Linux Chapters 7-12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel? a. image= b. default= c. install= d. root=

A

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate? a. xvidtune b. xvideotune c. xtune d. vidtune

A

What character, when appended to a command, causes the command to be run in the background? a. & b. $ c. # d. %

A

What option can be added to the rpm command in order to query packages?​ a. ​-q b. ​-v c. ​-h d. ​-i

A

What option can be added to the userdel command to remove the home directory of the target user? a. -r b. -d c. -R d. -x

A

When viewing the output of the ps ax​ command, what does a < symbol in the STAT column indicate for a process? ​a. The process is high priority. ​b. The process is exiting. ​c. The process is accepting redirected input from a terminal. ​d. The process is currently active on the processor.

A

Where are the log files for the Samba daemon located?​ a. ​/var/log/samba b. ​/var/run/samba/log c. ​/var/log/access.log d. ​/var/log/Samba/log

A

What two files below are the first two BASH environment files to be executed?​ Multiple Answer ​a. /etc/profile ​b. /etc/bashrc ​c. ˜/.bashrc d. ​˜/.bash_profile

A and B

What two window managers is the Compiz Fusion window manager based upon?​ Multiple Answer ​a. compiz ​b. sawfish c. ​fvwm d. beryl​

A and D

Detail shell scripts and explain how they are used and executed.

A shell script is meant to be run by the UNIX shell. These commands can be written in different types of scripting languages. These scripts can be used to start programs, manipulate files, and printing out text. Scripts can be executed from the command-line in UNIX.

How many DNS servers can be configured in the /etc/resolv.conf file? a. two b. three c. four d. five

B

Select the escape sequence that is used for a form feed: \n b. \f /f /n

B

​The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below? a. 780​ ​b. 631 ​c. 4586 ​d. 8080

B

In an if construct, what statements are optional?​ Multiple Answer ​a. fi ​b. elif ​c. else ​d. then

B and C

The dump/restore utility is limited to a maximum of how many different incremental backups? a. seven b. eight c. nine d. ten

C

The environment variables that are set by default and their current values can be viewed with what command? a. env b. get c. set d. setenv

C

What is the default print job priority for all print jobs created by the lp command? a. -50 b. 0 c. 50 d. 100

C

What is the most commonly used LAN protocol? a. DLC b. UDP/IP c. TCP/IP d. IPX/SPX

C

What tool below was designed as a secure remote access utility that encrypts information that passes across the network? a. Virtual Network Computing (VNC) b. Telnet c. Secure Shell (SSH) d. rlogin

C

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd? a. wtmp b. messages c. dmesg d. secure

D

What number indicates the lowest kernel priority (PRI) of a process possible?​ ​a. -20 ​b. 0 ​c. 20 d. ​127

D

What option can be added to the netstat command in order to display network statistics?​ a. ​-s b. ​-p c. ​-a d. ​-i

D

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons? a. -f b. -l c. -a d. -e

D

What option, when added to the crontab command, opens the vi editor with a user's cron table? a. -u b. -c c. -f d. -e

D

Zombie processes are also known as defunct processes.​ True or False

False

A(n) ____________________ refers to a program that is running in memory and on the CPU.

Process

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False

True

Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond True or False

True

Most daemon scripts accept the arguments start, stop, and restart. True or False

True

The ____________ command can be used to start X Windows and the default window manager or desktop environment.​

startx

The amount of time a process has to use the CPU is called a(n) ____________________.

time slice

Which command should be used to restrict access to printers? a. lpadmin b. lpa c. lpr d. admin

A

​RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as? a. package dependency b. branching package​ c. family package d. recursing package

A

Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded:​ Multiple Answer ​a. append= ​b. map= ​c. initrd= d. ​boot=

A and D

​What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively? Multiple Answer ​a. PWD ​b. CWD ​c. PATH d. ​SHELL

A and D

Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed: a. -r b. -l c. -f d. -c

B

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent? a. 30-40 b. 40-50 c. 50-60 d. 60-70

B

What character is used to delimit most Linux configuration files? a. tab b. colon c. space d. semicolon

B

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?​ a. psbranch ​b. pstree ​c. psparent ​d. pshead

B

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol? a.* b. + c. - d. /

B

If no level of compression is specified, the gzip command assumes what compression level? a. 4 b. 5 c. 6 d. 7

C

Most Linux distributions make use of what package manager? a. PRM b. MPR c. RPM d. RMP

C

Select the option that can be used with the lpstat command to display a list of printers that are enabled: a. -o b. -a c. -p d. -e

C

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file? a. # b. < c. > d. |

C

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH? a. ˜/.bash_profile b. ˜/.bash_login c. /etc/profile d. ˜/.profile

C

What is the default target on a system with a GUI installed?​ ​a. multi-user.target ​b. single-user.target ​c. graphical.target d. ​gui.target

C

​What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use? ​a. system.conf ​b. local.setup ​c. login.defs ​d. user.defs

C

​What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is? Multiple Answers ​a. -s ​b. -h ​c. -d ​d. -k

C and D

Select below the configuration file that is used to configure the BIND / DNS server:​ a. ​/etc/dns.conf b. ​/etc/bind.conf c. ​/etc/resolv.conf d. ​/etc/named.conf

D

Select the command that can be used to send a small TCP/IP packet to another IP address and await a response: a. png b. ipquery c. ring d. ping

D

The ____________________ environment variable contains a list of directories to search for executable programs.

PATH

When a computer first initializes, the system BIOS performs a(n) ____________________.

POST

In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.

authentication

In a process referred to as ____________________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.

forking

A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.

runlevel

Most commands that are run by the shell are run in a separate ____________________, which is created by the current shell.

subshell

The _________________ file often contains a single uncommented line that configures the default runlevel for a system.​

/etc/inittab

On Linux, the root user always has a UID of what number?​ ​a. 0 ​b. 1 ​c. 23 ​d. 500

A

What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces? a. ifconfig b. ipconf c. ipconfig d. ifconf

A

What command can be used to display the contents of a file that was compressed with the compress utility? a. zcat b. ccat c. cat d. acat

A

What stage of the GRUB boot loader typically resides on the MBR / GPT? a. Stage1 b. Stage1.5 c. Stage2 d. Stage2.5

A

The K desktop environment utilizes what window manager and toolkit below?​ Multiple Answer ​a. kwin ​b. mutter ​c. Qt toolkit ​d. GTK+ toolkit

A and C

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwdconv b. pwconv c. passwd d. pwdcv

B

Each octet in an IP address represents a binary number consisting of how many bits / bytes? a. 4-bit b. 8-bit c. 4-byte d. 8-byte

B

In Linux, what runlevel is also known as the multiuser mode? a. 1 b. 2 c. 3 d. 4

B

In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?​ a. ​iproute.ipv4 b. ​net.ipv4.ip_forward c. ​ipv4.routing d. net.routing.enable​

B

On Linux systems that use the traditional ​UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in? a. systemctl​ ​b. chkconfig ​c. autoservice ​d. run-daemon

B

Processes are started with what nice value by default? a. -20 b. 0 c. 1 d. 19

B

Select the metacharacter that can be used to send the standard output of one command to another command as standard input: a. < b. | c. > d. #

B

Under what directory is the Linux kernel stored? a. / b. /boot c. /root d. /krnl

B

What can be used on a Linux system to trace the lineage of each child process?​ ​a. process ID b. ​parent process ID ​c. execution order ID ​d. process fork ID

B

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script? ​a. @! ​b. #! ​c. // ​d. ->

B

What device file below indicates the first ATAPI IDE tape device (nonrewinding)?​ a. ​/dev/st0 b. ​/dev/nht0 c. ​/dev/nst0 d. ​/dev/ht0

B

What file controls the default runlevel when using Systemd?​ ​a. /etc/inittab ​b. /etc/systemd/system/default.target ​c. /etc/systemd/inittab.target d. ​/etc/systemd.conf

B

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?​ Multiple Answers ​a. secure ​b. wtmp ​c. lastlog ​d. xferlog

B and C

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?​ Multiple Answers a. SIGHUP​ ​b. SIGINT ​c. 1 ​d. 2

B and D

After a background process has been started, what command below can be used to move it to the foreground? a. b2f b. fgd c. fg d. fgnd

C

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​ ​a. grub2-install ​b. grub-config ​c. grub-mkconfig d. ​grub-compile

C

An RPM package can be converted to a cpio archive using what command? a. ​conv_arch b. ​rpmconv c. ​rpm2cpio d. ​cpioconv

C

Select the test statement that can be used to determine if A is numerically greater than B: a. [ A -g B ] b. [ A -ge B ] c. [ A -gt B ] d. [ A +eq B ]

C

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?​ a. 827 ​b. 1012 ​c. 514 ​d. 23

C

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below? a.sed b. grep c. awk d. nl

C

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable? a. ls $PWD b. echo #PWD c. echo $PS1 d. ls #PS1

C

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. newgroup b. groupmod c. newgrp d. groupadd

C

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?​ ​a. boot-config ​b. loaderconf ​c. grubby d. ​parted

C

What is the subnet mask for a Class C IP address? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

C

What kill signal stops a process, then restarts it with the same PID? a. SIGINT b. SIGQUIT c. SIGHUP d. SIGTERM

C

What number represents the stderr file descriptor? a. 0 b. 1 c. 2 d. 3

C

What option can be used with ssh to enable tunneling of X Windows information?​ a. ​-L b. ​-f c. ​-X d. ​-x

C

What option should be used in conjunction with the lp command in order to specify the destination printer name? a. -n b. -p c. -d d. -l

C

​What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package? a. ​-r b. ​-D c. ​-P d. ​-d

C

​What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system? a. ​-c b. ​-U c. ​-F d. ​-z

C

​When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts? ​a. chkconfig ​b. service c. ​systemctl ​d. syscontroller

C

Select the two commands below that will provide the number of lines in a file, and the number of characters in a file, respectively:​ Multiple Answer ​a. count -c b. ​pr -d ​c. wc -l ​d. wc -c

C and D

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes? Multiple Answers a. ​kthreadd ​b. syslogd ​c. init ​d. systemd

C and D

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. first b. second c. fifth d. sixth

D

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command? a. sys-conf-kb b. system-config-kb c. sys-config-keyboard d. system-config-keyboard

D

In order to create user accounts on a Linux system, what command should be utilized? a. uadd b. usercreate c. adduser d. useradd

D

In order to download DPM packages, what command should be used below?​ a. ​apt-search b. ​yum c. ​dpm-grab d. ​apt-get

D

In order to redirect a file to the standard input of a command, what metacharacter should be used? a. > b. # c. | d. <

D

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?​ ​a. silent b. ​noerror c. ​whisper ​d. quiet

D

What permissions are required to execute a shell script in a manner similar to any other executable program on the system? a. read b. write and read c. execute d. read and execute

D

What well-known TCP port is utilized by the SMTP service?​ a. ​110 b. ​22 c. ​23 d. ​25

D

When killing a background job with the kill command, the background job ID must be prefixed by what character below? a. & b. # c. $ d. %

D

Which command can be used to count the number lines, words, and characters in a file? a. pr b. nl c. tr d. wc

D

Which of the following is not one of the three main types of Linux commands?​ ​a. binary programs ​b. shell scripts ​c. shell functions d. ​device calls

D

On most Linux systems, the logrotate utility is automatically scheduled to run weekly. True or False

False

The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory. True and False

False

The killall command uses the PID to kill a process. True or False

False

The secure log file contains information regarding the last user to log in to a system.​ True or False

False

After a process has been started, you can change its priority by using the renice command. True or False

True

Any command that can be executed on the command line can also be placed inside any environment file. True or False

True

When you print to a printer class, the print job is send to the first available printer in the printer class. True or False

True

You can choose to use a window manager only, and not use a desktop manager. True or False

True

You can use the sed command to remove unwanted lines of text. True or False

True

​Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stop daemons after system initialization. True or False

True

On a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.

cancel

A case construct must be ended by ____________________.

esac

The ____________________ can be used to affect the process priority indirectly.

nice value

IPv6 IP addresses are delimited by what character below? a. : b. . c. , d. ;

A

An IPv6 IP address consists of 16-bit numbers in what numbering scheme? a. decimal b. octal c. binary d. hexadecimal

D

What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer? a. route b. route add c. traceroute d. ip

C

What is the Advanced Encryption Standard (AES) encryption algorithm​'s largest key length size? a. ​192-bit b. ​64-bit c. ​256-bit d. ​128-bit

C

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm? a. 40%-50% b. 50%-60% c. 60%-70% d. 70%-80%

C

When using the compress utility, each file specified for compression is renamed with what extension? a. .cmp b. .c c. .Z d. .cpz

C

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory? a. daemon b. manip-daemon c. service d. daemon-service

C

Select the two window managers that have been used in GNOME:​' Multiple Answer a.​kwin ​b. lxde c. ​metacity d. ​mutter

C and D

The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?​ Multiple Answers ​a. log.conf ​b. rsyslog.conf ​c. rsyslog.d ​d. log.d

C and D

What two commands below can be used to stop a process, either by PID number or process name?​ Multiple Answers ​a. end ​b. stop c. kill​ d. ​killall

C and D

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?​ Multiple Answers ​a. /etc/prnt.config ​b. /etc/cupsd.conf ​c. /etc/cups/cupsd.conf ​d. /etc/cups/printers.conf

C and D

​What two ps options can be used to display a full list of information about each process, and a long list of information about each process? ​a. -e ​b. -p ​c. -f ​d. -l

C and D

A user account can be locked with the usermod command using what option? a. -U b. -u c. -l d. -L

D

Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat

D

The GUI components and related software take up how much space on a typical Linux installation? a. ​1 GB ​b. 2 GB ​c. 3 GB ​d. 4 GB

D

The sshd daemon is configured by editing what configuration file?​ a. ​/etc/sshd.config b. ​/etc/ssh/ssh_config c. ​/etc/ssh.conf d. ​/etc/ssh/sshd_config

D

What command below can be used to uninstall the LILO bootloader from an active partition?​ ​a. lilo --remove ​b. lilo -d ​c. lilo delete ​d. lilo -U

D

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? a. install b. configure c. make install d. make

D

What range of ports is considered to be "well-known"?​ a. ​10023-24433 b. ​24434-65535 c. ​1024-10023 d. ​0-1023

D

​What command can be used to search for DPM package information? a. dpkg-search b. dpkg-list c. dpkg-info d. dpkg-query

D

​What yum command below can display a list of package group names? a. ​yum --list -g b. ​yum show groups c. ​yum list --groups d. ​yum grouplist

D

Fedora 20 makes use of the XFree86 ​implementation of X Windows. True or False

False

Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully. True or False

False

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off? a. 0 b. 1 c. 6 d. 7

A

In order to display a list of at job IDs, what option can be specified to the at command? a. -l b. -u c. -a d. -d

A

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.​ ​a. (hd0,0) ​b. (hd1,1) ​c. (hda,0) ​d. (hda,1)

A

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. process state b. process flag c. process priority d. PID

A

What option can be used in the journald configuration file to specify a file size limit to the event log?​ ​a. SystemMaxUse ​b. Max_file_size ​c. Journal_Limit ​d. SizeLimit

A

When used with the compress command, what option below can be used to compress symbolic links? a. -f b. -r c. -c d. -v

A

Where is the skeleton directory located on most Linux systems? a. /etc/skel b. /var/skel c. /etc/skeleton d. /var/skeleton

A

A list of all exported environment and user-defined variables in a shell can be viewed with what command below? a. env b. set c. setenv d. getenv

A

What command can be used to replace characters in a file sent via Standard Input? a. tr b. rt c. ts d. st

A

What number represents the stdin file descriptor? Correct a. 0 b. 1 c. 2 d. 3

A

When used with the uncompress command, what option displays the contents of the compress file to Standard Output? a. -c b. -r c. -v d. -f

A

​What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on? ​a. for ​b. while ​c. case ​d. switch

A

Select the two escape sequences that represent a horizontal tab and a vertical tab, respectively:​ Multiple Answer ​a. \V ​b. \t ​c. \v ​d. \b

A and B

In Fedora 20, where are user configured settings for Xorg stored?​ ​a. /etc/X11/xorg.conf ​b. /etc/X11/xorg.conf.d/ ​c. /etc/inittab d. ​/etc/X11.conf

B

On a Fedora based system, where are the shell environment and scheduled commands for at stored?​ ​a. /var/spool/cron/atjobs b. ​/var/spool/at ​c. /var/run/at d. /var/run/cron/at​

B

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database? a. info b. alert c. debug d. panic

B

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?​ ​a. grub-install ​b. grub2-install ​c. install_grub ​d. install_grub2

B

What is the subnet mask for a Class B IP address? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

B

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?​ ​a. alert ​b. panic ​c. crit ​d. error

B

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? a. SIGINT b. SIGQUIT c. SIGKILL d. SIGTERM

B

​In the process state column, what does an "R" indicate? ​a. The indicated process is being restarted because it resceived a SIGHUP kill signal. b. ​The process is currently running on the processor. ​c. The process is reading from the local hard disk. ​d. The process is recovering from a fatal error, and may potentially become a zombie.

B

​What operator below is known as the NOT operator? ​a. -o ​b. -a ​c. ! ​d. %

B

The GNOME 3 desktop environment utilizes what window manager and toolkit below? Multiple Answer ​a. kwin ​b. mutter ​c. Qt toolkit ​d. GTK+ toolkit

B and D

​What two commands below can be used to modify the password expiry information and a user's default shell? Multiple Answers ​a. chexp ​b. chage ​c. shellmod ​d. chsh

B and D

How many different kill signals can be sent by the kill command to a given process? a. 16 b. 32 c. 64 d. 128

C

In order to send a print job to a printer using CUPS, what command must be used? a. print b. pl c. lp d. pr

C

Select the escape sequence that starts a new line when used with echo: ​a. \\ ​b. \a ​c. \n ​d. \r

C

To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor. True or False

False

_______________ represents a text description of the user and is typically left blank.

GECOS

The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.

Kern

A set of information that is sent to a printer at the same time is called a(n) ____________________.

Print Job

CUPS contains versions of the lpr, lpc, lpq, and lprm commands. True or False

True

Each process can start an unlimited number of other processes. True or False

True

Any command that can take standard input and transform it into standard output is called a(n) ____________________ command.

filter

The first daemon process on a system is called the ____________________ daemon.

initialize

The ____________________ command takes user input from stdin and places it in a variable specified by an argument.

read

Processes that have encountered an error during execution and continuously uses up system resources are referred to as ____________________ processes.

rogue


Ensembles d'études connexes

The US to 1877 (HIST1377) CH2 LS *Transplantation and borderlands*

View Set

Chapter 16 - Therapy & Treatment

View Set

MediaLab ASCP BoC Practice Exam - Fall 2022

View Set

ATI RN Fundamentals Online Practice 2023 B

View Set

Macroeconomics Chapter 7 Terms and Questions

View Set

bus law, chapter 16, bus law ,chapter 11, bus law chapter 10, bus law chapter 9, BLAW Chapter 9, Business Law Chapter 16 - Agency Law, Business Law chapter 11-19, Business Law Exam 3, Business Law Exam 3, 5 - 20 agency, business 3, Business Law Test...

View Set

PSC 1Y - Prof Luck - Final Unit 5 Lecture Review Questions

View Set