CIS204 Test 3 Study guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.

public ; private

To Convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.

pwconv

Databases store information in the form of ____, each of which contains ____.

records; tables

The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

rlogin

The ____________________ command is used to view the current SELinux status.

sestatus

You can use the ____________________ command to connect to both Samba and Windows servers.

smbclient

In SSH, the /etc/ssh directory stores the DSA public key in the ____ file.

ssh_host_dsa_key. pub

The ____ command can be used to obtain root access when you need to perform an administrative task.

su

By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.

ten

A common utility used to troubleshoot routing is the ____ command.

traceroute

You can create user accounts on the Linux system by using the ____.

useradd

Remote computers can connect to a configured VNC server using the ____ command.

vncviewer

The____ command can be used to display the contents of a compressed file.

zcat

The _____ option can be used with the tar command to extract a specified archive.

-x

When using the compress utility, each file is renamed with a(n)_____ filename extension to indicate that is compressed.

.Z

The Filename extension given to files compressed with bzip2 is ____.

.bz2

Packages in the Red Hat Package Manager format have filenames that indicate the hardware architecture for which the software was compiled, and end with the ____________________ extension.

.rpm

When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.

False

When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.

False

_______________________________________________________ represents a text description of the user and is typically left blank.

GECOS or GECOS field or General Electric Comprehensive Operating System or General Electric Comprehensive Operating System (GECOS)

When working with Sendmail, you can use the ____ command to test SMTP support.

HELO

____ are the most common hardware component to fail on Linux systems.

Hard disks

Computer names are called ____.

Host names

To send a print job to a printer, you nust first use the ___ command and specify what to print.

Ip

You can restrict who can print to certain by using the ____ command.

Ipadmin

The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.

Kern

The ____ command looks for makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for local hardware architecture.

make

The first DNS server in a zone is called the ____________________ DNS server.

master or primary

The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.

mput filename

Two or more computers that are connected with media that can exchange information are called a(n) ____________________.

network

When working with Sendmail, if you modify the /etc/aliases file, you need to run the ____ command to rebuild the aliases database

newaliases

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the _____ command.

newgrp

You can perform up to____ different incremental backups using the dump/restore utility.

nine

To see what network services are running on your network, you can run the ____ command.

nmap

Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.

nohup

The ____ PostgreSQL command-line utility backs up PostgreSQL database settings.

pg_restore

The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

ping

When using the cpio utility, the ___ option causes a new archive to be created.

-o

The ___ option to the ipstat command causes a list of printers that are enabled to be displayed.

-p

____________________ is used to reduce the size of a file or set of files.

Compression

The ____ SQL statement is used to delete a database.

DROP DATABASE

NTP uses port ____.

UDP 123

When used with the tar utility, the ___ option causes filenames to be stored in an archive using absolute pathnames.

-p

The ____ option for the sar command is used to displays statistics for the processor queue.

-q

You can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents.

-r

The ____ ftp utility command runs a shell on the local computer.

!

Any line that starts with a(n) ___ character is a comment in the /etc/rsyslog.conf file.

#

The ____ option for the sar command is used to display swap statistics.

-B

The______ option, when used with the Gzip Command, causes the compression ratio for files that have been compressed to be listed.

-I

To lock an account, you can use the usermod command with the____ option.

-L

The ____ option to the iptables command can be used to specify the default policy for a certain chain type.

-P

To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.

-V

When used with the uncomress command, the ___ option displays the contents of the compressed file to Standard Output.

-c

The ____ option to the iptables command can be used to specify the destination address of packets for a rule.

-d

The ip command uses the ___ option to specify the destination printer name.

-d

To remove a package from the system, you can use the ___ option to the rpm command.

-e

When used with the uncompressed command, the _____ option can be used to compress symbolic links.

-f

One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

/etc/hosts.equiv

The Skeleton directory on most Linux systems is ______.

/etc/skel

LOg files are typically stored in the _____ directory.

/var/log

The ____ zone configuration file contains a PTR record used to identify the loopback adapter.

/var/named/named.local

In NTP, stratum ____ consists of atomic devices or GPS clocks.

0

The IP addresses___and___ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

0.0.0.0; 255.255.255.255.

The shell restricts the number of file handles that programs can open to ____ by default.

1024

NetBIOS names can be up to ____ characters long.

15

The subnet mask for a Class B IP address is ____.

255.255.0.0

The subnet mask for a Class C IP address is ____.

255.255.255.0

All Linux problems can be divided into ____ categories.

3

The compression algorithm used by the compass utility has an average compression ratio of _____%

40-50

By default, all print jobs have a priority of____.

50

If no level of comression is specified, the gzip command assumes the number____.

6

The average compression ratio for gzip is ______%

60-70

Each octet in an IP address represents a(n)_____ binary number.

8-bit

IPv6 IP addresses are delimited by the ____ character.

:

Most printers are plug and play compatible and must be manually configured when they are plugged into the system.

False

The _____ priority used by the system log daemon indicates an error that should be rectified immediately, such as a corrupt system database.

Alert

Performance problems are caused by hardware, not software.

False

SLIP is a newer technology than PPP

False

On a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.

Cancel

____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet.

DNS

The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.

DirectoryIndex index.html

Almost all hardware problems are the result of damaged hardware.

False

If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the SU command.

False

Client computers can retrieve e-mail from e-mail servers via ____ or ____.

POP; FTP

Most linux distributions today use____ as their package manager.

RPM

When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.

SIGHUP

To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.

Samba

The ___ log file contains information and error messages regarding netork access generated by daemons such as sshd and xinetd.

Secure

____ is a remote administration tool that encrypts information that passes across the network.

Secure Shell (SSH)

____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.

Subnetting

Apache daemon listens for HTTP requests on port ____.

TCP 80

A(n) ____ is a program that can start a network daemon.

TCP wrapper

The most command LAN protocol used today is____.

TCP/IP

The /etc/resolv.conf file can contain up to ____ DNS servers.

Three(3)

A route table is a list of TCP/IP networks that is stored in system memory.

True

All DNS servers contain a DNS cache file

True

Class D addresses are used for multicasting.

True

Passwords used by the PPP daemon are stored in two files:/etc/ppp/pap-secrets and /etc/ppp/chap-secrets.

True

The compress utility preserves the original ownershi, modification, and access time for each file that it compresses.

True

The tar utility cannot back up device files or files with filenames longer than 255 characters

True

The use of NFS is less common than the use of FTP to transfer files on public networks.

True

The very secure FTP Daemin is a stand-alone Daemon.

True

In the PostgreSQL utility, the ____________________ built-in command is used to list available databases.

\l

In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.

authentication

When performance issues arise, you can compare the output of performance utilities to the ____________________ values found in the system log book.

baseline

Some peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ____________________.

bus mastering

To view the contents of a file that was compressed with the bzip2 utility, you must use the ____________________ command.

bzcat

The ____ command can be used in the BASH prompt to obtain a Web page from the Apache server.

curl

The IP address of the network interface on the router to which you send packets is called the ____________________.

default gateway

Viewing the output of the ____________________ command or the contents of the /var/log/boot.log and /var/log/messages log files can isolate most hardware problems.

dmesg

Processes can initiate numerous connections, called ____________________, to files on the filesystem in addition to standard input, standard output, and standard error.

file handles

IPv6 IP addresses are written using eight 16-bit ____ numbers.

hexadecimal

The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

ifconfig

A(n) ____________________ backup backs up only the data that has been changed since the last backup.

incremental

To see a list of all printers on the system and their status, you can use the -t option to the _____ command.

ipstat


Ensembles d'études connexes

MACROECONOMICS CHAPTER 9-13 TOPHAT

View Set

Ch. 40: Fluid, Electrolytes, and Acid-Base Balances

View Set

King Henry VIII and his six wives

View Set

relevancy topic - sixth extinction ( biodiversity)

View Set

Chapter 8: Communication and the Nurse-Patient Relationship

View Set

Algebra: Chapter 4.1-4.4 Quiz Review

View Set