Chapter 10 -12 linux+ guide to linux certification review
When compiling source code into binary program, which command preforms a system check and creates the Makefile?
./configure
Which filename extension indicates a tarball?
.tar.gz
Which of the following represents the first nonrewinding SCSI tape device on a system?
/dev/nst0
Which file contains full and incremental backup information for use with the dump/restore utility?
/etc/dumpdates
Which file holds the methods to be used and the order in which they will be applied for host name resolution?
/etc/hosts
Which file contains default information such as UID and GID ranges and minimum password length to be used as user creation?
/etc/login.defs
What s the name of the file that contains a listing of a user on the system and their home directories?
/etc/passwd
Which file stores the TCP/Ip address of the DNS servers used to resolve host names?
/etc/resolv.conf
Which file would you modify to change the TCP/IP address of the first wired NIC on the system the next time the system is booted or the card is brought up?
/etc/sysconfig/network-scripts/ifcfg-eth0
Most log files on the system are found in which directory?
/var/log
Which dump level indicates a full backup?
0
You have created a full backup and four incremental backups. In which order must you restore these backups?
0, 1, 2, 3, 4
Which of the following port numbers is associated with telnet?
23
Which of the following are stand-alone daemons?
Apache (httpd) and telnet(in.telnetd)
What are two means available to resolve a host name to the appropriate TCP/IP address?
DNS and /etc/hosts
The Debian Package Manager(DPM) is the default package manager used by Fedora 13.
False
The bzip2 and gzip utilities use similar compression algorithms.
False
To install a new program from RPM software repositories on the Internet, you can use the yum update programname command.
False
What is the most common method for obtaining Linux software?
Internet download
Which networking service allows you to share files with other computers on the network?
NFS
A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address.
True
Along with a listing of user accounts, the /etc/passwd file contains information on account expiry.
True
Most source code is available on the Internet in tarball format.
True
SSH encrypts all traffic that passes across the network, whereas telnet and rlogin do not.
True
The -9option to the gzip utility results in a higher compression ratio.
True
The line that configures the host name for the computer at boot time can be found in /etc/sysconfig/network.
True
What is the name used to describe a user providing a user name and password to log into a system?
authorization
You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and printer 1-21, respectively. Which command would you use to remove these two jobs from the print queue?
cancel Printer1-17 Printer1-21
What is the name of the utility used to rotate log files?
logrotate
The TCP/IP address 127.0.0.1 is also referred to as the?
loopback address
Which command can be used to send a print job to the default printer named Printer1?
lp-d Printer1 file and c. lp file
When compiling source code into a binary program, which command preforms compilation by running the GNU C Compiler?
make
When compiling source code into a binary program, which command copies compiled binary files to the correct location on the filesystem?
make install
Which command can be used to alter the primary group associated with a given user temporarily?
newgrp
The daemons associated with network services listen for network traffic associated with a particular?
port
The process of sending print jobs from the print queue to the printer is called?
printing
Which two commands can be used to modify the route table on a Linux computer?
route and ip
What devices are used to transfer information from one network to another?
routers
Which of the following commands can be used to list detailed information about a package, such as its installation date and license?
rpm -qi packagename
Which of the following commands can be used to list the files contained within an installed RPM package?
rpm -ql packagename
Which of the following commands creates an archive?
tar -zcvf/dev/fd0*
When a printer is disabled?
the print queue accepts jobs into the print queue and holds them there until the printer is enabled again.
When a printer is rejecting requests?
the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable.
You can clear a log file simply by redirecting nothing into it.
true
You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd.
true
Which command is used to delete a user account?
userdel username
Which command can you use to lock a user account?
usermod -L username
Which command would you use to unlock a user account?
usermod -U username
Files that have compressed using the compress utility typically have the_____ extension.
z
Which of the following are graphical remote administration technologies?
X Windows and VNC
Which of the following commands extracts an archive?
cpio -vicdu -I /dev/fd0
What is the background process responsible for printing on Fedora Linux?
cupsd
Before a computer can use a router, what configuration information must it be provided?
default gateway
To test DNS configuration by resolving a host name to an IP address, which command or commands you use?
dig hostname and host hostname
Which option to the rpm command can be used to remove a package from the system?
e
When referring to the /etc/rsyslog.conf file, _______ specifies information from a certain area of the system, whereas _________ is the level of importance of that information.
facility, priority.
Stand-alone daemons are started on demand using the Internet Super Daemon (xinetd).
false
UIDs and GIDs are unique to the system and, once used, can never be reused.
false
Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)
ifconfig, ping and netstat -i
Which command would be used to activate the NIC aliased as eth0?
ifup eth0