Linux - Final Exam
To lock an account, you can use the usermod command with the ____ option. Selected Answer: -L -U -u -L -l
-L
To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package. -v -m -V -M
-V
When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed. Answers: .Z .c .cpm .cpz
.Z
The filename extension given to files compressed with bzip2 is ____. Answers: .bz .bz2 .gz .Z
.bz2
In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader. /load /bin /boot /mnt
/boot
The ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave). /dev/hdc1 /dev/hdb1 /dev/hda1 /dev/hdc2
/dev/hdb1
The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH. ~/.bash_profile ~/.bash_login /etc/profile ~/.profile
/etc/profile
To verify hardware settings, you can examine the contents of the ____ directory. /log /root /proc hw
/proc
The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively. 1.1.1.1; 255.255.255.255 0.0.0.0; 255.255.255.255 0.0.0.0; 256.256.256.256 1.1.1.1; 256.256.256.256
0.0.0.0; 255.255.255.255
RAID level ____ is often referred to as disk mirroring. 1 2 3 4
1
NetBIOS names can be up to ____ characters long. 15 25 50 100
15
The subnet mask for a Class C IP address is ____. 255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255
255.255.255.0
Hard disks can contain a maximum of ____ major partitions. 4 8 6 32
4
There are ____ different kill signals that the kill command can send to a certain process. 16 32 64 128
64
Each octet in an IP address represents a(n) ____ binary number. 4-bit 8-bit 4-byte 8-byte
8-bit
The shell that is used by default in Linux is the ____ shell. BASH root gdm command line
BASH
____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet. DNS DHCP NTP NIS
DNS
A(n) ____ service provides an efficient method for transferring files over the Internet. FTP DNS Web Mail
FTP
____ are the most common hardware component to fail on Linux systems. Floppy drives Hard drives NICs Video cards
Hard drives
The two most common desktop environments that are used on Linux are ____ and ____. KDE; kwin KDE; Xfce KDE; GNOME Xfce; GNOME
KDE; GNOME
The concept of ____ enables software developers to read other developers' source code, modify that source code to make the software better, and redistribute that source code to other developers who might improve it further. Open Source Software Linux Closed Source Software Freeware
Open Source Software
Client computers can retrieve email from email servers via ____ or ____. SSH; FTP POP; IMAP POP; FTP SSH; IMAP
POP; IMAP
Most Linux distributions today use ____ as their package manager. RPM PRM MPR PRMM
RPM
Apache daemon listens for HTTP requests on port ____. TCP 20 TCP 25 TCP 80 TCP 110
TCP 80
A(n) ____ is a program that can start a network daemon. network bootstrapper IP wrapper TCP wrapper daemon launcher
TCP wrapper
The most common LAN protocol used today is ____. UDP/IP IPX/SPX TCP/IP DLC
TCP/IP
If you type enough unique letters of a directory and press ____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information. Alt Ctrl Tab Esc
Tab
NTP uses port ____. TCP 20 TCP 25 UDP 69 UDP 123
UDP 123
To display the contents of a file called data, use the command ____. disp data ls data ls l data cat data
cat data
Most configuration files on Linux systems are delimited using ____ characters. tab colon space semicolon
colon
Copying a file can be accomplished using the ____ command. cp cpy copy mv
cp
A system process that is not associated with a terminal is called a(n) ____ process. daemon user parent startup
daemon
To create partitions after installation, you can use the ____ command. format formatdisk fdisk partition
fdisk
Solaris, HPUX and AIX are all ____ of Unix. versions flavors types instances
flavors
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer. ipconfig ifconf ipconf ifconfig
ifconfig
The ____ file in the /proc directory contains statistics on the performance of the processor. loadavg cpuinfo modules kcore
loadavg
To send a print job to a printer, you must first use the ____ command and specify what to print. print pl lp pr
lp
You can restrict who can print to certain printers by using the ____ command. lpadmin lpa lpr admin
lpadmin
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the ____ command. newgroup groupmod groupadd newgrp
newgrp
To see what network services are running on your network, you can run the ____ command. map nmap nm networkmap
nmap
The ____ command sends a small TCP/IP packet to another IP address and awaits a response. ping ring png ipquery
ping
Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key. authentication ; encryption public ; private unidirectional ; bidirectional data ; code
public ; private
The ____ command will confirm the system directory that you are currently in. dir pwd whereami ld
pwd
You can use the ____ command to start, stop, or restart any daemons listed within the /etc/rc.d/init.d directory. daemon manipdaemon service daemonservice
service
The ____ command can be used to obtain root access when you need to perform an administrative task. su sudo swu switchu
su
Databases store information in the form of ____, each of which contains ____. lists; fields fields; records records; tables tables; records
tables; records
All Linux problems can be divided into ____ categories. two three four five
three
A common utility used to troubleshoot routing is the ____ command. route ip traceroute routeadd
traceroute
You can create user accounts on the Linux system by using the ____ command. uadd usercreate adduser useradd
useradd
The ____ command counts the number of lines, words, and characters in a file. pr nl tr wc
wc