Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

NTP stands for: A. Network Tool Package B. Network Time Protocol C. New Technology Processor D. Nothing To Post

Network Time Protocol

Cisco, Juniper, Ericsson, and Extreme Networks are all vendors that provide: A. Network virtualization solutions. B. Computer GPS systems. C. Infrastructure consulting. D. Infrastructure Rackspace.

Network virtualization solutions

The acronym POP3 stands for: A. Protocol Office Post 3. B. Post Office Protocol 3. C. Postal Origin Process, 3 letter state abbreviation. D. Post Office Processor, third version.

Post Office Protocol 3

_________ is the Raspberry Pis official supported Operating System. A. Windows 10 B. Red Hat Linux C. Raspbian D. Unix System 5

Raspbian

Which of the following is not part of the Raspberry Pi hardware: A. BCM2835 Processor B. Real-time Clock C. USB Connector D. HDMI Connecto

Real-time Clock

POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for: A. User authentication. B. Setting CPU clock speed. C. Receiving e-mail. D. Secure file copy.

Receiving e-mail

The method or process for a server used on a network to resolve client URLs to IP addresses is called ______. Resolving Integrating Implementing Switch-a-roo

Resolving

The acronym SSH stands for: A. Secure shell. B. Secured server home. C. Secure server header. D. Shared server hardware.

Secure shell

The acronym SMTP stands for A. Server Mail Transport Process. B. Several Mails To Process. C. Server Mail Trusted Protocol. D. Simple Mail Transfer Protocol.

Simple Mail Transfer Protocol

Branches from the root directory are called: A. Subusers. B. Subdirectories. C. Hardware devices. D. Return path.

Subdirectories

The up arrow on the keyboard can be used for: A. Change prompts. B. Shutting down the server. C. Toggling through the command history. D. Starting the vi editor.

Toggling through the command history

$ tree /usr/steve/documents/ will do what: A. Tree the directory /documents for user steve B. List all files that match .txt in /documents C. List files that match .doc in /documents D. Change directory to /documents

Tree the directory /documents for user steve

A code compiler is a special software program that takes high-level source code written in some programming language and transforms/converts it into an equivalent binary form (object or machine code), which can then be executed by a computer.

True

A compiler is used to generate an objective code file that is then linked with other objects to create an executable file.

True

A compiler program is used to generate an objective file that is then linked with other objects to create an executable file

True

A software repository is a storage location from which software packages and/or code may be retrieved.

True

An interpreter program is used to execute cod that is not compiled

True

Applications on X11 run in reverse order than a normal client/server environment.

True

As the IT industry changes over time, the system administrator must also be flexible and possess the ability to change with both IT and business.

True

How is the URL for www.blinn.edu resolved publicly to an IP address? Having the IP randomly assigned by a router. B. Using a domain naming server (DNS). C. In the /etc/hostname file. D. Calling the helpdesk and getting the IP address.

Using a domain naming server (DNS)

How could you tell if the SGID bit is set? A. a "s" in the 2nd triad where x usually is B. a "s" in the 1st triad where w usually is C. a "B" in the 2nd triad where w usually is D. a "T" in the 1st triad where x usually is

a "s" in the 2nd triad where x usually is

You use the ___ command to move to a new directory. A. mount B. change C. back D. cd

cd

If I was logged in to the server as user3 and wanted to change back to my home directory, which command would be the best for me to use? A. cd ~user3 B. cd ~/user3 C. cd /export/home/user3 D. ~user3

cd ~user3

You use the ____ command to change a user's full name, phone number, and other contact information. A. chfn B. profile C. useradd D. usermod

chfn

Which command do you use to modify file permissions A. chgrp B. chmod C. chown D. fileperms

chmod

If you had to recursively apply permissions to files in a directory, the best command to invoke would be: A. chmod -R 644 * B. chmod -r 777 * C. chmod -all 644 * D. chmod -R 000 *

chmod -R 644 *

The command to list all of the process IDs is: A. list -a B. down -l C. uptime -a D. ps -ef

ps -ef

Which of the following commands do you use to view the jobs running on the server? A. ls procs B. ps -ef C. lpstat D. queue -a

ps -ef

All of the following commands can be used to manipulate text strings except: A. replace B. grep C. vi D. sed

replace

Which Linux command would list all rpm packages installed? A. rpm -qa B. rpm -i C. rpm -list D. rpm -all

rpm -qa

Which of the following would not be a valid way to see text in a file called foo? A. cat foo | more B. show foo | more C. cat foo D. more foo

show foo | more

Which of the following commands best invokes the superuser? A. su - B. su-env C. su -xx D. setenv su

su -

Which command will create a new user on the server: A. vi username B. add username C. sudo adduser username D. sudo create username

sudo adduser username

The ________ command shows time for system command usage where as the _________ command gives the current date and time information. A. date, system B. system, date C. time, date D. date, time

time date

Which file stores user account information including the account name, user ID, home directory, and shell? A. /etc/passwd B. /usr/userlist C. /usr/userconf D. /etc/shadow

/etc/passwd

Which of the following files would store local system encrypted passwords? A. /etc/authusers B. /etc/krb5.conf C. /etc/shadow D. /etc/password

/etc/shadow

The best place to find the executable files on the system would be in: /usr /opt /var /etc

/usr

Which of the following in an example of an absolute path? A. /usr/local/docs/srv/www B. ~user3/home C. ~mydocs/lab6 D. ../../var/adm/cron

/usr/local/docs/srv/www

Look for log files here: A. /etc B. /usr C. /opt D. /var

/var

Which umask setting would be used to set permissions on a file to user -rw-r--r--: A. 123 B. 022 C. 222 D. 111

022

Which tcp port would be responsible for running ssh? A. 443 B. 80 C. 22 D. 25

22

There are _____ IT lifecycle phases. A. 3 B. 7 C. 9 D. 5

5

To go to the start of a file in vi, you would type: A. :G B. :1 C. :top D. :g

:1

In the vi editor, what escape command sequence will quit and save it? A. :q B. :qwnow C. :wq! D. :savenow

:wq!

The father of Linux is considered by most to be: A. Linus Torvalds B. Steve Jobs C. Steve Ballmer D. Tim Berners-Lee

A. Linus torvalds

The _____________ Unix variant was developed in the _____________ by IBM. A. IRIX, 1980's B. AIX, 1980's C. Linux, 1990's D. Solaris, 1980's

AIX, 1980's

The Raspberry Pi can be used with: A keyboard A mouse A monitor All of the above.

All of the above

Which of the following are X-Window (X11) applications: A. All of the above. B. xclock C. xcalc D. xterm

All of the above

Which of the following are related to high-order programming: A. Compiler. B. Code Interpreter. C. Makefile. D. All of the above.

All of the above

Which of the following is a virtualization solution? A. VMware B. Windows Hyper-V C. Citrix XenServer D. All of the above.

All of the above

The generic term for all types of names and addresses that refer to objects on the World Wide Web is: A. Domain Name Server (DNS). B. Uniform Resource Locator (URL). C. Web Link Locator (WLL). D. Home Link Locator (HLL).

B. Uniform Resource Locator (URL).

A DNS does what: A. Creates FQDNs based on the IP address. B. Creates IP addresses for URLs to use. C. Gives network traffic reports. D. Changes user-friendly domain names into the actual IP address for exchanging data on the internet.

Changes user-friendly domain names into the actual IP address for exchanging data on the internet.

Amazon Web Service (AWS) is a provider of: A. Programming Languages. B. Computer hardware. C. Contracted System Administrators. D. Cloud hosting.

Cloud Hosting

$ sudo adduser jimmy will do what A. Delete the user jimmy on the server B. Creates the user jimmy on the server C. List files in the directory /usr/home/jimmy D. Change to the /usr/home directory for user jimmy

Creates the user jimmy on the server

The SUID bit: A. is shown as 'x' in the file permissions and allows the file to be executed as the file owner. B. is shown as 'r' in the file permissions and allows the file to be executed as the file owner. C. is shown as 't' in the file permissions and allows the file to be executed as the file owner. D. is shown as 's' in the file permissions and allows the file to be executed as the file owner.

D. is shown as 's' in the file permissions and allows the file to be executed as the file owner.

drwxr-xr-x would be best classified with permissions set as: A. 4755 B. 644 C. 1744 D. 755

D. 755

The Raspberry Pi can be used as: A. Web server. B. Mail server. C. DNS server. D. All of the above.

D. All of the above

Being g eneric, ___________ can be applied by an organization for establishing integration with the organization's strategy, delivering value, and maintaining a minimum level of competency A. ITT B. ITS C. WWW D. ITIL

D. ITIL

If I wanted to quickly create a zero byte file, I would use: A. You cannot create a zero byte file in Unix B. makenew filename C. newfile filename D. touch filename

D. Touch filename

Which command is used to initiate an encrypted data transfer? A. sst B. ssl C. None of the above. D. scp

D. scp

A cron entry of * 12 * * * would run: A. Every minute of every day. B. Every minute on the 12th day of the month. C. Every minute of the noon hour of every day. D. Every minute during the midnight hour.

Every minute of the noon hour of every day.

./myscript.sh will do what: A. Do nothing unless your are the root user. B. Create a cron table entry for executing the shell script. C. Execute the shell script provided it has executable permission. D. Set the system time after executing the the shell script.

Execute the shell script provided it has executable permission

Apache and Tomahawk are two commonly used web servers.

False

The following shell script does what: echo "Enter your name:" read NAME echo "Enter your favorite food:" read FOOD echo "$NAME likes to eat $FOOD" A. Asks for name and color then displays it to the screen. B. Asks for name and food then displays it on the screen. C. Asks for name and food then stores it in a text file. D. Asks for name and food then orders it from a restaurant.

B. Asks for name and food then displays it on the screen.

$sudo deluser john will do what A. Create the user john on the server B. Delete the user john from the server C. List files in the directory /usr/home/john D. Change to the /usr/home directory for user john

B. Delete the user john from the server

The _ _ _ _ _ _ _ _ _ _ _ _ _ command shows who, when, where, and IP of users in the system. A. nslookup B. finger C. dump D. netconfig -u

B. finger

An absolute path can contain which of the following characters: A. * B. ~ C. .. D. .

B. ~

_____________ and ____________ are web server applications commonly used together for handling embedded web page scripting. A. Two web servers cannot work together on the same hardware. B. Google, Yahoo C. Apache, Tomcat D. VMware, Hyper-V

C. Apache, Tomcat

Which command would redirect the directory listing output of user1's home directory into a file called user1out. txt in the tmp directory? A. ls -ltr ~user1/ < ./tmp/user1out.txt B. ls -ltr ~/ > /tmp/user1out.txt C. ls -al ~user1/ > /tmp/user1out.txt D. ls -al ~user1/ > ../tmp/user1out.txt

C. ls -al ~user1/ > /tmp/user1out.txt

__________ focuses on aligning IT services with the needs of business. A. ITA B. ITS C. ITSM D. ITTS

C. ITSM

One of your users, much to your frustration, created a file accidently with a special character in it and you wanted to remove the file. What other special character will you have to use in your remove command to get rid of A. ] B. ? C. \ D. >

C. \

You would most definitely find the SGID bit set on directories that contain: A. public or log files B. personal files C. executable files D. root files

C. executable files

Which of the following in an example of a relative path? A. /var/adm/cron B. /opt/bin C. ~user3/home D. /usr/local/docs/srv/www

C. ~user3/home

Virtualization allows for more physical hardware to increase system performance at a lower cost

False

Virtualization, in the IT environment, can only be done with software and hardware.

False

X-Windows is Microsoft graphical user interface (GUI) for remote access.

False

You must indicate a command interpreter at the start of a shell script.

False

Which of the following provides accurate time setting for a server? A. DNS B. SYSTIME C. UPDATE D. NTP

NTP

NOOBS stands for: A. New out of the box software B. Nothing operates out of the box simply C. No output operating basic software D. Nuclear oscillating and operating basic system

New out of the box software

A complete email system consists of a _ _ _ _ _ _ _ _ _ server and a __ _ _ _ _ _ _ _ server to handle both incoming and outgoing data. A. POP3, SMTP B. DNS, router C. input, output D. Sendmail, Receivemail

POP3,SMTP

How can I tell if the SGID had been set: A. The group execute bit is 's' B. The group execute bit is 'g' C. The file permission is 777 D. The user execute bit is 's'

The group execute bit is 's'

Telnet should be used for: A. As a replacement for ssh. B. To verify that ports are active and can be reached. C. For secure transmitting of passwords. D. For secure connections to remote systems

To verify that ports are active and can be reached

C++ and Java are both programming languages that require a compiler

True

C++ is a high-level programming language that requires a compiler to convert the source code into a binary executable file that can run on the server

True

C++ is also considered a middle-order programming language because it can support both low-level assembly and high-level functions or objects

True

Data center virtualization can also be considered as a cloud infrastructure

True

HTML, PHP, and JSP are all types of web page laguages

True

Hacker ethics are concerned primarily with sharing, openness, collaboration, and engaging in the hands-on imperative.

True

ITSM lifecycle stages are Service Strategy, Service Design, Service Transition, Service Operations, and Continued Service Improvement.

True

Java programming uses compiled classes to make up the executable used in website applications and requires that the client have either the Java Runtime Environment (JRE) or Java Virtual Machine (JVM) packages installed on the client machine.

True

Port 80 is the standard HTTP port for Apache

True

Port 8080 is the standard HTTP port for Tomcat.

True

Postfix, Citadel, and Dovecot are all mail server applications.

True

Software (such as operating systems), hardware (such as data filer), networking(such as switches), and data centers can all be virtualized.

True

Storage virtualization is the process of poling physical storage from multiple network storage devices so that it looks like a single storage device

True

Technological change brings the role of the system administrator, IT, and business together in a new technology or methodology.

True

The "Computer Hacker Attitude" is that access to computers-and anything that might teach you something about the way the world works-should be unlimited and total

True

The "cloud" as referred in IT, is an example of virtualization.

True

The ITIL framework is designed to standardize the selection, planning, deliver, and support of IT services to a busines.

True

The Tomcat webserver allows the use of java servlet and JSP code to be embedded into the HTML code.

True

The Unix commands gcc and javac are considered code compiler commands.

True

The command perl and ruby are considered code interpreter comands.

True

The most common web server used on Unix systems is apache

True

The sudo command allows regular users to run a program with the privileges of another user, usually root.

True

The workers.properties file contains parameters that can be set to allow Apache to pass HTTP data to Tomcat.

True

VMware, Hyper-V, and XenApps are all types of software and/or operating system virtualization.

True

Xclock, Xcalc, and Xterm are all X11 applications

True

Which of the following commands could be used to see a UNIX system's routing table? A. ipconfig B. enroute -p C. ifconfig -a D. netstat -rn

netstat -rn

In most cases, you log onto Linux using a(n) ________ user account and then use a command to operate termporarily as a(n) ________ account, when necessary. A. end, top B. administrative, normal C. local, super D. normal, administrative

normal, administrative

Which command do you use to create a new user account? a. provuser b. createuser c. newuser d. useradd

d. useradd

The acronym HTML stands for: A. Hyper text markup language. B. Hyper text media linkage. C. High text media level. D. High transfer media link.

hyper text markup language

Piping uses the ____________ of one command as ______ for the second command A. redirect, output B. output, redirect C. output, input D. input, output

output, input

What command can be used to perform a search and replace on a file or text stream? A. sed B. cat C. tail -f file >> $string D. rep string -s

sed

A _________ is essentially a pointer or reference to an actual file a.hard link b.directory c.copy d.soft link

soft link

If I wanted to change the Message Of The Day (motd) file, which command would be the best for me to use: A. sudo vi /etc/motd B. sudo vi /usr/etc/motd C. vi /var/opt/motd D. nano /opt/motd

sudo vi/etc/motd

This is used to add to the available amount of RAM in a system: A. runlevel B. swap C. boot sector D. BIOS

swap

-rwsr-xr-x means that: A. the SUID bit is set. B. this is a file in a web server content directory. C. the SGID bit is set. D. the file is in the /tmp directory.

the SUID bit is set

What other special character is used to chain commands and redirect the output of one command into another: >> < ~ |

|

Very bad things can happen when you: A. rm -rf * B. cat a binary file C. leave yourself logged in D. all of the above.

all of the above

Which init level will drop a machine into single user mode? A. init 0 B. init 1 C. init 7 D. init 6

init 1

Which of the following are valid ways to interactively switch a running system to runlevel 3? A. restart 3 B. chrunlevel 3 C. init 3 D. runlevel 3

init 3

The best way to terminate a misbehaving process running on your system: A. init 0 B. kill C. nice D. shutdown -r now

kill

Look for log files here: A. /opt/var B. /etc/lib C. /usr/home D. /var/log

/var/log

$ more logfile.txt >> logfile1.txt will do what: A. Do nothing, this is not a valid command B. Copy the data from logfile.txt into logfile1.txt and then remove the file C. Overwrite the file called logfile1.txt D. Append the data from logfile.txt into logfile1.txt

Append the data from logfile.txt into logfile1.txt

To terminate a zombie process: A. Delete the user that is running the zombie process B. Find the PID and then use the kill command C. Contact your system administrator...WAIT, you are the system administrator! D. Find the PID and use the rm command on executable files that could be causing the zombie process

Find the PID and then use the kill command

Starting a new subshell to execute a process is known as: A. Splitting B. Subbing C. Forking D. Stemming

Forking

What is the numeric equivalent to the permissions rwx, which you might grant to a user, group, or other entity? A. 1 B. 7 C. 4 D. 2

7

To get to the start of the file in vi, you would type: A. :top B. :1:0 C. :start D. :0

:0

The IT lifecycle phases are: A. The Plan and Strategy Phase, The Design and Deliver Phase, The Implement and Operate Phase, The Manage and Customer Service Phase, The Decommission Phase B. Set by each company as needed. C. The Administrative Phase, The Technical Phase, The Operational Phase, The Management Phase and The Customer Service Phase D. The Plan Phase, The Design Phase, The Deliver Phase, The Operations Phase, The Retirement Phase

A. The Plan and Strategy Phase, The Design and Deliver Phase, The Implement and Operate Phase, The Manage and Customer Service Phase, The Decommission Phase

$ cd /user/ted/games will do what: A. Change to the /games directory for user ted B. Tree the directory /games C. List files in the directory /games D. Change directory to /user/tom/games

A. Change to the /games directory for user ted

The most recent shell to be developed by the UNIX community is A. zsh B. tcsh C. bash D. sh

A. zsh

Which of the following commands are considered to be navigational type within the Unix file system: A. cd B. pwd C. ls D. All of the above.

All of the above

Which of the following companies use Unix servers: A. Texas A&M University B. Google C. Amazon D. All of the above

All of the above

Which of the following is a higher-order programming language? A. C++ B. All of the above. C. Python D. Ruby

All of the above

$ tail -100 /var/log/temp.log will do what: A. Tree the first 100 files in the directory /var/log B. Display the last 100 lines of the file temp.log C. Create 100 files called temp.log in the /var/log directory D. Read the first 100 lines of the file temp.log

Display the last 100 lines of the file temp.log

Civilization is a process of interaction and integration among the people, companies, and governments of different nations, a process driven by international trade and investment and aided by information technology

False

Data encryption/decryption in a secured connection is achieved by requiring a private lock and public key.

False

Perl and Ruby are both programming languages that require a compiler.

False

Python is considered a low order programming language that is used for doing batch jobs.

False

SSH stands for secure system hypertext and allows for unsecure remote access to a UNIX server

False

The Apache webserver does not support secure data transporting

False

The belief that information-sharing must be secure at all costs, and that access to computing resources should be limited whenever possible is known as a "Computer Hacker Moral".

False

The globalization of business will not affect the IT role of a system administrator in the future.

False

The port that you should use to connect ssh via putty is 27

False

The scp command stands for standard copy procedure and is used for quick, unsecure file coping on a UNIX server

False

The switch user (su) command allows a user to run a program with the privileges of another user, usually root.

False

X-Windows(X11) is useful for: A. Graphically presenting an application to a remote user in a Unix server-client configuration. B. A remote desktop alternative running on tcp/3389 C. Upgrading the Windows operating system. D. Allowing the UNIX operating system to run on remote machines.

Graphically presenting an application to a remote user in a Unix server-client configuration.

_________ is designed to standardize the selection, planning, delivery and support of IT services to a business. A. WWW B. ITIL C. HTML D. Technological Change

ITIl

What does ITIL stand for? A. Information Technology Incident Lifecycle B. Infrastructure Technology Incident Library C. Information Technology Infrastructure Library D. Informative Technology Innovation Level

Information Technology Infrastructure Library

The acronym ITSM stands for: A. Information Technological Society Management B. Instructional Technology Services Marketing C. Information Technology Service Management D. Inovative Technology System Management

Information Technology Service Management

apt is used for: A. Shutting down the server. B. Reloading the network paramters. C. Installing new software packages. D. Increasing operating system clock speed.

Installing new software packages

You want to determine how long your computer has been running so you enter upt and press the _______ key to get BASH to finish the command for you. A. TAB B. SHIFT C. CTRL D. ALT

TAB

The Raspberry Pi was developed for teaching and learning in what country: A. United Kingdom B. France C. Germany D. United States

United Kingdom

If I wanted to create a cron table entry to do a specific task, I would do: A. crontab -start B. crontab -open C. crontab -e D. crontab -task

crontab -e

The ______ command will create an entry in the cron table A. makecron -e B. crontab -e C. cronnew -e D. cronedit -e

crontab -e

What command is used to display a list of directories the shell will search in to find a command that has been entered? A. echo $MYPATH B. echo $PATH C. echo $HOME D. echo $DIR

echo $PATH

To toggle back and forth between modes in vi, you use the ________ key. A. up arrow B. F2 C. esc D. tab

esc

You would most definitely find the SGID bit set on directories that contain: A. public or log files B. personal files C. executable files D. root files

executable files

All of the following are examples of RPMs except: A. getapp B. yum C. apt D. GNU

getapp

What is the command to print a list of previous commands to the screen: A. time B. history C. date D. who

history


Ensembles d'études connexes

SPA3 (15.2 Part #2 with haber [Test #4])

View Set

Chapter 7. Management and Leadership

View Set

Chapter 27: Children and Adolescences

View Set

PA Driver's manual Chapter 3: Learning to Drive and Safety (Part 1)

View Set

Chapter 25: Care of patients with skin problems

View Set

10. Salt marshes and mangrove forests

View Set

Exam I, Manske Chapter 1-4, 15 and Kisner Chapter 1-5 (ROM, Stretching, Joint Mobs)

View Set

Inverse Trigonometry- sin, cos, tangent

View Set