linux+ comptia ALL

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

DPKG force install a dependacy FLAG

--force

RPM command to ignore any errors with dependicies COMMAND

--force-nodeps

find information for a dpkg package FLAG

--info

TAR Removes the specified files from the filesystem after they have been added to the archive FLAG

--remove-flags

proces priority range

-20 19

RSYNC Copies block device contents to another device FLAG

-D

AWK show different field delimiters FLAG

-F

TAR Sets the tape length so multiple tapes can be used for an archive FLAG

-L

DPKG list information about a package FLAG

-l

RSYNC follows links to their destination FLAG

-l

TAR stays on the local file system FLAG

-l

Free Command more detailed summary FLAG

-lohi

TAR specifies multiple archive targets or spreads a large archive across multiple tapes or media FLAG

-m

CPIO copy files to an acrchive FLAG

-o

CPIO This copies files from one directory tree to another without the use of an archive FLAG

-p

RSYNC preserves permissions FLAG

-p

FIND what is the flag for permision searches FLAG

-perm

APT remove a package and delete config files

-purge

RPM show all the Config files for a package FLAG

-ql

DPKG remove a package FLAG

-r

RSYNC replicates recursively FLAG

-r

SYSLOG add remote logging flag

-r

journalctl in reverse order pipe

-r

APT remove a package but keep config files

-remove

RSYNC preserves modify times FLAG

-t

hidden files start with what character?

.

what a hidden folder or file starts with

.

run a file as absolute path

./

automount point on a systemd units

.automount

Which of the following user environment files is executed first if found in the user's home directory

.bash_profile

file is a personal initialization file for configuring the user environment. The file is defined in you're home directory and can be used for the following: Modifying you're working environment by setting custom environment variables and terminal settings. Instructing the system to initiate applications.

.bash_profile

what must be run first in order to customize the makefile for your system?

.configure

What filename extension do UEFI bootloader files use?

.efi

GIT the staging area's index file name is called

.git/

GIT If you have files in your working directory that you do not want added to the staging area index, create a file called

.gitignore

gzip file extension name

.gz

BASH variables are edited in what file

.profile

controls variables for profile of all users of the system whereas, . profile allows you to customize you're own environment

.profile

What file name extension does the CentOS Linux distribution use for packages?

.rpm

shared libary extension

.so

target file extensions (RUNLEVELS)

.target

tar extension name

.tgz

starting point of the virtual file system

/

The public key is copied to the SSH sever system and placed in the LOCATION

/.ssh/authorized_keys

Contains openssh client configuartions LOCATION

/.ssh/config

The OpenSSH application keeps track of any previously connected hosts and their public keys in each user LOCATION

/.ssh/known_hosts

Contains executables LOCATION

/bin

folder contains bootloader files LOCATION

/boot

holds files used in booting the operating system LOCATION

/boot

The EFI System Partition (ESP) is stored LOCATION

/boot/efi

where are grub legacy store its menu commands LOCATION

/boot/grub

where is the grub2 configuration file found?

/boot/grub

is the program which makes the computer just smart enough to find the operating system kernel and load it into memory LOCATION

/boot/grub2

Contains device files for all the hardware devices on the machine LOCATION

/dev

is the location of special or device files LOCATION

/dev

location of devices LOCATION

/dev

links storgage devices by their manufacture make,model, and serial number LOCATION

/dev/disk/by-id

links storage devices by the label assigned to them LOCATION

/dev/disk/by-label

links storageg devices by the physical hardware port they are connected to LOCATION

/dev/disk/by-path

links storage devices by the 128 bit universally unique indefier (UUID) assigned to the deivce LOCATION

/dev/disk/by-uuid

all devices on your computer can be found here LOCATION

/dev/mapper

logical volumes are stored in LOCATION

/dev/mapper

to create virtual files that interface with applications that manipulate data on a virtual LVM volume before being sent to a physical hard drive device LOCATION

/dev/mapper

blackhole because it immediately discards anything written to it and only returns an end-of-file EOF when read LOCATION

/dev/null

name fo the file that is your terminal LOCATION

/dev/tty

Where are your config files stored? LOCATION

/etc

Apparmor Profiles are defined for each application in the LOCATION

/etc/apparmor.d

Apparmor variables are then defined in files contained in the LOCATION

/etc/apparmor.d/turntables

debian repository LOCATION

/etc/apt/sources.list

default repositories LOCATION

/etc/apt/sources.list

file to change aliases

/etc/bashrc

systemwide bash per-interactive-shell startup file. Is is used system wide functions and aliases. LOCATION

/etc/bashrc

encrypted file that is a table that indicates the drive device file LOCATION

/etc/crypttab

location for grub global command configuration LOCATION

/etc/default/grub

UFW configuration file LOCATION

/etc/default/ufw

checked to see what partitions should be automatically mounted. LOCATION

/etc/fstab

file is a table that indicates the drive device file LOCATION

/etc/fstab

folder to modify to eanble filesystem quota support LOCATION

/etc/fstab

is a text file which defines the groups to which users belong under Linux and UNIX operating system LOCATION

/etc/group

symbolic link to the grub.cfg file LOCATION

/etc/grub2.cfg

file contains secure info for encrpted passwords for groups LOCATION

/etc/gshadow

is an operating system file that translate hostnames or domain names to IP addresses LOCATION

/etc/hosts

most basic network security feature you can implement is to use the LOCATION

/etc/hosts.deny

This file turns scripts on and off LOCATION

/etc/init.d

Which directory on an old SysV init system stores the service startup scripts? LOCATION

/etc/init.d

For SysV init systems, the default runlevel is stored within the LOCATION

/etc/inittab

This file sets default runlevel LOCATION

/etc/inittab

Which of the following configuration files should be modified to disable Ctrl-Alt-Del in Linux? LOCATION

/etc/inittab

message to come up when users first login LOCATION

/etc/login.warn

modprobe configuration file LOCATION

/etc/modprobe.conf

Contains configuariton files generated at system installation or created by an administraotr LOCATION

/etc/modprobe.d

quota files are mounted in LOCATION

/etc/mtab

is a command line utility for the configuration of networking on certain Linux distributions LOCATION

/etc/netplan

in which file is network bonding configured? LOCATION

/etc/network/interfaces

Which file is consulted first when a hostname lookup occurs?

/etc/nsswitch.conf

file is used to configure which services are to be used to determine information such as hostnames, password files, and group files LOCATION

/etc/nsswitch.conf

PAM confiuration files are located in LOCATION

/etc/pam.d

location of where account infoformation is stored LOCATION

/etc/passwd

bash variables, path, and settings are in what file

/etc/profile

contains Linux system wide environment and startup programs. It is used by all users with bash, ksh, sh shell. LOCATION

/etc/profile

directory contains other scripts that contain application-specific startup files, which are also executed at startup time by the shell. LOCATION

/etc/profile.d

Location of runlevels for inits LOCATION

/etc/rc.d

Init file used by system Administrator LOCATION

/etc/rc.local

Which file contains a list of DNS servers the Linux system can use to resolve hostnames? LOCATION

/etc/resolv.conf

resolver configuration file for Linux and UNIX like operating systems. It is used to configure dns name servers LOCATION

/etc/resolve.conf

this logs system messages

/etc/rsylog.conf

ryslog configuration file LOCATION

/etc/rsyslog.conf

file provides a list of locations from which users can't log in using the root user account, LOCATION

/etc/securetty

Checking DNS's protocols in the LOCATION

/etc/services

file documents the different standard application services names and their corresponding port numbers and protocols as well as any aliases. LOCATION

/etc/services

firewall file location LOCATION

/etc/services

a system file in which encryption user password are stored so that they aren't available to people who try to break into the system LOCATION

/etc/shadow

In which directory are time zone files found? LOCATION

/etc/share/zoneinfo

skeleton directory for where temporary files are held LOCATION

/etc/skel

contains openssh client configurations LOCATION

/etc/ssh/ssh_config

contains the opennssh daemon configurations LOCATION

/etc/ssh/sshd_config

Which file would you edit to give root user privledges to someone else

/etc/sudoers

file is used to specify information about the desired network configuration on you're server LOCATION

/etc/sysconfig/network

What folder does Red Hat-based systems use to store network configuration files? LOCATION

/etc/sysconfig/network-scripts

Permanent changes go in LOCATION

/etc/sysctl

can configure various Linux networking and system settings. allows you to make changes to a running Linux kernel LOCATION

/etc/sysctl.conf

SYSTEMD Units that are controlled by the sysadmin and have ultimate precedence over all the other units LOCATION

/etc/systemd/system

time zone file location LOCATION

/etc/timezone

udev local adminstartion rules highest priority LOCATION

/etc/udev/rules.d

UFW rules are stored in the LOCATION

/etc/ufw

directory contains configuration files used by both the X.org and XFree86 applications for controlling the X Windows graphical environment on the Linux system LOCATION

/etc/x11

red hat repository LOCATION

/etc/yum.repos.d

Which directory should you place on a separate partition to separate user data from system data? LOCATION

/home

bash is found in what folder LOCATION

/home

folder contains user data files LOCATION

/home

Where are your files for executables? LOCATION

/lib

Modules required to support a kernel are stored in the LOCATION

/lib/modules

used as a mount point for removable media devices LOCATION

/media

also used as a mount point for removable devices LOCATION

/mnt

contains data for optional third party programs LOCATION

/opt

Changes in this section do not show up after reboot LOCATION

/proc

Dynamically created section for devices LOCATION

/proc

is virtual file system created on fly when system boots and is dissolved at time of system shut down. LOCATION

/proc

system's current processors' information LOCATION

/proc/cpuinfo

problems with RAID, check which file LOCATION

/proc/mdstat

to view detatiled system RAM infoformation, look at the LOCATION

/proc/meminfo

mount points are found LOCATION

/proc/mounts

mount points are found LOCATION

/proc/partitions

system partitions are found where LOCATION

/proc/partitions

ip forwarding files ip4 LOCATION

/proc/sys/net/ipv4/ip_forward

ip forwarding files ip6 LOCATION

/proc/sys/net/ipv6/conf/all/forwarding

SYSTEMD Units that have been created at runtime; may have precedence over non-runtime or installed units LOCATION

/run/systemd/system

udev Volatile rules LOCATION

/run/udev/rules.d

Where are system binaries stored

/sbin

first program that is started at boot time by the Linux kernel LOCATION

/sbin/init

libary of time zone files LOCATION

/share/zoneinfo

Database of everything connected to your computer LOCATION

/sys

stores and allows modification of the devices connected to the system LOCATION

/sys

fold that contains folders for each mounded drive LOCATION

/sys/block

SCSI problems, check which file LOCATION

/sys/class/scsi_host/host#/scan

contains temporary files created by system users LOCATION

/tmp

contains data for standard linux programs LOCATION

/usr

contains local user programs and data LOCATION

/usr/bin

In which directory structure are kernel modules typically found? LOCATION

/usr/lib

In which directory structure are kernel modules typicallyfound? LOCATION

/usr/lib

Kernel modules files LOCATION

/usr/lib/modules

SYSTEMD Units that have been installed with the distribution LOCATION

/usr/lib/systemd/system/

udev system rules LOCATION

/usr/lib/udev/rules.d

contains data for programs unique to the local installation LOCATION

/usr/local

contains data for system programs and data LOCATION

/usr/sbin

Which folder contains template files for each time zone that Linux supports?

/usr/share/zoneinfo

Most log files are kept in what folder LOCATION

/var

What folder do most Linux distributions use to store boot logs? LOCATION

/var/log

most Linux distributions create log fi les in the LOCATION

/var/log

file to check for printer errors LOCATION

/var/log/cups/error_log

The log file that dmesg uses to display the boot messages from the most recent system bootup LOCATION

/var/log/kern.log

stores Kernel logs and warning data. This log is valuable for troubleshooting custom kernels as well LOCATION

/var/log/kernel

stores Kernel logs and warning data. This log is valuable for troubleshooting custom kernels as well

/var/log/kernel.log

This file has all the global system messages located inside, including the messages that are logged during system startup. LOCATION

/var/log/messages

It is mainly used to track the usage of authorization systems. LOCATION

/var/log/secure

Nice default start level

0

Runlevel order for halt

0

run level for shut down the system

0

setsebool turn off

0

what number account denotes the root user

0

Runlevel order for single user

1

Sitcky Bit number set

1

run level for single user mode

1

setsebool turn on

1

what number account denotes which is responsible for some binaries and nologin accounts

1

uptime shows usage over what intervals in minutes

1 5 15

a remote desktop for linux

VNC

BASH symbol for escaping characters

\

command to print a new line

\n

GREP what to type to search for the begining of a line TEXT

^

symbol to search for text WITHIN a file

^

BASH different way of using $() SYMBOL

`

AA turn off a specific profile, use the COMMAND

aa-complain

If you need to troubleshoot an AppArmor profile, do this COMMAND FLAG

aa-complain

AA If you want to completely disable an individual profile use COMMAND

aa-disable

command to list processes that are not restricted by the AppArmor profiles. COMMAND

aa-unconfined

AA view a listing of active network ports on your system that don't have a profile defined by using the COMMAND

aa-unconfirmed

to create a report if any kernel-level hardware errors are detected (RED HAT) COMMAND

abrt

mode uses octal (base-8) numbers to specify permissions. DEFINITION

absolute mode

name of using the fulll path when navigating directories DEFINITION

absolute path

IPTABLES Allow the packet to continue to the next step (filtering point, routing decision, and so on).

accept

one network interface is live while the other is use as a backup for fault tolerance DEFINITION

active/passive

udevadm default value

add

add a repostiory COMMAND

add-apt-repository

are orchestration utilities that require software to be installed in the app container being monitored. DEFINITION

agent monitoring

the tool uses preexisting and/or embedded software in the container or the container's external environment to conduct its monitoring activity. DEFINITION

agentless monitoring

two or more network interfaces are combined to created one larger network pipe DEFINITION

aggregation

method is used to automate unattended installations of Linux

anaconda kickstart

is a Linux kernel security module that allows the system administrator to restrict programs' capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths.

apparmor

is considered a MAC security system PROGRAM

apparmor

it only controls the files and network ports applications have access to. APP

apparmor

debian based system to retrieve packages

apt

APT search for packages COMMAND

apt-cache search

repository probems, do this COMMAND

apt-get-dist-upgrade

PAM If the module returns a success status code and no preceding stack modules have returned a fail status code, a final success status is immediately returned to the application without running the rest of the modules within the configuration file. If the module returns a fail status code, it is ignored.

sufficient

s to allow standard users to run an application with root privileges. COMMAND

suid

why no shared ID's?

support non-repudation

swap partition to disengage it from swap space COMMAND

swapoff

viewing memory and determining if swap is a file or a partition COMMAND

swapon

view a swap space element's type, name, and priority

swapon -a

radius is commonly used for

switches and routers

mode enables you to set permissions using three components: permission contexts, operators and attributes DEFINITION

symbolic mode

another name for private keys DEFINITION

symmetric keys

You may be able to improve CPU performance by modifying certain kernel parameters via the COMMAND

sysctl

What protocol became a de facto standard in Linux for tracking system event messages?

syslog

first thing to try with storage intergrity problems COMMAND

badblocks

a measurement of the maximum data amount that can be transferred between two network points over a period of time DEFINITION

bandwidth

is a shell script that Bash runs whenever it is started interactively. It initializes an interactive shell session COMMAND

bashrc

SHELL to restart a job in the background use the COMMAND

bg

name of software LInux uses to provide DNS naming system

bind

most basic form of two factor authentication

biometrics

You can see your label and UUIDs with the

blkid

displays current partition sizes and mount points COMMAND

blkid

what kind of storage reers to unstructured data offered on the microsof azure cloud platform and typically consists of items such as images streaming video and big data

blob storage

FIREWALL Accepts only network connections that originated on the system. Rejects incoming network packets and sends an icmp-host-prohibited or icmp6-adm-prohibted message back.

block

allows you to aggregate multiple interfaces into one virtual network device DEFINITION

bonding

term for making two network cards act as a single device DEFINITION

bonding

GIT a local repository area employed for a particular project section, such as development or project testing DEFENTION

branch

allows you to control how the bridging behaves. COMMAND

brctl

virtual machines to all act as nodes on her host machine's LAN and get their own IP address that they will use to send/receive network traffic DEFINITION

bridged

network enables the virtual machine to be a full participant on the same network as the virtualization host.

bridged network

Braile package for debian

brltty

importance of disabling root login via ssh

brute force vulnerability

compiling software when a developer commits code to a certain branch in a repository is an example of which type of automation

build

the orchestration tool would immediately start up an additional production app container using the container's stored configuration settings

build automation

compression with higher compression rates but longer time to compress

bzip2

it will allow you to do a lot with the customization of your cloud VM installs

cloud-init

improves application performance by dividing application functions among multiple servers

clustering

pluggable devices are hardware that can be connected to the system only when the system is completely powered down DEFINITION

cold pluggable

GIT The project's workflow dictates when the programs are moved to the local directory via the CINNABD

commit

cups AC

common unix printing system

CVE AC

comon vulnerabilities and exposures

GIT the first time you have built a .git/ subdirectory on your system, use COMMAND

config

What method should you use to easily move an application from a development environment to a production environment without having to duplicate the operating system?

container

allows your developers to easily deploy applications between development, test, and production. DEFINITION

container

is a binary file that has within it all the necessary components to run as a Docker container instance.

container image

by creating a self-contained environment to encapsulate applications DEFINTION

containers

allows you to redirect multiple items into a command. It can also modify a file using a script, create a script, keep data in a script, and so on. DEFINITION

here documents

to see list of previous entries in terminal COMMAND

history

VI cursor key movement letters

hjkl

Performs similar to work but is used in a home setting, where other systems on the network are mostly trusted.

home

command to test a host name COMMAND

host

HBA AC

host bus adapter

For systems using the systemd startup method, use what to view or change the hostname information

hostnamectl

pluggable devices that can be removed at any time DEFINITION

hot pluggable

provides encrypted communciatins with web servers

https

is a utility for accessing the hardware clock. The hardware clock is independent of the OS(operating system) you use and works even when the machine is shut down. COMMAND

hwclock

Which Linux commands allow you to retrieve the time from the physical workstation or server? 2

hwclock timedatectl

allows you to pull out various data concerning the current user process COMMAND

id

is used to find out user and group names and numeric ID's (UID or group ID) of the current user or any other user in the server COMMAND

id

ssh name of the file used if it is a passwordless key

id_rsa

RSA *public* key, which, when supplied the remote host (via an 'authorized keys' file, publishing it in the DNS, or other means) allows the host to authenticate you're connection as being originated by you, and decide whether or not to accept it as a result

id_rsa.pub

The BIOS or UEFI starts a bootloader program from the

mbr

Which partition structure has extended partitions?

mbr

two hashes for integrity checks

md5 sha

to specify partiitions to be used for raid COMMAND

mdadm

DD to an input file COMMAND

if

command dispalys or sets the ip address and netmask values for a network interface COMMAND

ifconfig

Displays network bandwidth usage (throughput) for adapter in a continuous graph format. COMMAND

iftop

What command provides a good way to display the network connections that are using the most bandwidth? COMMAND

iftop

if a user cannot delete a file, look for what on the file

immutable bit set

user cannot delete one of her files, first thing to check

immutable bit set

FIREWALL Performs similar to work but is typically used on internal networks, where other systems on the network are mostly trusted.

internal

imap AC

internet message access protocol

ipsec AC

internet protocol security

receive the signal immediately and wake up DEFINITION

interuptible sleep

Determining the version of software installed on each client node is an example of collecting info for which collection in an automated infastructure DEFINITION

inventory

Conducting a non-cached read test using the COMMAND

ioping

can be used to perform simple disk latency tests

ioping

a static summary of CPU filesystem and partition statistics since the system booted COMMAND

iostat

command to see I/O wait times

iostat

displays a real time chart of disk statistics by partition COMMAND

iostat

What command can you use to both display and set the IP address, netmask, and default router values?

ip

bridging enables a virtual machine to get its own

ip

displays or sets the ip address, netmask and router values for a network interfaces COMMAND

ip

Interface configurations COMMAND 2

ip route

perform network throughput tests COMMAND

iperf

a framework that operates at the network layer

ipsec

helps secure communications across networks via encryption

ipsec

line based utility which is used to administer the framework called IP sets inside the Linux kernel COMMAND

ipset

utility is used to manage IPsets and requires super user priviledges COMMAND

ipset

IPSET properly add the new IP address to the BlockThem IPset

ipset -add

To create firewall rules on a system, you can use the COMMAND

iptables

to unblock ports, use this COMMAND

iptables -A

Persistancy for iptables COMMAND

iptables-save

kerberos command to view tickets contained in the servers credential cache COMMAND

klist

symbol before a file permission file that shows it belongs to a symbolic link

l

command to see which users logged in most recently COMMAND

last

It displays the event messages from the /var/log/wtmp log file, used by many Linux distributions to log user logins. COMMAND

lastb

this shows bad login attempts COMMAND

lastb

to set the locale COMMAND

lc_*

environment variable defines a character set to use for the Linux system COMMAND

lc_all

What two environment variables control all of the localization settings? 2

lc_all lang

PAM intergrates with

ldap

distributed database method for authorizing users to access resources located on multiple network servers

ldap

linux/opensource equivalent of active directory

ldap

provide simple network authentication services to multiple applications and devices on a local network

ldap

utilizes a hierarchical tree database structure to store information about both network users and resources.

ldap

line utility that is used in case a user wants to know the shared library dependencies of an executable or even that of a shared library COMMAND

ldd

ou can check which libraries a program uses by typing in

ldd

utility to track down missing library files for an application COMMAND

ldd

command to show a text file and not load the entire file at the beginning: for faster usage COMMAND

less

Permissions, first letter is an l, means its a

link

what piece of information is changed when an existing file is changed when a hard link pointing to that file is created

link count

LUKS AC

linux unified key system

lsof AC

list of open files

to create a hard link COMMAND

ln

this shows system usage and performance DEFINITION

load average

network traffic is shared between two or more network interfaces DEFINTION

load balancing

redirects entire client requests to one of a cluster of servers DEFINITION

load balancing

shows your computers load average as well as how long its been powered on COMMAND

loadaverage

VM typically it communicates only with the virtualization host via a virtual Ethernet switch.

local

problems with terminal files, improperly configured GUI components and expired passwords/accounts are all possible problems for

local access

These variables are only available to the current BASH shell DEFINITION

local variables

What Linux command displays all of the localization environment variables and their values? COMMAND

locale

to help you easily display these environment variables COMMAND

locale

What Systemd utility allows you to change the localization on your Linux system?

localectl

just displays the current localization settings COMMAND

localectl

use this to check keyboard settings COMMAND

localectl

it allows programs on the current system to test or implement networking services via TCP without needing to employ external networking structures.

localhost

s the ability to adapt a Linux system to a specific language.

localization

faster way to find files COMMAND

locate

third command to quickly locate a file COMMAND

locate

locate a file and ignore the case COMMAND FLAG

locate -i

GIT tool allows you to view information about previous commits that have occurred in a project COMMAND

log

IPTABLES Create a log entry.

log

dynamic device folder to allow you to create virtual drive devices defintition DEFINITION

logical volume manager

service accounts should never show

logins

It automatically splits rsyslogd log files into archive files based on a time or the size of the file COMMAND

logrotate

To configure log rotation, use the COMMAND

logrotate

What type of address is used so local applications can use network protocols to communicate with each other?

loopback address

to check the status of the print queue COMMAND

lpq

submits a new print job to print a file COMMAND

lpr

What command would show you the available drives detected by the system at GRUB

ls

Which command is used to display security context on files COMMAND

ls

simplest way to list files COMMAND

ls

to view the security context for a file use the COMMAND

ls -Z

list all files inlcuding hidden files FLAG

ls -a

command to see a list of shared inode numbers

ls -i

Permission problems with ownership? Try what first? COMMAND

ls -l

to see file owner and group settings COMMAND

ls -l

first thing to try for missing devices COMMAND

lsblk

ommand provides information about block devices (disks), such as hard drives and network cards, that are connected. COMMAND

lsblk

displays information about the hardware devices installed on the Linux system COMMAND

lsdev

first thing to try with memory problems COMMAND

lshw

Which command displays modules that are currently loaded into memory COMMAND

lsmod

Which command displays modules that are currently loaded into memory? COMMAND

lsmod

display module status COMMAND

lsmod

provides a list of files that are opened COMMAND

lsof

Which command gives an overview of all the hardware and drivers in the system, including the ports used to talk to the CPU?

lspci

command to troubleshoot PCI card issues COMMAND

lspci

use this to check your video settings COMMAND

lspci

You can view the basic information about USB devices connected to your Linux system by using the COMMAND

lsusb

use this to check your usb settings COMMAND

lsusb

to create logical volume from partitions in each physical volume COMMAND

lvcreate

What is the best way add swap space?

lvm

command to build the nessecary files for an application COMMAND

make

Build automation tools

make ant gradle rake cake

command to install the application files in your computer COMMAND

make install

creates an initial image used by the kernel for preloading the block device modules (such as IDE, SCSI or RAID) which are needed to access the root filesystem COMMAND

makeinitrd

type this to see a manual

man

mbr AC

master boot record

GIT Merge another brance of GIT COMMAND

merge

another name for a hash DEFINITION

message digest

motd AC

message of the day

SHELL SCRIPT characters that have special meaning when used in the Linux shell. DEFINITION

metacharacters

Mirrors all the logical volumes that exist on a given volume group.

mirrorvg

first thing to try if you have missing mount points COMMAND

mkdir

make a new directory in your present location COMMAND

mkdir

Make directories and parents COMMAND FLAG

mkdir -p

The Swiss Army knife for creating filesystems in Linux is COMMAND

mkfs

What tool do you use to create a new filesystem on a partition? COMMAND

mkfs

The command traditionally used to create an initial RAM disk

mkinitrd

Your Linux server installs correctly, but when you try to boot it, you cannot see the specialized disk subsystem that it installed to. Which of the following commands will be helpful in fixing this situation

mkinitrd dracut

if you need to add additional swap space, use COMMAND

mkswap

You can find out more detailed information concerning a particular kernel module via the COMMAND

modinfo

Looks for mods and dependencies

modprobe

Which command can both load and unload kernel modules? COMMAND

modprobe

Which command loads a module and its dependencies COMMAND

modprobe

You need to install a module, including all its needed dependencies. COMMAND

modprobe

insert a module and its dependancies COMMAND

modprobe

this utility removes mods will unload the kernal and unlink any dependancies

modprobe

remove mods either with or without dependancies COMMAND FLAG

modprobe -d

MODPROBE remove the xyz module and all of its dependencies

modprobe -r

Makes a nickname for a module COMMAND FLAG

modprobe alias

Used to specify commands to execute when a module is loaded COMMAND FLAG

modprobe install

Used to specify which options to pass to a module when it is loaded COMMAND FLAG

modprobe options

Used to specify commands to execute when a module is removed COMMAND FLAG

modprobe remote

to show a txt file on page at a time and flip through it COMMAND

more

to temporarily mount a filesystem to a linux virtual directory COMMAND

mount

How mount all filesystems listed in /etc/fstab whic have the option auto set COMMAND

mount -a

the user can move the mouse cursor by using keys on the keyboard.

mouse keys

Displays approximate travel times and packet loss percentages between the first 10 routers in the path from the source to the destination in a continuous graph or report format. COMMAND

mtr

concept that allows you to configure multiple paths between the linux system and network storage devices DEFINITION

multipath

to create different network paths to a remote storage device

multipath

Executes various DNS queries in an interactive or noninteractive mode. Check the returned information for correctness. COMMAND

nslookup

look up DNS information for multiple servers or domains COMMAND

nslookup

is the filesystem used by the Microsoft NT operating system and subsequent versions of Windows.

ntfs

to set the ip, netmask address and gateway use which COMMANDS 2

ntmui nmcli

is cross-platform proprietary remote desktop software that offers support for multi-session environments and account management

nx

Four remote deskops for linux

nx spice vnc xrdp

DD to an output file COMMAND

of

another program provides yet another command-line interface for working with drive partitions:

parted

program is that it allows you to modify existing partition sizes, so you can easily shrink or grow partitions on the drive.

parted

this tool can manage partition tables in both gpt and mbr

parted

to modify a GUID partition table use what tool COMMAND

parted

for newly created partitions, in that it forces a re-read of a disk's partition table without rebooting the system COMMAND

partprobe

create a passwd for an account COMMAND

passwd

for better security, put what on your UEFI

password

protect your grub bootload with a

password

allows you to merge lines of files horizontally COMMAND

paste

why do you boot the system into single user mode to

recover root password

IPTABLES do not allow the packet to continue to the next step but send a response message to the origin of the packet, informing it of the rejection.

reject

name of using path from where you are curently DEFINITION

relative path

systemctl Load the service configuration file of the running designated unit(s) to make service configuration changes without stopping the service. Note that this is different from the daemon-reload command.

reload

misconfigured openssh is most often the problem with

remote access

rdma ac

remote direct access memory

to change the priority of a process thats already running us the COMMAND

renice

tls prevents

replay attacks

contains software packages that have been tested and know to install and work corretly in the distribution enviroment DEFINITION

repository

PAM If the module returns a fail status code, a final fail status will be returned to the application, but only after the rest of the modules within the configuration file run.

required

command to expand or shrink a file system COMMAND

resize2fs

utility restores the security context of a fi le or directory back to the default settings as defi ned in the policies. COMMAND

restorecon

ACL potential problem

restrictive firewall settings

remove or delete a file COMMAND

rm

remove empty directories tool COMMAND

rmdir

this utility removes a mod from the kernel but keeps dependancies

rmmod

utility to remove a module COMMAND

rmmod

user account has full administrator privileges on the Linux system and can access any file, directory, or network port regardless of any security settings

root user

Which command displays the default gateway? COMMAND

route

command to set the default router address COMMAND

route

connect these network segments and forward IP packets to the appropriate network segment toward their ultimate destination.

router

red hat package tools COMMAND

rpm

command to list all currently installed packages using RPM management

rpm --query --all

command to copy a very large file quickly

rsync

how to copy files over a network COMMAND

rsync

program to copy files locally or remotely. known for its speed COMMAND

rsync

tool used in Linux for intergrity checks COMMAND

rsync

What syslog application is known for its rocket-fast speed?

rsyslogd

faster than syslogd

rsyslogd

program used to accept logging data from remote servers

rsyslogd

command to modify the filesystem parameters COMMAND

rune2fs

To determine your system's current and former runlevel, you employ the COMMAND

runlevel

term to set a firewall to active

runtime

command can copy block device contents directly COMMAND

rysnc

Displaying CPU usage COMMAND

sar

system's processor performance over time COMMAND

sar

occurs when network traffic exceeds capacity DEFINTION

saturation

geared for quickly transferring files in a noninteractive manner between two systems on a network COMMAND

scp

scp AC

secure copy

ssh AC

secure shell

usb storage device potential problems

security concern

problem with soft links

security concerns

This command searches and replaces text or complete phrases COMMAND

sed

command for stream editing

sed

name for a certificate that is generated by yourself DEFINTION

self-signed

implements MAC security by allowing you to set policy rules for controlling access between various types of objects on the Linux system, including users, files, directories, memory, network ports, and processes APP

selinux

is a Linux kernel security module that provides a mechanism for supporting access control security policies, including mandatory access controls (MAC). SELinux is a set of kernel modifications and user-space tools that have been added to various Linux distributions.

selinux

two most common linux email packages

sendmail postfix

smb ac

server message block

command for services COMMAND

service

user accounts are used to start and run applications that require access to a limited set of files and directories

service account

SERVICE Load the service configuration file of the running designated service. This allows you to make service configuration changes without stopping the service. Note that if you attempt the reload command on a stopped service, a FAILED status will be generated.

service reload

SERVICE Stop and immediately restart the designated service. Note that if a designated service is not already started, a FAILED status will be generated on the stop attempt, and then the service will be started.

service restart

SERVICE start the desinated service

service start

SERVICE Display the services current status

service status

SERVICE Stop the designated service. Note if a designated service is already stopped, a FAILED status will be generated on the stop attempt.

service stop

for a more detailed listing of the SElinux status, use the COMMAND

sestatus

BASH Shows all variables COMMAND

set

SHELL SCRIPT displays all of the global variables set

set

check enviroment variables COMMAND

set

SGID AC

set group id

SUID AC

set user ID

change the state of SELINUX COMMAND

setenforce

To change the boolean setting of a policy use the COMMAND

setsebool

a second utiltiy for transering files security over a network (COMMAND)

sftp

scp is faster than

sftp

is a special type of file permissions given to a file/folder. Normally in Linux/Unix when a program runs, it inherits access permissions from the logged in user

sgid

a copy of the operating system binaries, configuration files, and anything else you need to boot the Linux system DEFINITION

system image

utility is the main gateway to managing systemd and system services COMMAND

systemctl

systemctl display the desinated unit

systemctl display

systemctl Mark the designated unit(s) to be started automatically at system boot time.

systemctl enable

SYSTEMCTL forces the system to immediately change to a provided target (a grouping of systemd unit files).

systemctl isolate

systemctl Prevent the designated unit(s) from starting. The service cannot be started using the start command or at system boot. Use the --now option to immediately stop any running instances as well. Use the --running option to mask the service only until the next reboot or unmask is used.

systemctl mask

SYSTEMCTL Stop and immediately restart the designated unit(s). If a designated unit is not already started, this will simply start it.

systemctl restart

SYSTEMCTL start the desiginated units

systemctl start

SYSTEMCTL l display the designated units current status

systemctl status

SYSTEMCTL stop the desiginated unit

systemctl stop

systemctl undo the effects o the mask command on the designated units COMMAND

systemctl unmask

command for investigate your system's boot performance and check for potential system initialization problems COMMAND

systemd-analyze

Displays the amount of time each running unit took to initialize. Units and their times are listed starting from the slowest to the fastest. COMMAND

systemd-analyze blame

defi nes a family of protocols that provide remote authentication in a server environment.

tacacs

If you want to display the file's last lines instead of its first lines, COMMAND

tail

TAIL displays data appended to the file as it happens FLAG

tail -f

archiving utlity most commonly used today

tar

TAR create a new tar file

tar -cvf

TAR display the contents of a tar file

tar -tvf

TAR extract the contents of tar file

tar -xvf

most common selinux policy

targeted

selinux type setting is the default and only enforces nework daemon policy rules

targeted

an older method for controlling access to network-based service DEFINTION

tcp wrappers

protection for uncommonly used services

tcp wrappers

allow you to store the sniffed data into a file COMMAND

tcpdump

is a free and open source protocol designed for use in virtual environments. It is often used to connect to virtual machines (VMs) that are hosted by the Kernel-Based Virtual Machine (KVM) hypervisor

spice

examples of third party logging services 2

splunk alienvault

This language is related to database servers

sql

Which command displays which ports the processes use on Linux systems?

ss

determine just which program is listening on which open port: sockets COMMAND

ss

big command for port forwarding

ssh

provides a layer of encryption around data sent across the network

ssh

ssh command for local port forwarding COMMAND

ssh -L

ssh command for remote port forwarding COMMAND

ssh -R

SSH x11 forwarding COMMAND

ssh -X

ssh command allows you to remove ID within an agent session COMMAND

ssh-add

Runs as a wrapper to the user's session and provides authentication when requested.

ssh-agent

login via ssh and not have to supply a password everytime

ssh-agent

copy the SSH public ID key COMMAND

ssh-copy-id

create a new public/private key pair with ssh COMMAND

ssh-keygen

VPN uses what protocol(or should) LOCATION

ssl/tls

These accounts are for normal system users who need to log into a terminal and run applications. DEFINITION

standard user

This firewall determines if packets are fragmented.

stateful firewall

what is faster? stateless or statefull firewall

stateful firewall

While it also employs packet filtering, it does not treat packets as individuals, but instead as a team. It tracks active network connections, such as TCP and UDP, and keeps an eye on network status.

statefull firewall

firewall focues only on individual packets DEFINITION

stateless firewall

The default location where a program sends error messages to

stderr

The default location where a program gets its input from

stdin

the default location where a program sends its regular output to

stdout

used to protect a file from being deleted by those who don't own it, even if they belong to the group that has write permissions to the file. DEFINITION

sticky bit

is a feature that allows the user to perform keyboard combinations, such as Ctrl+C, without having to hold down the modifier key while pressing the combination

sticky keys

allows a standard user account to run commands as another use account including the root user account COMMAND

su

root privledges set permanantly COMMAND

su

SUDO This provides you with a non-login shell for the root user. FLAG

su -l

VM storage with set amount

thick provisioning

It allows a standard user account to run any command as another user account, including the root user account. COMMAND

sudo

root privledges for ONE command COMMAND

sudo

need to execute a root-specific command that is not in the normal user's path FLAG

sudo -

SUDO kill all the dd jobs COMMAND

sudo killall -USR1 dd

command allows a standard user to open a file in a text editor with privileges of another user account, including the root user account COMMAND

sudoedit

this type of virtual disk is a static setting where the virtual disk size is selected and file are created on the physical disk DEFINITION

thick provisioning

VM storage only uses what is necessary for hd space

thin provisioning

dynamic type of virtual disk which causes the hypervior to consume only the amount of disk space actually used for the virtual device DEFINITION

thin provisioning

it only wakes up based on an external event, such as hardware becoming available DEFINITION

uninteruptible sleep

Uses existing desktop applications, focus is on the interface (not apps), originally designed for Ubuntu, and development now handled by other organizations.

unity

endpoints similar to network sockets

unix sockets

command allows you to view the account creation configuration directives within the /etc/default/useradd file

useradd -D

USERADD lock an account FLAG

useradd -L

USERADD remove the lock on a user account

useradd -U

to delete an account on linux COMMAND

userdel

USER remove a user along with his home directory FLAG

userdel -r

userdel with superuser privledges?

userdel -r

to use to lock an account COMMAND

usermod

USERMOD Add to a group

usermod -aG

common usermod line command

usermod -aG

USERMOD Lock an account

usermod -l

USERMOD unlock an account

usermod -u

a VM is consigned to a private virtual network, opposite of bridging

NAT

LInux desktop used with LinuxMint

cinnamon

Which of the following utilities creates rules in /etc/host.deny to prevent access to the SSH server during a hacking attack? COMMAND

DenyHosts

SHELL SCRIPT file to display environment variables COMMAND

echo

command to DISPLAY text to STDOUT

echo

how to enable forwarding of ip packets

echo "1"

2nd command to create quota files COMMAND

edquota

change the quota for a specific user COMMAND

edquota

older boot system

efi

GREP equivlent command for general expression

egrep

It is a program which scans a specified file line by line, returning lines that contain a pattern matching a given regular expression. COMMAND

egrep

What syslog severity level has the highest priority ranking in rsyslogd?

emerg

SELINUX to enable the policy rules on the system and block any unauthorized access.

enforcing

network traffic is grouped into a zone, which is a predefined rule set. Each zone has a configuration file that defines this rule set, also called trust levels COMMAND

firewalld

What is mandatory access control designed to secure

files and directories

permission problems? Look at what? 4

filesystem quotas, disk space, inode use, and umask settings

more complex search of files, such as metadata COMMAND

find

slower but more thourough way to find things COMMAND

find

this can find hidden files COMMAND

find

show the current state of an uncomplicated firewall

ufw status

command helps you restrict access to system resources for each user account COMMAND

ulimit

Which command lets you alter the default permissions in a shell COMMAND

umask

feautre defines the default permissions linux assigns to the file or directroy COMMAND

umask

to unmount a virtual directory COMMAND

umount

UFW AC

uncomplicated firewall

on pci cards: basic computer parts DEFINITION

client devices

GIT Cloning a project from remote repository COMMAND

clone

old legacy application that provides remote look up services to find users on a linux system

finger

Redhat based firewall utility

firewalld

This service includes Authentication server, Key distribution center and Ticket-granting service

kerberos

sercure authentication protocl that uses sysmettric key cryptography

kerberos

kernel stops working due to errors DEFINITION

kernel Panic

What memory area does Linux use to store boot messages?

kernel ring buffer

check what for policy violations?

kernel security module log files

SHELL terminate a shell COMMAND

kill

what to add after setting a bash variable

""

immediately stop running a program DEFINITION

kill signal

kerberos use what service to determine if a ticket is valid COMMAND

kinit

What syslog severity level represents normal but significant condition messages?

notice

Use what program to lockout users

pam

SHELL SCRIPT symbol for comments

#

used in Linux to define the shell as a bin/bash shell that reads the program

#!

SHELL SCRIPT specific format for the shell script to work

#!/bin/bash

BASH positional parameters symbol

$

GREP command to treat text as variables?

$

GREP what to type to search for the endof a line TEXT

$

set an envirement variable Text

$

SHELL SCRIPT is used for executing a command mostly inside some other command i.e Function symbols

$()

What environment variable contains the username of the user who started the shell?

$USER

SHELL SCRIPT array builder symbold

${}

VI search the entire file symbol

%

print print string characters in the argument

%s

SHELL To run a shell script in background mode, include the

&

how to send a process to the background TEXT

&

symbol to put a job in the background

&

PIPING causes the second command to be executed if the first command has an exit status of 0 (success). If an exit status of nonzero (failure) is returned, the second command is not attempted.

&&

Sometimes you want to send standard error and standard output to the same file

&>

Brute force attack logins can be prevent by settings in

pam_tally2

command allows you to view failed login attempts COMMAND

pam_tally2

authentication issues? check what?

pam_tally2 faillock

how to organize text file alphabetically COMMAND

sort

sort a fiie numerically from top to bottom COMMAND

sort

sort a list of numbers in a file FLAG

sort -n

GREP This option shows all the lines in a file that don't match the string; this is exactly the opposite of the default behavior FLAG

grep -v

GREP option selects only lines that have the string as a whole word, not part of another word. FLAG

grep -w

to add a group COMMAND

groupadd

command to delete a group COMMAND

groupdel

command to modify a group COMMAND

groupmod

Specifies the /etc/fstab option for group quotas.

grpquota

What command must you run to save changes to a GRUB Legacy boot menu?

grub-install

You must run the command to generate the GRUB2 grub.cfg configuration file.

grub-mkconfig

install a dpkg package FLAG

-i

Redirect STDOUT to specified file. If file exists, append to it. If it does not exist, create it

>>

command to append data to a preexisting file

>>

A process that is the most recently acted upon SYMBOL

+

How do you determine the default job running in a console session?

+

DATE to retrieve the date in YYYY-MM-DD format.

+%F

DATA use what to retrieve the week number

+%V

DATE to retrieve the Julian date, day number

+%j

SUID command for adding in permissions

+s

Permissions command for adding a sticky bit

+t

command generates the GRUB2 configuration used for booting

grub-mkconfig

DPKG remove a package and its config files FLAG

-P

DPKG search installed files for a package FLAG

-S

RPM verify a package FLAG

-V

To view the security context assigned to objects, add the

-Z

RSYNC switch allows you to recursively back up a directory tree and preserves all the file metadata.

-a

TAR sets the block size FLAG

-b

will create a tarball using the highest compression utility, xz, and allow the administrator to view the files via the verbose option while they are being copied into the compressed archive

-cJvf

RPM remove a package FLAG

-e

RSYNC preserves group ownership FLAG

-g

TAR Creates a new format incremental backup (only files that have changed since the last full or incremental backup). FLAG

-g

CPIO Extract files from an archive FLAG

-i

RPM install a package FLAG

-i

the users group id number

100

privileged ports run up to number

1023

registered port numbers

1024 49151

pop port 2

109 110

ntp port

123

maximum partitions allowed on a gpt disk

128

imap port 2

143 220

page blob maximum storage

1tb

Runlevel order for debian user

2

SGID number set

2

run level for multi user mode WITHOUT networking services enabled

2

nfs port

2049

sendmail and postfix port

25

Redirect STDERR to specified file. If file exists, overwrite it. If it does not exist, create it.

2>

command to get around superuser errors and file errors

2>

Redirect STDERR to specified file. If file exists, append to it. If it does not exist, create it.

2>>

run level for multi user mode WITH networking services enabled

3

Install grub2 on a system COMMAND

grub2-install

ldap port

389

SUID number set

4

mbr supports how many drives

4

run level for custom

4

what number account denotes the apache user

48

run level for multi user mode with gui interface

5

A page blob is limited to how much storage

512 bytes

run level for rebooting the system

6

port for cups

631

how many levels of run levels

7

finger port

79

what number account denotes nobody NUMBER

99

vi command to exit out of a session

:q!

how to string multiple commands on one line TYPE

;

Redirect STDIN from specified file into command.

<

Redirect STDOUT to specified file. If file exists, overwrite it. If it does not exist, create it

>

command to redirect text to a different file

>

command generates the grub configuration file for you COMMAND

grub2-mkconfig

older of the compression utilities

gzip

inheritence issues? why maybe?

ACL

Runlevel orders AC

halt single debian redhat wildcard redhat reboot

type of file that has to different file names and be accessed with either name

hard link

Orchastration: To make sure software, services and systems maintain a consistant state: DEFINTION

Automated configuration management

a usb device can be an example of what kind of token

hardware token

information system security alerts

CVE

first thing to try if you are having performance issues COMMAND

hdparm

to show the first 10 lines of a file COMMAND

head

An Extensible Firmware Interface (EFI) system partition uses a filesystem of what type for compatibility

FAT

HEAD set numbers to show set amount of lines FLAG

head -n

Onscreen gnome keyboard

GOK

tells the compy what to boot

GRUB

gpt AC

GUID partition table

DenyHosts and Fail2ban are basically

IDS

another command for stdin redirection COMMAND

here

shell problems? 2 causes

Improperly configured environment variables, default shell setting

command that sets the language envirement variable

LANG

this variable changes the setting for all of the localization environment variables

LANG

The journalctl application allows you to filter event messages related to a specific application by the application process ID (PID) using the

OBJECT_PID

file format bundles all of the virtual machine configuration files into a single tar file for distribution

OVA

VARIABLE search order for executing files

PATH

Which variable defines the directories in which a bash shell searches for executable commands

PATH

Completely kill a process COMMAND

PID

Inserting modules to memory can be accomplished by using the COMMAND

insmod

bit is used with executable files

SUID

linux Terminal clear the screen COMMAND

clear

VM quick to boot and begin serving and priced simply

amazon machine images

utility allows you to insert a single module into the Linux kernel COMMAND

insmod

Displays the ARP table for the network's neighborhood. Checks for incorrect or duplicate MAC addresses. This command is obsolete. COMMAND

arp

three most common character sets linux

ascii unicode utf8

name for keys that use public and private keys DEFINITION

asymmetric keys

CRON command for a one time sceduler event

at

SHELL allows you to specify a time when the Linux system will run a script

at

What command allows you to run a shell script at a specific time?

at

orchastration: Used to define parameters

attributes

if there are policy violations, use this program COMMAND

auditd

package provides this extra level of logging for better security COMMAND

auditd

abrt AC

automatic bug reporting tool

scripting language used for manipulating data and generating reports.

awk

is a filesystem protocol created by Microsoft for reading and writing data across a network using a network storage device. It was released to the public for use on all operating systems.

cifs

BASH statement allows you to check multiple values of a single variable in a list-oriented format COMMAND

case

quickly read a file COMMAND

cat

to concatinate two dirrerent files COMMAND

cat

an encrypted key that implements a two-factor authentication method

certificate

issues digital certificates: Something you possess and something you know DEFINITION

certificate authority

Creates queues for each process and handles the various queues in a loop while providing read request priority over write requests. This scheduler is good for situations where more balance I/O handling is needed and/or the system has a multiprocessor COMMAND

cfq

IO scheduling tools

cfq noop deadline

command allows the adminstrator to set how often the password must be changed and what happens as the password starts to age COMMAND

chage

to view an accounts passwd status COMMAND

chage

The filtering point and the table (filter, NAT, or mangle) are combined into a single set of rules called a DEFINTION

chain

iptables determine the path each packet takes as it enters the Linux system to reach the appropriate application.

chains

You can change the default security context assigned to a file by using the COMMAND

chcon

Automated Configuration management programs

chef puppet ansible

can change the group assigned to the file or directroy by using the COMMAND

chgrp

to configure various services to start at different run levels COMMAND

chkconfig

can change the assigned permissions COMMAND

chmod

Chmod Operate recursivley through directories FLAG

chmod -R

octal notation for modifying permissions COMMAND

chmod ug

change the owner assigned to a file or directory COMMAND

chown

utility runs a command in a new root directory structure, within the standard Linux virtual fi lesystem. All disk access performed by the command is restricted to the new root directory structure. COMMAND

chroot jail

CPIO AC

copy in out

Problems with local access? look at what?

corrupt terminal files, improperly configured GUI components, and expired passwords/accounts

copy COMMAND

cp

Copy a directory FLAG

cp -r

copy files recursive COMMAND

cp -r

To quickly create an archive of disparate files around the virtual directory structure, the best utility to use is the

cpio

utlility for creating an archive file (command)

cpio

order for inserting a new hd into a computer

create format mount

SHELL program provides an interface that can run scripts at a regularly scheduled interval.

cron

application schedules jobs on Linux systems

cron

SHELL define the jobs to run in the cron table by using the COMMAND

crontab

SHELL key to press to stop a shell running in the foreground

ctl c

SHELL key to press to pause a shell running in the foreground

ctl z

software that allows a linux system system to connect to any printer resource, either locally or via a network, by using a common application interface

cups

is a computer software project providing a library (and command-line tool for transferring data using various network protocols.

curl

aqustition command for downloading files 2 of a remote source(ip address) COMMANDS 2

curl wget

sift through the data in a large text file, it helps to quickly extract small data sections COMMAND

cut

CUT set a delimiter FLAG

cut -d

DTLS AC

datagram transport layer security

determine the current time zone setting for your Linux system COMMAND

date

utility to copy almost everything on a disk COMMAND

dd

Batches disk I/O requests and attempts to handle each request by a specified time. This scheduler is good for situations where increased database I/O and overall reduced I/O latency are needed, and/or an SSD is employed, and/or a real-time application is in use. COMMAND

deadline

crytographic token that provides authentication and data verification DEFINITION

digital signature

Permissions, first letter is a d means its a

directory

SELINUX setting value completely disables SELinux from monitoring actions on the system.

disabled

three types of selinux modes

disabled enforcing permissive

refers to the storage medium's gradual decay due to time or improper use, which causes data degeneration or loss DEFINITION

degraded storage

sdd potential problem

degraded storage

ufw common pipe

deny

helps protect against brute force attacks coming through openssh COMMAND

denyhosts

Which command builds the kernel module dependency file? COMMAND

depmod

utlity to update the modules.dep file COMMAND

depmod

LMV device files are managed by the

device mapper

displays disk usage by partition COMMAND

df

utility allows you to view overall space usage COMMAND

df

provides a means for configuring one or more network interfaces using the Dynamic Host Configuration Protocol COMMAND

dhclient

command to explore text file differences COMMAND

diff

backup that makes a copy of all data that has changed since the last full backup DEFINTION

differential backup

command can display individual host records for a domain

dig

command displays all of the DNS data records associated with a specific host or network COMMAND

dig

is most likely to help you with name resolution problems? COMMAND

dig

Which of the following communicates with the Linux operating system to transmit the UI wants and needs?

display server

To see memory changes COMMAND

dmesg

command lets you peek at the kernel ring buffer to view kernel event messages as it detects and works with devices COMMAND

dmesg

command to display kernel event messages

dmesg

hd and SCSI problems, run what COMMAND

dmesg

to display the most recent boot messages COMMAND

dmesg

use this if you are experiancing resource exaustion COMMAND

dmesg

utility will simply dump the current kernel ring buffer to STDOUT COMMAND

dmesg

problems with communication ports

dmesg | grep ttyS

use this for uncommon hardware issues COMMAND

dmidecode

FIREWALL Performs similar to public but is used in a location's demilitarized zone, which is publicly accessible and has limited access to the internal network.

dmz

name server (another name)

dns map

Which Linux container package runs an engine as a process on the host operating system and provides a command-line interface to control containers?

docker

containers program for virtualization

docker

KDE Plasma's file manager name

dolphin

program for handling .deb files COMMAND

dpkg

DPKG is a powerful command line tool used to reconfigure an already installed package COMMAND

dpkg-reconfigure

use this to reset your keyboard configuration on debian COMMAND

dpkg-reconfigure-keyboard-configuration

is a set of tools that provide enhanced functionality for automating the Linux boot process. COMMAND

dracut

program to make an ISO file for booting COMMAND

dracut

check this for hardware or software compatibility issues

drivers

FIREWALL Drops all incoming network packets. allows only outbound network connections

drop

IPTABLES Do not allow the packet to continue to the next step; just discard it.

drop

a secure communication protocol but is is designed to employ only UDP packets

dtls

displays disk usage by directory, good for finding users or applications that are taking up the most disk space.

du

what is called when a a computer has two network interfaces

dual homed

command to display block and superblock group info COMMAND

dumpe2fs

what key to use at grub menu for more options

e

command to change the label on the filesystem COMMAND

e2label

quotas only work on an

entire device

SHELL SCRIPT command allows you to run a script and modify environment variables internal to the script without affecting the system environment variables COMMAND

env

prints envirement variables COMMAND

env

What option sets the wireless access point name in the iwconfig command?

essid

dhclient configuration file LOCATION

etc/dhcp/dhclient.conf

User environment files typically come from where

etc/skel

SYSTEMD Units that are controlled by the sysadmin and have ultimate precedence over all the other units LOCATION

etc/systemd/system

to display ethernet settings for a network interface COMMAND

ethtool

local account access problem, first thing check

expiration

BASH make variable an envirement variable COMMAND

export

SHELL SCRIPT command allows you to mark a variable as exportable COMMAND

export

this is a descendant of the original Linux ext filesystem. It supports files up to 2 tebibytes (TiB), with a total filesystem size of 16TiB. It supports journaling as well as faster startup and recovery

ext3

filesystems that support journaling

ext3 ext4

it's the current version of the original Linux filesystem. It supports files up to 16TiB, with a total filesystem size of 1EiB. It also supports journaling and utilizes improved performance features.

ext4

FIREWALL Performs similar to public but is typically used on external networks, when masquerading is enabled for the local systems

external

monitors system logs looking for repeated failures from the same host COMMAND

fail2ban

utility to view and reset login failure tallies

faillock

the most common command line partitioning tool

fdisk

SHELL restart a job in foreground mode use COMMAND

fg

Permissions, first letter is a -, means it is a

file

show what kind of file it is COMMAND

file

which command determiines the type of a file by using a definition databse file which contains info about all common file types COMMAND

file

method of using wildcard characters for file names is also called. Used in any situwation where you iterate through multiple files DEFINITION

file globbing

for sharing files that multiple clients can access and modify as needed DEFINITION

file server

fstab AC

file system table

sticky bits are only used for

folders

systemd Envirenment Variables file

foobar.service

BASH loop with variables BASH COMMAND

for

SHELL SCRIPT iteration

for

shows memory usage COMMAND

free

you can see high RAM usage via the COMMAND

free

Free command with gb and mb FLAG

free -h

command for making a rescue of a file system

fsck

repair an ext* filesystem use COMMAND

fsck

used to fix a file system COMMAND

fsck

an image that is a copy of all the data DEFINITION

full backup

FQDN AC

fully qualified domain name

awk is also called

gawk

command to view the GUID partition table? COMMAND

gdisk

drives that use gpt use what command for finding info on partitions

gdisk

gpio AC

general purpose input output

To see the current mode of SELinux, use the COMMAND

getenforce

shell problems? COMMAND

getent

inheritence issues? Run what COMMAND?

getfacl

to use the ACL feauture in LINUX, use COMMAND 2

getfacl setfacl

to view the current setting of a policy use the COMMAND

getsebool

Which of the following commands allows you to switch to a new Git branch GIT COMMAND

git merge

These variables store values just like local variables and can be used by the current BASH shell. However, when another process is started from the BASH shell, these variables are passed into the new process. DEFINITION

global variables

interface provides multiple digital input and output lines that you can control individually, down to the single-bit level. COMMAND

gpio

more common partition type today

gpt

another nice tool for filtering text COMMAND

grep

can help you fi nd a file line (or lines) that contain certain text strings. COMMAND

grep

good command to use with ps

grep

GREP only show a numeric count of matches found FLAG

grep -c

reason to change port numbers

increased security

backup that only makes a copy of data that has been modified since the last backup operation DEFINITION

incremental backup

is an umbrella term that encompasses both the configuration management settings (operating system, libraries, additional software) and the policy as code items (security policies, authentication settings). DEFINITION

infastructure as code

the process of deploying an app and its environment in a container can be easily automated is called DEFINITION

infastructure automation

allows you to set a default ACL on a directory that is automatically inherited by any fi le created in the directory. DEFINITION

inheritence

First process that loads up. It's in charge of all other processes

init

GIT staging area employs a hidden subdirectory named .git , which is a created via the COMMAND

init

systemctl manages what type of files

init files

is the root filesystem image used for booting the kernel provided as a compressed cpio archive. COMMAND

initramfs

If a fi lesystem runs out of inodes, no additional fi les can be created on it. DEFINITION

inode exaustion

another name for number of current files

inodes

to set the ssid and encryptioin key for a wireless interface COMMAND

iwconfig

compress a tar with bzip2 FLAG

j

command for journald

journalctl

How do you watch the systemd journal files in real time COMMAND TAIL

journalctl -f

The default logging system for systemd

journald

program for both local and remote logging of system information

journald

service for both local and remote logging of system information.

journald

It's simpler in format than YAML

json

Executable problems? Remember what to fix?

must be executable from all directories related to the file

to move files COMMAND

mv

process of translating between a system's fully qualifi ed domain name (FQDN) and its IP address is called DEFINITION

name resolution

program running in background on your Linux server that provides hostname resolution

named

performs network throughput tests COMMAND

nc

problem cause of GCC

needs compiling

This software provides code hooks into the kernel, which allow other packages to implement firewall technologie

netfilter

lists all of the open network connections on the system: COMMAND

netstat

needs to verify if the HTTP server port is bound to the correct IP

netstat

NETSTAT display the routing table FLAG

netstat -r

NTP AC

network time protocol

is a network-based filesystem

nfs

is a protocol used to share folders in a network environment

nfs

provides files sharing between unix and linux systems

nfs

boot method can be especially useful during development where the root filesystem is changing frequently

nfs boot

start a command or script with a higher priority level COMMAND

nice

NICE set the nice level for a process FLAG

nice -n

NICE set the process id FLAG COMMAND

nice -p

help with NIC configuation problems COMMAND

nmcli

nohup AC

no hangup

. What command do you use to disconnect a shell script from the current console so that it can continue to run after the console exits?

nohup

SHELL command runs another command blocking any SIGHUP signals that are sent to the process. This prevents the process from exiting when you exit your terminal session. COMMAND

nohup

means that every action a user takes can be tracked back to that exact user. DEFINITION

non-repudation

Places all I/O requests into a single FIFO queue and handles them in order. This scheduler is good for situations where less CPU usage is needed and/or an SSD is employed. COMMAND

noop

to block the root user account from logging in from the network, use what program

openssh

this program provides certificate functions

openssl

PAM Conditionally adds the module's status code to the final status. If this is the only record for the PAM service type, it is included. If not, the status code is ignored.

optional

program used for braille reading

orca

screen reader programts

orca emacspeak espeak festival

scans through the various processes using memory and creates a score. The score is based on the total memory a process (and it's child processes) is using and the smallest number of processes that can be killed to come out of a critical low-memory status DEFINITION

out of memory killer

file is a virtual appliance used by virtualization applications such as VMware Workstation and Oracle VM Virtualbox

ova

involves the layering of a more specific or purpose-driven additional layer of networking and protocols over an underlying network.

overlay network

is an open-source standard for packaging and distributing software applications for virtual machines

ovf

occurs when a network packet fails to reach its destination

packet drop

Program for password control (length etc)

pam

cannot write data and receives a permission error.

permission inheritence

SElinux monitors rules and logs any policy violations but doesnt enforce them

permissive

What SELinux mode tracks policy violations but doesn't enforce them?

permissive

VM volumes stay intact even after the virtual machine is shut down

persistant volumes

allows you display all process that match the search term COMMAND

pgrep

Perform simple ICMP packet throughput tests and displays statistics on items such as round-trip times COMMAND

ping

send icmp packs to remote hosts COMMAND

ping

xargs is used with what?

piping

want to use two commands at once? use what?

piping or |

stop process by using their names rather than the PID numbers COMMAND

pkill

PAM AC

pluggable authentication modules

allows clients t cmmunicate with a mail server t read messages in they're mailbx

pop

pop AC

post office protocol

mailing protocol supports encryption, vi, domains and clear config files

postfix

SHELL SCRIPT see the local variables set for your bash session COMMAND

printenv

to format and display text COMMAND

printf

only a super user can run a service on a

privileged port

Orchastration: a collection of steps needed to take place to complete an action

procedure

order for bash in files

profile, profile.d, ~/.bash_profile, .profile

allows you to intercept web requests from local network clients. By intercepting the web requests, you have control of how clients interact with remote web servers DEFINITION

proxy server

Which command is used to display security context on processes COMMAND

ps

show you a treelike hierarchy of processes and information about them? COMMAND

ps

to see a processes security context use COMMAND FLAG

ps -Z

show processes more completely FLAG

ps -a

show user information for processes

ps -u

show processes without controlling tty

ps -x

show all processes for all users COMMAND

ps aux

PTY AC

pseudo terminal

tree of processes COMAND

pstree

FIREWALL Accepts only selected incoming network connections. Typically used in a public setting, where other systems on network are not trusted.

public

PKI AC

public key infastructure

GIT If a remote developer needs the latest project files COMMAND

pull

GIT put project to remote repository COMMAND

push

command to create a physical volume COMMAND

pvcreate

first thing to try if you have missing volumes COMMAND

pvscan

command to see where you are currently COMMAND

pwd

which defines how a network workstation can boot and load an operating system from a central network server

pxe

command to check quota limits COMMAND

quota

to create user and group quota files COMMAND

quotacheck

some problems as to why you can't create a file 2

quotas disk space

protocol allows an authentication server to authenticate not only the user account, but also other information about the user, such as a network address, phone number, and access privileges.

radius

allows direct access between a clients and servers memory COMMAND

rdma

the script isn't executed as a separate process but rather as if the commands were run within the current shell DEFINITION

sourcing scripts

allows more efficient memory usage between multiple programs

shared libaries

makes it easier to distribute applications

shared libaries

functions are used with what in BASH?

shell scripts

KILL SIGNAL Hang up or shut down the process COMMAND

sighup

KILL SIGNAL Interupt the process COMMAND

sigint

KILL SIGNAL Kill the process COMMAND

sigkill

Kill a process and remove it from memory COMMAND

sigkill

KILL SIGNAL Stop execution COMMAND

sigstop

KILL SIGNAL Terminate the signal COMMAND

sigterm

You wish to terminate a process but don't want to cause unnecessary data loss or other problems COMMAND

sigterm

KILL SIGNAL Stop the terminal COMMAND

sigtstp

snmp AC

simple network management protocol

What command parameter would you add to the end of the GRUB2 linux command to force a Linux system to start in single-user mode?

single

feature for people who have "heavy hands" when typing on a keyboard.

slow keys

check SATA drives COMMAND

smartctl

micrsoft servers use this protocol for file and print sharing with clients

smb

hybrid aproach of backup, half backup persay DEFINTION

snapshot backup

Simplest tool for monitoring

snmp

a way for an administrator to query remote network devices and servers to obtain information about their confi guration, status, and even performance.

snmp

type of link that creates a pointer to a file but an actual copy DEFINITION

soft link

files that reside on the network device can be an example of what kind of tokens DEFINITION

software tokens

pipe command writes to a file and displays it on the screen COMMAND

tee

reads the standard input and writes it to both the standard output and one or more files COMMAND

tee

to jump between run levels COMMAND`

telinit

the original remote terminal application

telnet

Which protocol is used to serve the initial PXE image to the localworkstation

tftp

a measurement of the actual data amount that is transferred between two network points over a period of time.

throughput

shows the actual elapsed time it took the program to run and how much user and system CPU time the application required COMMAND

time

to see how long a linux command takes to run COMMAND

time

Which command displays the current date, system time, hardware time, and time zone?

timedatectl

command to manage the time and date settings on you're system COMMAND

timedatectl

is a software component that is used to determine whether a packet drop has occurred COMMAND

timeout

preset time periods for handling unplanned events DEFINITION

timeout

sotre a digital ID as an encypted file DEFINITION

tokens

a real-time display of applications, their system state, and the resources they consume COMMAND

top

allow you to create empty files on the fly COMMAND

touch

is a useful command line utility that translates and/or deletes characters from stdin input, and writes to stdout COMMAND

tr

Display approximate travel times between each router from the source to the destination, discovering the maximum transition unit (MTU) along the way. COMMAND

tracepath

Display approximate travel times between each router from the source to the destination. COMMAND

traceroute

IPsec mode where only data is protected

transport mode

A firewall that accepts all network connections is called a

trusted

option allows you to specify the interface from which to sniff packets COMMAND

tshark

allows changing of the system file type (ext3,ext4,etc) COMMAND

tune2fs

which utility wouldl be used to change how often a filesystem check is performed on an ext2 filesystem without losing any data stored on that file system

tune2fs

IPsec mode all the data and its associated headers added for transportation purposed(called a datagram) are protected

tunnel mode

Which type of hypervisor interfaces directly with the host system hardware?

type 1

environment variable overrides the default system time zone for session application COMMAND

tz

a program that is automatically started at boot time by the init process or the Systemd systems and runs in the background at all times

udev

utility that is used for monitoring and connecting hot pluggable devices

udev

Which program allows you to reload the defined rules for detecting and installing new devices?

udevadm

allows you to send commands to the udev program COMMAND

udevadm

udevadm Modifies the internal state of udev COMMAND

udevadm control

udevadm reload the rules COMMAND

udevadm reload-rules

udevadm Requests device events from the kernel COMMAND

udevadm trigger

Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?

uefi

newer boot system

uefi

to destroy linked files COMMAND

unlink

BASH delete variables COMMAND

unset

BASH It iterates through a block of commands until the test condition evaluates to a True logical value. Opposite of the while COMMAND

until

SHELL SCRIPT similar command too while

until

creates or updates a database used by locate COMMAND

updatedb

display how long your computer has been running

uptime

displaying load averages COMMAND

uptime

three types of permissions

user group others

add a user COMMAND

useradd

Useradd alter the default file for user logins FLAG

useradd -D

Specifies the /etc/fstab option for user quotas.

usrquota

Which of the following are options used in the /etc/fstab file to designate a filesystem as one that uses quotas? COMMAND

usrquota grpquota

Which character set has replaced ASCII as the default character set used in U.S. Linux installations?

utf8

What two character sets use a transformation code to store characters?

utf8 locale

to group physical volumes into a volume group COMMAND

vgcreate

two text editors for linux

vim nano

command securely opens the sudoers in an editor so you can make changes. COMMAND

visudo

some instances of multiple individuals overwriting the /etc/sudoers file. Use what? COMMAND

visudo

name of the kernel image file

vmlinux

indicates that the kernel file is compressed using the bzImage compression method, a very common method in most Linux distributions.

vmlinuz

allows you to view disk I/O specific to swapping, which increases when RAM is improperly sized COMMAND

vmstat

program that is an example of full virtualization

vmware

Which of the following are remote desktops typically used with virtual machines?

vnc spice

a secure point to point tunnel between a remote client or server

vpn

Which of the following commands will display CPU load data along with information concerning users who are currently logged into the system?

w

verbose output of users COMMAND

w

newer display server

wayland

two display servers for linux

wayland x11

command for determining word count of a file COMMAND

wc

red-hat based distributions use what command for sudo COMMAND

wheel

Find more information about a specific command COMMAND

whereis

a second command to quickly locate a file COMMAND

whereis

search for a file to locate programs and their corresponding man pages and config files COMMAND

whereis

a command to tell you all instances of the command in your path COMMAND

which

command to quickly locate a file COMMAND

which

find the directories of specific commands COMMAND

which

to quickly see if a command is using an alias COMMAND

which

Finding the init program file location COMMAND

which init

SHELL SCRIPT loop statement

while

restrict cron access with what? 2

whitelist blacklist

2nd command that provides more data on a user COMMAND

who

command will display what user account you are currently using COMMAND

whoami

What command is useful in determining which company or person owns a domain? COMMAND

whois

displays FQDN information stored there COMMAND

whois

make your own runlevel NAME and number level

wildcard 4

tshark is part of

wireshark

Accepts only selected incoming network connections. Typically used in a work setting, where other systems on the network are mostly trusted.

work

is network-aware and can enable clients to access Graphical User Interface (GUI) elements over a network. It is possible to forward X traffic through a Secure Shell (SSH) tunnel.

x forwarding

old display server

x11

way to secure tunnel port forwarding

x11

a command line utility for building an execution pipeline from standard input COMMAND

xargs

get around programs that don't except standard input

xargs

way to build commands on the fly

xargs

was created by Silicon Graphics for its (now defunct) advanced graphical workstations. The filesystem provided some advanced high-performance features that makes it still popular in Linux.

xfs

displays info about a mounted filesystem including the blcok sizes and sector sizes as well as label and UUID info COMMAND

xfs-info

displays or changes filesystem parameters such as the label or UUID assigned COMMAND

xfs_admin

what command fixes filesystem problems on an XFS file system COMMAND

xfs_repair

new compression utility

xz

tool with highest compression rates

xz

redhat package tool command 2

yum dnf

YUM install a package COMMAND

yum install

download an rpm package without installing it COMMAND

yumdownloader

compress a tar with gzip FLAG

z

compression that operates on multiple files

zip

ZIP unzip all files and subdirectories FLAG

zip -r

a process has ended but its parent process hasn't acknowledged the termination signal because it's sleeping, the process is considered a DEFINITION

zombie

firewalld Network traffic is grouped into a predefined rule set,

zone

The firewalld service uses what as a predefined rule set.

zones

openSUSE package tool management

zypper

GREP general command to compare two dpossible words or charter sets that match

|

Bash command to execute a command only if the first command line fails

||

command to configure the ssh COMMAND/LOCATION

~/.ssh/config

how to provide a special username and other parameters related to a specific host to which you connect using SSH. what file do you add this info

~/.ssh/config


Kaugnay na mga set ng pag-aaral

Chapter 3 Policies, Procedures, and Awareness

View Set

UNCC BLAW exam 3 (8,9,10,20,34,35)

View Set

Chapter 5 Therapeutic Relationships NCLEX

View Set

History, Chapter 1, Unit 1, 1.06 The Nile River Valley

View Set

study guide flash cards: cog exam 3

View Set