linux Ch 10-13

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What FTP command runs a shell on the local computer?

!

Which file stores the Apache configuration in Fedora 13?

/etc/httpd/conf/httpd.conf

What directory are you placed in when you log in as the anonymous user to a Fedora 13 FTP server?

/var/ftp

What is the name of the file that contains a listing of all users on the system and their home directories?

/etc/passwd

Which dump level indicates a full backup?

0

Which SQL statement key word can be used to delete a record within a table?

DELETE

In which of the following zones might a system administrator put the web server hosting the company's publicly accessible website?

DMZ

What is the name used to describe a user providing a user name and password to log in to a system?

authentication

Which command would be used to activate the NIC aliased as eth0?

ifup eth0

What command looks for a Makefile and uses the information within it to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?

make

The daemons associated with network services listen for network traffic associated with a particular _____.

port

Which of the following represents the first nonrewinding SCSI tape device on a system?

/dev/nst0

Which of the following is a valid APIPA address?

169.254.38.101 Correct. The 169.254.0.0 through 169.254.255.255 range of IP addresses has been designated for use by the Automatic Private IP Address (APIPA) method of assigning IP addresses when a DHCP server is unavailable and an address has not been statically assigned.

Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server?

23/tcp open telnet

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?

DNS

What are two means available to resolve a host name to the appropriate TCP/IP address? (Choose two answers.)

DNS /etc/hosts

Which of the following SQL statements can be used to delete a table from a database?

DROP TABLE table_name;

Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?

Restart the DHCP daemon.

Which command can be used at a BASH command prompt to obtain a Web page?

curl

You want to determine whether your Linux workstation was able to get assigned an IP address from the DHCP server once you connected it to the network. Which of the following legacy commands might help you determine this?

ifconfig eth0

To test DNS configuration by resolving a host name to IP address, which command or commands can you use? (Choose all that apply.)

nslookup hostname dig hostname host hostname

You can clear a log file simply by redirecting nothing in to it. (True or False?)

True

Which of the following commands can be used to trace an IPv6 route? (Choose two.)

traceroute6 tracepath6

Most log files on the system are found in which directory?

/var/log

You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. (True or False?)

True

The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up?

ifup eth0

Which command can be used to synchronize your computer with an NTP time source?

ntpq

Which of the following does the -r option for the gpg command specify?

Encrypt for the user id given.

Which networking service allows you to share files to other computers on the network?

NFS

Which of the following is the full path and file name where the Debian Package Manager repositories can be configured?

/etc/apt/sources.list

Which of the following files does the hostnamectl command modify to set the hostname on a machine?

/etc/hostname

Which of the following files does a TCP wrapper check before starting a network daemon?

/etc/hosts.allow /etc/hosts.deny

Which of the following ports should you disable so that they no longer respond to network requests on a Linux system due to a lack of encryption? (Choose all that apply.)

21 23

Which of the following port numbers is associated with telnet?

23

Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory?

Kerberos

What DNS resource record type is used to provide the IP address for the e-mail server for a zone?

MX

Which of the following types of DNS records need to be configured to facilitate email delivery?

MX

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)

ifconfig ping netstat -i

Which of the following is the log file where Dandified YUM writes its log entries?

dnf.rpm.log

When compiling source code into a binary program, which command does the compiling using the GNU C Compiler?

make

After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem?

make install

When compiling source code into a binary program, which command copies compiled binary files to the correct location on the filesystem?

make install

Which of the following commands creates an archive?

tar -zcvf /dev/fd0 *

Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.)

udevadm control --reaload udevadm control -R

Which of the following is the first field of the /etc/passwd file?

username

Which of the following are stand-alone daemons? (Choose all that apply.)

Apache (httpd) DNS (named)

Which of the following options for the iptables command will delete all rules for all chains?

-F

What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?

-P

When using the compress command to archive a set of files into a single file, which of the following options will display the compression ratio of the individual files making up the new compressed file?

-v

Which of the following entries could be added to the rsyslog.conf configuration file to have all syslog messages displayed to console 10?

. /dev/tty10

When compiling source code into a binary program, which command performs a system check and creates the Makefile?

./configure

Files that have been compressed using the compress utility typically have the ______ extension

.Z

Which of the following file extensions are used by the Debian Package Manager?

.deb

Which filename extension indicates a tarball?

.tar.gz

Which of the following is not a valid compression file extension for the Linux operating system?

.vz

Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed?

/27

The System Log Daemon, rsyslogd, creates a socket for other system processes to write to. What is the path to this socket?

/dev/log

On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination?

/etc/inittab

Which of the following files contains the list of shared libraries?

/etc/ld.so.cache

Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?

/etc/login.defs

If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login?

/etc/nologin.txt

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

Which file stores the TCP/IP addresses of the DNS servers used to resolve host names?

/etc/resolv.conf

Which of the following files contain the path and filename where DNS servers should be configured?

/etc/resolv.conf

In which file can you configure rules for logging on a Linux system?

/etc/rsyslog.conf

What is the complete path and filename of the file where ports and their associated protocols are defined?

/etc/services

Which of the following files stores information about failed logins on a Linux system?

/var/log/btmp

What zone configuration file contains a PTR record used to identify the loopback adapter?

/var/named/named.local

The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of?

48

Which of the following ports would be used to resolve a domain name to an IP address?

53

If no level of compression is specified, the gzip command assumes what compression level?

6

Which DNS resource record is an alias to other records?

CNAME

What must you do in order to become a DNS server? (Choose all that apply.)

Create zone files. Run the name daemon (named).

Which of the following must you perform to share a directory using NFS? (Choose all that apply.)

Edit the /etc/exports file. Run the exportfs -a command. Start or restart the NFS daemons.

Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry. (True or False?)

False

NFS can be used to share files natively with computers running the Microsoft Windows operating system. (True or False?)

False

NIS clients use NIS records to access their configuration information. (True or False?)

False

Standalone daemons are started on demand using the Internet Super Daemon (xinetd). (True or False?)

False

Stratum 1 NTP servers do not obtain time information from other NTP servers. (True or False?)

False

The Debian Package Manager (DPM) is the default package manager used by Fedora 13. (True or False?)

False

The bzip2 and gzip utilities use similar compression algorithms. (True or False?)

False

To install a new program from RPM software repositories on the Internet, you can use the yum update programname command. (True or False?)

False

UIDs and GIDs are unique to the system and once used can never be reused. (True or False?)

False

Which of the following statements should be used at the end of a SQL statement where an aggregate function such as SUM or COUNT is used?

GROUP BY

When working with Sendmail, what command can be used to test SMTP support?

HELO

You have opened a telnet session on port 25 with your email server. What command can you type within your telnet session to start an email session? (Choose all that apply.)

HELO EHLO

Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables?

INNER JOIN

Which of the following is a valid SQL statement for adding a new row of data to a SQL database table?

INSERT INTO users (firstname, lastname) values ('George', 'Washington');

What is the most common method for obtaining Linux software?

Internet Download

Which of the following is a protocol originally developed by Cisco that uses TCP to handle authentication, authorization, and accounting services?

TACACS+

What is the most commonly used LAN protocol?

TCP/IP

Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.)

The CREATE DATABASE statement within the PostgreSQL utility.

A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address. (True or False?)

True

DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. (True or False?)

True

Most source code is available on the Internet in tarball format. (True or False?)

True

Postfix is an email server daemon that is easier to configure compared to the Sendmail email daemon. (True or False?)

True

You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of?

UDP

Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN?

VPN

Which of the following can be used to graphically remotely administer a Linux machine?

VNC

Which of the following are graphical remote administration technologies? (Choose all that apply.)

X Windows VNC

Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system?

YUM

Which of the following package managers are used to install RPM packages on the SUSE or openSUSE distributions by default?

Zypper

Which type of CM software can connect to inventory members via SSH to perform configuration management activities?

agentless

Which of the following commands can be used to install the latest versions of all packages currently installed on the system from the sources configured in sources.list?

apt upgrade

Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system?

apt-get upgrade

Which of the following commands can you use to search available repository information? (Choose two.)

aptapt-cache

If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter?

brctl

You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue?

cancel Printer1-17 Printer1-21

Which of the following will display the contents of the /etc/shadow file? (Choose all that apply.)

cat /etc/shadow getent /etc/shadow

Which of the following will show account aging information for a user such as the date of the last password change, when the password expires, and the number of days of warning before the password expires?

chage -l jsmith

Which of the following commands will change the SELinux security context of a file?

chcon

Which of the following is used on modern Linux distributions that reads YAML configuration files to add apps, modify existing configuration settings, or perform administrative tasks at boot time?

cloud-init

Which of the following commands can be used to back up files in case of system failure, supports long filenames, and can also back up device files?

cpio

Which of the following commands extracts an archive?

cpio -vicdu -I /dev/fd0

What is the background process responsible for printing on Fedora Linux?

cupsd

Which of the following commands can be used to pause a printer named Printer1?

cupsdisable Printer1

Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them?

declarative configuration

Before a computer can use a router, what configuration information must it be provided?

default gateway

Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.)

delgroup groupdel

Emily accidentally created a new user account on the wrong server. Which of the following commands could she use to delete the account she created? (Choose all that apply.)

deluser userdel

Which of the following commands can be used to modify configuration options for DPM packages after they have been installed?

dpkg-reconfigure

Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed?

dpkg.log

Which option to the rpm command can be used to remove a package from the system?

e

Which of the following commands can be used to view the quota for a user?

edquota -u jsmith

Which of the following commands will display detailed information for network hardware?

ethtool

When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information.

facility, priority

Which of the following commands can you use to list users who have been locked out by pam_faillock.so?

faillock

Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address?

files

Which of the following will display entries from the Name Service Switch libraries?

getent

You run the command hostname server1 and issue the reboot command. You notice that the host name has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead?

hostnamectl set-hostname server1

What command can be used to view and modify the date and time within the BIOS?

hwclock

Which of the following commands can you use to view events within the journald database?

journalctl

Which of the following log files contains information and error messages generated by the Linux kernel?

kern.log

When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in ___________ in the ~/.ssh/ directory.

known_hosts

Which command within the command-line FTP utility can be used to change the current directory on the local computer?

lcd

Which of the following commands will list missing libraries as not found if a necessary library is not installed?

ldd

What is the name of the utility used to rotate log files?

logrotate

The TCP/IP address of 127.0.0.1 is also referred to as the _____.

loopback address

Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)

lp -d Printer1 file lp file

Which of the following commands can be used to set the default printer for all users on a Linux system where printer1 is the name of the printer?

lpoptions -d printer1

Which of the following commands will display the print jobs in the print queue for printer1 only?

lpstat -o printer1

Which of the following commands can be used to display any email messages awaiting delivery alongside the reason that they were not delivered?

mailq

What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer and allows the use of wildcard metacharacters to specify the filename?

mput filename

Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.)

nameserver 10.1.1.4 domain comptia.org

Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.)

netstat -u netstat --udp

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database?

newaliases

Which command can be used to alter the primary group associated with a given user temporarily?

newgrp

What PostgreSQL command-line utility backs up PostgreSQL database settings?

pg_dump

Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection?

ping

Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel?

ping -c 4 server1

Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)

route ip

What devices are used to transfer information from one network to another?

routers

Which of the following commands will install an RPM package while ignoring any other packages that it may be dependent upon for proper operation?

rpm -ivh --nodeps package.rpm

Which of the following commands can be used to list detailed information about a package such as its installation date and license?

rpm -qi packagename

Which of the following commands can be used to list the files contained within an installed RPM package?

rpm -ql packagename

Which of the following hashing algorithm commands reduces the chances of collisions due to the bit length of the message digest?

sha256sum

Which command can be used to connect to a remote Windows share called data on the server called fileserver?

smbclient //fileserver/data

Which of the following commands can be used to display socket information out to the terminal screen?

ss

Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password?

su

Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account?

sudo

Which of the following two commands can be used to add custom log file entries to the journald database? (Choose two.)

systemd-cat logger

Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen?

tar -czvf

Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?

testparm

If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance?

testwr

When a printer is disabled, ________.

the print queue does accept jobs into the print queue and holds them there until the printer is enabled again

When a printer is rejecting requests,____________.

the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

Which of the following commands can be used to delete a user account?

userdel

Which of the following can be used at the command line to download a file using the HTTP protocol? (Choose two.)

wget, curl

Which of the following is a special group that provides its members with the ability to run the su and sudo commands?

wheel

What command can be used to display the contents of a file that was compressed with the compress utility?

zcat

The SUSE and openSUSE Linux distributions use an alternative to yum but that provides the same functionality. What is the name of the command they use?

zypper

Which file contains full and incremental back-up information for use with the dump/restore utility?

/etc/dumpdates

In which of the following directories can you place files that will be copied to new user directories when new users are created?

/etc/skel

Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command?

/etc/sudoers

Which file would you modify to change the TCP/IP address of the first wired NIC on the system the next time the system is booted or the card is brought up?

/etc/sysconfig/network-scripts/ifcfg-eth0

What is the path to where the journald.conf file is located?

/etc/systemd/journald.conf

Where is the default document root directory for the Apache Web server?

/var/www/html

The -9 option to the gzip utility results in a higher compression ratio. (True or False?)

True

On a system running NetworkManager, which of the following commands can be used to view or modify connection information?

nmcli

The process of sending print jobs from the print queue to the printer is called?

printing

Which of the following commands will install a package using the Red Hat Package Manager, showing all information, while printing pound signs to show the progress of installation?

rpm -ivh packagename.rpm

Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface?

tshark

Which command is used to delete a user account?

userdel username

Which command can you use to lock a user account?

usermod -L username

Which command would you use to unlock a user account?

usermod -U username

Which of the following commands can be used to set the number of days until user account jsmith with an expired password is disabled?

usermod -f 15 jsmith

Which of the following utilities will allow you to view information about virtual memory usage on a Linux system?

vmstat

Which of the following options can be used with the usermod command to change the description of the user account that is stored in the GECOS field?

-c

You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible?

/etc/nsswitch.conf

SSH encrypts all traffic that passes across the network, whereas telnet and rlogin do not. (True or False?)

True

The line that configures the host name for the computer at boot time can be found in /etc/sysconfig/network. (True or False?)

True

The lines within the Apache configuration file that modify the functionality of the Apache are called directives. (True or False?)

True

You have created a full backup and four incremental backups. In which order must you restore these backups?

0, 1, 2, 3, 4

Which of the following RPM options will update a software package to the newest version, or install the package if it does not already exist on a system?

-U

You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it can not be delivered. What should you do?

Run the newaliases command.


Ensembles d'études connexes

Gram positive and Gram negative bacteria

View Set

Unit 2 python example quiz that helps he get a 100

View Set

Micro Final (Exercises, Tests and Quizzes)

View Set

2nd half: section 9 Loan Qualification & Financing in. WA

View Set

Chapter 5: Understanding Metrics

View Set

Chapter 16 Therapeutic Relationships intro to OT

View Set

Insurance Property and Casualty test ver

View Set

Chapter 15 & 16 Physical, Cognitive, Developmental, and Emotion Psych of Middle Adulthood

View Set

Chapter 3: Classification and Diagnosis

View Set