Linux Final
Which of the following is the greatest expense for companies using Linux? a. Additional software b. Software upgrades c. Operating system cost d. Hiring people to maintain the Linux system
d. Hiring people to maintain the Linux system
What DNS resource record type is used to provide the IP address for the e-mail server for a zone? a. CNAME b. NS c. SOA d. MX
d. MX
The mutt software is an example of what type of mail service software on Linux? a. Mail Delivery Agent b. Mail Transfer Agent c. Mail Transport Agent d. Mail User Agent
d. Mail User Agent
Proxy servers keep track of the information passed to each client by maintaining what type of table? a. routing b. firewall c. caching d. Network Address Translation (NAT)
d. Network Address Translation (NAT)
What option can be used in the journald configuration file to specify a file size limit to the event log? a. Max_file_size b. SizeLimit c. Journal_Limit d. SystemMaxUse
d. SystemMaxUse
What two characters below should not be used in filenames? Select one or more: a. _ b. $ c. . d. *
b. $ d. *
Select the two filename extensions that are associated with C++ programming language source code files: Select one or more: a. .c b. .cpp c. .cc d. .c++
b. .cpp c. .cc
Under the root directory in Linux, which directory contains system commands and utilities? a. /opt b. /usr c. /var d. /boot
b. /usr
Each octet in an IP address represents a binary number consisting of how many bits / bytes? a. 4-bit b. 8-bit c. 4-byte d. 8-byte
b. 8-bit
Each octet in an IP address represents a binary number consisting of how many bits / bytes? a. 8-byte b. 8-bit c. 4-byte d. 4-bit
b. 8-bit
To which license does Linux adhere? a. Artistic license b. GNU General Public License c. Free source license d. Open license
b. GNU General Public License
Which of the following statements are true? (Choose all that apply.) a. Soft limits can never be exceeded b. Hard limits can never be exceeded c. Hard limits allow a user to exceed them for a certain period of time d. Quotas can limit both user space and the number of files a user can own. e. Soft limits allow a user to exceed them for a certain period of time
b. Hard limits can never be exceeded d. Quotas can limit both user space and the number of files a user can own. e. Soft limits allow a user to exceed them for a certain period of time
What does the mv command do? (Choose all that apply.) a. It makes a directory. b. It moves a directory. c. It moves a file. d. It makes a volume.
b. It moves a directory. c. It moves a file.
The QT toolkit is utilized by which GUI environment? a. Enlightenment b. KDE c. Xfce d. GNOME
b. KDE
Assistive technologies are configured using what utility on Fedora 20 in GNOME? a. Accessibility b. Universal Access c. Access Helper d. Usability
b. Universal Access
After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database? a. alias b. mail c. sendmail d. newaliases
d. newaliases
In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. PID b. process flag c. process priority d. process state
d. process state
Which prompt does the root user receive when logged in to the system? a. ! b. @ c. # d. $
c. #
A production kernel refers to a kernel whose _________. a. revision number is even b. major number is odd c. minor number is even d. minor number is odd
c. minor number is even
The ___________ command can be used to search Internet software repositories for RPM packages that map to your architecture, and automatically install or upgrade those packages on your system.
yum
By default, Fedora 20 allows the root user to log into the GNOME desktop. True False
False
Character devices typically transfer data more quickly than block devices True False
False
Fedora 20 makes use of the XFree86 implementation of X Windows. True False
False
In the past, SATA hard disks were referred to as Integrated Drive Electronics (IDE). True False
False
Linux commands entered via the command line are not case sensitive. True False
False
Performance problems are caused by hardware, not software. True False
False
Performing regular system backups and identifying potential problem areas are examples of reactive maintenance. True False
False
SLIP is a newer technology than PPP. True False
False
Which command do you use to rename files and directories? a. mv b. rename c. rn d. cp
a. mv
What two FTP commands below can be used to close the ftp utility? Select one or more: a. quit b. exit c. close d. bye
a. quit d. bye
The Linux kernel exists as a file named: a. vmlinuz b. kernel.0 c. krn.linux d. vmlinux
a. vmlinuz
What was created to define a standard directory structure and common file location for Linux? a. FSH b. root directory c. FHS d. X.500
c. FHS
Where is the /proc filesystem stored? a. on the hard disk drive in the / directory b. on the hard disk drive in the /var directory c. in RAM d. on the hard disk drive in the /etc directory
c. in RAM
What PostgreSQL command-line utility backs up PostgreSQL database settings? a. pg_restore b. pg_dumpall c. pg_dump d. pg_backup
c. pg_dump
After logging into a terminal, a user will receive an interface known as which option below? a. processor b. swap memory c. shell d. user interface
c. shell
In order to change the time zone of a system after installation, what command must be used? a. tzmod b. tzchange c. tzselect d. time_zone
c. tzselect
What command can be used to change the maximum number of file handles that can be used by a program? a. pgmod b. fhlimit c. ulimit d. fhch
c. ulimit
In order to redirect a file to the standard input of a command, what metacharacter should be used? a.| b.# c.> d.<
d. <
In order to download DPM packages, what command should be used below? a. dpm-grab b. yum c. apt-search d. apt-get
d. apt-get
In Fedora 20, what terminal is used for graphical login? a. tty0 b. tty2 c. tty4 d. tty1
d. tty1
What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file? a. execute b. sticky bit c. read d. write
d. write
The ________ can be used to affect the process priority indirectly.
nice value
In a file listing, the 9 characters following the file type (for example, -rwxr-xr-x) refer to the file's ____________
permissions
A network __________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.
protocol
Text wildcards used to ease the searching of specific text information are called_____________ . .
regular expressions
Most commands that are run by the shell are run in a separate _________ , which is created by the current shell.
subshell
An alternative to the vi editor that offers an equal set of functionality is the GNU _____________ .
Emacs editor
________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.
FHS
The less command offers less functionality than the more command. True False
False
The _____________ environment variable contains a list of directories to search for executable programs.
Path
Any command that can be executed on the command line can also be placed inside any environment file. True False
True
If the / filesystem becomes corrupted, the system is unstable and must be turned off. True False
True
If you boot your computer from Linux live media, you will be able to use a fully functional Linux system prior to installing Linux on permanent storage. True False
True
Linux has only one root directory per directory tree. True or False? True False
True
Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project. True False
True
The cpio command has the ability to handle long filenames and can be used to back up device files. True False
True
The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations. True False
True
You can use wildcard metacharacters with the find command. True False
True
What operator below is known as the NOT operator? a. ! b. -a c. -o d. %
a. !
When used with the uncompress command, what option displays the contents of the compress file to Standard Output? a. -c b. -r c. -f d. -v
a. -c
What option can be added to the rpm command in order to query packages? a. -q b. -v c. -i d. -h
a. -q
Which sar command option is used to display statistics for the processor queue? a. -q b. -v c. -c d. -r
a. -q
What option, when added to the rm command, is commonly referred to as the -resume option? a. -r b. -i c. -f d. -d
a. -r
What file in the /proc directory contains information about a computer's CPU? a. /proc/cpuinfo b. /proc/meminfo c. /proc/cpu_info d. /proc/proc_info
a. /proc/cpuinfo
You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process? a. /var/log/boot.log b. /var/log/wtmp c. /var/log/messages d. /var/log/startup.log
a. /var/log/boot.log
What zone configuration file contains a PTR record used to identify the loopback adapter? a. /var/named/named.local b. /var/named/named.ca c. /etc/named.loop d. /etc/named.conf
a. /var/named/named.local
Which RAID level is also referred to as mirroring? a. 1 b. 5 c. 0 d. 4
a. 1
Which of the following kernels are developmental kernels? (Choose all that apply.) a. 3.5.5 b. 3.2.7 c. 3.4.4 d. 3.3.4
a. 3.5.5 d. 3.3.4
Which RAID level uses striping with parity? a. 5 b. 2 c. 1 d. 4
a. 5
Which of the following are characteristics of Open Source Software? (Choose all that apply.) a. Any bugs are fixed quickly. b. The software is developed collaboratively. c. The source code for software is available for a small fee. d. The value of the software is directly related to its price.
a. Any bugs are fixed quickly. b. The software is developed collaboratively.
What is the most common open source Web server available for Linux? a. Apache b. pine c. Samba d. Squid
a. Apache
After typing the ls -a command, you notice that there is a file whose filename begins with a dot ( . ). What does this mean? a. It is a hidden file. b. It is a system file. c. It is a file in the current directory. d. It is a binary file.
a. It is a hidden file.
After typing the ls -F command, you notice a filename that ends with an * asterisk character. What does this mean? a. It is an executable file. b. It is a special device file. c. It is a hidden file. d. It is a linked file.
a. It is an executable file.
Who formed the Free Software Foundation to promote open development? a. Richard Stallman b. Ken Thompson c. Dennis Ritchie d. Linus Torvalds
a. Richard Stallman
After typing the ls -F command, you see the following line in the output: -rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1 What does this mean? a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file. b. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. c. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file. d. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file.
a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.
What is the term for a ZFS managed filesystem that is created from ZFS pools? a. ZFS volume b. ZFS store c. ZFS lake d. ZFS vault
a. ZFS volume
Which of the following could result in a segmentation fault (fatal signal 11) during a Fedora installation? a. all of the above b. improper device driver c. overclocked CPU d. RAM problems
a. all of the above
What two NTP daemons below are commonly used on Linux systems? Select one or more: a. chronyd b. ntpd c. timed d. sntpd
a. chronyd b. ntpd
What two commands below can be used to modify the password expiry information and a user's default shell? Select one or more: a. chsh b. chexp c. chage d. shellmod
a. chsh c. chage
In an if construct, what statements are optional? Select one or more: a. else b. then c. elif d. fi
a. else c. elif
What two commands below can display memory information and swap usage? Select one or more: a. free b. swap_stat c. vmstat d. memtop
a. free c. vmstat
What two commands below can be used to stop a process, either by PID number or process name? Select one or more: a. kill b. end c. killall d. stop
a. kill c. killall
Linux is __________ and __________ operating system. a. multiuser, multitasking b. processing, closed source c. production, stable d. large, useful
a. multiuser, multitasking
A special device file is used to ___________. a. represent hardware devices such as hard disk drives and ports b. enable proprietary custom-built devices to work with Linux c. do nothing in Linux d. keep a list of device settings specific to each individual user
a. represent hardware devices such as hard disk drives and ports
The environment variables that are set by default and their current values can be viewed with what command? a. set b. get c. env d. setenv
a. set
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. sixth b. first c. second d. fifth
a. sixth
What does the /var directory contain? a. spools and log files b. local variance devices c. various additional programs d. temporary files
a. spools and log files
Select the two commands below that can be used to prepare a swap partition and then enable it for use: Select one or more: a. swapon b. swapit c. mkswap d. mkfs.swap
a. swapon c. mkswap
What two resource record types map FQDNs to IPv4 and IPv6 addresses respectively? Select one or more: a. AAAA b. CNAME c. A d. NS
a. AAAA c. A
The first software RAID volume on a system will use a multiple disk device file that starts with what number? a. 255 b. 127 c. 254 d. 128
b. 127
In what year was the source code for the Linux kernel released? a. 1987 b. 1991 c. 1993 d. 1990
b. 1991
How many different kill signals can be sent by the kill command to a given process? a. 32 b. 64 c. 128 d. 16
b. 64
Which common GUI environments are available in most Linux distributions? (Choose all that apply.) a. CDE b. KDE c. RPM d. GNOME
b. KDE d. GNOME
What Linux distribution is the most commonly used distribution within organizations today? a. Debian b. Red Hat c. Mandrake d. SuSE
b. Red Hat
If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below: a. SIGTERM b. SIGHUP c. SIGINT d. SIGQUIT
b. SIGHUP
What two Linux distributions below utilize the Debian package manager by default? Select one or more: a. SUSE Linux b. Ubuntu Linux c. Linux Mint d. Red Hat Linux
b. Ubuntu Linux c. Linux Mint
The tac command _________. a. displays the contents of a file in reverse order last word on the line first and first word on the line last b. displays the contents of a file in reverse order last line first and first line last c. displays the contents of hidden files d. is not a valid Linux command
b. displays the contents of a file in reverse order last line first and first line last
After a background process has been started, what command below can be used to move it to the foreground? a. b2f b. fg c. fgd d. fgnd
b. fg
Which of the following is NOT a piece of information that the Fedora installation program prompts you for? a. installation destination b. firewall settings c. keyboard layout d. time zone
b. firewall settings
What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on? a. switch b. for c. while d. case
b. for
What argument can be used with the chmod command to add read permission and remove write permission for a group on a file? a. o+r-w b. g+r-w c. u+r+w d. g-r+w
b. g+r-w
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files? a. grub-compile b. grub-mkconfig c. grub-config d. grub2-install
b. grub-mkconfig
elect below the command and the associated alias available on most Linux systems that displays a long listing for each file in a directory? Select one or more: a. ls -F b. ll c. ls -l d. lf
b. ll c. ls -l
In order to send a print job to a printer using CUPS, what command must be used? a. print b. lp c. pl d. pr
b. lp
Which command is used to format a partition on a hard disk drive with the ext4 filesystem? a. format_ext4 device b. mkfs -t ext4 device c. makeext4FS device d. ext4mkfs device
b. mkfs -t ext4 device
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. groupmod b. newgrp c. newgroup d. groupadd
b. newgrp
Which of the following commands can be used to create partitions on either a MBR or GPT hard disk? a. gdisk b. parted c. fdisk d. cfsck
b. parted
The default permissions given by the system prior to analyzing the umask are ___________for directories, and __________ for files. a. rw-rw-rw- and rwxrwxrwx b. rwxrwxrwx and rw-rw-rw- c. rw-rw-rw- and rw-rw-rw- d. rw-rw-rw- and r--r--r--
b. rwxrwxrwx and rw-rw-rw-
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a: a. DBMS b. tarball c. router d. package manager
b. tarball
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a: a. package manager b. tarball c. router d. DBMS
b. tarball
In order to quickly create an empty file, what command can be used? a. echo file1 b. vim file1 c. create file1 d. touch file1
b. vim file1
The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need another user interface b. when you need to increase the stability of Linux c. when you need support in Linux for new hardware d. when you need to use kernel modules
b. when you need to increase the stability of Linux c. when you need support in Linux for new hardware
What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively? Select one or more: a. -e b. -Z c. -z d. -u
b. -Z c. -z
When performance issues arise, you can compare the output of performance utilities to the _________ values found in the system log book.
baseline
Which prompt do regular users receive when logged in to the system? a. ! b. @ c. $ d. #
c. $
Linux servers are typically installed in a rack using rackmount server hardware. Which of the following is used to describe the minimum height of a rackmount server? a. Series A b. Level 5 c. 1U d. Type A
c. 1U
The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system? a. 23 b. 827 c. 514 d. 1012
c. 514
Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics? a. x b. $ c. Ctrl+g d. P
c. Ctrl+g
In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line? a. dd b. Ctrl+a c. Ctrl+k d. Ctrl+d
c. Ctrl+k
What software type is software that is distributed free of charge, but the source code is not available? a. Shareware b. Open source software c. Freeware d. Close source software
c. Freeware
What must a user do to run cp or mv interactively and be asked if she wants to overwrite an existing file? a. There is no choice as the new file will overwrite the old one by default. b. Type cp -i or mv-i. c. Just type cp or mv as they run in interactive mode by default. d. Type interactive cp or interactive mv.
c. Just type cp or mv as they run in interactive mode by default.
How can a user switch from insert mode to command mode when using the vi editor? a. Type in a : character b. Press the Del key c. Press the Esc key d. Press the Ctrl+Alt+Del keys simultaneously
c. Press the Esc key
If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Alt b. Ctrl c. Tab d. Esc
c. Tab
Which of the following commands will change the user ownership and group ownership of file1 to user1 and root respectively? a. chown root:user1file1 b. chown user1 : root file1 c. chown user1:root file1 d. chwon root : user1file1
c. chown user1:root file1
What character is used to delimit most Linux configuration files? a. tab b. semicolon c. colon d. space
c. colon
What are the three standard Linux permissions? a. read, write, examine b. full control, read-execute, write c. execute, read, write d. read, write, modify
c. execute, read, write
What command can be used to view what shared libraries are required by a certain program? a. ldlist b. showlibs c. ldd d. ldconfig
c. ldd
When displaying a large text file, what two commands provide the ability to show text in a page by page fashion? a. buffer b. paged c. less d. more
c. less d. more
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred? a. page fault b. IRQ fault c. segmentation fault d. RAM failure
c. segmentation fault
What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes? Select one or more: a. kthreadd b. syslogd c. systemd d. init
c. systemd d. init
Each SCSI device attached to a system must be assigned an ID number. What is this ID number called? a. device ID b. SCSI controller c. target ID d. SCSI number
c. target ID
How many DNS servers can be configured in the /etc/resolv.conf file? a. two b. five c. three d. four
c. three
What two commands can be used to show information about physical volumes and logical volumes respectively? Select one or more: a. showvg b. showlv c. lvdisplay d. vgdisplay
c. lvdisplay d. vgdisplay
Select the iptables option that specifies the destination address of packets for a rule: a. -D b. -L c. -F d. -d
d. -d
What option should be used in conjunction with the lp command in order to specify the destination printer name? a. -l b. -p c. -n d. -d
d. -d
Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? /dev/sda1 / ext4 defaults 1 1 none /dev/pts devpts gid=5,mode=620 1 0 none /proc proc defaults 0 1 none /dev/shm tmpfs defaults 1 0 /dev/sdc2 swap swap defaults 0 1 /dev/dvd /media/dvd iso9660 noauto,ro 0 0 /dev/fd0 /media/floppy auto noauto 0 0 a. none, as fsck must be run manually for each filesystem b. /, /dev/pts and /dev/shm c. all of them, as fsck is run automatically at boot for all filesystems d. /, /proc and swap
d. /, /proc and swap
In what year was the source code for the Linux kernel released? a. 1990 b. 1993 c. 1987 d. 1991
d. 1991
When issuing the ls -F command, what special character indicates a linked file? a. * b. & c. = d. @
d. @
What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document? a. DocumentRoot index.html b. UseIndex index.html c. Index index.html d. DirectoryIndex index.html
d. DirectoryIndex index.html
What service provides a method for the efficient transfer of files over the Internet? a. Telnet b. HTML c. SMTP d. FTP
d. FTP
What software type is software that is distributed free of charge, but the source code is not available? a. Shareware b. Open source software c. Close source software d. Freeware
d. Freeware
The ability to extract, manipulate, and format text using pattern action statements belongs to which command below? a. grep b. nl c. sed d. awk
d. awk
In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued? a. cd .. b. cd ./.. c. /home/joe d. cd ../..
d. cd ../..
After a background process has been started, what command below can be used to move it to the foreground? a. b2f b. fgnd c. fgd d. fg
d. fg
What argument can be used with the chmod command to add read permission and remove write permission for a group on a file? a. u+r+w b. g-r+w c. o+r-w d. g+r-w
d. g+r-w
What utility in the sysstat package measures the flow of information to and from disk devices? a. drivemon b. iodump c. mpstat d. iostat
d. iostat
Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called? a. dumping b. hiccuping c. flooding d. jabbering
d. jabbering
Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat
d. lpstat
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwd b. passwdconv c. pwdcv d. pwconv
d. pwconv
In what filesystem are most of the operating system files contained? a. boot b. data c. mnt d. root
d. root
Select the escape sequence that starts a new line when used with echo: a. \a b. \r c. \\ d. \n
d. \n
What is the most common hardware component to fail on a Linux system? a. Video cards b. NICs c. Floppy drives d. Hard disks
d.Hard disks
The _____________ command can be used to create and work with up to 128 primary partitions on a GPT hard disk using an interface that is nearly identical to fdisk.
gdisk
To prevent signals from bouncing back and forth on a SCSI cable, each end of the cable must have a(n)________ to stop signals from being perpetuated.
terminator
The __________command can be used to search Internet software repositories for RPM packages that map to your architecture, and automatically install or upgrade those packages on your system.
yum