Linux+ Final Exam parts of Chapter 10-12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?

-F

A user account can be locked with the usermod command using what option?

-L

Which option to the dpkg command an be used to list the files that comprise a package?

-L

What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?

-P

What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

-d -k

Which option to the rpm command can be used to remove a package from the system?

-e

What option can be added to the rpm command in order to query packages?

-q

What option can be added to the userdel command to remove the home directory of the target user?

-r

When compiling source code into a binary program, which command performs a system check and creates the Makefile?

./configure

Which filename extension indicates a tarball?

.tar.gz

Files with what two file extensions are commonly known as tarballs?

.tar.gz .tgz

Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?

/etc/login.defs

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

What is the name of the file that contains a listing of all users on the system and their home directories?

/etc/passwd

Which file stores the TCP/IP address of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC?

/etc/resolv.conf

Where is the skeleton directory located on most Linux systems?

/etc/skel

Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system?

/etc/sysconfig/network-scripts/ifcfg-eth0

On Linux, the root user always has a UID of what number?​

0

What range of ports is considered to be "well-known"?

0-1023

A Class A network uses how many bits for the network ID and how many bits for the host ID?

8 24

IPv6 addresses are delimited by what character below?

:

What are two means available to resolve a host name to the appropriate TCP/IP address?

DNS /etc/hosts

Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry. True or False?

False

The Debian Package Manager (DPM) is the default package manager used by Fedora 20. True or False?

False

To install a new program from RPM software repositories on the Internet, you can use the yum update programname command. True or False?

False

UIDs and GIDs are unique to the system and once used can never be reused. True or False?

False

Most Linux distributions make use of what package manager?

RPM

A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False?

True

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. True or False?

True

Most source code is available on the Internet in tarball format. True or False?

True

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

True

The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?

True

The line that configures the host name for the computer at boot time can be found in /etc/sysconfig/network. True or False?

True

You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

True

In order to download DPM packages, what command should be used below?

apt-get

What is the name used to describe a user providing a user name and password to log in to a system?

authentication

Before a computer can use a router, with what configuration information must it be provided?

default gateway

What command can be used to search for DPM package information?

dpkg-query

An IPv6 IP address consists of 16-bit numbers in what numbering scheme?

hexadecimal

What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?

ifconfig

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity?

ifconfig ping netstat -i

Which command would be used to activate the NIC aliased as eth0?

ifup eth0

What configuration file contains parameters that set the default location for e-mail, password expiration, minimum password length, and the range of UIDs and GIDs available for use?

login.defs

The TCP/IP address of 127.0.0.1 is also referred to as the __________.

loopback address

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?

make

When compiling source code into a binary program, which command does the compiling using the GNU C Compilier?

make

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the _____ command.

newgrp

Which command can be used to alter the primary group associated with a given user temporarily?

newgrp

To test DNS configuration by resolving a host name to IP address, which command or commands can you use? (Choose all that apply.)

ns lookup hostname dig hostname host hostname

RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?

package dependency

Select the command that can be used to send a small TCP/IP packet to another IP address and await a response?

ping

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?

pwconv

What devices are used to transfer information from one network to another?

routers

Which of the following commands can be used to list the files contained within an installed RPM package?

rpm -ql packagename

Which of the following commands creates an archive (tarball)?

tar -zcvf/dev/st0*

In order to create user accounts on a Linux system, what command should be utilized?

useradd

Which command is used to delete a user account?

userdel username

Which command can you use to lock a user account?

usermod -L username

Which command would you use to unlock a user account?

usermod -U username

What yum command below can display a list of package group names?

yum grouplist

Which of the following commands can be used to search for packages that contain the word "oobla" on RPM software repositories?

yum search oobla

What is the subnet mask for a Class B IP address?

255.255.0.0

What is the subnet mask for a Class C IP address?

255.255.255.0

Which of the following commands can be used to remove the test DPM package, including any test configuration files?

apt -get purge test

What two commands can be used to modify the password expiry information and a user's default shell?

chsh chage


Ensembles d'études connexes

(WK 3 NR 326) ECT Therapy questions

View Set

chapter 36 geriatric emergencies

View Set