Linux, Chapter 7-13 Final Review
Ch7- True/False: Because Standard Error and Standard Ouput represent the results of a command and Standard Input represents the input required for a command, only Standard Error and Standard Ouput can be redirected to/from a file.
False
Ch13- Which SQL statement key word can be used to delete a record within a table? Select one: a. REMOVE b. CLEAR c. DELETE d. DROP
DELETE
CH8- Which of the following statements is true? Select one: a. The boot loader points to the active partition. b. Either the MBR/GPT or the active partition can contain the boot loader. c. The boot loader points to the MBR/GPT. d. Both the MBR/GPT and the active partition point to the boot loader.
Either the MBR/GPT or the active partition can contain the boot loader.
Ch7- Before a user-defined variable can be used by processes that run in subshells, that variable must be __________. Select one: a. exported b. validated by running the env command c. redirected to the BASH shell d. imported
Exported
Ch10- True/False: Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry.
False
Ch11- True/False: The bzip2and gziputilities use similar compression algorithms.
False
Ch11- True/False: To install a new program from RPM software repositories on the Internet, you can use the yum update programname command.
False
Ch12- True/False: Standalone daemons are started on demand using inetd or xinetd.
False
Ch13- True/False: NFS can be used to share files natively with computers running the Microsoft Windows operating system.
False
Ch10- What is the name used to describe a user providing a user name and password to log in to a system? Select one: a. authorization b. validation c. authentication d. login
authentication
Ch7- Which of the following will display the message welcome home if the cd /home/user1 command is successfully executed? Select one: a. echo "welcome home" && cd /home/user1 b. cd /home/user1 && echo "welcome home" c. cd /home/user1 || cat "welcome home" d. cat "welcome home" || cd /home/user1
cd /home/user1 && echo "welcome home"
Ch8- Which of the following commands can be used to start a UNIX SysV daemon called lala in runlevels 1, 2 and 3? Select one: a. update-rc.d lala defaults b. systemctl enable lala 123 c. service enable lala 123 d. chkconfig --level 123 lala on
chkconfig --level 123 lala on
Ch9- What command is used to view and modify user jobs scheduled to run with cron? Select one: a. sched b. cron c. crontab d. ps
crontab
Ch9- What is the name given to a process not associated with a terminal? Select one: a. daemon process b. child process c. user process d. parent process
daemon process
Ch12- Before a computer can use a router, what configuration information must it be provided? Select one: a. routing table b. subnet mask c. default gateway d. default router
default gateway
Ch11- Which option to the rpm command can be used to remove a package from the system? Select one: a. U b. u c. r d. e
e
Ch7- The current value for the HOME variable is displayed by which of the following commands? (Choose all that apply.) Select one or more: a. echo $HOME b. echo HOME= c. echo ~ d. echo ls HOME
echo $HOME echo ~
Ch10- When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information. Select one: a. facility, priority b. process, degree c. service, precedents d. section, priority
facility, priority
Ch7- Every if construct begins with if and must be terminated with? Select one: a. endif b. stop c. end d. fi
fi
Ch9- The term used to describe a process spawning or initiating another process is referred to as_____. Select one: a. branching b. forking c. a child process d. parenting
forking
Ch8- The first daemon loaded on a Linux system is _____. Select one: a. initstate b. inittab c. init d. linux
init
Ch12- Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.) Select one or more: a. traceroute b. ip c. ipconfig d. route
ip route
Ch9- A runaway process that is faulty and consuming mass amounts of system resources ________. Select one: a. has a PPID of Z b. is a rogue process c. is a zombie process d. is an orphaned process
is a rogue process
Ch9- Which command can be used to see processes running in the background? Select one: a. jobs b. fg c. bg d. ps -%
jobs
Ch13- Which command within the command-line FTP utility can be used to change the current directory on the local computer? Select one: a. cd b. get c. lcd d. dir
lcd
Ch12- The TCP/IP address of 127.0.0.1 is also referred to as the _____. Select one: a. loopback address b. local host c. lookup address d. local address
loopback address
Ch10- Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.) Select one or more: a. lp -d Printer1 file b. lp Printer1 file c. lp file d. lp -m Printer1 file
lp -d Printer1 file lp file
Ch7- Which of the following operators reverses the meaning of a test statement? Select one: a. -a b. #! c. ! d. -o
!
Ch8- Which of the following indicates the second partition on the third hard disk drive to GRUB? Select one: a. (hd2,3) b. (hd2,1) c. (hd3,2) d. (hd4,3)
(hd2,1)
Ch9- Nice values are used to affect process priorities using a range between _____________. Select one: a. 0 and -19 b. -19 and 20 c. 0 and 20 d. -20 and 19
-20 and 19
Ch11- When compiling source code into a binary program, which command performs a system check and creates the Makefile? Select one: a. make install b. ./configure c. tar d. make
./configure
Ch11- Which filename extension indicates a tarball? Select one: a. .dump b. .tar.gz c. .gz d. .tar
.tar.gz
Ch11- Which file contains full and incremental back-up information for use with the dump/restore utility? Select one: a. /etc/dumpfile b. /etc/dumpdates c. /etc/dumps d. /etc/dump.conf
/etc/dumpdates
Ch12- What are two means available to resolve a host name to the appropriate TCP/IP address? (Choose two answers.) Select one or more: a. /etc/resolve.conf b. /etc/hosts c. DHCP d. DNS
/etc/hosts DNS
Ch13- Which file stores the Apache configuration in Fedora? Select one: a. /etc/httpd.conf b. /etc/apache2/httpd.conf c. /etc/apache2.conf d. /etc/httpd/conf/httpd.conf
/etc/httpd/conf/httpd.conf
Ch10- What is the name of the file that contains a listing of all users on the system and their home directories? Select one: a. /etc/passwd b. /etc/password c. /etc/shadow d. /etc/users
/etc/passwd
Ch7- Which of the following files is always executed immediately after any user logs in to a Linux system and receives a BASH shell? Select one: a. ~/.profile b. ~/.bash_login c. ~/.bash_profile d. /etc/profile
/etc/profile
Ch12- Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC? Select one: a. /etc/resolv.conf b. /etc/host.conf c. /etc/resolve d. /etc/hosts
/etc/resolv.conf
Ch12- Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system? Select one: a. /etc/sysconfig/network-scripts/ipcfg-eth1 b. /etc/sysconfig/network-scripts/ifcfg-eth1 c. /etc/sysconfig/network-scripts/ifcfg-eth0 d. /etc/sysconfig/network-scripts/ipcfg-eth0
/etc/sysconfig/network-scripts/ifcfg-eth0
Ch10- Most log files on the system are found in which directory? Select one: a. /etc/logfiles b. /dev/log c. /var/log d. /etc/log
/var/log
Ch11- Which dump level indicates a full backup? Select one: a. 0 b. 9 c. 1 d. f
0
Ch8- Which runlevel halts the system? Select one: a. 6 b. 0 c. 1 d. 5
0
Ch11- You have created a full backup and four incremental backups. In which order must you restore these backups? Select one: a. 1,2,3,4,0 b. 0.4.3.2.1 c. 0,1,2,3,4 d. 4,3,2,1,0
0,1,2,3,4
Ch7- Which of the following file descriptor numbers represents stdout? Select one: a. 2 b. 3 c. 1 d. 0
1
Ch7- How do you indicate a comment line in a shell script? Select one: a. Begin the line with #!. b. There are no comment lines in a shell script. c. Begin the line with ! d. Begin the line with #
Begin the line with #
Ch13- Which DNS resource record is an alias to other records? Select one: a. NS b. CNAME c. AAAA d. A
CNAME
Ch13- What must you do in order to become a DNS server? (Choose all that apply.) Select one or more: a. Create zone files. b. Run the name daemon (named). c. Create NIS maps. d. Create resource records for DNS lookups.
Create zone files. Run the name daemon (named).
Ch13- You have opened a telnet session on port 25 on your email server. What command can you type within your telnet session to start an email session? (Choose all that apply.) Select one or more: a. HELO b. EHLO c. START d. WAZUP
HELO EHLO
Ch9- Which of the following statements is true? (Choose all that apply.) Select one or more: a. If /etc/cron.allow exists, only users listed in it can use the cron command. b. If /etc/at.allow exists, only users listed in it can use the at command. c. If a user is listed in both /etc/cron.allow and /etc/cron.deny, then /etc/cron.deny takes precedence and the user cannot access the crontab command. d. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command.
If /etc/cron.allow exists, only users listed in it can use the cron command. If /etc/at.allow exists, only users listed in it can use the at command. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command.
Ch7- What does >> accomplish when entered on the command line after a command? Select one: a. It does not accomplish anything b. It redirects Standard Error and Standard Input to the same location c. It appends Standard Ouput to a file d. It redirects both Standard Error and Standard Ouput to the same location
It appends Standard Ouput to a file
Ch8- Which of the following statements is true? Select one: a. The GRUB2 boot loader is often used on legacy Linux systems. b. The GRUB boot loader is stored in the /usr/grub directory. c. LILO needs to be reinstalled after it has been modified. d. GRUB needs to be reinstalled after it has been modified.
LILO needs to be reinstalled after it has been modified.
Ch7- What is wrong with the following command string ls /etc/hosts >listofhostfile? Select one: a. The ls command is one of the commands that cannot be used with redirection; you must use | to pipe instead b. Nothing is wrong with the command c. The file descriptor was not declared; unless 1 for Standard Ouput or 2 for Standard Error is indicated, the command will fail d. The file listofhostfile will always only contain Standard Error as a file descriptor was not declared
Nothing is wrong with the command
Ch12- Which Windows program is often used to connect to a Linux server via SSH? Select one: a. Putty b. Rdesktop c. SSHD d. mstsc
Putty
Ch13- Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do? Select one: a. Run the dhcpconf command to edit the configuration file. b. Log in as the root user and reedit the configuration file. c. Restart the DHCP daemon. d. Restart the xinetd daemon.
Restart the DHCP daemon.
Ch13- You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it can not be delivered. What should you do? Select one: a. Restart the Postfix daemon. b. Add the line to the /etc/aliases.db file instead. c. Run the newaliases command. d. Log out of the system and then log back into the system and resend the email.
Run the newaliases command.
Ch10- True/False: You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd.
True
Ch10- True/false: You can clear a log file simply by redirecting nothing in to it.
True
Ch11- True/False: Most source code is available on the Internet in tarball format.
True
Ch11- True/False: The -9 option to the gziputility results in a higher compression ratio.
True
Ch12- SSH encrypts all traffic that passes across the network, whereas telnet does not.
True
Ch12- True/False: A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address.
True
Ch13- True/False: Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon.
True
Ch13- True/False: DHCP clients send a DHCPREQUEST packet when they require a new IP configuration.
True
Ch7- True/False: The alias command can be used to make a shortcut to a single command.
True
Ch7- What would be the effect of using the alias command to make an alias for the date command named cat in honor of your favorite pet? Select one: a. It cannot be done as there already is an environment variable cat associated with the cat command. b. It cannot be done as there already is a command cat on the system. c. There is no effect until the alias is imported as it is a user-declared variable. d. When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead.
When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead.
Ch-8 Which two implementations of X Windows are commonly used in Linux? (Choose two answers.) Select one or more: a. XFce b. X.org c. Xconfigurator d. XFree86
X.org XFree86
Ch7- You have redirected Standard Error to a file called Errors. You view the contents of this file afterward and notice that there are six error messages. After repeating the procedure, you notice that there are only two error messages in this file. Why? Select one: a. After you open the file and view the contents, the contents are lost b. You did not append the Standard Error to the Errorfile and as a result, it was overwritten when the command was run a second time c. The system generated different Standard Ouput d. You must specify a new file each and every time you redirect as the system creates the specified file by default
You did not append the Standard Error to the Errorfile and as a result, it was overwritten when the command was run a second time
Ch9- The killall command terminates _________. Select one: a. all instances of a process with the same PPID b. all instances of a process with the same PID c. all instances of a process with the same name d. all instances of a process with the same priority
all instances of a process with the same name
Ch12- To test DNS configuration by resolving a host name to IP address, which command or commands can you use? (Choose all that apply.) Select one or more: a. nslookup hostname b. dig hostname c. host hostname d. resolve hostname
nslookup hostname dig hostname host hostname
Ch9- Every process has a process ID and a_______. Select one: a. daemon b. fork process c. parent process ID d. child process
parent process ID
Ch12- The daemons associated with network services listen for network traffic associated with a particular _____. Select one: a. station b. TCP/IP address c. allocation number d. port
port
Ch10- The process of sending print jobs from the print queue to the printer is called? Select one: a. redirecting b. printing c. spooling d. queueing
printing
Ch9- Which command entered without arguments is used to display a list of processes running in the current shell? Select one: a. ps b. list c. pid d. ppid
ps
Ch7- Which construct can be used in a shell script to read Standard Input and place it in a variable Select one: a. sum b. verify c. test d. read
read
Ch9- Which of the following commands will most likely increase the chance of a process receiving more time slices? Select one: a. renice 19 b. renice 15 c. renice -12 d. renice 0
renice -12
Ch12- What devices are used to transfer information from one network to another? Select one: a. DNS servers b. routers c. DHCP servers d. LANs
routers
Ch9- The at command is used to _______________. Select one: a. schedule processes to run at a single instance in the future b. schedule processes to run periodically on a recurring basis in the future c. schedule processes to run periodically in the background d. schedule processes to run in the foreground
schedule processes to run at a single instance in the future
Ch8- What keyword can be specified within a boot loader to force the system to boot to Single User Mode? Select one: a. init b. single c. rescue d. telinit
single
Ch13- Which command can be used to connect to a remote Windows share called data on the server called fileserver? Select one: a. smbclient -L //fileserver/data b. smbclient -L fileserver:data c. smbclient \\fileserver\data d. smbclient //fileserver/data
smbclient //fileserver/data
Ch8- Which command can be used to start X Windows, the window manager, and the default desktop environment? Select one: a. stargui b. startgdm c. startx d. gstart
startx
Ch8- Which of the following Systemd commands can be used to stop a daemon called lala? Select one: a. service stop lala b. systemctl stop lala.service c. chkconfig stop lala d. stop lala
systemctl stop lala.service
Ch11- Which of the following commands creates an archive? Select one: a. tar -tvf /dev/st0 b. tar -cvf /dev/st0 c. tar -xvf /dev/st0 d. tar -zcvf /dev/st0
tar -zcvf /dev/st0
Ch10- When a printer is disabled, ________. Select one: a. the print queue redirects all print jobs sent to it to /dev/null b. the printer appears as off-line when a lp request is sent c. the print queue does accept jobs into the print queue and holds them there until the printer is enabled again d. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable
the print queue does accept jobs into the print queue and holds them there until the printer is enabled again
Ch9- Which command is used to gain real-time information about processes running on the system with the most processor-intensive processes listed at the beginning of the list? Select one: a. top -l b. ps -elf c. top d. ps
top
Ch9- True/False: As daemon processes are not associated with terminals, you must use the -e switch with the ps command to view them.
true
Ch10- Which command is used to delete a user account? Select one: a. usermod -d username b. rm username c. userdel username d. del username
userdel username
Ch10- Which command can you use to lock a user account? Select one: a. useradd -L username b. lock username c. usermod -L username d. secure username
usermod -L username
Ch8- Which command can be used to fine-tune the vsync and hsync of a video card for use in X Windows? Select one: a. vhtune b. vidtune c. synctune d. xvidtune
xvidtune
Ch11- Which of the following commands can be used to search for packages that contain the word oobla on RPM software repositories? Select one: a. rpm -qS oobla b. yum search oobla c. rpm -ql oobla d. yum list oobla
yum search oobla