DEFINITION
agent monitoring
the tool uses preexisting and/or embedded software in the container or the container's external environment to conduct its monitoring activity. DEFINITION
agentless monitoring
two or more network interfaces are combined to created one larger network pipe DEFINITION
aggregation
method is used to automate unattended installations of Linux
anaconda kickstart
is a Linux kernel security module that allows the system administrator to restrict programs' capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths.
apparmor
is considered a MAC security system PROGRAM
apparmor
it only controls the files and network ports applications have access to. APP
apparmor
debian based system to retrieve packages
apt
APT search for packages COMMAND
apt-cache search
repository probems, do this COMMAND
apt-get-dist-upgrade
PAM If the module returns a success status code and no preceding stack modules have returned a fail status code, a final success status is immediately returned to the application without running the rest of the modules within the configuration file. If the module returns a fail status code, it is ignored.
sufficient
s to allow standard users to run an application with root privileges. COMMAND
suid
why no shared ID's?
support non-repudation
swap partition to disengage it from swap space COMMAND
swapoff
viewing memory and determining if swap is a file or a partition COMMAND
swapon
view a swap space element's type, name, and priority
swapon -a
radius is commonly used for
switches and routers
mode enables you to set permissions using three components: permission contexts, operators and attributes DEFINITION
symbolic mode
another name for private keys DEFINITION
symmetric keys
You may be able to improve CPU performance by modifying certain kernel parameters via the COMMAND
sysctl
What protocol became a de facto standard in Linux for tracking system event messages?
syslog
first thing to try with storage intergrity problems COMMAND
badblocks
a measurement of the maximum data amount that can be transferred between two network points over a period of time DEFINITION
bandwidth
is a shell script that Bash runs whenever it is started interactively. It initializes an interactive shell session COMMAND
bashrc
SHELL to restart a job in the background use the COMMAND
bg
name of software LInux uses to provide DNS naming system
bind
most basic form of two factor authentication
biometrics
You can see your label and UUIDs with the
blkid
displays current partition sizes and mount points COMMAND
blkid
what kind of storage reers to unstructured data offered on the microsof azure cloud platform and typically consists of items such as images streaming video and big data
blob storage
FIREWALL Accepts only network connections that originated on the system. Rejects incoming network packets and sends an icmp-host-prohibited or icmp6-adm-prohibted message back.
block
allows you to aggregate multiple interfaces into one virtual network device DEFINITION
bonding
term for making two network cards act as a single device DEFINITION
bonding
GIT a local repository area employed for a particular project section, such as development or project testing DEFENTION
branch
allows you to control how the bridging behaves. COMMAND
brctl
virtual machines to all act as nodes on her host machine's LAN and get their own IP address that they will use to send/receive network traffic DEFINITION
bridged
network enables the virtual machine to be a full participant on the same network as the virtualization host.
bridged network
Braile package for debian
brltty
importance of disabling root login via ssh
brute force vulnerability
compiling software when a developer commits code to a certain branch in a repository is an example of which type of automation
build
the orchestration tool would immediately start up an additional production app container using the container's stored configuration settings
build automation
compression with higher compression rates but longer time to compress
bzip2
it will allow you to do a lot with the customization of your cloud VM installs
cloud-init
improves application performance by dividing application functions among multiple servers
clustering
pluggable devices are hardware that can be connected to the system only when the system is completely powered down DEFINITION
cold pluggable
GIT The project's workflow dictates when the programs are moved to the local directory via the CINNABD
commit
cups AC
common unix printing system
CVE AC
comon vulnerabilities and exposures
GIT the first time you have built a .git/ subdirectory on your system, use COMMAND
config
What method should you use to easily move an application from a development environment to a production environment without having to duplicate the operating system?
container
allows your developers to easily deploy applications between development, test, and production. DEFINITION
container
is a binary file that has within it all the necessary components to run as a Docker container instance.
container image
by creating a self-contained environment to encapsulate applications DEFINTION
containers
allows you to redirect multiple items into a command. It can also modify a file using a script, create a script, keep data in a script, and so on. DEFINITION
here documents
to see list of previous entries in terminal COMMAND
history
VI cursor key movement letters
hjkl
Performs similar to work but is used in a home setting, where other systems on the network are mostly trusted.
home
command to test a host name COMMAND
host
HBA AC
host bus adapter
For systems using the systemd startup method, use what to view or change the hostname information
hostnamectl
pluggable devices that can be removed at any time DEFINITION
hot pluggable
provides encrypted communciatins with web servers
https
is a utility for accessing the hardware clock. The hardware clock is independent of the OS(operating system) you use and works even when the machine is shut down. COMMAND
hwclock
Which Linux commands allow you to retrieve the time from the physical workstation or server? 2
hwclock timedatectl
allows you to pull out various data concerning the current user process COMMAND
id
is used to find out user and group names and numeric ID's (UID or group ID) of the current user or any other user in the server COMMAND
id
ssh name of the file used if it is a passwordless key
id_rsa
RSA *public* key, which, when supplied the remote host (via an 'authorized keys' file, publishing it in the DNS, or other means) allows the host to authenticate you're connection as being originated by you, and decide whether or not to accept it as a result
id_rsa.pub
The BIOS or UEFI starts a bootloader program from the
mbr
Which partition structure has extended partitions?
mbr
two hashes for integrity checks
md5 sha
to specify partiitions to be used for raid COMMAND
mdadm
DD to an input file COMMAND
if
command dispalys or sets the ip address and netmask values for a network interface COMMAND
ifconfig
Displays network bandwidth usage (throughput) for adapter in a continuous graph format. COMMAND
iftop
What command provides a good way to display the network connections that are using the most bandwidth? COMMAND
iftop
if a user cannot delete a file, look for what on the file
immutable bit set
user cannot delete one of her files, first thing to check
immutable bit set
FIREWALL Performs similar to work but is typically used on internal networks, where other systems on the network are mostly trusted.
internal
imap AC
internet message access protocol
ipsec AC
internet protocol security
receive the signal immediately and wake up DEFINITION
interuptible sleep
Determining the version of software installed on each client node is an example of collecting info for which collection in an automated infastructure DEFINITION
inventory
Conducting a non-cached read test using the COMMAND
ioping
can be used to perform simple disk latency tests
ioping
a static summary of CPU filesystem and partition statistics since the system booted COMMAND
iostat
command to see I/O wait times
iostat
displays a real time chart of disk statistics by partition COMMAND
iostat
What command can you use to both display and set the IP address, netmask, and default router values?
ip
bridging enables a virtual machine to get its own
ip
displays or sets the ip address, netmask and router values for a network interfaces COMMAND
ip
Interface configurations COMMAND 2
ip route
perform network throughput tests COMMAND
iperf
a framework that operates at the network layer
ipsec
helps secure communications across networks via encryption
ipsec
line based utility which is used to administer the framework called IP sets inside the Linux kernel COMMAND
ipset
utility is used to manage IPsets and requires super user priviledges COMMAND
ipset
IPSET properly add the new IP address to the BlockThem IPset
ipset -add
To create firewall rules on a system, you can use the COMMAND
iptables
to unblock ports, use this COMMAND
iptables -A
Persistancy for iptables COMMAND
iptables-save
kerberos command to view tickets contained in the servers credential cache COMMAND
klist
symbol before a file permission file that shows it belongs to a symbolic link
l
command to see which users logged in most recently COMMAND
last
It displays the event messages from the /var/log/wtmp log file, used by many Linux distributions to log user logins. COMMAND
lastb
this shows bad login attempts COMMAND
lastb
to set the locale COMMAND
lc_*
environment variable defines a character set to use for the Linux system COMMAND
lc_all
What two environment variables control all of the localization settings? 2
lc_all lang
PAM intergrates with
ldap
distributed database method for authorizing users to access resources located on multiple network servers
ldap
linux/opensource equivalent of active directory
ldap
provide simple network authentication services to multiple applications and devices on a local network
ldap
utilizes a hierarchical tree database structure to store information about both network users and resources.
ldap
line utility that is used in case a user wants to know the shared library dependencies of an executable or even that of a shared library COMMAND
ldd
ou can check which libraries a program uses by typing in
ldd
utility to track down missing library files for an application COMMAND
ldd
command to show a text file and not load the entire file at the beginning: for faster usage COMMAND
less
Permissions, first letter is an l, means its a
link
what piece of information is changed when an existing file is changed when a hard link pointing to that file is created
link count
LUKS AC
linux unified key system
lsof AC
list of open files
to create a hard link COMMAND
ln
this shows system usage and performance DEFINITION
load average
network traffic is shared between two or more network interfaces DEFINTION
load balancing
redirects entire client requests to one of a cluster of servers DEFINITION
load balancing
shows your computers load average as well as how long its been powered on COMMAND
loadaverage
VM typically it communicates only with the virtualization host via a virtual Ethernet switch.
local
problems with terminal files, improperly configured GUI components and expired passwords/accounts are all possible problems for
local access
These variables are only available to the current BASH shell DEFINITION
local variables
What Linux command displays all of the localization environment variables and their values? COMMAND
locale
to help you easily display these environment variables COMMAND
locale
What Systemd utility allows you to change the localization on your Linux system?
localectl
just displays the current localization settings COMMAND
localectl
use this to check keyboard settings COMMAND
localectl
it allows programs on the current system to test or implement networking services via TCP without needing to employ external networking structures.
localhost
s the ability to adapt a Linux system to a specific language.
localization
faster way to find files COMMAND
locate
third command to quickly locate a file COMMAND
locate
locate a file and ignore the case COMMAND FLAG
locate -i
GIT tool allows you to view information about previous commits that have occurred in a project COMMAND
log
IPTABLES Create a log entry.
log
dynamic device folder to allow you to create virtual drive devices defintition DEFINITION
logical volume manager
service accounts should never show
logins
It automatically splits rsyslogd log files into archive files based on a time or the size of the file COMMAND
logrotate
To configure log rotation, use the COMMAND
logrotate
What type of address is used so local applications can use network protocols to communicate with each other?
loopback address
to check the status of the print queue COMMAND
lpq
submits a new print job to print a file COMMAND
lpr
What command would show you the available drives detected by the system at GRUB
ls
Which command is used to display security context on files COMMAND
ls
simplest way to list files COMMAND
ls
to view the security context for a file use the COMMAND
ls -Z
list all files inlcuding hidden files FLAG
ls -a
command to see a list of shared inode numbers
ls -i
Permission problems with ownership? Try what first? COMMAND
ls -l
to see file owner and group settings COMMAND
ls -l
first thing to try for missing devices COMMAND
lsblk
ommand provides information about block devices (disks), such as hard drives and network cards, that are connected. COMMAND
lsblk
displays information about the hardware devices installed on the Linux system COMMAND
lsdev
first thing to try with memory problems COMMAND
lshw
Which command displays modules that are currently loaded into memory COMMAND
lsmod
Which command displays modules that are currently loaded into memory? COMMAND
lsmod
display module status COMMAND
lsmod
provides a list of files that are opened COMMAND
lsof
Which command gives an overview of all the hardware and drivers in the system, including the ports used to talk to the CPU?
lspci
command to troubleshoot PCI card issues COMMAND
lspci
use this to check your video settings COMMAND
lspci
You can view the basic information about USB devices connected to your Linux system by using the COMMAND
lsusb
use this to check your usb settings COMMAND
lsusb
to create logical volume from partitions in each physical volume COMMAND
lvcreate
What is the best way add swap space?
lvm
command to build the nessecary files for an application COMMAND
make
Build automation tools
make ant gradle rake cake
command to install the application files in your computer COMMAND
make install
creates an initial image used by the kernel for preloading the block device modules (such as IDE, SCSI or RAID) which are needed to access the root filesystem COMMAND
makeinitrd
type this to see a manual
man
mbr AC
master boot record
GIT Merge another brance of GIT COMMAND
merge
another name for a hash DEFINITION
message digest
motd AC
message of the day
SHELL SCRIPT characters that have special meaning when used in the Linux shell. DEFINITION
metacharacters
Mirrors all the logical volumes that exist on a given volume group.
mirrorvg
first thing to try if you have missing mount points COMMAND
mkdir
make a new directory in your present location COMMAND
mkdir
Make directories and parents COMMAND FLAG
mkdir -p
The Swiss Army knife for creating filesystems in Linux is COMMAND
mkfs
What tool do you use to create a new filesystem on a partition? COMMAND
mkfs
The command traditionally used to create an initial RAM disk
mkinitrd
Your Linux server installs correctly, but when you try to boot it, you cannot see the specialized disk subsystem that it installed to. Which of the following commands will be helpful in fixing this situation
mkinitrd dracut
if you need to add additional swap space, use COMMAND
mkswap
You can find out more detailed information concerning a particular kernel module via the COMMAND
modinfo
Looks for mods and dependencies
modprobe
Which command can both load and unload kernel modules? COMMAND
modprobe
Which command loads a module and its dependencies COMMAND
modprobe
You need to install a module, including all its needed dependencies. COMMAND
modprobe
insert a module and its dependancies COMMAND
modprobe
this utility removes mods will unload the kernal and unlink any dependancies
modprobe
remove mods either with or without dependancies COMMAND FLAG
modprobe -d
MODPROBE remove the xyz module and all of its dependencies
modprobe -r
Makes a nickname for a module COMMAND FLAG
modprobe alias
Used to specify commands to execute when a module is loaded COMMAND FLAG
modprobe install
Used to specify which options to pass to a module when it is loaded COMMAND FLAG
modprobe options
Used to specify commands to execute when a module is removed COMMAND FLAG
modprobe remote
to show a txt file on page at a time and flip through it COMMAND
more
to temporarily mount a filesystem to a linux virtual directory COMMAND
mount
How mount all filesystems listed in /etc/fstab whic have the option auto set COMMAND
mount -a
the user can move the mouse cursor by using keys on the keyboard.
mouse keys
Displays approximate travel times and packet loss percentages between the first 10 routers in the path from the source to the destination in a continuous graph or report format. COMMAND
mtr
concept that allows you to configure multiple paths between the linux system and network storage devices DEFINITION
multipath
to create different network paths to a remote storage device
multipath
Executes various DNS queries in an interactive or noninteractive mode. Check the returned information for correctness. COMMAND
nslookup
look up DNS information for multiple servers or domains COMMAND
nslookup
is the filesystem used by the Microsoft NT operating system and subsequent versions of Windows.
ntfs
to set the ip, netmask address and gateway use which COMMANDS 2
ntmui nmcli
is cross-platform proprietary remote desktop software that offers support for multi-session environments and account management
nx
Four remote deskops for linux
nx spice vnc xrdp
DD to an output file COMMAND
of
another program provides yet another command-line interface for working with drive partitions:
parted
program is that it allows you to modify existing partition sizes, so you can easily shrink or grow partitions on the drive.
parted
this tool can manage partition tables in both gpt and mbr
parted
to modify a GUID partition table use what tool COMMAND
parted
for newly created partitions, in that it forces a re-read of a disk's partition table without rebooting the system COMMAND
partprobe
create a passwd for an account COMMAND
passwd
for better security, put what on your UEFI
password
protect your grub bootload with a
password
allows you to merge lines of files horizontally COMMAND
paste
why do you boot the system into single user mode to
recover root password
IPTABLES do not allow the packet to continue to the next step but send a response message to the origin of the packet, informing it of the rejection.
reject
name of using path from where you are curently DEFINITION
relative path
systemctl Load the service configuration file of the running designated unit(s) to make service configuration changes without stopping the service. Note that this is different from the daemon-reload command.
reload
misconfigured openssh is most often the problem with
remote access
rdma ac
remote direct access memory
to change the priority of a process thats already running us the COMMAND
renice
tls prevents
replay attacks
contains software packages that have been tested and know to install and work corretly in the distribution enviroment DEFINITION
repository
PAM If the module returns a fail status code, a final fail status will be returned to the application, but only after the rest of the modules within the configuration file run.
required
command to expand or shrink a file system COMMAND
resize2fs
utility restores the security context of a fi le or directory back to the default settings as defi ned in the policies. COMMAND
restorecon
ACL potential problem
restrictive firewall settings
remove or delete a file COMMAND
rm
remove empty directories tool COMMAND
rmdir
this utility removes a mod from the kernel but keeps dependancies
rmmod
utility to remove a module COMMAND
rmmod
user account has full administrator privileges on the Linux system and can access any file, directory, or network port regardless of any security settings
root user
Which command displays the default gateway? COMMAND
route
command to set the default router address COMMAND
route
connect these network segments and forward IP packets to the appropriate network segment toward their ultimate destination.
router
red hat package tools COMMAND
rpm
command to list all currently installed packages using RPM management
rpm --query --all
command to copy a very large file quickly
rsync
how to copy files over a network COMMAND
rsync
program to copy files locally or remotely. known for its speed COMMAND
rsync
tool used in Linux for intergrity checks COMMAND
rsync
What syslog application is known for its rocket-fast speed?
rsyslogd
faster than syslogd
rsyslogd
program used to accept logging data from remote servers
rsyslogd
command to modify the filesystem parameters COMMAND
rune2fs
To determine your system's current and former runlevel, you employ the COMMAND
runlevel
term to set a firewall to active
runtime
command can copy block device contents directly COMMAND
rysnc
Displaying CPU usage COMMAND
sar
system's processor performance over time COMMAND
sar
occurs when network traffic exceeds capacity DEFINTION
saturation
geared for quickly transferring files in a noninteractive manner between two systems on a network COMMAND
scp
scp AC
secure copy
ssh AC
secure shell
usb storage device potential problems
security concern
problem with soft links
security concerns
This command searches and replaces text or complete phrases COMMAND
sed
command for stream editing
sed
name for a certificate that is generated by yourself DEFINTION
self-signed
implements MAC security by allowing you to set policy rules for controlling access between various types of objects on the Linux system, including users, files, directories, memory, network ports, and processes APP
selinux
is a Linux kernel security module that provides a mechanism for supporting access control security policies, including mandatory access controls (MAC). SELinux is a set of kernel modifications and user-space tools that have been added to various Linux distributions.
selinux
two most common linux email packages
sendmail postfix
smb ac
server message block
command for services COMMAND
service
user accounts are used to start and run applications that require access to a limited set of files and directories
service account
SERVICE Load the service configuration file of the running designated service. This allows you to make service configuration changes without stopping the service. Note that if you attempt the reload command on a stopped service, a FAILED status will be generated.
service reload
SERVICE Stop and immediately restart the designated service. Note that if a designated service is not already started, a FAILED status will be generated on the stop attempt, and then the service will be started.
service restart
SERVICE start the desinated service
service start
SERVICE Display the services current status
service status
SERVICE Stop the designated service. Note if a designated service is already stopped, a FAILED status will be generated on the stop attempt.
service stop
for a more detailed listing of the SElinux status, use the COMMAND
sestatus
BASH Shows all variables COMMAND
set
SHELL SCRIPT displays all of the global variables set
set
check enviroment variables COMMAND
set
SGID AC
set group id
SUID AC
set user ID
change the state of SELINUX COMMAND
setenforce
To change the boolean setting of a policy use the COMMAND
setsebool
a second utiltiy for transering files security over a network (COMMAND)
sftp
scp is faster than
sftp
is a special type of file permissions given to a file/folder. Normally in Linux/Unix when a program runs, it inherits access permissions from the logged in user
sgid
a copy of the operating system binaries, configuration files, and anything else you need to boot the Linux system DEFINITION
system image
utility is the main gateway to managing systemd and system services COMMAND
systemctl
systemctl display the desinated unit
systemctl display
systemctl Mark the designated unit(s) to be started automatically at system boot time.
systemctl enable
SYSTEMCTL forces the system to immediately change to a provided target (a grouping of systemd unit files).
systemctl isolate
systemctl Prevent the designated unit(s) from starting. The service cannot be started using the start command or at system boot. Use the --now option to immediately stop any running instances as well. Use the --running option to mask the service only until the next reboot or unmask is used.
systemctl mask
SYSTEMCTL Stop and immediately restart the designated unit(s). If a designated unit is not already started, this will simply start it.
systemctl restart
SYSTEMCTL start the desiginated units
systemctl start
SYSTEMCTL l display the designated units current status
systemctl status
SYSTEMCTL stop the desiginated unit
systemctl stop
systemctl undo the effects o the mask command on the designated units COMMAND
systemctl unmask
command for investigate your system's boot performance and check for potential system initialization problems COMMAND
systemd-analyze
Displays the amount of time each running unit took to initialize. Units and their times are listed starting from the slowest to the fastest. COMMAND
systemd-analyze blame
defi nes a family of protocols that provide remote authentication in a server environment.
tacacs
If you want to display the file's last lines instead of its first lines, COMMAND
tail
TAIL displays data appended to the file as it happens FLAG
tail -f
archiving utlity most commonly used today
tar
TAR create a new tar file
tar -cvf
TAR display the contents of a tar file
tar -tvf
TAR extract the contents of tar file
tar -xvf
most common selinux policy
targeted
selinux type setting is the default and only enforces nework daemon policy rules
targeted
an older method for controlling access to network-based service DEFINTION
tcp wrappers
protection for uncommonly used services
tcp wrappers
allow you to store the sniffed data into a file COMMAND
tcpdump
is a free and open source protocol designed for use in virtual environments. It is often used to connect to virtual machines (VMs) that are hosted by the Kernel-Based Virtual Machine (KVM) hypervisor
spice
examples of third party logging services 2
splunk alienvault
This language is related to database servers
sql
Which command displays which ports the processes use on Linux systems?
ss
determine just which program is listening on which open port: sockets COMMAND
ss
big command for port forwarding
ssh
provides a layer of encryption around data sent across the network
ssh
ssh command for local port forwarding COMMAND
ssh -L
ssh command for remote port forwarding COMMAND
ssh -R
SSH x11 forwarding COMMAND
ssh -X
ssh command allows you to remove ID within an agent session COMMAND
ssh-add
Runs as a wrapper to the user's session and provides authentication when requested.
ssh-agent
login via ssh and not have to supply a password everytime
ssh-agent
copy the SSH public ID key COMMAND
ssh-copy-id
create a new public/private key pair with ssh COMMAND
ssh-keygen
VPN uses what protocol(or should) LOCATION
ssl/tls
These accounts are for normal system users who need to log into a terminal and run applications. DEFINITION
standard user
This firewall determines if packets are fragmented.
stateful firewall
what is faster? stateless or statefull firewall
stateful firewall
While it also employs packet filtering, it does not treat packets as individuals, but instead as a team. It tracks active network connections, such as TCP and UDP, and keeps an eye on network status.
statefull firewall
firewall focues only on individual packets DEFINITION
stateless firewall
The default location where a program sends error messages to
stderr
The default location where a program gets its input from
stdin
the default location where a program sends its regular output to
stdout
used to protect a file from being deleted by those who don't own it, even if they belong to the group that has write permissions to the file. DEFINITION
sticky bit
is a feature that allows the user to perform keyboard combinations, such as Ctrl+C, without having to hold down the modifier key while pressing the combination
sticky keys
allows a standard user account to run commands as another use account including the root user account COMMAND
su
root privledges set permanantly COMMAND
su
SUDO This provides you with a non-login shell for the root user. FLAG
su -l
VM storage with set amount
thick provisioning
It allows a standard user account to run any command as another user account, including the root user account. COMMAND
sudo
root privledges for ONE command COMMAND
sudo
need to execute a root-specific command that is not in the normal user's path FLAG
sudo -
SUDO kill all the dd jobs COMMAND
sudo killall -USR1 dd
command allows a standard user to open a file in a text editor with privileges of another user account, including the root user account COMMAND
sudoedit
this type of virtual disk is a static setting where the virtual disk size is selected and file are created on the physical disk DEFINITION
thick provisioning
VM storage only uses what is necessary for hd space
thin provisioning
dynamic type of virtual disk which causes the hypervior to consume only the amount of disk space actually used for the virtual device DEFINITION
thin provisioning
it only wakes up based on an external event, such as hardware becoming available DEFINITION
uninteruptible sleep
Uses existing desktop applications, focus is on the interface (not apps), originally designed for Ubuntu, and development now handled by other organizations.
unity
endpoints similar to network sockets
unix sockets
command allows you to view the account creation configuration directives within the /etc/default/useradd file
useradd -D
USERADD lock an account FLAG
useradd -L
USERADD remove the lock on a user account
useradd -U
to delete an account on linux COMMAND
userdel
USER remove a user along with his home directory FLAG
userdel -r
userdel with superuser privledges?
userdel -r
to use to lock an account COMMAND
usermod
USERMOD Add to a group
usermod -aG
common usermod line command
usermod -aG
USERMOD Lock an account
usermod -l
USERMOD unlock an account
usermod -u
a VM is consigned to a private virtual network, opposite of bridging
NAT
LInux desktop used with LinuxMint
cinnamon
Which of the following utilities creates rules in /etc/host.deny to prevent access to the SSH server during a hacking attack? COMMAND
DenyHosts
SHELL SCRIPT file to display environment variables COMMAND
echo
command to DISPLAY text to STDOUT
echo
how to enable forwarding of ip packets
echo "1"
2nd command to create quota files COMMAND
edquota
change the quota for a specific user COMMAND
edquota
older boot system
efi
GREP equivlent command for general expression
egrep
It is a program which scans a specified file line by line, returning lines that contain a pattern matching a given regular expression. COMMAND
egrep
What syslog severity level has the highest priority ranking in rsyslogd?
emerg
SELINUX to enable the policy rules on the system and block any unauthorized access.
enforcing
network traffic is grouped into a zone, which is a predefined rule set. Each zone has a configuration file that defines this rule set, also called trust levels COMMAND
firewalld
What is mandatory access control designed to secure
files and directories
permission problems? Look at what? 4
filesystem quotas, disk space, inode use, and umask settings
more complex search of files, such as metadata COMMAND
find
slower but more thourough way to find things COMMAND
find
this can find hidden files COMMAND
find
show the current state of an uncomplicated firewall
ufw status
command helps you restrict access to system resources for each user account COMMAND
ulimit
Which command lets you alter the default permissions in a shell COMMAND
umask
feautre defines the default permissions linux assigns to the file or directroy COMMAND
umask
to unmount a virtual directory COMMAND
umount
UFW AC
uncomplicated firewall
on pci cards: basic computer parts DEFINITION
client devices
GIT Cloning a project from remote repository COMMAND
clone
old legacy application that provides remote look up services to find users on a linux system
finger
Redhat based firewall utility
firewalld
This service includes Authentication server, Key distribution center and Ticket-granting service
kerberos
sercure authentication protocl that uses sysmettric key cryptography
kerberos
kernel stops working due to errors DEFINITION
kernel Panic
What memory area does Linux use to store boot messages?
kernel ring buffer
check what for policy violations?
kernel security module log files
SHELL terminate a shell COMMAND
kill
what to add after setting a bash variable
""
immediately stop running a program DEFINITION
kill signal
kerberos use what service to determine if a ticket is valid COMMAND
kinit
What syslog severity level represents normal but significant condition messages?
notice
Use what program to lockout users
pam
SHELL SCRIPT symbol for comments
#
used in Linux to define the shell as a bin/bash shell that reads the program
#!
SHELL SCRIPT specific format for the shell script to work
#!/bin/bash
BASH positional parameters symbol
$
GREP command to treat text as variables?
$
GREP what to type to search for the endof a line TEXT
$
set an envirement variable Text
$
SHELL SCRIPT is used for executing a command mostly inside some other command i.e Function symbols
$()
What environment variable contains the username of the user who started the shell?
$USER
SHELL SCRIPT array builder symbold
${}
VI search the entire file symbol
%
print print string characters in the argument
%s
SHELL To run a shell script in background mode, include the
&
how to send a process to the background TEXT
&
symbol to put a job in the background
&
PIPING causes the second command to be executed if the first command has an exit status of 0 (success). If an exit status of nonzero (failure) is returned, the second command is not attempted.
&&
Sometimes you want to send standard error and standard output to the same file
&>
Brute force attack logins can be prevent by settings in
pam_tally2
command allows you to view failed login attempts COMMAND
pam_tally2
authentication issues? check what?
pam_tally2 faillock
how to organize text file alphabetically COMMAND
sort
sort a fiie numerically from top to bottom COMMAND
sort
sort a list of numbers in a file FLAG
sort -n
GREP This option shows all the lines in a file that don't match the string; this is exactly the opposite of the default behavior FLAG
grep -v
GREP option selects only lines that have the string as a whole word, not part of another word. FLAG
grep -w
to add a group COMMAND
groupadd
command to delete a group COMMAND
groupdel
command to modify a group COMMAND
groupmod
Specifies the /etc/fstab option for group quotas.
grpquota
What command must you run to save changes to a GRUB Legacy boot menu?
grub-install
You must run the command to generate the GRUB2 grub.cfg configuration file.
grub-mkconfig
install a dpkg package FLAG
-i
Redirect STDOUT to specified file. If file exists, append to it. If it does not exist, create it
>>
command to append data to a preexisting file
>>
A process that is the most recently acted upon SYMBOL
+
How do you determine the default job running in a console session?
+
DATE to retrieve the date in YYYY-MM-DD format.
+%F
DATA use what to retrieve the week number
+%V
DATE to retrieve the Julian date, day number
+%j
SUID command for adding in permissions
+s
Permissions command for adding a sticky bit
+t
command generates the GRUB2 configuration used for booting
grub-mkconfig
DPKG remove a package and its config files FLAG
-P
DPKG search installed files for a package FLAG
-S
RPM verify a package FLAG
-V
To view the security context assigned to objects, add the
-Z
RSYNC switch allows you to recursively back up a directory tree and preserves all the file metadata.
-a
TAR sets the block size FLAG
-b
will create a tarball using the highest compression utility, xz, and allow the administrator to view the files via the verbose option while they are being copied into the compressed archive
-cJvf
RPM remove a package FLAG
-e
RSYNC preserves group ownership FLAG
-g
TAR Creates a new format incremental backup (only files that have changed since the last full or incremental backup). FLAG
-g
CPIO Extract files from an archive FLAG
-i
RPM install a package FLAG
-i
the users group id number
100
privileged ports run up to number
1023
registered port numbers
1024 49151
pop port 2
109 110
ntp port
123
maximum partitions allowed on a gpt disk
128
imap port 2
143 220
page blob maximum storage
1tb
Runlevel order for debian user
2
SGID number set
2
run level for multi user mode WITHOUT networking services enabled
2
nfs port
2049
sendmail and postfix port
25
Redirect STDERR to specified file. If file exists, overwrite it. If it does not exist, create it.
2>
command to get around superuser errors and file errors
2>
Redirect STDERR to specified file. If file exists, append to it. If it does not exist, create it.
2>>
run level for multi user mode WITH networking services enabled
3
Install grub2 on a system COMMAND
grub2-install
ldap port
389
SUID number set
4
mbr supports how many drives
4
run level for custom
4
what number account denotes the apache user
48
run level for multi user mode with gui interface
5
A page blob is limited to how much storage
512 bytes
run level for rebooting the system
6
port for cups
631
how many levels of run levels
7
finger port
79
what number account denotes nobody NUMBER
99
vi command to exit out of a session
:q!
how to string multiple commands on one line TYPE
;
Redirect STDIN from specified file into command.
<
Redirect STDOUT to specified file. If file exists, overwrite it. If it does not exist, create it
>
command to redirect text to a different file
>
command generates the grub configuration file for you COMMAND
grub2-mkconfig
older of the compression utilities
gzip
inheritence issues? why maybe?
ACL
Runlevel orders AC
halt single debian redhat wildcard redhat reboot
type of file that has to different file names and be accessed with either name
hard link
Orchastration: To make sure software, services and systems maintain a consistant state: DEFINTION
Automated configuration management
a usb device can be an example of what kind of token
hardware token
information system security alerts
CVE
first thing to try if you are having performance issues COMMAND
hdparm
to show the first 10 lines of a file COMMAND
head
An Extensible Firmware Interface (EFI) system partition uses a filesystem of what type for compatibility
FAT
HEAD set numbers to show set amount of lines FLAG
head -n
Onscreen gnome keyboard
GOK
tells the compy what to boot
GRUB
gpt AC
GUID partition table
DenyHosts and Fail2ban are basically
IDS
another command for stdin redirection COMMAND
here
shell problems? 2 causes
Improperly configured environment variables, default shell setting
command that sets the language envirement variable
LANG
this variable changes the setting for all of the localization environment variables
LANG
The journalctl application allows you to filter event messages related to a specific application by the application process ID (PID) using the
OBJECT_PID
file format bundles all of the virtual machine configuration files into a single tar file for distribution
OVA
VARIABLE search order for executing files
PATH
Which variable defines the directories in which a bash shell searches for executable commands
PATH
Completely kill a process COMMAND
PID
Inserting modules to memory can be accomplished by using the COMMAND
insmod
bit is used with executable files
SUID
linux Terminal clear the screen COMMAND
clear
VM quick to boot and begin serving and priced simply
amazon machine images
utility allows you to insert a single module into the Linux kernel COMMAND
insmod
Displays the ARP table for the network's neighborhood. Checks for incorrect or duplicate MAC addresses. This command is obsolete. COMMAND
arp
three most common character sets linux
ascii unicode utf8
name for keys that use public and private keys DEFINITION
asymmetric keys
CRON command for a one time sceduler event
at
SHELL allows you to specify a time when the Linux system will run a script
at
What command allows you to run a shell script at a specific time?
at
orchastration: Used to define parameters
attributes
if there are policy violations, use this program COMMAND
auditd
package provides this extra level of logging for better security COMMAND
auditd
abrt AC
automatic bug reporting tool
scripting language used for manipulating data and generating reports.
awk
is a filesystem protocol created by Microsoft for reading and writing data across a network using a network storage device. It was released to the public for use on all operating systems.
cifs
BASH statement allows you to check multiple values of a single variable in a list-oriented format COMMAND
case
quickly read a file COMMAND
cat
to concatinate two dirrerent files COMMAND
cat
an encrypted key that implements a two-factor authentication method
certificate
issues digital certificates: Something you possess and something you know DEFINITION
certificate authority
Creates queues for each process and handles the various queues in a loop while providing read request priority over write requests. This scheduler is good for situations where more balance I/O handling is needed and/or the system has a multiprocessor COMMAND
cfq
IO scheduling tools
cfq noop deadline
command allows the adminstrator to set how often the password must be changed and what happens as the password starts to age COMMAND
chage
to view an accounts passwd status COMMAND
chage
The filtering point and the table (filter, NAT, or mangle) are combined into a single set of rules called a DEFINTION
chain
iptables determine the path each packet takes as it enters the Linux system to reach the appropriate application.
chains
You can change the default security context assigned to a file by using the COMMAND
chcon
Automated Configuration management programs
chef puppet ansible
can change the group assigned to the file or directroy by using the COMMAND
chgrp
to configure various services to start at different run levels COMMAND
chkconfig
can change the assigned permissions COMMAND
chmod
Chmod Operate recursivley through directories FLAG
chmod -R
octal notation for modifying permissions COMMAND
chmod ug
change the owner assigned to a file or directory COMMAND
chown
utility runs a command in a new root directory structure, within the standard Linux virtual fi lesystem. All disk access performed by the command is restricted to the new root directory structure. COMMAND
chroot jail
CPIO AC
copy in out
Problems with local access? look at what?
corrupt terminal files, improperly configured GUI components, and expired passwords/accounts
copy COMMAND
cp
Copy a directory FLAG
cp -r
copy files recursive COMMAND
cp -r
To quickly create an archive of disparate files around the virtual directory structure, the best utility to use is the
cpio
utlility for creating an archive file (command)
cpio
order for inserting a new hd into a computer
create format mount
SHELL program provides an interface that can run scripts at a regularly scheduled interval.
cron
application schedules jobs on Linux systems
cron
SHELL define the jobs to run in the cron table by using the COMMAND
crontab
SHELL key to press to stop a shell running in the foreground
ctl c
SHELL key to press to pause a shell running in the foreground
ctl z
software that allows a linux system system to connect to any printer resource, either locally or via a network, by using a common application interface
cups
is a computer software project providing a library (and command-line tool for transferring data using various network protocols.
curl
aqustition command for downloading files 2 of a remote source(ip address) COMMANDS 2
curl wget
sift through the data in a large text file, it helps to quickly extract small data sections COMMAND
cut
CUT set a delimiter FLAG
cut -d
DTLS AC
datagram transport layer security
determine the current time zone setting for your Linux system COMMAND
date
utility to copy almost everything on a disk COMMAND
dd
Batches disk I/O requests and attempts to handle each request by a specified time. This scheduler is good for situations where increased database I/O and overall reduced I/O latency are needed, and/or an SSD is employed, and/or a real-time application is in use. COMMAND
deadline
crytographic token that provides authentication and data verification DEFINITION
digital signature
Permissions, first letter is a d means its a
directory
SELINUX setting value completely disables SELinux from monitoring actions on the system.
disabled
three types of selinux modes
disabled enforcing permissive
refers to the storage medium's gradual decay due to time or improper use, which causes data degeneration or loss DEFINITION
degraded storage
sdd potential problem
degraded storage
ufw common pipe
deny
helps protect against brute force attacks coming through openssh COMMAND
denyhosts
Which command builds the kernel module dependency file? COMMAND
depmod
utlity to update the modules.dep file COMMAND
depmod
LMV device files are managed by the
device mapper
displays disk usage by partition COMMAND
df
utility allows you to view overall space usage COMMAND
df
provides a means for configuring one or more network interfaces using the Dynamic Host Configuration Protocol COMMAND
dhclient
command to explore text file differences COMMAND
diff
backup that makes a copy of all data that has changed since the last full backup DEFINTION
differential backup
command can display individual host records for a domain
dig
command displays all of the DNS data records associated with a specific host or network COMMAND
dig
is most likely to help you with name resolution problems? COMMAND
dig
Which of the following communicates with the Linux operating system to transmit the UI wants and needs?
display server
To see memory changes COMMAND
dmesg
command lets you peek at the kernel ring buffer to view kernel event messages as it detects and works with devices COMMAND
dmesg
command to display kernel event messages
dmesg
hd and SCSI problems, run what COMMAND
dmesg
to display the most recent boot messages COMMAND
dmesg
use this if you are experiancing resource exaustion COMMAND
dmesg
utility will simply dump the current kernel ring buffer to STDOUT COMMAND
dmesg
problems with communication ports
dmesg | grep ttyS
use this for uncommon hardware issues COMMAND
dmidecode
FIREWALL Performs similar to public but is used in a location's demilitarized zone, which is publicly accessible and has limited access to the internal network.
dmz
name server (another name)
dns map
Which Linux container package runs an engine as a process on the host operating system and provides a command-line interface to control containers?
docker
containers program for virtualization
docker
KDE Plasma's file manager name
dolphin
program for handling .deb files COMMAND
dpkg
DPKG is a powerful command line tool used to reconfigure an already installed package COMMAND
dpkg-reconfigure
use this to reset your keyboard configuration on debian COMMAND
dpkg-reconfigure-keyboard-configuration
is a set of tools that provide enhanced functionality for automating the Linux boot process. COMMAND
dracut
program to make an ISO file for booting COMMAND
dracut
check this for hardware or software compatibility issues
drivers
FIREWALL Drops all incoming network packets. allows only outbound network connections
drop
IPTABLES Do not allow the packet to continue to the next step; just discard it.
drop
a secure communication protocol but is is designed to employ only UDP packets
dtls
displays disk usage by directory, good for finding users or applications that are taking up the most disk space.
du
what is called when a a computer has two network interfaces
dual homed
command to display block and superblock group info COMMAND
dumpe2fs
what key to use at grub menu for more options
e
command to change the label on the filesystem COMMAND
e2label
quotas only work on an
entire device
SHELL SCRIPT command allows you to run a script and modify environment variables internal to the script without affecting the system environment variables COMMAND
env
prints envirement variables COMMAND
env
What option sets the wireless access point name in the iwconfig command?
essid
dhclient configuration file LOCATION
etc/dhcp/dhclient.conf
User environment files typically come from where
etc/skel
SYSTEMD Units that are controlled by the sysadmin and have ultimate precedence over all the other units LOCATION
etc/systemd/system
to display ethernet settings for a network interface COMMAND
ethtool
local account access problem, first thing check
expiration
BASH make variable an envirement variable COMMAND
export
SHELL SCRIPT command allows you to mark a variable as exportable COMMAND
export
this is a descendant of the original Linux ext filesystem. It supports files up to 2 tebibytes (TiB), with a total filesystem size of 16TiB. It supports journaling as well as faster startup and recovery
ext3
filesystems that support journaling
ext3 ext4
it's the current version of the original Linux filesystem. It supports files up to 16TiB, with a total filesystem size of 1EiB. It also supports journaling and utilizes improved performance features.
ext4
FIREWALL Performs similar to public but is typically used on external networks, when masquerading is enabled for the local systems
external
monitors system logs looking for repeated failures from the same host COMMAND
fail2ban
utility to view and reset login failure tallies
faillock
the most common command line partitioning tool
fdisk
SHELL restart a job in foreground mode use COMMAND
fg
Permissions, first letter is a -, means it is a
file
show what kind of file it is COMMAND
file
which command determiines the type of a file by using a definition databse file which contains info about all common file types COMMAND
file
method of using wildcard characters for file names is also called. Used in any situwation where you iterate through multiple files DEFINITION
file globbing
for sharing files that multiple clients can access and modify as needed DEFINITION
file server
fstab AC
file system table
sticky bits are only used for
folders
systemd Envirenment Variables file
foobar.service
BASH loop with variables BASH COMMAND
for
SHELL SCRIPT iteration
for
shows memory usage COMMAND
free
you can see high RAM usage via the COMMAND
free
Free command with gb and mb FLAG
free -h
command for making a rescue of a file system
fsck
repair an ext* filesystem use COMMAND
fsck
used to fix a file system COMMAND
fsck
an image that is a copy of all the data DEFINITION
full backup
FQDN AC
fully qualified domain name
awk is also called
gawk
command to view the GUID partition table? COMMAND
gdisk
drives that use gpt use what command for finding info on partitions
gdisk
gpio AC
general purpose input output
To see the current mode of SELinux, use the COMMAND
getenforce
shell problems? COMMAND
getent
inheritence issues? Run what COMMAND?
getfacl
to use the ACL feauture in LINUX, use COMMAND 2
getfacl setfacl
to view the current setting of a policy use the COMMAND
getsebool
Which of the following commands allows you to switch to a new Git branch GIT COMMAND
git merge
These variables store values just like local variables and can be used by the current BASH shell. However, when another process is started from the BASH shell, these variables are passed into the new process. DEFINITION
global variables
interface provides multiple digital input and output lines that you can control individually, down to the single-bit level. COMMAND
gpio
more common partition type today
gpt
another nice tool for filtering text COMMAND
grep
can help you fi nd a file line (or lines) that contain certain text strings. COMMAND
grep
good command to use with ps
grep
GREP only show a numeric count of matches found FLAG
grep -c
reason to change port numbers
increased security
backup that only makes a copy of data that has been modified since the last backup operation DEFINITION
incremental backup
is an umbrella term that encompasses both the configuration management settings (operating system, libraries, additional software) and the policy as code items (security policies, authentication settings). DEFINITION
infastructure as code
the process of deploying an app and its environment in a container can be easily automated is called DEFINITION
infastructure automation
allows you to set a default ACL on a directory that is automatically inherited by any fi le created in the directory. DEFINITION
inheritence
First process that loads up. It's in charge of all other processes
init
GIT staging area employs a hidden subdirectory named .git , which is a created via the COMMAND
init
systemctl manages what type of files
init files
is the root filesystem image used for booting the kernel provided as a compressed cpio archive. COMMAND
initramfs
If a fi lesystem runs out of inodes, no additional fi les can be created on it. DEFINITION
inode exaustion
another name for number of current files
inodes
to set the ssid and encryptioin key for a wireless interface COMMAND
iwconfig
compress a tar with bzip2 FLAG
j
command for journald
journalctl
How do you watch the systemd journal files in real time COMMAND TAIL
journalctl -f
The default logging system for systemd
journald
program for both local and remote logging of system information
journald
service for both local and remote logging of system information.
journald
It's simpler in format than YAML
json
Executable problems? Remember what to fix?
must be executable from all directories related to the file
to move files COMMAND
mv
process of translating between a system's fully qualifi ed domain name (FQDN) and its IP address is called DEFINITION
name resolution
program running in background on your Linux server that provides hostname resolution
named
performs network throughput tests COMMAND
nc
problem cause of GCC
needs compiling
This software provides code hooks into the kernel, which allow other packages to implement firewall technologie
netfilter
lists all of the open network connections on the system: COMMAND
netstat
needs to verify if the HTTP server port is bound to the correct IP
netstat
NETSTAT display the routing table FLAG
netstat -r
NTP AC
network time protocol
is a network-based filesystem
nfs
is a protocol used to share folders in a network environment
nfs
provides files sharing between unix and linux systems
nfs
boot method can be especially useful during development where the root filesystem is changing frequently
nfs boot
start a command or script with a higher priority level COMMAND
nice
NICE set the nice level for a process FLAG
nice -n
NICE set the process id FLAG COMMAND
nice -p
help with NIC configuation problems COMMAND
nmcli
nohup AC
no hangup
. What command do you use to disconnect a shell script from the current console so that it can continue to run after the console exits?
nohup
SHELL command runs another command blocking any SIGHUP signals that are sent to the process. This prevents the process from exiting when you exit your terminal session. COMMAND
nohup
means that every action a user takes can be tracked back to that exact user. DEFINITION
non-repudation
Places all I/O requests into a single FIFO queue and handles them in order. This scheduler is good for situations where less CPU usage is needed and/or an SSD is employed. COMMAND
noop
to block the root user account from logging in from the network, use what program
openssh
this program provides certificate functions
openssl
PAM Conditionally adds the module's status code to the final status. If this is the only record for the PAM service type, it is included. If not, the status code is ignored.
optional
program used for braille reading
orca
screen reader programts
orca emacspeak espeak festival
scans through the various processes using memory and creates a score. The score is based on the total memory a process (and it's child processes) is using and the smallest number of processes that can be killed to come out of a critical low-memory status DEFINITION
out of memory killer
file is a virtual appliance used by virtualization applications such as VMware Workstation and Oracle VM Virtualbox
ova
involves the layering of a more specific or purpose-driven additional layer of networking and protocols over an underlying network.
overlay network
is an open-source standard for packaging and distributing software applications for virtual machines
ovf
occurs when a network packet fails to reach its destination
packet drop
Program for password control (length etc)
pam
cannot write data and receives a permission error.
permission inheritence
SElinux monitors rules and logs any policy violations but doesnt enforce them
permissive
What SELinux mode tracks policy violations but doesn't enforce them?
permissive
VM volumes stay intact even after the virtual machine is shut down
persistant volumes
allows you display all process that match the search term COMMAND
pgrep
Perform simple ICMP packet throughput tests and displays statistics on items such as round-trip times COMMAND
ping
send icmp packs to remote hosts COMMAND
ping
xargs is used with what?
piping
want to use two commands at once? use what?
piping or |
stop process by using their names rather than the PID numbers COMMAND
pkill
PAM AC
pluggable authentication modules
allows clients t cmmunicate with a mail server t read messages in they're mailbx
pop
pop AC
post office protocol
mailing protocol supports encryption, vi, domains and clear config files
postfix
SHELL SCRIPT see the local variables set for your bash session COMMAND
printenv
to format and display text COMMAND
printf
only a super user can run a service on a
privileged port
Orchastration: a collection of steps needed to take place to complete an action
procedure
order for bash in files
profile, profile.d, ~/.bash_profile, .profile
allows you to intercept web requests from local network clients. By intercepting the web requests, you have control of how clients interact with remote web servers DEFINITION
proxy server
Which command is used to display security context on processes COMMAND
ps
show you a treelike hierarchy of processes and information about them? COMMAND
ps
to see a processes security context use COMMAND FLAG
ps -Z
show processes more completely FLAG
ps -a
show user information for processes
ps -u
show processes without controlling tty
ps -x
show all processes for all users COMMAND
ps aux
PTY AC
pseudo terminal
tree of processes COMAND
pstree
FIREWALL Accepts only selected incoming network connections. Typically used in a public setting, where other systems on network are not trusted.
public
PKI AC
public key infastructure
GIT If a remote developer needs the latest project files COMMAND
pull
GIT put project to remote repository COMMAND
push
command to create a physical volume COMMAND
pvcreate
first thing to try if you have missing volumes COMMAND
pvscan
command to see where you are currently COMMAND
pwd
which defines how a network workstation can boot and load an operating system from a central network server
pxe
command to check quota limits COMMAND
quota
to create user and group quota files COMMAND
quotacheck
some problems as to why you can't create a file 2
quotas disk space
protocol allows an authentication server to authenticate not only the user account, but also other information about the user, such as a network address, phone number, and access privileges.
radius
allows direct access between a clients and servers memory COMMAND
rdma
the script isn't executed as a separate process but rather as if the commands were run within the current shell DEFINITION
sourcing scripts
allows more efficient memory usage between multiple programs
shared libaries
makes it easier to distribute applications
shared libaries
functions are used with what in BASH?
shell scripts
KILL SIGNAL Hang up or shut down the process COMMAND
sighup
KILL SIGNAL Interupt the process COMMAND
sigint
KILL SIGNAL Kill the process COMMAND
sigkill
Kill a process and remove it from memory COMMAND
sigkill
KILL SIGNAL Stop execution COMMAND
sigstop
KILL SIGNAL Terminate the signal COMMAND
sigterm
You wish to terminate a process but don't want to cause unnecessary data loss or other problems COMMAND
sigterm
KILL SIGNAL Stop the terminal COMMAND
sigtstp
snmp AC
simple network management protocol
What command parameter would you add to the end of the GRUB2 linux command to force a Linux system to start in single-user mode?
single
feature for people who have "heavy hands" when typing on a keyboard.
slow keys
check SATA drives COMMAND
smartctl
micrsoft servers use this protocol for file and print sharing with clients
smb
hybrid aproach of backup, half backup persay DEFINTION
snapshot backup
Simplest tool for monitoring
snmp
a way for an administrator to query remote network devices and servers to obtain information about their confi guration, status, and even performance.
snmp
type of link that creates a pointer to a file but an actual copy DEFINITION
soft link
files that reside on the network device can be an example of what kind of tokens DEFINITION
software tokens
pipe command writes to a file and displays it on the screen COMMAND
tee
reads the standard input and writes it to both the standard output and one or more files COMMAND
tee
to jump between run levels COMMAND`
telinit
the original remote terminal application
telnet
Which protocol is used to serve the initial PXE image to the localworkstation
tftp
a measurement of the actual data amount that is transferred between two network points over a period of time.
throughput
shows the actual elapsed time it took the program to run and how much user and system CPU time the application required COMMAND
time
to see how long a linux command takes to run COMMAND
time
Which command displays the current date, system time, hardware time, and time zone?
timedatectl
command to manage the time and date settings on you're system COMMAND
timedatectl
is a software component that is used to determine whether a packet drop has occurred COMMAND
timeout
preset time periods for handling unplanned events DEFINITION
timeout
sotre a digital ID as an encypted file DEFINITION
tokens
a real-time display of applications, their system state, and the resources they consume COMMAND
top
allow you to create empty files on the fly COMMAND
touch
is a useful command line utility that translates and/or deletes characters from stdin input, and writes to stdout COMMAND
tr
Display approximate travel times between each router from the source to the destination, discovering the maximum transition unit (MTU) along the way. COMMAND
tracepath
Display approximate travel times between each router from the source to the destination. COMMAND
traceroute
IPsec mode where only data is protected
transport mode
A firewall that accepts all network connections is called a
trusted
option allows you to specify the interface from which to sniff packets COMMAND
tshark
allows changing of the system file type (ext3,ext4,etc) COMMAND
tune2fs
which utility wouldl be used to change how often a filesystem check is performed on an ext2 filesystem without losing any data stored on that file system
tune2fs
IPsec mode all the data and its associated headers added for transportation purposed(called a datagram) are protected
tunnel mode
Which type of hypervisor interfaces directly with the host system hardware?
type 1
environment variable overrides the default system time zone for session application COMMAND
tz
a program that is automatically started at boot time by the init process or the Systemd systems and runs in the background at all times
udev
utility that is used for monitoring and connecting hot pluggable devices
udev
Which program allows you to reload the defined rules for detecting and installing new devices?
udevadm
allows you to send commands to the udev program COMMAND
udevadm
udevadm Modifies the internal state of udev COMMAND
udevadm control
udevadm reload the rules COMMAND
udevadm reload-rules
udevadm Requests device events from the kernel COMMAND
udevadm trigger
Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?
uefi
newer boot system
uefi
to destroy linked files COMMAND
unlink
BASH delete variables COMMAND
unset
BASH It iterates through a block of commands until the test condition evaluates to a True logical value. Opposite of the while COMMAND
until
SHELL SCRIPT similar command too while
until
creates or updates a database used by locate COMMAND
updatedb
display how long your computer has been running
uptime
displaying load averages COMMAND
uptime
three types of permissions
user group others
add a user COMMAND
useradd
Useradd alter the default file for user logins FLAG
useradd -D
Specifies the /etc/fstab option for user quotas.
usrquota
Which of the following are options used in the /etc/fstab file to designate a filesystem as one that uses quotas? COMMAND
usrquota grpquota
Which character set has replaced ASCII as the default character set used in U.S. Linux installations?
utf8
What two character sets use a transformation code to store characters?
utf8 locale
to group physical volumes into a volume group COMMAND
vgcreate
two text editors for linux
vim nano
command securely opens the sudoers in an editor so you can make changes. COMMAND
visudo
some instances of multiple individuals overwriting the /etc/sudoers file. Use what? COMMAND
visudo
name of the kernel image file
vmlinux
indicates that the kernel file is compressed using the bzImage compression method, a very common method in most Linux distributions.
vmlinuz
allows you to view disk I/O specific to swapping, which increases when RAM is improperly sized COMMAND
vmstat
program that is an example of full virtualization
vmware
Which of the following are remote desktops typically used with virtual machines?
vnc spice
a secure point to point tunnel between a remote client or server
vpn
Which of the following commands will display CPU load data along with information concerning users who are currently logged into the system?
w
verbose output of users COMMAND
w
newer display server
wayland
two display servers for linux
wayland x11
command for determining word count of a file COMMAND
wc
red-hat based distributions use what command for sudo COMMAND
wheel
Find more information about a specific command COMMAND
whereis
a second command to quickly locate a file COMMAND
whereis
search for a file to locate programs and their corresponding man pages and config files COMMAND
whereis
a command to tell you all instances of the command in your path COMMAND
which
command to quickly locate a file COMMAND
which
find the directories of specific commands COMMAND
which
to quickly see if a command is using an alias COMMAND
which
Finding the init program file location COMMAND
which init
SHELL SCRIPT loop statement
while
restrict cron access with what? 2
whitelist blacklist
2nd command that provides more data on a user COMMAND
who
command will display what user account you are currently using COMMAND
whoami
What command is useful in determining which company or person owns a domain? COMMAND
whois
displays FQDN information stored there COMMAND
whois
make your own runlevel NAME and number level
wildcard 4
tshark is part of
wireshark
Accepts only selected incoming network connections. Typically used in a work setting, where other systems on the network are mostly trusted.
work
is network-aware and can enable clients to access Graphical User Interface (GUI) elements over a network. It is possible to forward X traffic through a Secure Shell (SSH) tunnel.
x forwarding
old display server
x11
way to secure tunnel port forwarding
x11
a command line utility for building an execution pipeline from standard input COMMAND
xargs
get around programs that don't except standard input
xargs
way to build commands on the fly
xargs
was created by Silicon Graphics for its (now defunct) advanced graphical workstations. The filesystem provided some advanced high-performance features that makes it still popular in Linux.
xfs
displays info about a mounted filesystem including the blcok sizes and sector sizes as well as label and UUID info COMMAND
xfs-info
displays or changes filesystem parameters such as the label or UUID assigned COMMAND
xfs_admin
what command fixes filesystem problems on an XFS file system COMMAND
xfs_repair
new compression utility
xz
tool with highest compression rates
xz
redhat package tool command 2
yum dnf
YUM install a package COMMAND
yum install
download an rpm package without installing it COMMAND
yumdownloader
compress a tar with gzip FLAG
z
compression that operates on multiple files
zip
ZIP unzip all files and subdirectories FLAG
zip -r
a process has ended but its parent process hasn't acknowledged the termination signal because it's sleeping, the process is considered a DEFINITION
zombie
firewalld Network traffic is grouped into a predefined rule set,
zone
The firewalld service uses what as a predefined rule set.
zones
openSUSE package tool management
zypper
GREP general command to compare two dpossible words or charter sets that match
|
Bash command to execute a command only if the first command line fails
||
command to configure the ssh COMMAND/LOCATION
~/.ssh/config
how to provide a special username and other parameters related to a specific host to which you connect using SSH. what file do you add this info
~/.ssh/config