Exam 2
NTP stands for: A. Network Tool Package B. Network Time Protocol C. New Technology Processor D. Nothing To Post
Network Time Protocol
Cisco, Juniper, Ericsson, and Extreme Networks are all vendors that provide: A. Network virtualization solutions. B. Computer GPS systems. C. Infrastructure consulting. D. Infrastructure Rackspace.
Network virtualization solutions
The acronym POP3 stands for: A. Protocol Office Post 3. B. Post Office Protocol 3. C. Postal Origin Process, 3 letter state abbreviation. D. Post Office Processor, third version.
Post Office Protocol 3
_________ is the Raspberry Pis official supported Operating System. A. Windows 10 B. Red Hat Linux C. Raspbian D. Unix System 5
Raspbian
Which of the following is not part of the Raspberry Pi hardware: A. BCM2835 Processor B. Real-time Clock C. USB Connector D. HDMI Connecto
Real-time Clock
POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for: A. User authentication. B. Setting CPU clock speed. C. Receiving e-mail. D. Secure file copy.
Receiving e-mail
The method or process for a server used on a network to resolve client URLs to IP addresses is called ______. Resolving Integrating Implementing Switch-a-roo
Resolving
The acronym SSH stands for: A. Secure shell. B. Secured server home. C. Secure server header. D. Shared server hardware.
Secure shell
The acronym SMTP stands for A. Server Mail Transport Process. B. Several Mails To Process. C. Server Mail Trusted Protocol. D. Simple Mail Transfer Protocol.
Simple Mail Transfer Protocol
Branches from the root directory are called: A. Subusers. B. Subdirectories. C. Hardware devices. D. Return path.
Subdirectories
The up arrow on the keyboard can be used for: A. Change prompts. B. Shutting down the server. C. Toggling through the command history. D. Starting the vi editor.
Toggling through the command history
$ tree /usr/steve/documents/ will do what: A. Tree the directory /documents for user steve B. List all files that match .txt in /documents C. List files that match .doc in /documents D. Change directory to /documents
Tree the directory /documents for user steve
A code compiler is a special software program that takes high-level source code written in some programming language and transforms/converts it into an equivalent binary form (object or machine code), which can then be executed by a computer.
True
A compiler is used to generate an objective code file that is then linked with other objects to create an executable file.
True
A compiler program is used to generate an objective file that is then linked with other objects to create an executable file
True
A software repository is a storage location from which software packages and/or code may be retrieved.
True
An interpreter program is used to execute cod that is not compiled
True
Applications on X11 run in reverse order than a normal client/server environment.
True
As the IT industry changes over time, the system administrator must also be flexible and possess the ability to change with both IT and business.
True
How is the URL for www.blinn.edu resolved publicly to an IP address? Having the IP randomly assigned by a router. B. Using a domain naming server (DNS). C. In the /etc/hostname file. D. Calling the helpdesk and getting the IP address.
Using a domain naming server (DNS)
How could you tell if the SGID bit is set? A. a "s" in the 2nd triad where x usually is B. a "s" in the 1st triad where w usually is C. a "B" in the 2nd triad where w usually is D. a "T" in the 1st triad where x usually is
a "s" in the 2nd triad where x usually is
You use the ___ command to move to a new directory. A. mount B. change C. back D. cd
cd
If I was logged in to the server as user3 and wanted to change back to my home directory, which command would be the best for me to use? A. cd ~user3 B. cd ~/user3 C. cd /export/home/user3 D. ~user3
cd ~user3
You use the ____ command to change a user's full name, phone number, and other contact information. A. chfn B. profile C. useradd D. usermod
chfn
Which command do you use to modify file permissions A. chgrp B. chmod C. chown D. fileperms
chmod
If you had to recursively apply permissions to files in a directory, the best command to invoke would be: A. chmod -R 644 * B. chmod -r 777 * C. chmod -all 644 * D. chmod -R 000 *
chmod -R 644 *
The command to list all of the process IDs is: A. list -a B. down -l C. uptime -a D. ps -ef
ps -ef
Which of the following commands do you use to view the jobs running on the server? A. ls procs B. ps -ef C. lpstat D. queue -a
ps -ef
All of the following commands can be used to manipulate text strings except: A. replace B. grep C. vi D. sed
replace
Which Linux command would list all rpm packages installed? A. rpm -qa B. rpm -i C. rpm -list D. rpm -all
rpm -qa
Which of the following would not be a valid way to see text in a file called foo? A. cat foo | more B. show foo | more C. cat foo D. more foo
show foo | more
Which of the following commands best invokes the superuser? A. su - B. su-env C. su -xx D. setenv su
su -
Which command will create a new user on the server: A. vi username B. add username C. sudo adduser username D. sudo create username
sudo adduser username
The ________ command shows time for system command usage where as the _________ command gives the current date and time information. A. date, system B. system, date C. time, date D. date, time
time date
Which file stores user account information including the account name, user ID, home directory, and shell? A. /etc/passwd B. /usr/userlist C. /usr/userconf D. /etc/shadow
/etc/passwd
Which of the following files would store local system encrypted passwords? A. /etc/authusers B. /etc/krb5.conf C. /etc/shadow D. /etc/password
/etc/shadow
The best place to find the executable files on the system would be in: /usr /opt /var /etc
/usr
Which of the following in an example of an absolute path? A. /usr/local/docs/srv/www B. ~user3/home C. ~mydocs/lab6 D. ../../var/adm/cron
/usr/local/docs/srv/www
Look for log files here: A. /etc B. /usr C. /opt D. /var
/var
Which umask setting would be used to set permissions on a file to user -rw-r--r--: A. 123 B. 022 C. 222 D. 111
022
Which tcp port would be responsible for running ssh? A. 443 B. 80 C. 22 D. 25
22
There are _____ IT lifecycle phases. A. 3 B. 7 C. 9 D. 5
5
To go to the start of a file in vi, you would type: A. :G B. :1 C. :top D. :g
:1
In the vi editor, what escape command sequence will quit and save it? A. :q B. :qwnow C. :wq! D. :savenow
:wq!
The father of Linux is considered by most to be: A. Linus Torvalds B. Steve Jobs C. Steve Ballmer D. Tim Berners-Lee
A. Linus torvalds
The _____________ Unix variant was developed in the _____________ by IBM. A. IRIX, 1980's B. AIX, 1980's C. Linux, 1990's D. Solaris, 1980's
AIX, 1980's
The Raspberry Pi can be used with: A keyboard A mouse A monitor All of the above.
All of the above
Which of the following are X-Window (X11) applications: A. All of the above. B. xclock C. xcalc D. xterm
All of the above
Which of the following are related to high-order programming: A. Compiler. B. Code Interpreter. C. Makefile. D. All of the above.
All of the above
Which of the following is a virtualization solution? A. VMware B. Windows Hyper-V C. Citrix XenServer D. All of the above.
All of the above
The generic term for all types of names and addresses that refer to objects on the World Wide Web is: A. Domain Name Server (DNS). B. Uniform Resource Locator (URL). C. Web Link Locator (WLL). D. Home Link Locator (HLL).
B. Uniform Resource Locator (URL).
A DNS does what: A. Creates FQDNs based on the IP address. B. Creates IP addresses for URLs to use. C. Gives network traffic reports. D. Changes user-friendly domain names into the actual IP address for exchanging data on the internet.
Changes user-friendly domain names into the actual IP address for exchanging data on the internet.
Amazon Web Service (AWS) is a provider of: A. Programming Languages. B. Computer hardware. C. Contracted System Administrators. D. Cloud hosting.
Cloud Hosting
$ sudo adduser jimmy will do what A. Delete the user jimmy on the server B. Creates the user jimmy on the server C. List files in the directory /usr/home/jimmy D. Change to the /usr/home directory for user jimmy
Creates the user jimmy on the server
The SUID bit: A. is shown as 'x' in the file permissions and allows the file to be executed as the file owner. B. is shown as 'r' in the file permissions and allows the file to be executed as the file owner. C. is shown as 't' in the file permissions and allows the file to be executed as the file owner. D. is shown as 's' in the file permissions and allows the file to be executed as the file owner.
D. is shown as 's' in the file permissions and allows the file to be executed as the file owner.
drwxr-xr-x would be best classified with permissions set as: A. 4755 B. 644 C. 1744 D. 755
D. 755
The Raspberry Pi can be used as: A. Web server. B. Mail server. C. DNS server. D. All of the above.
D. All of the above
Being g eneric, ___________ can be applied by an organization for establishing integration with the organization's strategy, delivering value, and maintaining a minimum level of competency A. ITT B. ITS C. WWW D. ITIL
D. ITIL
If I wanted to quickly create a zero byte file, I would use: A. You cannot create a zero byte file in Unix B. makenew filename C. newfile filename D. touch filename
D. Touch filename
Which command is used to initiate an encrypted data transfer? A. sst B. ssl C. None of the above. D. scp
D. scp
A cron entry of * 12 * * * would run: A. Every minute of every day. B. Every minute on the 12th day of the month. C. Every minute of the noon hour of every day. D. Every minute during the midnight hour.
Every minute of the noon hour of every day.
./myscript.sh will do what: A. Do nothing unless your are the root user. B. Create a cron table entry for executing the shell script. C. Execute the shell script provided it has executable permission. D. Set the system time after executing the the shell script.
Execute the shell script provided it has executable permission
Apache and Tomahawk are two commonly used web servers.
False
The following shell script does what: echo "Enter your name:" read NAME echo "Enter your favorite food:" read FOOD echo "$NAME likes to eat $FOOD" A. Asks for name and color then displays it to the screen. B. Asks for name and food then displays it on the screen. C. Asks for name and food then stores it in a text file. D. Asks for name and food then orders it from a restaurant.
B. Asks for name and food then displays it on the screen.
$sudo deluser john will do what A. Create the user john on the server B. Delete the user john from the server C. List files in the directory /usr/home/john D. Change to the /usr/home directory for user john
B. Delete the user john from the server
The _ _ _ _ _ _ _ _ _ _ _ _ _ command shows who, when, where, and IP of users in the system. A. nslookup B. finger C. dump D. netconfig -u
B. finger
An absolute path can contain which of the following characters: A. * B. ~ C. .. D. .
B. ~
_____________ and ____________ are web server applications commonly used together for handling embedded web page scripting. A. Two web servers cannot work together on the same hardware. B. Google, Yahoo C. Apache, Tomcat D. VMware, Hyper-V
C. Apache, Tomcat
Which command would redirect the directory listing output of user1's home directory into a file called user1out. txt in the tmp directory? A. ls -ltr ~user1/ < ./tmp/user1out.txt B. ls -ltr ~/ > /tmp/user1out.txt C. ls -al ~user1/ > /tmp/user1out.txt D. ls -al ~user1/ > ../tmp/user1out.txt
C. ls -al ~user1/ > /tmp/user1out.txt
__________ focuses on aligning IT services with the needs of business. A. ITA B. ITS C. ITSM D. ITTS
C. ITSM
One of your users, much to your frustration, created a file accidently with a special character in it and you wanted to remove the file. What other special character will you have to use in your remove command to get rid of A. ] B. ? C. \ D. >
C. \
You would most definitely find the SGID bit set on directories that contain: A. public or log files B. personal files C. executable files D. root files
C. executable files
Which of the following in an example of a relative path? A. /var/adm/cron B. /opt/bin C. ~user3/home D. /usr/local/docs/srv/www
C. ~user3/home
Virtualization allows for more physical hardware to increase system performance at a lower cost
False
Virtualization, in the IT environment, can only be done with software and hardware.
False
X-Windows is Microsoft graphical user interface (GUI) for remote access.
False
You must indicate a command interpreter at the start of a shell script.
False
Which of the following provides accurate time setting for a server? A. DNS B. SYSTIME C. UPDATE D. NTP
NTP
NOOBS stands for: A. New out of the box software B. Nothing operates out of the box simply C. No output operating basic software D. Nuclear oscillating and operating basic system
New out of the box software
A complete email system consists of a _ _ _ _ _ _ _ _ _ server and a __ _ _ _ _ _ _ _ server to handle both incoming and outgoing data. A. POP3, SMTP B. DNS, router C. input, output D. Sendmail, Receivemail
POP3,SMTP
How can I tell if the SGID had been set: A. The group execute bit is 's' B. The group execute bit is 'g' C. The file permission is 777 D. The user execute bit is 's'
The group execute bit is 's'
Telnet should be used for: A. As a replacement for ssh. B. To verify that ports are active and can be reached. C. For secure transmitting of passwords. D. For secure connections to remote systems
To verify that ports are active and can be reached
C++ and Java are both programming languages that require a compiler
True
C++ is a high-level programming language that requires a compiler to convert the source code into a binary executable file that can run on the server
True
C++ is also considered a middle-order programming language because it can support both low-level assembly and high-level functions or objects
True
Data center virtualization can also be considered as a cloud infrastructure
True
HTML, PHP, and JSP are all types of web page laguages
True
Hacker ethics are concerned primarily with sharing, openness, collaboration, and engaging in the hands-on imperative.
True
ITSM lifecycle stages are Service Strategy, Service Design, Service Transition, Service Operations, and Continued Service Improvement.
True
Java programming uses compiled classes to make up the executable used in website applications and requires that the client have either the Java Runtime Environment (JRE) or Java Virtual Machine (JVM) packages installed on the client machine.
True
Port 80 is the standard HTTP port for Apache
True
Port 8080 is the standard HTTP port for Tomcat.
True
Postfix, Citadel, and Dovecot are all mail server applications.
True
Software (such as operating systems), hardware (such as data filer), networking(such as switches), and data centers can all be virtualized.
True
Storage virtualization is the process of poling physical storage from multiple network storage devices so that it looks like a single storage device
True
Technological change brings the role of the system administrator, IT, and business together in a new technology or methodology.
True
The "Computer Hacker Attitude" is that access to computers-and anything that might teach you something about the way the world works-should be unlimited and total
True
The "cloud" as referred in IT, is an example of virtualization.
True
The ITIL framework is designed to standardize the selection, planning, deliver, and support of IT services to a busines.
True
The Tomcat webserver allows the use of java servlet and JSP code to be embedded into the HTML code.
True
The Unix commands gcc and javac are considered code compiler commands.
True
The command perl and ruby are considered code interpreter comands.
True
The most common web server used on Unix systems is apache
True
The sudo command allows regular users to run a program with the privileges of another user, usually root.
True
The workers.properties file contains parameters that can be set to allow Apache to pass HTTP data to Tomcat.
True
VMware, Hyper-V, and XenApps are all types of software and/or operating system virtualization.
True
Xclock, Xcalc, and Xterm are all X11 applications
True
Which of the following commands could be used to see a UNIX system's routing table? A. ipconfig B. enroute -p C. ifconfig -a D. netstat -rn
netstat -rn
In most cases, you log onto Linux using a(n) ________ user account and then use a command to operate termporarily as a(n) ________ account, when necessary. A. end, top B. administrative, normal C. local, super D. normal, administrative
normal, administrative
Which command do you use to create a new user account? a. provuser b. createuser c. newuser d. useradd
d. useradd
The acronym HTML stands for: A. Hyper text markup language. B. Hyper text media linkage. C. High text media level. D. High transfer media link.
hyper text markup language
Piping uses the ____________ of one command as ______ for the second command A. redirect, output B. output, redirect C. output, input D. input, output
output, input
What command can be used to perform a search and replace on a file or text stream? A. sed B. cat C. tail -f file >> $string D. rep string -s
sed
A _________ is essentially a pointer or reference to an actual file a.hard link b.directory c.copy d.soft link
soft link
If I wanted to change the Message Of The Day (motd) file, which command would be the best for me to use: A. sudo vi /etc/motd B. sudo vi /usr/etc/motd C. vi /var/opt/motd D. nano /opt/motd
sudo vi/etc/motd
This is used to add to the available amount of RAM in a system: A. runlevel B. swap C. boot sector D. BIOS
swap
-rwsr-xr-x means that: A. the SUID bit is set. B. this is a file in a web server content directory. C. the SGID bit is set. D. the file is in the /tmp directory.
the SUID bit is set
What other special character is used to chain commands and redirect the output of one command into another: >> < ~ |
|
Very bad things can happen when you: A. rm -rf * B. cat a binary file C. leave yourself logged in D. all of the above.
all of the above
Which init level will drop a machine into single user mode? A. init 0 B. init 1 C. init 7 D. init 6
init 1
Which of the following are valid ways to interactively switch a running system to runlevel 3? A. restart 3 B. chrunlevel 3 C. init 3 D. runlevel 3
init 3
The best way to terminate a misbehaving process running on your system: A. init 0 B. kill C. nice D. shutdown -r now
kill
Look for log files here: A. /opt/var B. /etc/lib C. /usr/home D. /var/log
/var/log
$ more logfile.txt >> logfile1.txt will do what: A. Do nothing, this is not a valid command B. Copy the data from logfile.txt into logfile1.txt and then remove the file C. Overwrite the file called logfile1.txt D. Append the data from logfile.txt into logfile1.txt
Append the data from logfile.txt into logfile1.txt
To terminate a zombie process: A. Delete the user that is running the zombie process B. Find the PID and then use the kill command C. Contact your system administrator...WAIT, you are the system administrator! D. Find the PID and use the rm command on executable files that could be causing the zombie process
Find the PID and then use the kill command
Starting a new subshell to execute a process is known as: A. Splitting B. Subbing C. Forking D. Stemming
Forking
What is the numeric equivalent to the permissions rwx, which you might grant to a user, group, or other entity? A. 1 B. 7 C. 4 D. 2
7
To get to the start of the file in vi, you would type: A. :top B. :1:0 C. :start D. :0
:0
The IT lifecycle phases are: A. The Plan and Strategy Phase, The Design and Deliver Phase, The Implement and Operate Phase, The Manage and Customer Service Phase, The Decommission Phase B. Set by each company as needed. C. The Administrative Phase, The Technical Phase, The Operational Phase, The Management Phase and The Customer Service Phase D. The Plan Phase, The Design Phase, The Deliver Phase, The Operations Phase, The Retirement Phase
A. The Plan and Strategy Phase, The Design and Deliver Phase, The Implement and Operate Phase, The Manage and Customer Service Phase, The Decommission Phase
$ cd /user/ted/games will do what: A. Change to the /games directory for user ted B. Tree the directory /games C. List files in the directory /games D. Change directory to /user/tom/games
A. Change to the /games directory for user ted
The most recent shell to be developed by the UNIX community is A. zsh B. tcsh C. bash D. sh
A. zsh
Which of the following commands are considered to be navigational type within the Unix file system: A. cd B. pwd C. ls D. All of the above.
All of the above
Which of the following companies use Unix servers: A. Texas A&M University B. Google C. Amazon D. All of the above
All of the above
Which of the following is a higher-order programming language? A. C++ B. All of the above. C. Python D. Ruby
All of the above
$ tail -100 /var/log/temp.log will do what: A. Tree the first 100 files in the directory /var/log B. Display the last 100 lines of the file temp.log C. Create 100 files called temp.log in the /var/log directory D. Read the first 100 lines of the file temp.log
Display the last 100 lines of the file temp.log
Civilization is a process of interaction and integration among the people, companies, and governments of different nations, a process driven by international trade and investment and aided by information technology
False
Data encryption/decryption in a secured connection is achieved by requiring a private lock and public key.
False
Perl and Ruby are both programming languages that require a compiler.
False
Python is considered a low order programming language that is used for doing batch jobs.
False
SSH stands for secure system hypertext and allows for unsecure remote access to a UNIX server
False
The Apache webserver does not support secure data transporting
False
The belief that information-sharing must be secure at all costs, and that access to computing resources should be limited whenever possible is known as a "Computer Hacker Moral".
False
The globalization of business will not affect the IT role of a system administrator in the future.
False
The port that you should use to connect ssh via putty is 27
False
The scp command stands for standard copy procedure and is used for quick, unsecure file coping on a UNIX server
False
The switch user (su) command allows a user to run a program with the privileges of another user, usually root.
False
X-Windows(X11) is useful for: A. Graphically presenting an application to a remote user in a Unix server-client configuration. B. A remote desktop alternative running on tcp/3389 C. Upgrading the Windows operating system. D. Allowing the UNIX operating system to run on remote machines.
Graphically presenting an application to a remote user in a Unix server-client configuration.
_________ is designed to standardize the selection, planning, delivery and support of IT services to a business. A. WWW B. ITIL C. HTML D. Technological Change
ITIl
What does ITIL stand for? A. Information Technology Incident Lifecycle B. Infrastructure Technology Incident Library C. Information Technology Infrastructure Library D. Informative Technology Innovation Level
Information Technology Infrastructure Library
The acronym ITSM stands for: A. Information Technological Society Management B. Instructional Technology Services Marketing C. Information Technology Service Management D. Inovative Technology System Management
Information Technology Service Management
apt is used for: A. Shutting down the server. B. Reloading the network paramters. C. Installing new software packages. D. Increasing operating system clock speed.
Installing new software packages
You want to determine how long your computer has been running so you enter upt and press the _______ key to get BASH to finish the command for you. A. TAB B. SHIFT C. CTRL D. ALT
TAB
The Raspberry Pi was developed for teaching and learning in what country: A. United Kingdom B. France C. Germany D. United States
United Kingdom
If I wanted to create a cron table entry to do a specific task, I would do: A. crontab -start B. crontab -open C. crontab -e D. crontab -task
crontab -e
The ______ command will create an entry in the cron table A. makecron -e B. crontab -e C. cronnew -e D. cronedit -e
crontab -e
What command is used to display a list of directories the shell will search in to find a command that has been entered? A. echo $MYPATH B. echo $PATH C. echo $HOME D. echo $DIR
echo $PATH
To toggle back and forth between modes in vi, you use the ________ key. A. up arrow B. F2 C. esc D. tab
esc
You would most definitely find the SGID bit set on directories that contain: A. public or log files B. personal files C. executable files D. root files
executable files
All of the following are examples of RPMs except: A. getapp B. yum C. apt D. GNU
getapp
What is the command to print a list of previous commands to the screen: A. time B. history C. date D. who
history