Advanced Linux pt 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which protocol is used to remotely access the whole desktop of another computer? a. Telnet b. Secure Shell c. Virtual Network Computing (VNC) d. HyperText Transfer Protocol (HTTP)

c. Virtual Network Computing (VNC)

A(n) ____ is a system process that is not associated with a terminal or a graphical environment. a. program b. user process c. daemon process d. Linux process

c. daemon process

How many fields of a crontab file define when the cron job should be run? a. three b. four c. five d. six

c. five

The ____ lists the USB devices on the system. a. hwinfo b. lspci c. lsusb d. sysfs

c. lsusb

The cron daemon checks to see if it has any jobs defined for the current time once every ____. a. second b. 30 seconds c. minute d. hour

c. minute

Which of the chmod command options is used to change the permissions for other users? a. a b. g c. o d. u

c. o

Which fdisk command is used to end the fdisk program without saving changes? a. d b. m c. q d. w

c. q

A(n) ____ is a local or remote directory containing packages and additional information about these packages. a. Package group b. Pattern c. repository d. installation summary

c. repository

In the /etc/fstab file, the fourth field in each line represents ____. a. the mount point b. the file system type c. the mount options d. the sequence of file system checks

c. the mount options

____ is a command line tool that guides you through the different aspects of the X11 configuration. a. YaST b. SaX2 c. xorgconfig d. yastconfig

c. xorgconfig

The ____ command is the front end to RPM and takes care of such things as dependencies when installing a package. a. rpm b. yast c. yum d. yumdownloader

c. yum

The ____ character indicates that a process is running in the background. a. * b. ^ c. % d. &

d. &

Which option is used with the crontab command to delete all jobs? a. -e b. file c. -l d. -r

d. -r

Which of the following is a valid GID for a normal group? a. 0 b. 15 c. 248 d. 1056

d. 1056

The highest permissible GID value is ____. a. 10000 b. 30000 c. 50000 d. 60000

d. 60000

Which of the following information is available to the system administrator only for installed packages? a. Summary and description b. Technical data c. Dependencies on other packages d. File list

d. File list

Which syslog element defines which messages are logged where, depending upon the source, filter, and destination? a. Facility b. Priority c. Destination d. Log path

d. Log path

The ____ signal continues a process that was stopped with the STOP signal. a. SIGKILL b. SIGHUP c. SIGINT d. SIGCONT

d. SIGCONT

In ncurses YaST, you selected highlighted menu items by pressing the ____. a.Tab key b. Shift key c. Arrow keys d. Spacebar

d. Spacebar

Which of the following is a disadvantage of installing a GUI? a. Ease of use b. Functionality c. Familiarity d. Stability

d. Stability

The ____ command can be used to set additional attributes on ext2/ext3 file systems. a. chmod b. chown c. lasttr d. chattr

d. chattr

Which syslog priority warns you that the system is no longer usable? a. debug b. warning c. crit d. emerg

d. emerg

The ____ command displays information about the hard drive and lets you manage certain hard drive parameters. a. hwinfo b. lspci c. fdisk d. hdparm

d. hdparm

The ____ command is used to change the effective group of the executing user. a. groupadd b. groupmod c. gpasswd d. newgrp

d. newgrp

Which logrotate setting is used to make sure that empty files are not rotated? a. size b. compress c. maxage d. notifempty

d. notifempty

____ is a tool used to download RPMs from yum repositories. a. rpm b. yast c. yum d. yumdownloader

d. yumdownloader

A process is a structured set of commands stored in an executable file.

False

Each file can belong to multiple users, but only to one group.

False

If the useradd command is called with no options specified, it creates a user with a random username and random password.

False

QT is YaST's text mode.

False

The size and age of log files are monitored automatically by the syslog program.

False

To access the whole desktop of a remote computer,, use Telnet or Secure Shell.

False

In a Linux environment, most programs share some code through the use of shared libraries.

True

RPM package files use the software_name-software_version-release_number.architecture.rpm naming format.

True

Runlevels define the state of the system.

True

The BIOS is a series of small programs and drivers that allow the CPU to communicate with basic system devices.

True

The Linux operating system has the ability to handle several users at the same time and to allow these users to perform several tasks on the same computer simultaneously.

True

The YaST software management module serves as the default software management interface for SUSE Linux Enterprise Server 11.

True

The cron daemon can run any command or shell script.

True

The fdisk program is used for partitioning hard disks from the command line.

True

X Window provides a GUI for computer networks for both client and server machines.

True

Which options is used with the useradd command to enter text for the comment field? a. -c b. -e c. -g d. -m

a. -c

What is the software library configuration file? a. /etc/ld.so.conf b. /etc/ld.conf c. /etc/ldd.so.conf d. /etc/ldconfig.conf

a. /etc/ld.so.conf

What is the UID for the root user? a. 0 b. 1 c. 100 d. 1000

a. 0

Which is the default setting for managing package dependencies in SLES 11? a. Resolve package dependencies automatically (Dependencies > Autocheck) b. Check for dependencies at specified time (Dependencies > Check Now) c. Reset ignored dependency conflicts (Extras > Reset Ignored Dependency Conflicts) d. Generate a dependency resolver test case (Extras > Generate Dependency Resolver Test Case)

a. Resolve package dependencies automatically (Dependencies > Autocheck)

A(n) ____ is a physical piece of hardware. a. device b. interface c. kernel module d. user space driver

a. device

If the file system type is not specified, the mkfs command automatically creates a(n) ____ filesystem. a. ext2 b. ext3 c. Reiser d. ISO9660

a. ext2

Which command do you use to find out what partition contains the kernel? a. find b. grub c. kernel d. lilo

a. find

The ____ command gives a comprehensive view of the hardware built into the system. a. hwinfo c. lsusb b. lspci d. sysfs

a. hwinfo

The ____ command is used to view shared libraries required by a specific program or shared library. a. ldd b. cat c. ls d. sash

a. ldd

The ____ filter lists groups created on the local server to provide permissions for members assigned to the group. a. local groups b. system groups c. custom d. permissions

a. local groups

The LILO ____ global option describes the colors used in the LILO boot menu. a. menu-scheme b. lba32 c. default d. image

a. menu-scheme

How frequently can a job scheduled using the at daemon be run? a. once b. monthly c. weekly d. daily

a. once

When testing a configuration, newer tests produce a black screen which makes it somewhat difficult to diagnose whether X11 is working properly. a. retro b. old c. older d. previous

a. retro

Which backup medium is typically used by Linux administrators because of their price to capacity ratio? a. tape drive b. writable DVDs c. removable hard drives d. magneto-optical drives

a. tape drive

In ncurses YaST, you press the ____ to move from one box to another or to the text buttons. a.Tab key b.Shift key c.Arrow keys d.Spacebar

a.Tab key

When the init process starts, it runs the ____ script. a. /etc/init.d/start b. /etc/init.d/boot c. /etc/init.d/load d. /etc/init.d/rc

b. /etc/init.d/boot

Which log file stores information about which user was logged in, where the user was logged in, and how long the user was logged in. a. /var/log/mail b. /var/log/wtmp c. /var/log/lastlog d. /var/log/users

b. /var/log/wtmp

The execute permission is represented by the value ____. a. 0 b. 1 c. 2 d. 4

b. 1

The minimum password length allowed by Blowfish is ____ characters. a. 6 b. 8 c. 10 d. 12

b. 8

When you first power on the system, the ____ takes charge of the boot process. a. motherboard b. BIOS c. MBR d. CPU

b. BIOS

Which YaST group includes modules for configuring keyboard settings? a. Network Devices b. Hardware c. System d. Software

b. Hardware

Which RPM component works in the background of the package manager and contains a list of all information on all installed RPM packages? a. RPM package manager b. RPM database c. RPM package d. Package label

b. RPM database

The ____ command is used to control whether or not the display manager is loaded when the system boots. a. displayconfig b. chkconfig c. displaymanager d. systemboot

b. chkconfig

The ____ daemon manages printers and print queues. a. cron b. cupsd c. httpd d. sshd

b. cupsd

A(n) ____ is a background process that makes your installed set of fonts available to XFree86 and other machines running X. a. font system b. font server c. fontX display d. bitmap font

b. font server

In a(n) ____ backup, only the files that have been modified since the last backup of any type, are backed up. a. full b. incremental c. partial d. differential

b. incremental

The ____ command is used to update the library cache. a. ldd b. ldconfig c. sash d. ldcache

b. ldconfig

Which command can be used to lock a user's account? a. useradd b. passwd c. usermod d. userlock

b. passwd

A(n) ____ is an installable list of packages. a. package group b. pattern c. repository d. installation summary

b. pattern

The ____ command displays a list of processes in the form of a tree structure. a. ps b. pstree c. nice d. top

b. pstree

The ____ filter lists user accounts created by the system for use with services and applications. a. local users b. system users c. custom d. services and applications

b. system users

The ____ command is used to fine tune the X server's video modes. a. startx b. xvidtune c. SuperProbe d. vncserver

b. xvidtune

The ____ option is used with the tar command to display a detailed output of the backup process. a. -c b. -f c. -v d. -z

c. -v

Which file should be edited to customize the behavior of the GRUB boot manager? a. /boot/grub.conf b. /boot/grub/menu.conf c. /boot/grub/menu.lst d. /boot/grub.lst

c. /boot/grub/menu.lst

Which runlevel represents multiuser mode without network server services? a. 0 b. 1 c. 2 d. 5

c. 2

Which boot loader location option is used to install the boot loader in the MBR of the first disk? a. Boot from boot partition b. Boot from extended partition c. Boot from Master Boot Record d. Boot from root partition

c. Boot from Master Boot Record

Which YaST groups includes modules for managing disk partitions? a. Network Devices b. Hardware c. System d. Software

c. System


Ensembles d'études connexes

Entrepreneurship Final Exam Review

View Set

EDS500 Chapter 2: Integration, Inclusion, and Support of Positive Outcomes

View Set

Ch 11 vital signs - objectives and key terms

View Set

Fluid and Electrolytes + 4 Categories of Diuretics

View Set

Lecture 19 - Ch 18: Applications of Immune Responses

View Set

7.0 Other Coverages and Options (10%)

View Set