Linux+ Full Dump

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the simplest method to connect a Win98 host to a Linux Server? Choose all that apply. A. Velcro B. Samba C. NFS D. DNS E. WINS

A. Velcro B. Samba

Which two services resolve Netbios names to IP addresses? A. WINS B. NetbiosSVC C. smbd D. nmbd E. DNS

A. WINS D. nmbd

Modprobe can be used to load (choose all that apply): A. a single module B. a stack of dependent modules C. all modules that are marked with a specified tag D. None of the choices

A. a single module B. a stack of dependent modules C. all modules that are marked with a specified tag

What command prints available functions? A. declare -f B. set C. typeset D. function()

A. declare -f

Which of the following lines would you find in the file /etc/host.conf? A. order hosts,bind B. 192.168.168.4 dns-server C. hosts: files,dns D. domain mycompany.com

A. order hosts,bind

What argument to the -name flag of find will match files or directories beginning with a '.' (period)?

Answer.\*

The very first line of a shell script should always contain what two characters at the beginning of the line?

Answer: #!

A user was not given permission to use the CRON scheduling system. What file needs to be modified to provide that access? (Please specify the full path to the file)

Answer: /etc/cron.allow

You want to make sure all Bash users, when they login, get access to a new program in /opt/bin (not currently in their PATH). To ensure this you would put the command: PATH=$PATH:/opt/bin; export PATH in what file?

Answer: /etc/profile

In which directory must definition files be placed to add additional repositories to yum?

Answer: /etc/yum.repos.d

You are building a server that will have many hardware and operating system upgrades. The server is the file server for all users on your 100 user network. Which directory should have its own mountpoint and/or hard drive?

Answer: /home

What Internet based organization is primarily responsible for hosting and distributing the various Linux HOWTOs? (NOT the URL)

Answer: The Linux Documentation Project

With the web site, www.tldp.org, what does "tldp" stand for?

Answer: The Linux Documentation Project

Which IP protocol is connectionless and unreliable?

Answer: UDP

What word is missing from the following SQL statement? insert into tablename ________(909, 'text'); (Please specify the missing word using lower-case letters only.)

Answer: VALUES, values

You wish to list the contents of your crontab. Type in the simplest command to do this

Answer: crontab -l

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

Answer: files

Which process has a PID of 1. Type in the process name?

Answer: init

You want to display a list of all last logged in users. The file /var/log/wtmp exists. Which command would you use?

Answer: last

Assume that on your system, there are man pages for both the command crontab and the configuration file for crontab. What command would you use to access the man page for the crontab configuration file?

Answer: man 5 crontab

What is the name of the main configuration file for GRUB? (Please specify the file name with no path information)

Answer: menu.lst

What command would help you test if your ppp connection was functional? Type just the command name.

Answer: minicom

On a Debian-based system, what command will create a boot disk on the first floppy if your kernel image is named "vmlinux-2.4.18-4"? Type the full command string to accomplish this.

Answer: mkboot vmlinux-2.4.18-4 Answer: mkboot /boot/vmlinux-2.4.18-4

What command will load groups of modules into the kernel as needed?

Answer: modprobe

You want to display all currently mounted file systems. Which command would you use? (Please enter only the command without arguments or options)

Answer: mount

The _______ command is used to modify a user's account information.

Answer: usermod

When attempting to send a file to another user securely with GPG, which of the following actions must be done? A. Encrypt the file using your public key. B. Encrypt the file using their public key. C. Encrypt the file using your private key. D. Encrypt the file using their private key. E. Sign the file with your public key.

B. Encrypt the file using their public key.

Which key do you press to switch to normal mode in vi? A. Alt B. Esc C. Ctrl D. Shift

B. Esc

Choose THREE websites that provide Linux-related news and documentation. A. Linux Scoop B. LWN.net C. Tux Facts D. Linux Today E. NewsForge

B. LWN.net D. Linux Today E. NewsForge

Which of the following fields are available in both the global /etc/crontab file as well as in user- specific crontab files? (Select TWO correct answers) A. Year B. Minute C. Username D. Command

B. Minute D. Command

The files /etc/hosts.allow, /etc/hosts.deny and /etc/nologin all exist on your computer and the sshd daemon is running. What will happen when users try to connect with ssh? A. Only connections from computers specified in /etc/hosts.allow will be allowed to log in. B. Only root will be allowed to log in. C. All users not specified in /etc/hosts.deny will be allowed to log in. D. No user will be allowed to log in.

B. Only root will be allowed to log in.

What output will the command seq 10 produce? A. A continuous stream of numbers increasing in increments of 10 until stopped. B. The numbers 1 through 10 with one number per line. C. The numbers 0 through 9 with one number per line. D. The number 10 to standard output.

B. The numbers 1 through 10 with one number per line.

What is the purpose of the Bash built-in export command? A. To allow disks to be mounted remotely. B. To automate the export of variables for subsequently executed commands. C. To make the command history available to sub-shells. D. To run a command as a process in a sub-shell. E. To save variable settings for future shell invocations.

B. To automate the export of variables for subsequently executed commands.

Which of the following would do the same as the command cat < file1.txt > file2.txt? A. cat < file1.txt file2.txt B. cat file1.txt >file2.txt C. cat <file1.txt | file2.txt D. cat file1.txt | file2.txt E. cp file1.txt>file2.txt

B. cat file1.txt >file2.txt

Which of the following commands will print the inode usage on each mounted filesystem? A. du -i B. df -i C. lsfs -i D. printfs -i

B. df -i

What command will allow you to see all of your environment variables? A. echo $* B. env C. which D. export

B. env

Which command will convert all tab characters in a file to spaces and print that to standard out? A. convert B. expand C. retab D. untab

B. expand

Which command makes the shell variable named VARIABLE visible to subshells? A. export $VARIABLE B. export VARIABLE C. set $VARIABLE D. set VARIABLE E. env VARIABLE

B. export VARIABLE

Which of the following lines is an example of a correct setting for the DISPLAY environment variable? A. hostname:displayname B. hostname:displaynumber C. hostname/displayname D. hostname/displaynumber E. hostname

B. hostname:displaynumber

Your server logfile shows repeated connections to TCP port 143. What service is being accessed? A. smtp B. imap C. pop3 D. pop2 E. nmbd

B. imap

The X program _________ is often used to make minor keyboard adjustments, like proper Back space/Delete mapping. A. xkbdmap B. kbdmap C. xmodmap D. modmap

B. kbdmap

Which Apache Directive specifies the location of the HTTP documents? A. RootDocument B. ServerRoot C. DocumentRoot D. RootServer E. DocPath

C. DocumentRoot

While using the vi editor, you wish to move ahead one page. You should press the control key and: A. A B. D C. F D. U

C. F

For accessibility assistance, which of the following programs is an on-screen keyboard? A. xkb B. atkb C. GOK D. xOSK

C. GOK

Instead of supplying an explicit device in /etc/fstab for mounting, what other options may be used to identify the intended partition? (Select TWO correct answers) A. FIND B. ID C. LABEL D. NAME E. UUID

C. LABEL E. UUID

What configuration file and directive will alter your apache server IP and or port that it listens to? A. Port B. IPAddress C. Listen D. MinSpareServers

C. Listen

What are the addresses falling into the range of 240.0.0.0 through 255.0.0.0? A. Class C network B. Class B network C. This is an experimental address range. D. This is a broadcast range.

C. This is an experimental address range.

You wish to kill a process with a PID of 123. Select the command which will allow the process to "clean up" before exiting. A. kill -1 123 B. kill -9 123 C. kill -15 123 D. kill -17 123

C. kill -15 123

Which of the following commands can be used to display the local routing table? (Choose TWO correct answers.) A. ifconfig B. dig C. netstat D. route E. trackroute

C. netstat D. route

What is the command to map a Windows user ID to a Linux user ID for use with the Samba Server? A. smbuser B. smbpasswd C. smbadduser D. useraddsmb E. useradd

C. smbadduser

Which two files in a user's home directory are used to customize the bash environment? A. bash and .bashrc B. bashrc and-bash_conf C. bashrc and bashprofile D. .bashrc and .bash_profile E. bash.conf and .bash_profile

D. .bashrc and .bash_profile

In GRUB's configuration file you find the line Root (hd1,4) What is corresponding device name on a Linux system? A. /dev/hda4 B. /dev/hda5 C. /dev/hdb4 D. /dev/hdb5

D. /dev/hdb5

What file determines the DNS servers used by your computer? A. /etc/hosts B. /etc/named.conf C. /etc/nsswitch.conf D. /etc/resolv.conf

D. /etc/resolv.conf

What is the output when the following shell script executes? Cat <<foobar Hello foobar foobar A. The contents of the file foobar B. Hello C. No output but a file named foobar is created D. Hello foobar E. Hello foobar

D. Hello foobar

You want to add an alias for an existing DNS record. What type of DNS record could you use? A. CNAME B. MX C. SOA D. NS

D. NS

Which signal is sent by the kill command by default? A. HUP(1) B. QUIT(3) C. KILL(9) D. TERM(15)

D. TERM(15)

Which of the following provides a non-graphical, text based interface for users who are visually impaired that can be used as a screen reader? A. easyspeech B. textconvert C. xscreen D. emacspeak

D. emacspeak

Which of the following services is NOT usually protected via TCP wrappers? A. ftp B. finger C. auth D. http

D. http

The legacy program for listing files in the printer queues from the command line is: A. lpd B. lpr C. lpstat D. lpq

D. lpq

Each entry in a crontab must end with what character? A. tab B. space C. backslash D. newline

D. newline

You enter the command date +%M. Wat does the output show you? A. the current year B. the current month C. the current hour D. the current minute E. the current second

D. the current minute

Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves? A. /etc/alias B. /etc/mail/forwarders C. ~/.alias D. ~/.forward

D. ~/.forward

User Sheets has been exiled to the marketing department who has a group name mktg. You now wish to change the primary group for the user Sheets to the mktg group. Type in the simplest command to do this?

usermod -g mktg Sheets

What command with options and arguments will display the mail servers for lpi.org?

Answer: dig lpi.org mx

In your DNS configuration, MX records are used to point to the _____ server(s) for your domain.

Answer: email

Which command allows to run a command in a modified environment, without changing the environment variables of the current shell? (Please provide the command name only, not the path.)

Answer: env

After modifying /etc/exports, what must be done to make the modifications available to users? Type the command with any options and arguments.

Answer: exportfs -a

What is a filesystem type the dump utility can work with?

Answer: ext2

What command with options will find all files on your system that have either the SUID or GUID bits set? Type the exact command with options to accomplish this.

Answer: find / -perm +6000

You can run the ________ command to see active network and UNIX domain socket connections as well as other open files. (Please specify the command with no path information, options or parameters)

Answer: lsof, /usr/bin/lsof

What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)

Answer: l

You have made changes to your /etc/lilo.conf file. Type in the simplest command that will reload the configuration to the MBR

Answer: lilo

What command can be used to generate log entries of any facility and priority? (supply just the command name without a path)

Answer: logger

Which program updates the database that is used by the locate command?

Answer: updatedb

You wish to add the user Sheets to the system including his home directory. Type in the simplest command to do this including switches

Answer: useradd -m Sheets

Type in the simplest command to do this including switches:

Answer: useradd -m king

You wish to remove the user stef from the system, including his home directories. Type in the simplest command to do this?

Answer: userdel -r stef

In the vi editor, which of the following commands will delete the current line at the cursor and the 16 lines following it (17 lines total)? A. 17d B. 17dd C. 17x D. d17d E. 16d

B. 17dd

Which of the following lines would you find in the file /etc/hosts? A. order hosts,bind B. 192.168.168.4 dns-server C. hosts: files dns D. domain mycompany.com

B. 192.168.168.4 dns-server

In what file are the mail aliases kept for Sendmail? (Provide the complete path) A. /etc/aliases B. /etc/mailaliases C. /etc/sendmail.aliases D. /etc/sendmail/aliases E. /var/spool/mail/aliases

A. /etc/aliases

In what file do you change default shell variables for all users? A. /etc/bashrc B. /etc/profile C. ~/.bash_profile D. /etc/skel/.bashrc E. /etc/skel/.bash_profile

A. /etc/bashrc

Where are the default settings for the useradd command kept? A. /etc/default/useradd B. /etc/sysconfig/useradd.cfg C. /etc/.useradd D. /etc/defaults/useradd E. /etc/login.defs

A. /etc/default/useradd

Shares can be configured for export via the NFS service by editing what file? A. /etc/exports B. /etc/export C. /etc/exportfs D. /etc/nfs/exports

A. /etc/exports

Which file is responsible for configuring the inet daemon? A. /etc/inetd.conf B. /etc/xinetd.conf C. /etc/tcpd.conf D. /etc/inet.conf

A. /etc/inetd.conf

What file allow admin to adjust number of mounts after which file system will be checked by e2fsck?

Answer: tune2fs

What file is displayed BEFORE users log in for users who log in to the machine locally? A. /etc/issue B. /etc/issue.net C. /etc/motd D. /etc/local.banner

A. /etc/issue

Which of the following commands loads the module file into the kernel and changes any symbols that are defined on the command line? A. insmod B. depmod C. modprobe D. setmod

A. insmod

Which port is the default server port for the HTTPS protocol? (Specify the port number using digits.)

Answer: 443

What section of the Man pages are system files mentioned in? Type the numeral of the section.

Answer: 5

Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this? A. /etc/X11/xdm/Xsetup B. /etc/X11/xdm.conf C. /etc/X11/xdm/Defaults D. /etc/X11/defaults.conf

A. /etc/X11/xdm/Xsetup

The ______ command is used to setup, view, and modify packet filtering, network and port translation, and other packet mangling rules within 2.4 and later kernel.

Answer: iptables

You can find out how much memory the kernel is using by taking the total amount of memory in your machine and subtracting from it the amount of: A. "total mem" in /proc/meminfo B. "total mem" in /proc/memused C. "total mem" in /proc/memcurrent D. None of the choices

A. "total mem" in /proc/meminfo

What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12? A. *.* /dev/tty12 B. /var/log/messages | /dev/tty12 C. | /dev/tty12 D. syslog tty12 E. mail.* /dev/tty12

A. *.* /dev/tty12

What entry can you add to syslog.conf file to have all syslog messages generated by your system go to virtual console 12? A. *.* /dev/tty12 B. /var/log/messages | /dev/tty12 C. | /dev/tty12 D. syslog tty12 E. mail.* /dev/tty12

A. *.* /dev/tty12

What Apache directive must you change when using inetd to control your Apache server? A. ServerType B. ServerInetd C. InetServer D. StartServer E. ServerMethod

A. ServerType

You wish to execute two commands, one after the other. However, you only want the second command to execute if the first is successful. Which character(s) do you put between the commands on the command line to accomplish this?

Answer: &&

The correct crontab entry in the minutes column to create a command in cron that runs every two minutes would be _____.

Answer: */2

A user wishes to modify his Environment variable PATH. What file should you tell him to edit in his home directory. Give filename only, no path.

Answer: .bash_profile

Where are command line aliases defined for a user? Type the full path and name of the file for the currently logged in user.

Answer: /.bashrc

What file would you edit to make the current user's vi session options always take effect? Type the full path and filename.

Answer: /.exrc

For the last command to work, what file must exist? Answer:

Answer: /VAR/LOG/WTMP

You've downloaded an image file of a boot floppy disk to your hard drive. What is the best utility to create a boot floppy from the disk image? (Specify a single command without options.)

Answer: /bin/dd

You wish to notify all users that you have to take down a service on which they rely. What command will allow you to send a message to all currently logged on users? Enter only the command, not the path.

Answer: wall

Which program finds only files that are in your PATH?

Answer: which

What directive in smb.conf specifies the domain or workgroup to join? Please enter only the directive below.

Answer: workgroup

You need to find the latest HOWTOs on using SATA devices. What web site hosts the latest HOWTOs?

Answer: www.serialata.org

What application can be used in place of xhost? Please enter only the name without path

Answer: xauth

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Provide only the name of the program without any path information)

Answer: xdm

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

Answer: xdm

In a networked environment, what command will grant anybody permission to display their X applications on a desktop? (Include both the command and argument(s).)

Answer: xhost +

You are running X in networked environment. You want to allow anyone on your network to display their X applications on your desktop. What command can you use to disable all access control for X?

Answer: xhost +

When you are looking for brief information about a program in your PATH with its associated man pages, you would use? A. which B. whereis C. locate D. where

B. whereis

Which TWO commands will find the path for the binary vim? A. man vim B. whereis vim C. apropos vim D. which vim

B. whereis vim D. which vim

Which command will create an ext3 filesystem on /dev/hda2? A. /sbin/mke2fs -d /dev/hda2 B. /sbin/mke2fs -j /dev/hda2 C. /sbin/mke2fs -m 3 /dev/hda2 D. /sbin/mke2fs -c ext3 /dev/hda2

B. /sbin/mke2fs -j /dev/hda2

The sticky bit is usually set on A. /var/log B. /tmp C. /home D. log liles

B. /tmp

The command mkfs -t ext3 /dev/hdb1 -T largefile creates what size of inode? A. 4 kilobyte B. 1 megabyte C. 2 megabyte D. 4 megabyte

B. 1 megabyte

What is the default process priority when a process is started using the nice command? A. -10 B. 10 C. 20 D. 0

B. 10

Your IP address is 170.35.13.28 and your network mask is 255.255.255.192. What host IP address is NOT a part of your local subnet? A. 170.35.13.33 B. 170.35.13.88 C. 170.35.13.62 D. 170.35.13.55

B. 170.35.13.88

Select the line that best represents what permissions the /etc/passwd file should have A. -rw------- 1 root root 531 Apr 3 12:36 /etc/passwd B. -rw-r--r-- 1 root root 531 Apr 3 12:36 /etc/passwd C. -rw-r--r-- 1 1 1 531 Apr 3 12:36 /etc/passwd D. all answers listed are not correct E. all answers listed are correct

B. -rw-r--r-- 1 root root 531 Apr 3 12:36 /etc/passwd

The message "Hard Disk Error" is displayed on the screen during Stage 1 of the GRUB boot process. What does this indicate? A. The kernel was unable to execute/bin/init B. The next Stage cannot be read from the hard disk because GRUB was unable to determine the size and geometry of the disk C. One or more of the filesystems on the hard disk has errors and a filesystem check should be run D. The BIOS was unable to read the necessary data from the Master Boot Record to begin the boot process

B. The next Stage cannot be read from the hard disk because GRUB was unable to determine the size and geometry of the disk

Which command allows you to make a shell variable visible to subshells? A. export $VARIABLE B. export VARIABLE C. set $VARIABLE D. set VARIABLE E. env variable

B. export VARIABLE

Which option in the /etc/fstab file causes all users IDs to be mapped to the system's anonymous ID when mounting a NFS mounted file system? A. no-root-squash B. all-squash C. all-id-squash D. root-squash

B. all-squash

What command will display all of the background tasks running in the current shell? A. history B. jobs C. kill -l D. list

B. jobs

What command will convert your shadow password file to md5 compatible passwords? A. passconv B. pwconv C. mdconv D. mdsum E. passwd --convert

B. pwconv

Which of the following commands can be used to locate programs and their corresponding man pages and configuration files? A. locate B. which C. find D. query E. whereis

E. whereis

To what environment variable will you assign or append a value if you need to tell the dynamic linker to look in a build directory for some of a program's shared libraries? A. LD_LOAD_PATH B. LD_LIB_PATH C. LD_LIBRARY_PATH D. LD_SHARE_PATH E. LD_RUN_PATH

C. LD_LIBRARY_PATH

To prevent a specific user from scheduling tasks with at, what should the administrator do? A. Add the specific user to /etc/at.allow file. B. Add the specific user to [deny] section in the /etc/atd.conf file. C. Add the specific user to /etc/at.deny file. D. Add the specific user to nojobs group. E. Run the following: atd -deny [user].

C. Add the specific user to /etc/at.deny file.

Which of the following statements is valid in the file /etc/nsswitch.conf? A. multi on B. 192.168.168.4 dns-server C. hosts: files dns D. include /etc/nsswitch.d/

C. hosts: files dns

What is true about the ntpdate command? A. It is the primary management command for the NTP time server. B. It updates the local system's date (i.e. day, month and year) but not the time (i.e. hours, minutes, seconds). C. It queries one or more NTP time servers and adjusts the system time accordingly. D. It sends the local system time to one or many remote NTP time servers for redistribution. E. It can be used by any user to set the user clock independently of the system clock.

C. It queries one or more NTP time servers and adjusts the system time accordingly.

Which of the following commands can deconfigure a network interface? A. ipdown B. net C. ifconfig D. netdown

C. ifconfig

Visit our reseller at www.company.com for lastest version and special price! A cronjob must run at least every 11 minutes. The job may take up to 7 minutes to complete, and there mustn't be two jobs at the same time. Which crontab line solves the problem? A. */8 * * * * myjob B. */9 * * * * myjob C. */10 * * * * myjob D. */11 * * * * myjob E. */12 * * * * myjob

C. */10 * * * * myjob

An installed package is broken. In order to go back to the previous version of the same package which RPM option should be used? A. --replacefiles B. --replacepkgs C. --oldpackage D. --nodeps

C. --oldpackage

Which command line option would you use to restrict the GNU find command to searching a particular number of subdirectories? A. --max-dirs B. -dirmax C. -maxdepth D. -s E. -n

C. -maxdepth

Which command will allow you to find a specific installed package? A. rpm -- list rpmname B. rpm -qvl rpmname C. rpm rpmname D. rpm -qv rpmname E. rpm -f rpmname

D. rpm -qv rpmname

Which of the following files has the correct permissions? A. rw--w--w- 1 root root 369 Dec 22 22:38 /etc/shadow B. rwxrw-rw- 1 root root 369 Dec 22 22:38 /etc/shadow C. rw-r--r-- 1 root root 369 Dec 22 22:38 /etc/shadow D. rw------- 1 root root 369 Dec 22 22:38 /ect/shadow

D. rw------- 1 root root 369 Dec 22 22:38 /ect/shadow

Which of the following sed commands will replace all instances of the string foo with the string foobar changing the file file1.txt in place? A. sed 's/foo/foobar/g' file1.txt B. sed 's/foo/foobar/g' file1.txt > file1.txt C. sed 's/foo/foobar/g' file1.txt | file1.txt D. sed -i 's/foo/foobar/g' file1.txt E. sed -i 's/foo/foobar/g' file1.txt > file1.txt

D. sed -i 's/foo/foobar/g' file1.txt

In order to append the output of ls to a file called bazz, which of the following command lines would you use? A. ls > bazz B. ls >& bazz C. ls &> bazz D. ls >> bazz

D. ls >> bazz

While installing from source code you don't see the configuration script. What command can you run to compile the code? A. make configure B. install C. install makefile D. make

D. make

Your department decided to change the Gnome Display Manager's greeting. What configuration file should you edit? A. /etc/gnome/greeting B. /opt/gnome/share/greeting C. /etc/X11/gmd.conf D. /etc/X11/gdm/Init/Default

D. /etc/X11/gdm/Init/Default

You want the default permissions for your files to be -rw-r----- . HOW must you set umask? A. 037 B. 640 C. 038 D. 027

D. 027

Where can lilo place boot code? A. The boot ROM B. The boot RAM C. The /boot partition D. The MBR on a hard drive

D. The MBR on a hard drive

Given the following routing table: Kernel IP routing table Destination Gateway Genmask Flags Metric 0.0.0.0 192.168.178.1 0.0.0.0 US 0 192.168.1.0 0.0.0.0 255.255.255.0 U 0 172.168.2.0 192.168.1.1 255.255.255.0 U 0 192.168.172.0 0.0.0.0 255.255.255.0 U 9 How would an outgoing packet to the destination 192.168.2.150 be handled? A. It would be passed to the default router 192.168.178.1 on wlan0. B. It would be directly transmitted on the device eth0. C. It would be passed to the default router 255.255.255.0 on eth0. D. It would be directly transmitted on the device wlan0. E. It would be passed to the router 192.168.1.1 on eth0.

E. It would be passed to the router 192.168.1.1 on eth0.

Users may create and edit a configuration file in their home directory that can tell the X window system what window manager they wish it to start when they log in. What file is that? A. $HOME/.wmrc B. $HOME/.startx C. $HOME/.Xdefaults D. $HOME/.xserverrc E. $HOME/.xinitrc

E. $HOME/.xinitrc

What directory be default contains the delivered mail for each user? A. ~/mail/ B. /usr/mail/ C. /var/mail/ D. /var/mail/spool/ E. /var/spool/mail/

E. /var/spool/mail/

Which port is used for DNS? A. 110 B. 21 C. 23 D. 52 E. 53

E. 53

You are formatting a single hard disk for a Linux install. What is the maximum number of primary partitions you can create? A. 0 B. 1 C. 2 D. 3 E. 4 F. 5

F. 5

What is the difference between the --remove and the--purge action with the dpkg command? A. --remove removes the program, --purge also removes the config files B. --remove only removes the program, --purge only removes the config files C. --remove removes a package, --purge also removes all packages dependent on it D. --remove removes only the package file itself, --purge removes all files related to the package

A. --remove removes the program, --purge also removes the config files

The user bob complains that he cannot access his email. In witch directory would you look to see if there is any deliverable email for him? A. /var/spool/mail B. /var/mail/mqueue C. /var/spool/mqueue D. /home/bob/.mail

A. /var/spool/mail

Which TWO runlevels should never be declared as the default runlevel? A. 0 B. 3 C. 5 D. 6

A. 0 D. 6

What output will the following command produce? seq 1 5 20 A. 1 6 11 16 B. 1 5 10 15 C. 1 2 3 4 D. 2 3 4 5 E. 5 10 15 20

A. 1 6 1 1 1 6

What output will the following command produce? seq 1 5 20 A. 1 6 11 16 B. 1 5 10 15 C. 1 234 D. 2 345 E. 5 10 15 20

A. 1 6 11 16

Where can the lilo command install the boot menu and information? Choose all that apply. A. Master Boot Record B. BIOS C. First Sector of a Partition D. BootBlk E. Boot Prom

A. Master Boot Record C. First Sector of a Partition

What is true about the root user and NFS? A. NFS shares don't allow root access by default B. NFS automatically masks out share permissions C. NFS automatically maps all root UID's to the local user "rootsquash" D. NFS ignores all users with a UID of 0 and a GID of 0 E. NFS pays no attention whatsoever to security

A. NFS shares don't allow root access by default

Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Choose THREE correct answers.) A. Postfix B. Procmail C. Sendmail D. Exim E. SMTPd

A. Postfix C. Sendmail D. Exim

What would the following command do? cat hosts | lpr -#2 A. Print the file hosts on the default printer two times. B. Categorize hosts and print the categorization as job #2. C. Output the file hosts to the line printer and assign it to the second printer queue. D. Print the hosts file to STDOUT and assign the current print job to printer tray number 2.

A. Print the file hosts on the default printer two times.

When you use DNS to find a hostname using a particular IP address, which kind of DNS entry is involved? A. Reverse DNS entries B. IP DNS entries C. Address DNS entries D. Network DNS entries

A. Reverse DNS entries

Which of the following details is NOT provided in any output from the netstat utility? A. broadcast services B. interface statistics C. masquerading connections D. network connections E. routing tables

A. broadcast services

Which of the following commands shows ONLY the user id of Bob? (Select TWO) A. cat /etc/passwd | grep Bob | cut -d: -f3 B. cat /etc/passwd | grep Bob | cut -f: -d3 C. grep Bob /etc/passwd | awk -F: '\'7b print $3 }' D. grep Bob /etc/passwd | awk -f: '\'7b print $3 }' E. grep Bob /etc/passwd | cut -F: -d3

A. cat /etc/passwd | grep Bob | cut -d: -f3 C. grep Bob /etc/passwd | awk -F: '\'7b print $3 }'

Identify the proper device for the third partition on the only SCSI drive on the system. A. /dev/hda3 B. /dev/sd0a3 C. /dev/sda3 D. /dev/sd1p3

C. /dev/sda3

Which directory tree is ordinarily the least likely to be backup or restore? A. /tmp B. /var C. /proc D. /usr E. /usr

C. /proc

What is the highest numbered TCP/IP port? A. 2047 B. 32767 C. 65535 D. 131071

C. 65535

Which of the following commands is used on the command line to send messages to the syslog systems. A. lastlog B. klog C. logger D. slog E. syslog

C. logger

What program do you use to suspend a printer queue? A. lpr B. lpq C. lpc D. lpd E. lprm

C. lpc

What command should be entered to print and then delete the file, foobar.txt? A. lpr -o delete foobar.txt B. lpr -d foobar.txt C. lpr -r foobar.txt D. lpr -o remove foobar.txt

C. lpr -r foobar.txt

If you want to print a listing of your computer's mail queues, what command would you use? A. sendmail -l B. lpq C. mailq D. mlq

C. mailq

Which directory in a user's home contains configuration files and key rings for GPG? A. ~/gpg.d/ B. ~/.gpg/ C. ~/.gnupg/ D. ~/gnupg/ E. ~/.gpg.d/

C. ~/.gnupg/

Which of the following commands will find the string foo in the file filel.txt, regardless of foo being in upper or lowercase letters? A. cat file1.txt | grep -i foo B. cat file1.txt > grep -n foo C. grep -i foo | file1.txt D. grep -n file1.txt < foo E. grep -n foo file1.txt

A. cat file1.txt | grep -i foo

Type in the full path and name of the global environment and startup program configuration file This file typically contains the PATH, umask and ulimit system wide settings.

Answer: /etc/profile

Undelivered mail for local system users is stored in what directory? Type the full path of the directory.

Answer: /var/spool/mail/username

In what directory does undelivered remote mail get stored in? Type the full path and name of the file.

Answer: /var/spool/mqueue

What is considered the normal exit value of a process?

Answer: 0 (or Zero)

What umask value will result in the default access permissions of 600 (rw-------) for files and (rwx ------) for directories? (Provide only the numerical umask value)

Answer: 077

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Answer: 1024

How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

Answer: 14

With IPv6, how many bits have been used for the interface identifier of an unicast address? (Specify the number using digits only.)

Answer: 64

You wish to list out in text all the daemons running and stopped on your system for all run levels. Type in the simplest command

Answer: chkconfig --list

NTP is used to synchronize the system ____ with a central system resource.

Answer: clock

Which file the /proc filesystem lists parameters passed from the bootloader to the kernel?

Answer: cmdline

What is the name of the Kernel configuration file? Type just the filename

Answer: config

What file or utility is used by normal users to configure the cron daemon? Type in the name of the tool only

Answer: crontab

You wish to make changes to your crontab entry. Type in the simplest command to make this change?

Answer: crontab -e

What is the exact, case-sensitive option that governs flow-control for the ppp daemon?

Answer: crtscts

An administrator has added the following line to /etc/inittab in order to disable the ability to reboot a Debian system by pressing the Control + Alt + Delete keys simultaneously: ca:12345:_________:/bin/echo "Rebooting disabled"

Answer: ctrlaltdel

The ______ command is used to print out the current date and time on the system.

Answer: date

Which command will display messages from the kernel that were output during the normal bootup sequence?

Answer: dmesg

Within a script you need to create a loop. Following the for variable in list, the statements to be looped are found between the keywords ____ and done.

Answer: do

What is the file that contains the settings and conversion parameters for the ftp server? Type in the ame of the file only

Answer: ftpconversions

What file is used to define a list of users that may NOT login to via the ftp daemon? Type just the name of the file.

Answer: ftpusers

What commmand can you use to determine the users connected to a Linux ftp server? Type just the command to accomplish this.

Answer: ftpwho

What command would be used to check the gpgp signature on a downloaded source file? Type just the name of the command.

Answer: gpg

You need to find all references in system document to the word "backup". What command would you type? (Do not provide full path).

Answer: grep

You need to find all references in system documentation to the word backup. What command would you type? (Do not provide full path)

Answer: grep

You are logged in as root. What command do you run to find out what groups user bruno belongs to?

Answer: groupsbruno

What command returns the first few lines of a given file?

Answer: head

What command is used to display a file in octal format?

Answer: hexdump

Which command is used to set the hostname of the local system? (Specify ONLY the command without any path or parameters.)

Answer: hostname

In the /etc/nsswitch.conf file, which directive specifies what "databases" are queried and in what order for host name lookups?

Answer: hosts

You need to access the site for HOWTO's, Guides and mini HOWTO's. Type in the full URL as it would appear in any browser, including the protocol.

Answer: http://www.tldp.org

You need to sync your hardware clock, which is on GMT, with your system clock, which you just updated with NTP. To do this, complete the following command: _________ -u --systohc

Answer: hwclock

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Answer: hwclock, /sbin/hwclock, /usr/sbin/hwclock

An administrator needs to sync the hardware clock with their system clock. In order to accomplish this, complete the following command: ________ -u --systohc

Answer: hwclock, /usr/sbin/hwclock, /sbin/hwclock

What command will display the group names and GIDs to which a user belongs? (Provide only the command name with or without path information)

Answer: id, /usr/bin/id

Which user-level program, when manually executed by the root user, is used to change the runlevel of the system? (Provide only the command with no additional options or parameters)

Answer: init

You are in run level 5 and wish to change to run level 1. Type in the simplest command to do this?

Answer: init 1

You wish to install the module fat.o into the kernel. Type in the simplest command to do this. Assume there are no dependancies for this module.

Answer: insmod fat

In an xinetd config file, which attribute specifies which interface will be used to offer the service?

Answer: interface

You suspect that a new ethernet card might be conflicting with another device. Which file should you check within the /proc tree to learn which IRQs are being used by which kernel drives?

Answer: interrupts

What command with all options and/or parameter will send the signal USR1 to any executing process of program apache2?

Answer: killall -s SIGUSR1 apache2

Type in the simplest command to list all loaded modules?

Answer: lsmod

What command would create the following output without using any arguments or options? Module Size Used by nls_iso8859-1 2880 0 (autoclean) nls_cp437 4384 0 (autoclean) ....

Answer: lsmod

The _______ command prints a list of email that is currently in the queue waiting for delivery.

Answer: mailq

What command is used to print a listing of e-mail that is currently being managed by the MTA but has not yet been delivered? (Please specify the command with or without path)

Answer: mailq, /usr/bin/mailq, sendmail -bp, /usr/sbin/sendmail -bp, /usr/lib/sendmail -bp

Which command, available with all MTAs, is used to list the contents of the MTA's mail queue? (Specify ONLY the command without any path or parameters.)

Answer: mailq, /usr/bin/mailq, sendmail -bp, /usr/sbin/sendmail -bp, /usr/lib/sendmail -bp, sendmail, /usr/sbin/sendmail, /usr/lib/sendmail

You are compiling some software from source. After running ./configure with the appropriate arguments and no errors, what is the next command to run?

Answer: make

Type in the command to compile a kernel image with normal compression

Answer: make bzImage

You are working on a non graphical shell. What command would you use to configure the kernel using a menu system. Type the command and its argument(s).

Answer: make menuconfig

You are using X and wish to build a new kernel. What X tool would you use to build the .config file. Type in just the command, not switches

Answer: make xconfig

Which of the following files assigns a user to its primary group? A. /etc/pgroup B. /etc/shadow C. /etc/group D. /etc/passwd E. /etc/gshadow

D. /etc/passwd

What configuration files on a Linux Server can be configured to share file systems with clients? Choose Two. A. /etc/nmbd B. /etc/smbd C. /etc/smb/samba.conf D. /etc/smb.conf E. /etc/samba/smb.conf

D. /etc/smb.conf E. /etc/samba/smb.conf

The/etc/ ________ file lists currently mounted devices.

Answer: mtab

What commands with any options, will cause sendmail to recognize newly added aliases while it's running?

Answer: sendmail -bi

To slave the NTP daemon to an external source, an administrator needs to modify the ______ variable in the /etc/ntp.conf file.

Answer: server

What is the command to check the syntax of your /etc/inetd.conf?

Answer: tcpdchk

Which configuration file would be edited to change the default options for outbound SSH sessions? A. /etc/ssh/sshd_config B. /etc/ssh/ssh C. /etc/ssh/client D. /etc/ssh/ssh_config E. /etc/ssh/ssh_client

D. /etc/ssh/ssh_config

Which configuration file would you edit to change default options for outbound ssh sessions? A. /etc/ssh/sshd_config B. /etc/ssh/ssh C. /etc/ssh/client D. /etc/ssh/ssh_config E. /etc/ssh/ssh_client

D. /etc/ssh/ssh_config

You are installing Linux on a workstation for a new employee. Which partition should be largest? A. / B. /boot C. /lib D. /usr

D. /usr

Which of the following lines would you find in the file /etc/resolv.conf? A. order hosts,bind B. 192.168.168.4 dns-server C. hosts: files,= dns D. domain mycompany.com

D. domain mycompany.com

The legacy program for sending files to the printer queues from the command line is: A. lpd B. lpr C. lpq D. lpp

B. lpr

Which of the following commands will send output from the program myapp to both standard output (stdout) and the file file1.1og? A. cat < myapp | cat > file1.1og B. myapp 0>&1 | cat > file1.1og C. myapp | cat > file1.1og D. myapp| tee file1.1og E. tee myapp file1.1og

D. myapp| tee file1.1og

You want to examine the changelog for the installed package postfix. Which command will display the changelog? A. rpm -Vc postfix B. rpm -qpil postfix C. rpm --changelog postfix D. rpm -q --changelog postfix E. rpm -qa --changelog postfix

D. rpm -q --changelog postfix

Which of these commands allows you to use shared libraries that are in /usr/local/lib? A. export LD_PRELOAD=/usr/local/lib B. export LD_LIBRARY_PATH=/usr/local/lib C. ldconfig /usr/local/lib D. ldd /usr/local/lib

C. ldconfig /usr/local/lib

What command will remove duplicate lines from a sorted file? A. filter B. trim C. uniq D. wc

C. uniq

What command option of modinfo can display its version number? A. -V B. -i C. -I D. -A

A. -V

What option of modprobe specifies the loading of all matching modules instead of stopping after the first successful loading? A. -a B. -f C. -c D. -e

A. -a

Which option to the tee command will cause the output to be concatenated on the end of the output file instead of overwriting the existing file contents? A. -a B. -c C. -no-clobber D. -continue

A. -a

What command option of depmod allows you to print a list of all unresolved symbols? A. -e B. -l C. -i D. -a

A. -e

What option of the insmod command can you use to force the loading of module even if problems are encountered? A. -f B. -F C. -u D. -r

A. -f

What option of modprobe allows you to set 'autoclean' on the loaded modules? A. -k B. -d C. -c D. -e

A. -k

Which of the following options will speed up traceroute for distant network queries? A. -n B. -p C. -0 D. -t E. -q

A. -n

After a minor security incident you are instructed by your lead sys-admin to verify the RPM's installed on running system. Which command will create a complete report which you can analyze for changes which may be security related? A. .rpm-Va>report B. rpm-Qavy > report C. rpm-Vqt-- nomd5>report D. rpm-checkfiles >report E. rpm-Va-nofiles > report

A. .rpm-Va>report

Identify the proper device for the third partition, on the second hard disk, on the first IDE controller on a C system. A. /dev/hdb3 B. /dev/hdlb3 C. /dev/hdclb3 D. /dev/hdcld2p3

A. /dev/hdb3

Identify the proper device for the third partition, on the second hard disk, on the first IDE controller on a PC system. A. /dev/hdb3 B. /dev/hd1b3 C. /dev/hdc1b3 D. /dev/hdc1d2p3

A. /dev/hdb3

Which file used by XDM specifies the default wallpaper? A. /etc/X11/xdm/Xsetup B. /etc/X11/xdm.conf C. /etc/X11/xdm/Defaults D. /etc/X11/defaults.conf

A. /etc/X11/xdm/Xsetup

You have just set up the X Display Manager as your default display manager. What file should you edit to change the default background for it? A. /etc/X11/xdm/Xsetup B. /etc/X11/prefdm C. /etc/X11/XF86Config D. /etc/X11/xdm.conf

A. /etc/X11/xdm/Xsetup

You have just set up the X Display Manager as your default display manager. What file should you edit to change the default background for it? A. /etc/X11/xdm/Xsetup B. /etc/X11/prefdm C. /etc/X11/xorg.conf D. /etc/X11/xdm.conf

A. /etc/X11/xdm/Xsetup

Which two files are responsible for allowing users to execute cron jobs? A. /etc/cron.allow B. /var/spool/cron.allow C. /var/spool/cron.allow D. /etc/cron.deny

A. /etc/cron.allow D. /etc/cron.deny

What files affect the functioning of TCP Wrappers? Choose Two. A. /etc/hosts.deny B. /etc/nsswitch.conf C. /etc/security/authconfig D. /etc/default/clients E. /etc/hosts.allow

A. /etc/hosts.deny E. /etc/hosts.allow

Which file is used by ld.so to find libraries quickly without actually having to search the directories in its library path? A. /etc/ld.so.cache B. /etc/ld.so.conf C. /etc/ld.so D. /var/ld/cache E. /var/.cache

A. /etc/ld.so.cache

Where can you specify options that affect the booting of the system? A. /etc/lilo.conf B. boot= prompt C. linux: D. init 3 E. init 5

A. /etc/lilo.conf B. boot= prompt

What should the permission settings be for /etc/passwd and /etc/shadow? A. /etc/passwd: -rw-r-r- /etc/shadow: -r- B. /etc/passwd: -r- /etc/shadow: -rw-r-r- C. /etc/passwd: -rw-r-r- /etc/shadow: -rw-r-r- D. /etc/passwd: -r- /etc/shadow: -r-

A. /etc/passwd: -rw-r-r- /etc/shadow: -r-

What two files acting together make up the login environment for a user on a default install of Linux? A. /etc/profile B. /etc/bashrc C. /etc/.login D. ~/.bash_profile E. /etc/.profile

A. /etc/profile D. ~/.bash_profile

What files affect the name resolution functionality of a Linux host? Choose Three. A. /etc/resolv.conf B. /etc/hosts C. /etc/default/names D. /etc/nsswitch.conf E. /etc/inet/hosts

A. /etc/resolv.conf B. /etc/hosts D. /etc/nsswitch.conf

What system file contains definitions of well known ports, their associated services and protocols? A. /etc/services B. /etc/sysconfig/network-scripts C. /etc/services.conf D. /etc/inet/hosts E. None of the choices

A. /etc/services

Which configuration file would be edited to change default options for the OpenSSH server? A. /etc/ssh/sshd_config B. /etc/ssh/ssh C. /etc/ssh/server D. /etc/ssh/ssh_config E. /etc/ssh/ssh_server

A. /etc/ssh/sshd_config

Which file contains information about all loaded modules? A. /proc/modules B. /etc/modules.conf C. /etc/conf.modules D. /lib/modules/kernel-version/modules.dep E. /proc/mod

A. /proc/modules

The information displayed by lsmod is identical to that available from: A. /proc/modules. B. /proc/depmod. C. /proc/ls. D. /proc/lsmod.

A. /proc/modules.

The normal use of depmod is to include which of the following lines in one of the files in /etc/rc.d so the correct module dependencies will be available after booting the system? A. /sbin/depmod -a B. /sbin/depmod -p C. /sbin/depmod -r D. /sbin/depmod -c

A. /sbin/depmod -a

In compliance with the FHS, in which of the following places are man pages typically found? A. /usr/share/man B. /opt/man C. /usr/doc D. /var/pkg/man E. /usr/local/man

A. /usr/share/man

What runlevels should never be declared as the default runlevel in /etc/inittab? A. 1 B. 3 C. 5 D. 6

A. 1 D. 6

Which of the following IP networks does RFC1918 reserve for use on private intranets? (Choose two) A. 10.0.0.0 B. 224.0.0.0 C. 199.14.0.0 D. 172.152.0.0 E. 192.168.0.0

A. 10.0.0.0 E. 192.168.0.0

Which of the following IP address ranges are considered private, according to RFC 1918? Choose all that apply. A. 10.0.0.0 - 10.255.255.255 B. 192.168.0.0 - 192.168.255.255 C. 172.16.0.0 - 172.31.255.255 D. 191.168.16.0 - 192.168.31.255 E. 172.16.0.0 - 172.16.255.255

A. 10.0.0.0 - 10.255.255.255 B. 192.168.0.0 - 192.168.255.255 C. 172.16.0.0 - 172.31.255.255

What is the binary conversion of the IP address 192.168.1.10? A. 11000000.10101000.00000001.00001010 B. 01101010.11000100.10101000.00000001 C. 00000001.00001010.11000000.10101000 D. 10101000.00000001.00001010.11000000 E. None of the choices

A. 11000000.10101000.00000001.00001010

Consider the following command and an abbreviated version of its output: $ netstat nr Kernel IP routing table Destination Gateway Genmask Flags Iface 192.168.165.0 0.0.0.0 255.255.255.0 U eth0 127.0.0.0 0.0.0.0 255.0.0.0 U lo0 0.0.0.0 192.168.165.1 0.0.0.0 UG eth0 What is the default gateway for the network? A. 192.168.165.1 B. 255.0.0.0 C. 255.255.255.0 D. 0.0.0.0 E. 192.168.165.0

A. 192.168.165.1

Which ports are used for FTP data and control? Choose Two. A. 20 B. 23 C. 22 D. 21 E. 25

A. 20 E. 25

Which of the following is a valid IPv6 address? A. 2001:db8:3241::1 B. 2001::db8:4581::1 C. 2001:db8:0g41::1 D. 2001%db8%9990%%1 E. 2001.db8.819f..1

A. 2001:db8:3241::1

Which of the following lines are valid in the file /etc/hosts? (Choose TWO correct answers.) A. 2001:db8::15 www.example.com www B. www.example.com www 203.0.13.15 C. 203.0.113.15 www.example.com www D. www.example.com,www 203.0.13.15,2001:db8::15 E. 2003.0.113.15,2001:db8::15 www.example.com www

A. 2001:db8::15 www.example.com www C. 203.0.113.15 www.example.com www

Which of the following will run a file named myscript every 23 minutes past midnight every two hours? A. 23 0-23/2 * * * /myscript B. 23 */0-23 * * * /myscript C. 23 @2 * * * /myscript D. 11 2/0-23 * * * /myscript

A. 23 0-23/2 * * * /myscript

You want to save vi changes to the file myfile with :w!, but vi complains it can not write to the file. Therefore, you want to check the write permissions on the file. To do this without leaving vi, you type: A. :!ls -l myfile B. :\ls -l myfile C. esc :ls -l myfile D. :?ls -l myfile

A. :!ls -l myfile

What command line redirection characters instruct the shell to read from the current input source until a specific word, on a separate line and without and trailing spaces, is reached? A. << B. <l C. !< D. $<

A. <<

When in Normal mode in vi, which command character can be used to begin a reverse search of the text? A. ? B. / C. F D. r

A. ?

After issuing: function myfunction { echo $1 $2 ; } in Bash, which output does: myfunction A B C Produce? A. A B B. A B C C. A C D. B C E. C B A

A. A B

When an Apache server is configured to provide 10 spare server processes, which kind of website would it typically serve? A. A low-to-moderate volume website B. A website for no more than 10 users C. A high volume web site D. A one-user volume website

A. A low-to-moderate volume website

The directory location /usr/share/doc contains what files? A. All documentation created from application source code. B. All documentation you wish to share with other users. C. Supplemental information about installed packages. D. Programs for reading documentation.

A. All documentation created from application source code.

A French user has installed the French language pack, but currencies are still being displayed with a leading '$' sign in his spreadsheets. What must be done to fix this? A. Alter the locale. B. Set the timezone correctly. C. Edit /etc/currency. D. Reinstall the French language pack.

A. Alter the locale.

Which TWO of the following are used in configuration files to create Apache webserver user authentication? (Please select TWO that apply) A. AuthUserFile /etc/apache2/users B. AuthName C. Authentication = Yes D. +Auth E. Authentication

A. AuthUserFile /etc/apache2/users B. AuthName

Why is the correct configuration of a system's time zone important? A. Because the conversion of Unix timestamps to local time relies on the time zone configuration. B. Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created. C. Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone. D. Because NTP chooses servers nearby based on the configured time zone.

A. Because the conversion of Unix timestamps to local time relies on the time zone configuration.

Which of the following information is NOT provided in any output from the netstat utility? A. Broadcast services B. Interface statistics C. Masquerading connections D. Network connections E. Routing tables

A. Broadcast services

On a default install of a Linux server, regardless of the distribution version, what are the easiest methods to disable telnet, but not uninstall or remove the service? Choose two. A. Comment telnet out of the /etc/inetd.conf file B. Delete the /etc/rc.d/init.d/telnet file C. Rename all SXXtelnet links in the /etc/rc or /etc/rc.d directories D. Run "chmod 554 /etc/xinetd.d/telnet" E. Nothing, it's not enabled by default

A. Comment telnet out of the /etc/inetd.conf file E. Nothing, it's not enabled by default

What key sequence will suspend the current process and return you to a shell prompt? A. Ctrl-z B. Ctrl-c C. Ctrl-x D. Ctrl-d

A. Ctrl-z

You are using an application that you want to appear on the screen of another machine. What environment variable would you have to set or edit to achieve this? A. DISPLAY B. REMOTE C. REMOTE_XWINDOW D. SCREEN

A. DISPLAY

Your DNS server needs to be configured for speed and security. Choose the best answer. A. Disable inetd, run named standalone, only allow tcp on ports 25 and 53 B. Disable inetd, run named standalone, only allow tcp on ports 25 and 110 C. Enable inetd, run named as an inetd service, only allow tcp on ports 25 and 53 D. Disable inetd, run named as a standalone on the apache server.

A. Disable inetd, run named standalone, only allow tcp on ports 25 and 53

Which TWO statements about crontab are true? A. Every user may have their own crontab. B. Changing a crontab requires a reload/restart of the cron daemon. C. The cron daemon reloads crontab files automatically when necessary. D. hourly is the same as "0 * * * *". E. A cron daemon must run for each existing crontab.

A. Every user may have their own crontab. C. The cron daemon reloads crontab files automatically when necessary.

On a default Linux system, what file system type does the dump command act upon? A. Ext2 B. UFS C. JFS D. XFS E. ReiserFS

A. Ext2

You need to install a fax server. Which type of fax/modem should you install to insure Linux compatibility? A. External Serial Fax/modem B. External USB Fax/modem C. Internal ISA Fax/modem D. Internal PCI Fax/modem

A. External Serial Fax/modem

Which backup method will require the minimum tapes to restore? A. Full B. Incremental C. Differential D. Copy E. DirTree

A. Full

Which backup method resets the archive bit? Select all that apply. A. Full B. Incremental C. Differential D. Copy E. DirTree

A. Full B. Incremental

Which bootloader can lie to Windows and make Windows believe that it's installed on the first partition even if it's not? A. GRUB B. XLoad C. LILO D. FILO

A. GRUB

Which protocol is used for the majority of the ping command's actions? A. ICMP B. UDP C. TCP D. NDP E. NCP

A. ICMP

Which of the following is the purpose of the nsswitch.conf file? A. It is used to configure where the C library looks for system information such as host name services and user passwords. B. It is used to configure network protocol port numbers such as for HTTP or SMTP. C. It is used to configure LDAP authentication services for the local system. D. It is used to configure which network services will be turned on during the next system reboot

A. It is used to configure where the C library looks for system information such as host name services and user passwords.

What is the purpose of the nsswitch.conf file? A. It is used to configure where the C library looks for system information such as host names and user passwords. B. It is used to configure network protocol port numbers such as for HTTP or SMTP. C. It is used to configure LDAP authentication services for the local system. D. It is used to configure which network services will be turned on during the next system boot.

A. It is used to configure where the C library looks for system information such as host names and user passwords.

What is the purpose of a screen reader? A. It reads text displayed on the screen to blind or visually impaired people. B. It reads the parameters of the attached monitors and creates an appropriate X11 configuration. C. It displays lines and markers to help people use speed reading techniques. D. It manages and displays files that contain e-books.

A. It reads text displayed on the screen to blind or visually impaired people.

What is the purpose of the xargs command? A. It will read standard input and execute command lines with the read input. B. It will get user input from the graphical environment. C. It will clean up command line arguments and verify syntactic correctness. D. It will pass arguments on the command line to a new graphical application. E. It will allow users to specify long options for commands that normally only accept short options.

A. It will read standard input and execute command lines with the read input.

When generating new authentication keys with SSH for a user, where should the private key be kept? A. On any trusted system from which the user will login. B. On a CD-ROM or USB stick. C. Printed and kept in a secure place. D. Only on the computer where the key was created. E. SSH does not use private keys.

A. On any trusted system from which the user will login.

What is true regarding TCP port 23? A. Port 23 is the well known port for the telnet service which is a plain text protocol that should no longer be used. B. Port 23 is the well known port for the SSH service which provides secure logins. C. Port 23 is the well known port for the rlogin service which is SSL secured by default. D. Port 23 is the well known port for the system login services which are encrypted when the user runs the starttls command in his login shell.

A. Port 23 is the well known port for the telnet service which is a plain text protocol that should no longer be used.

Which of the following is very important when installing from source code (Check TWO that apply)? A. Read all documentation included with the source code. B. Reboot after installing all programs. C. Manually check to see if all dependencies are met. D. Use rpm or dpkg go verify the installation. E. Do not install binaries as the root user.

A. Read all documentation included with the source code. C. Manually check to see if all dependencies are met.

Which of the following steps prevents a user from obtaining an interactive login session? A. Run the command chsh -s /bin/false with the user name. B. Set the UID for the user to 0. C. Remove the user from the group staff. D. Add the user to /etc/noaccess. E. Create a .nologin file in the user's home directory.

A. Run the command chsh -s /bin/false with the user name.

You ran out of space and added a eighth disk to your SCSI-I system. When you try to start, the system no longer boots. What is most likely the cause of this problem? A. SCSI-I supports only 8 devices including the adaptor B. SCSI-I supports only6 disks per adaptor C. There is a SCSI-ID conflict that causes that problem D. You forgot to set the SCSI-ID #8 for the new disk

A. SCSI-I supports only 8 devices including the adaptor

What of the following can be done by the command ifconfig? (Choose TWO correct answers.) A. Set a network interface active or inactive. B. Specify the kernel module to be used with a network interface. C. Allow regular users to change the network configuration of a network interface. D. Change the netmask used on a network interface. E. Specify which network services are available on a network interface.

A. Set a network interface active or inactive. D. Change the netmask used on a network interface.

What does the Filesystem Hierarchy Standard enable? (Select TWO answers) A. Software to predict the location of installed files and directories B. Software to predict the ownership and access rights of installed files and directories C. Users to predict the location of installed files and directories. D. Users to predict how the filesystem should be formatted according to need.

A. Software to predict the location of installed files and directories C. Users to predict the location of installed files and directories.

Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.) A. Start and prepare the desktop environment for the user. B. Configure additional devices like new monitors or projectors when they are attached. C. Handle the login of a user. D. Lock the screen when the user was inactive for a configurable amount of time. E. Create an X11 configuration file for the current graphic devices and monitors.

A. Start and prepare the desktop environment for the user. C. Handle the login of a user.

Man pages cover what topics? Select THREE that apply. A. Superuser commands B. Configuration commands C. System policies D. Programming libraries E. Kernel version history

A. Superuser commands B. Configuration commands D. Programming libraries

When using /etc/ppp/peers/* files, which of the following is true: A. The /etc/ppp/options should be empty. B. Any user can run pppd from the command line. C. The dial-on-demand option cannot be used. D. You must use chap authentication.

A. The /etc/ppp/options should be empty.

During a system boot cycle, what is the program that is run after the BIOS completes its tasks? A. The bootloader B. The inetd program C. The init program D. The kernel

A. The bootloader

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion? A. The encrypted passwords are still subject to brute force attacks. B. This is just for historical reasons. C. There is other information in the file that needs to be kept secret. D. The passwords can be decrypted by anyone with root access.

A. The encrypted passwords are still subject to brute force attacks.

You have a file /etc/resolv.conf, but the computer does not use the configured DNS servers to look up host names. What is most likely the problem? A. The hosts entry in your /etc/nsswitch.conf does not list dns. B. You do not have a /etc/named.conf file. C. The localhost hostname is not properly configured in /etc/hosts. D. The named daemon is not running on your computer.

A. The hosts entry in your /etc/nsswitch.conf does not list dns.

Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.) A. The list of users that belong to the group. B. The home directory of the group. C. The name of the group. D. The description of the group. E. The password of the group.

A. The list of users that belong to the group. C. The name of the group. E. The password of the group.

You found these lines in the modules.dep file: /lib/modules/2.2.5-15smp/fs/msdos.o: /lib/modules/2.2.5-15smp/fs/fat.o Which of the following is true? A. The msdos module is dependent upon fat. B. The fat and msdos modules cannot be loaded manually. C. The fat and msdos modules are automatically loaded at startup. D. The fat module is a submodule to the msdos module.

A. The msdos module is dependent upon fat.

What is true regarding the command userdel --force --remove bob? (Choose TWO correct answers.) A. The user bob is removed from the system's user database. B. The user bob's home directory is removed. C. The locate database is updated to drop files owned by bob. D. All files owned by bob are remove from all mounted filesystems. E. In case bob was the last member of a group, that group is deleted.

A. The user bob is removed from the system's user database. B. The user bob's home directory is removed.

Which statement is true regarding the following /etc/resolv.conf file? search example.com 127.0.0.1 208.77.188.166 A. There is a syntax error. B. If DNS queries to the localhost fail, the server 208.77.188.166 will be queried. C. example.com will be appended to all host lookups. D. The DNS servers at 127.0.0.1 and 208.77.188.166 will be queried in a round robin fashion. E. The DNS server with the shortest ping time will be queried first. If the lookup fails, the second server will be queried.

A. There is a syntax error.

What is the purpose of the Sticky Keys feature in X? A. To assist users who have difficulty holding down multiple keys at once B. To prevent repeated input of a single character if the key is held down C. To ignore brief keystrokes according to a specified time limit D. To repeat the input of a single character

A. To assist users who have difficulty holding down multiple keys at once

Your investigation of a system turns up a file that contains the line below: find /home -iname .rhosts -exec rm -f {} \; What is the purpose of this script? A. To enhance system security B. To remove all program error dumps C. To remove all temporary files in the user's home directories D. To reset the configuration for the rsh and rexec utilities

A. To enhance system security

Rate this advice: In order to use the latest kernel, it is necessary to first upgrade to the newest utilities and libraries. A. True B. False

A. True

Rate this comment: The "root" account has no security restrictions imposed upon it. A. True B. False

A. True

In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true? A. Without additional configuration, no users may have user specific crontabs. B. Without additional configuration, all users may have user specific crontabs. C. The cron daemon will refuse to start and report missing files in the system's logfile. D. When a user creates a user specific crontab the system administrator must approve it explicitly.

A. Without additional configuration, no users may have user specific crontabs.

You want to install a new software package, but it is only available in RPM format and you are running Debian Linux. Which of the following would help you to install it on your system? A. alien B. apt-conf C. dselect D. cpio

A. alien

Lsmod shows information about: A. all loaded modules. B. all updatable modules. C. all non-updatable modules. D. all unloaded modules.

A. all loaded modules.

The normal way of starting your Apache server would be the command: A. apachectl start B. http -start C. inetd apache D. apachestart -n E. apache start

A. apachectl start

What command will show partial word matches for a search term? A. apropos B. locate C. whereis D. whatis E. find

A. apropos

What command is the functional equivalent of the command "man -k searchterm"? A. apropos searchterm B. whatis searchterm C. locate searchterm D. find / -name searchterm E. None of the selections

A. apropos searchterm

You discover a pending job for the at command. Which of the following do you have to use to remove it? A. atrm B. atq -r C. at -r D. rmat

A. atrm

What modprobe option will cause inactive kernel modules to be unloaded? A. autoclean B. inactive C. remove D. timeout E. holdoff

A. autoclean

You need to print 12 copies of the document foo.txt. Which of the following commands would you use? A. cat foo.txt | lpr -#12 B. cat foo.txt > lpr -#12 C. cat foo.txt | lpr -12 D. cat foo.text > lpr -12

A. cat foo.txt | lpr -#12

Which commands will print two copies of the file to the default printer? Choose all that apply. A. cat hosts | lpr -#2 B. lpr -K2 hosts C. lpr -P -count 2 hosts D. cat hosts > lpr ; cat hosts > lpr E. for 1 in 2 lpr hosts

A. cat hosts | lpr -#2 B. lpr -K2 hosts

Select all of the protocols that are supported by the Linux implementation of ppp. A. chap B. mschap C. pap D. spap E. eap

A. chap B. mschap C. pap

Upgrading a kernel involves which of the following tasks (choose all that apply): A. configuring the desired modules B. compiling the kernel and modules C. installing the kernel image D. conducting a system reboot

A. configuring the desired modules B. compiling the kernel and modules C. installing the kernel image D. conducting a system reboot

Which daemon or service can be configured as a non-root user? A. cron B. ntp C. lpr D. nmbd E. slocate

A. cron

When using the PPP daemon make a connection, what option is set to configure it to use hardware flow control? A. crtscts B. rsync C. nsync D. connect

A. crtscts

What command will print a list of usernames (first column) and their corresponding user id (uid, third column) from /etc/passwd? A. cut -d: -fl,3 /etc/passwd B. chop -c l,3 /etc/passwd C. tac l-3 /etc/passwd D. fmt -u /etc/passwd

A. cut -d: -fl,3 /etc/passwd

Which of the following commands can be used to create a new file that is 100kB in size? A. dd B. file C. mkfile D. touch

A. dd

Which of the following correctly describe the relationship between depmod and modprobe? A. depmod creates a dependency file for use by modprobe B. modprobe creates a dependency file for use by depmod C. they have no relationship D. they can replace each other

A. depmod creates a dependency file for use by modprobe

Which of the following programs is typically used to query installed debian packages? (Please select TWO that apply) A. dpkg B. apt-cache C. apt-conf D. dselect

A. dpkg D. dselect

Which Debian package system command will list all partially installed packages and suggest how to get them correctly installed? A. dpkg -C B. apt-get -u C. dpkg -Dh D. dpkg -l E. apt-get -y

A. dpkg -C

Which command will print the exit value of the previous command to the screen in bash? A. echo $? B. echo $# C. echo $exit D. echo $status E. echo $

A. echo $?

You are writing text in vi. Now you want to save your changes and exit. Which TWO sequence of inputs will accomplish this? A. esc ZZ B. ctrl :w! C. esc zz D. esc :wq! E. ctrl XX

A. esc ZZ D. esc :wq!

You've just finished editing a new entry in the /etc/exports file. Which of the following will cause the changes to take effect without interrupting current connected users or rebooting the machine? Choose all that apply. A. exportfs -a B. /etc/rc.d/init.d/nfs restart C. service nfs restart D. kill -1 HUP nfs E. init 1

A. exportfs -a

Which of the following Linux filesystems pre-allocates a fixed number of inodes at the filesystem's make/ creation time, and does NOT generate them as needed? A. ext3 B. jfs C. reiserfs D. xfs

A. ext3

Which of the following commands will NOT update the Modify timestamp on the file /tmp/myfile.txt? A. file /tmp/myfile.txt B. echo "Hello" >/tmp/myfile.txt C. sed -i "s/1/2/" /tmp/myfile.txt D. echo -n "Hello" >/tmp/myfile.txt E. touch /tmp/myfile.txt

A. file /tmp/myfile.txt

Which of the following find commands will print out a list of files owned by root and with the SUID bit set in /usr? A. find /usr -uid 0 -perm +4000 B. find -user root +mode +s /usr C. find -type suid -username root -d /usr D. find /usr -ls \*s\* -u root E. find /usr -suid -perm +4000

A. find /usr -uid 0 -perm +4000

Which of the following find commands will print out a list of suid root files in /usr? A. find /usr -uid 0 -perm +4000 B. find -user root +mode +s /usr C. find -type suid -username root -d /usr D. find /usr -ls \*s\* -u root E. find /usr -suid -perm +4000

A. find /usr -uid 0 -perm +4000

You want to the command foo to take its input from the file foobar and send its output to the program bar. Which of the following command lines will do this? A. foo < foobar | bar B. foo < foobar > bar C. foo | foobar > bar D. foo | bar < foobar E. foo > bar < foobar

A. foo < foobar | bar

What keyword is missing from this code sample of a shell script? ____ i in *.txt; do echo $i done A. for B. loop C. until D. while

A. for

Which TWO daemons may be used to support various routing protocols under Linux? A. gated B. ripd C. ospfdm D. bgpd E. routed

A. gated E. routed

Which command can be used to delete a group from a Linux system? A. groupdel B. groupmod C. groups D. groupedit

A. groupdel

You are performing an onsite security inspection of division of your company. On an Apache server, you want to determine what files are needed and which can be removed from the /etc/httpd folder. Which of the following are possibly valid Apache confguration files? Choose all that apply. A. httpd.conf B. apached.conf C. srm.conf D. access.conf E. in.http.conf

A. httpd.conf C. srm.conf D. access.conf

Your machine has two working NIC's with proper addresses. You want to split your network into two new subnets. What single command will accomplish this? A. ifconfig B. route C. default D. netstat E. None of the choices

A. ifconfig

Which of the following is the command used to deactivate a network interface? A. ifdown B. ipdown C. net D. netdown

A. ifdown

Your FTP server has been under attack, and the ISP of the attacker has been less than helpful in mitigating the attacks. So you decide that all connections from that ISP (badguy.example.org) to your FTP server will be denied and sent a message. Which line in your /etc/hosts.allow will have the desired effect? A. in.ftpd : .badguy.example.org : twist 450 denied due to numerous attacks from this domain B. ftp : badguy.example.org : DENIED message 450 denied due to numerous attacks from this domain C. in.ftpd : badguy.example.org : spawn echo 450 denied due to numerous attacks from this domain D. ftp : .badguy.example.org : DENIED due to numerous attacks from this domain

A. in.ftpd : .badguy.example.org : twist 450 denied due to numerous attacks from this domain

Which one of the following lines would you expect to see in the file /etc/hosts.allow? A. in.tftpd: LOCAL B. tftp dgram udp wait root /usr/sbin/tcpd in tdtpd C. tftp 69/udp D. udp 17 UDP

A. in.tftpd: LOCAL

Which of the following commands installs a loadable module in the running kernel? A. insmod B. depmod C. modprobe D. setmod

A. insmod

Which of the following correctly describe a Micro-kernel Architecture? A. it has an extremely small core. B. only its small core remains in memory at all times. C. its device drivers are loaded as-needed. D. None of the choices

A. it has an extremely small core. B. only its small core remains in memory at all times. C. its device drivers are loaded as-needed.

Which of the following correctly describe a Monolithic Kernel (choose all that apply): A. it is built into one single binary. B. it is loaded completely into memory at boot time. C. it pre-dates micro-kernel architecture by at least ten years. D. None of the choices

A. it is built into one single binary. B. it is loaded completely into memory at boot time. C. it pre-dates micro-kernel architecture by at least ten years.

Which system administration command you can use to update ld.so.cache after the installation of new shared libraries? A. ldconfig B. ldd C. libpath D. newlibs

A. ldconfig

You are experimenting with a binary in /tmp/foo.d that expects its configuration file at /etc/foo.conf. You don't want to save it there, but use a symbolic link to /tmp/foo.d/foo.conf instead. Which command would accomplish that? A. ln -s /tmp/foo.d/foo.conf /etc/foo.conf B. ln /tmp/foo.d/foo.conf /etc/foo.conf C. ln -s /etc/foo.conf /tmp/foo.d/foo.conf D. ln /etc/foo.conf /tmp/foo.d/foo.conf

A. ln -s /tmp/foo.d/foo.conf /etc/foo.conf

Which of the following are syslog facilities? (Choose TWO correct answers.) A. local7 B. mail C. advanced D. postmaster E. remote

A. local7 B. mail

What command would cause a print job to be printed next regardless of its current position in the queue. A. lpc topq B. lpc -t C. lpq -t D. lpc move E. lpq --next

A. lpc topq

Which of the following are valid commands to affect your system's printing? A. lpq B. lprm C. lpstatus D. lpr E. lpio

A. lpq B. lprm D. lpr

The correct command to view "verbose" line printer queue information is: A. lpq -l B. lpq -all C. lpq -verbose D. lpq -a

A. lpq -l

Which of the following commands will flush all print jobs on all configured queues of the system? A. lprm -a all B. lprm -all C. lprm -a * D. lpflush -all

A. lprm -a all

What command will compile the Linux kernel and leave a file in arch/i386/boot called bzImage? A. make bzImage B. make compile C. make Image D. make bzdisk

A. make bzImage

If your new kernel does not behave normally after a routine kernel upgrade, chances are that you forgot to _______ before compiling the new kernel. A. make clean B. make shot C. make clear D. make remove

A. make clean

You have finished updating and resolving dependencies for some source code. What command should you run before recompiling the code into binary form? A. make clean B. make all C. makedep D. make install

A. make clean

When preparing to compile a new kernel, which of the following commands can be used to create the configuration file? A. make config B. make kernel C. ./configure D. make kernelconfig E. [Kernel Source Path]/Configure

A. make config

Which of the following commands can be used to customize all kernel compilation options? (Select THREE) A. make config B. make menuconfig C. make xconfig D. make kernelconfig E. make configure

A. make config B. make menuconfig C. make xconfig

Which of the following insures that all of the dependencies, such as the include files, are in place? A. make dep B. make clean C. make_dep D. make_install

A. make dep

After rebooting a machine with a recompiled new kernel and its modules a lot of "Can't locate module" errors appear on screen. Which of the following is most likely to be the source of the problem? A. make modules_install wasn't executed. B. make modules install wasn't executed. C. The kernel wasn't configured to use modules. D. This kernel version does not support modules. E. depmod wasn't run before rebooting.

A. make modules_install wasn't executed.

Which of the following commands will attempt to configure the kernel from an old configuration file and run through the make config process for you? A. make oldconfig B. make newconfig C. make clean D. None of the choices

A. make oldconfig

Which of the following brings up a user friendly GUI interface? A. make xconfig B. make menuconfig C. make config D. make compile

A. make xconfig B. make menuconfig

What command could you use to confirm function of a ppp connection before establishing it? A. minicom B. hyperterminal C. setserial D. modemset E. None of the choices

A. minicom

What utility examines the object file module_file associated with a kernel module and displays any information that it can glean? A. modinfo B. modprobe C. insmod D. depmod

A. modinfo

How can you list the parameters that you can use on an specific module? A. modinfo -p B. modinfo -list C. lsmod D. modprobe -p E. cat /etc/modules.conf

A. modinfo -p

Modprobe will automatically load all base modules needed in the module stack as described by its dependency file. What file is this? A. modules.dep B. modprobe.dep C. module.dep D. modep.dep

A. modules.dep

Which of the following commands puts the output of the command date into the shell variable mydate? A. mydate="$(date)" B. mydate="exec date" C. mydate="$((date))" D. mydate="date" E. mydate="${date}"

A. mydate="$(date)"

Lsmod shows information in which of the following formats? A. name, size, use count, list of referring modules B. name, use count, list of referring modules, size C. name, size, list of referring modules, use count D. None of the choices

A. name, size, use count, list of referring modules

You are not using the WINS service on your network, but need to provide NETBIOS resolution to your hosts. What is the name of the daemon that provides these services on a Linux server? A. nmbd B. dns C. winsd D. lmhostsd E. smbd

A. nmbd

In order to allow a Win95 host to resolve the name of and map network drives to your Linux server, what services should be running? Choose Two. A. nmbd B. smbd C. named D. routed E. winsd

A. nmbd B. smbd

You want to make the directory /home/tess available via NFS. Which option do you have to use to grant read permission for the root user on the NFS mounted file system? A. no_root_squash B. root_squash C. root(rw) D. For safety, the NFS protocol does not allow this?

A. no_root_squash

What protocol will allow you to keep accurate time on your hosts? A. ntp B. nntp C. ncftp D. inn E. ntime

A. ntp

To see the current time set by a NTP clock, you use the command: A. ntpd -clock B. ndtime C. hwdate D. ntpdate

A. ntpd -clock

Which command is used to dump files in octal format? A. od B. octdump C. dumpoct D. cat -o

A. od

What command will set a regular users password to force changing it every 60 days? Choose all that apply. A. passwd -x 60 user1 B. chage -M 60 user1 C. passwd +x 60 user1 D. useradd -e 60 user1 E. usermod -f 60 user1

A. passwd -x 60 user1 B. chage -M 60 user1

Incremental upgrades of the kernel are distributed as: A. patches. B. fixes. C. hotfixes. D. service packs.

A. patches.

Which of the following are commonly used Mail Tranfer Agent (MTA) applications? (Please select THREE correct answers) A. postfix B. procmail C. sendmail D. exim E. smtpd

A. postfix C. sendmail D. exim

What program is needed to establish a PPP link to another computer? A. pppd B. wvdial C. papd D. kppp

A. pppd

Your /etc/passwd file appears to have approximately 1/2 shadow passwords and 1/2 standard unix encrypted passwords. What utility would you most likely run again to fix this? A. pwconv B. passconvert C. useradd -conv D. pwhash E. passwd -fix

A. pwconv

What TWO permissions must a user have in order to run a shell script? A. read B. write C. execute D. browse on the directory E. users cannot run shell scripts

A. read C. execute

You are using quota on your system. How can you see disk quota details? A. repquota B. quota -l C. quota D. quotachech E. quota --list

A. repquota

You are using quota on your system. How can you see disk quota details? A. repquota B. quota-l C. quota D. quotacheck E. quota --list

A. repquota

What output will the following command sequence produce? echo '1 2 3 4 5 6' | while read a b c; do echo result: $c $b $a; done A. result: 3 4 5 6 2 1 B. result: 1 2 3 4 5 6 C. result: 6 5 4 D. result: 6 5 4 3 2 1 E. result: 3 2 1

A. result: 3 4 5 6 2 1

What output will the following command sequence produce? echo '1 2 3 4 5 6' | while read a b c; do echo result: $c $b $a; done A. result: 3 4 5 6 2 1 B. result: 1 2 3 4 5 6 C. result: 6 5 4 D. result: 6 5 4 3 2 1 E. result: 3 2 1

A. result: 3 4 5 6 2 1

Which parameters should appear in a valid /etc/printcap file to allow a local printer queue to point to another machine's print queue? Choose two. A. rm B. rp C. remoteip D. netprinter E. netip

A. rm B. rp

What command should you use to unload loadable modules from the running kernel? A. rmmod B. remove -mod C. delmod D. unload module

A. rmmod

What command will unload a kernel module? A. rmmod B. unmod C. delmod D. modprobe E. unloadmod

A. rmmod

You need maximum performance of your machine and therefore you decide to unload all dispensable modules. Which command would you use? A. rmmod B. insmod -r C. unmod D. module -r

A. rmmod

What is the command to delete the default gateway from the system IP routing table? (Choose TWO correct answers.) A. route del default B. ifconfig unset default C. netstat -r default D. ip route del default E. sysctl ipv4.default_gw=0

A. route del default D. ip route del default

After a minor security incident you are instructed by your lead sys-admin to verify the RPM's installed on a running system. Which command will create a complete report which you can analyze for changes which may be security related? A. rpm -Va >report B. rpm -Qavy >report C. rpm -Vqt --nomd5 >report D. rpm --checkfiles >report E. rpm -Va --nofiles >report

A. rpm -Va >report

You need to know where all the configuration files for the installed package named "postfix" are located. Assuming it was installed with rpm, which command will list this information for you? A. rpm -qc postfix B. rpm -Vc postfix C. rpm --config postfix D. rpm -listconfig postfix E. rpm -qa --config postfix

A. rpm -qc postfix

You have an updated RPM called screensaver-1.1.i386. rpm. You have version 1.0 installed. Using RPM, how do you view the changelog of this file to see if you should install the update? A. rpm -qp --changelog screensaver-1.1.i386. rpm B. rpm --changelog screensaver-1.1.i386. rpm C. rpm -qc screensaver-1.1.i386. rpm D. rpm -showchangelog screensaver-1.1.i386. rpm

A. rpm -qp --changelog screensaver-1.1.i386. rpm

Loadable kernel modules can (choose all that apply): A. save memory B. ease configuration C. include filesystems D. include ethernet card drivers

A. save memory B. ease configuration C. include filesystems D. include ethernet card drivers

What command with options will cause the redirection symbol (>) to fail to overwrite the contents of an existing file? A. set -o noclobber B. set +o nooverwrite C. export OVERWRITE=no D. alias >='!>' E. None of the choices

A. set -o noclobber

Which of the following files typically are used to configure Apache? (Choose two) A. srm.conf B. www.conf C. http.boot D. httpd.conf E. apache.conf

A. srm.conf D. httpd.conf

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services? A. tcpd B. inetd C. fingerd D. mountd E. xinetd

A. tcpd

What command will verify the syntax of a hosts.allow and hosts.deny file combination? A. tcpdchk B. verify --tcp C. ipswitch D. tcpdump E. tcpdmatch

A. tcpdchk

Which of the following commands can be used to instruct the init process to switch runlevels? (Choose TWO correct answers) A. telinit B. initctl C. init D. reinit E. runlevel

A. telinit C. init

You are having some trouble with a disk partition and you need to do maintenance on this partition but your users home directories are on it and several are logged in. Which command would disconnect the users and allow you to safely execute maintenance tasks? A. telinit 1 B. shutdown -r now C. killall -9 inetd D. /bin/netstop --maint E. /etc/rc.d/init.d/network stop

A. telinit 1

You are having some trouble with a disk partition and you need to do maintenance on this partition but your users home directories are on it and several are logged in. Which command would disconnect the users and allow you to safely execute maintenance tasks? A. telinit 1 B. shutdown -r now C. killall -9 inetd D. /bin/netstop maint E. /etc/rc.d/init.d/network stop

A. telinit 1

insmod tries to link a module into the running kernel by resolving all symbols obtained from: A. the kernel's exported symbol table. B. the kernel's internal pointer base. C. the user command argument list. D. None of the choices

A. the kernel's exported symbol table.

The command echo $! will produce what output? A. the process id of last background command B. the exit status of the last command C. the exit status of the last background command D. the process id of the current shell E. the name of the command being executed

A. the process id of last background command

Which of the following GNU commands would be the most likely command you'd use to find the system load average? A. top B. nice C. loadavg D. cpustat E. ps

A. top

GNU Make determines which pieces of a large program need to be recompiled and issues the commands to recompile them when necessary. A. true B. false

A. true

Rate this comment: Linux by and large is monolithic. A. true B. false

A. true

The command "make config" requires bash. A. true B. false

A. true

With insmod, the paths listed in /etc/modules.conf override the paths defined in MODPATH. A. true B. false

A. true

Which commands can be used to change a user's account aging information? (Choose THREE correct answers.) A. usermod B. passwd C. chattr D. chage E. chsh

A. usermod B. passwd D. chage

Which commands can you use to change a user's account aging information? (Choose THREE correct answers.) A. usermod B. passwd C. chattr D. chage E. chsh

A. usermod B. passwd D. chage

Which commands can you use to change a user's password expiry information? (Choose THREE correct answers.) A. usermod B. passwd C. chattr D. chage E. chsh

A. usermod B. passwd D. chage

Which of the following regarding user account configuration is true (choose all that apply): A. username is case-sensitive B. password is case-sensitive C. username is case-insensitive D. password is case-insensitive

A. username is case-sensitive B. password is case-sensitive

What command will show only complete word matches for a search term? A. whatis B. apropos C. locate D. find E. whereis

A. whatis

Which two commands share the same database for retrieving information? A. whatis B. whereis C. apropos D. find E. man

A. whatis C. apropos

What command is the functional equivalent of the command "man -f searchterm"? A. whatis searchterm B. apropos searchterm C. locate searchterm D. find / -name searchterm E. None of the selections

A. whatis searchterm

The system bell sound is annoying you. Which of the following can you use to change this and other user X preferences? A. xset B. xconf C. xbell D. xmag E. xpref

A. xset

You just started X for the first time and noticed that the display does not use the entire screen. What program can you use to fix this? A. xvidtune B. xf86config C. XF86Setup D. tweakscreen

A. xvidtune

An administrator has issued the following command: grub-install --root-directory=/custom-grub /dev/sda In which directory will the new menu.lst file be found? (Provide the full directory path only without the filename)

Answer: /custom-grub/boot/grub

What file is used in recent apache distributions to configure the service? Type the full path and name of the file.

Answer: /etc/apache/httpd.conf Answer: /etc/apache2/httpd.conf

Which file specifies the user accounts can NOT submit jobs via at or batch? (Provide the full path and filename)

Answer: /etc/at.deny

Which file specifies the user accounts that can NOT submit jobs via at or batch? (Provide the full path and filename)

Answer: /etc/at.deny

In which file, if present, must all users be listed that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Answer: /etc/cron.allow

Please specify the directory containing the configuration files for the CUPS printing system. (Provide the full path to the directory)

Answer: /etc/cups

Please specify the top directory containing the configuration files for the CUPS printing system. (Provide the full path to the directory)

Answer: /etc/cups, /etc/cups/

Please specify the top directory containing the configuration files for the CUPS printing system. (Specify the full path to the directory.)

Answer: /etc/cups, /etc/cups/

What file contains a list of directories for an NFS daemon to server to other systems? (Provide the complete answer)

Answer: /etc/exports

What file contains a list of shared directories on a Linux/Unix system? Type the full path and name of the file.

Answer: /etc/exports

You are running a machine which exports a list of directories using NFS. Provide the complete path to the file which contains this list.

Answer: /etc/exports

Given the following line from /etc/nsswitch.conf: hosts: files mdns4_minimal [NOTFOUND=return] dns mdns4 By default, which file will be queried first for hostname lookups? (Provide the full path and filename)

Answer: /etc/hosts

Type in the name of the file including path of the static host name to IP address configuration file

Answer: /etc/hosts

Which local system networking file binds a hostname to an IP address? Type the full path and name of the file.

Answer: /etc/hosts

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.)https:// lh3.googleusercontent.com/-5cd-clmKnbk/AAAAAAAAAAI/AAAAAAAAADM/-SXesH19Ido/s46-c-k-no/photo.jpg

Answer: /etc/hosts.allow

Which file contains a set of services and permitted hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Please enter the full path)

Answer: /etc/hosts.allow

Which file contains a list of services and hosts that will be denied by a TCP Wrapper such as tcpd? (type full path)

Answer: /etc/hosts.deny

What file is used to deny hosts access to a system's printers? Type the filename including full path.

Answer: /etc/hosts.lpd

What file on a remote host should be configured to allow your host to print to its already functioning printers? Type the full path and name of the file.

Answer: /etc/hosts.lpd

The system configuration file named _______ is commonly used to set the default runlevel. (Please provide the fill name with full path information) Answer:

Answer: /etc/inittab

What is the name of the file and location that governs what run level is to be booted to on startup. Give full path and file name

Answer: /etc/inittab

Type in the name of file and full path to the file that holds a message for remote users about possible system outages.

Answer: /etc/issues.net

On your system exists a file that is described as a map file that is used to update the MBR or first sector of the partition with the appropriate booting information. Type the full path and name of the file.

Answer: /etc/lilo.conf

Type in the name of the file including full path that holds contains a daily message viewed by users when they log in?

Answer: /etc/motd

The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.)

Answer: /etc/nologin

In what file can you configure your name server resolution queries to use the localhost first? Type the full path and name of the file.

Answer: /etc/nsswitch.conf

Type in the name and full path to the network configuration file that defines the search order for name resolution

Answer: /etc/nsswitch.conf

The ________ file contains the system default options for the PPP daemon.

Answer: /etc/ppp/options

Type in the name and full path to the config file that contains the IP address of DNS servers for hostname resolution

Answer: /etc/resolv.conf

What file with full path is used to set the location to query for hostname resolution outside of the local system?

Answer: /etc/resolv.conf

To find the port used by a particular known service, you would look in what file? Type the full path and name of the file.

Answer: /etc/services

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

Answer: /etc/shadow

By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.)

Answer: /etc/skel

By default, which directories contents will be copied to a new user's home directory when the account is created, passing the -m option to the useradd command?

Answer: /etc/skel

Where should you put the .pinerc file so that all new users get it as part of their initial creation? Type the full path of the directory.

Answer: /etc/skel

You just installed a new system, but before you create any new users you want to ensure they have a subdirectory bin/ in their home directory. To ensure this directory is automatically created each time you add a new user, in what subdirectory should you create the directory?

Answer: /etc/skel

By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Please provide the full path)

Answer: /etc/skel, /etc/skel/

Which directory in /etc is used to keep a sample copy of files and directories for when a new user has a home directory created? (Please provide the full path)

Answer: /etc/skel, /etc/skel/

What file do you configure to make changes to your smbd and nmbd daemons? Type the full path and name of the file.

Answer: /etc/smb.conf

Which file lists which users can execute commands using sudo? (Provide the full path and filename)

Answer: /etc/sudoers

Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)

Answer: /etc/sudoers

You are running a Red Hat machine. You have added a 2nd NIC to your machine and rebooted it. The card is detected in the BIOS but is not configured along with the eth0 interface upon network start. A file must be created to allow this interface to function. Type the full path and name of the file.

Answer: /etc/sysconfig/network-scripts/ifcfg-eth1

For security reasons, the system administrator is setting up a log server. What file does the system administrator have to edit in order to have each machine send log entries to the new log server?

Answer: /etc/syslog.conf

Type in the file and full path to the configuration file for the Sytem logging daemons

Answer: /etc/syslog.conf

What is the full path and file name of the file that contains the configuration files for system logging? Type in full path and file name.

Answer: /etc/syslog.conf

Converting from the inetd to xinetd services requires populating entries in what file, including the full path and name?

Answer: /etc/xinetd.conf

The xinetd service will be used instead of inetd. In order to create a similar configuration as inetd, what main file must be created or edited for xinetd? (Please specify the full path)

Answer: /etc/xinetd.conf

You decide to use xinetd instead of inetd. Now, you need to transfer information from /etc/inetd conf to another file. What file?

Answer: /etc/xinetd.conf

Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)

Answer: /etc/xinetd.d/, /etc/xinetd.d

To prevent users from being able to fill up the / partition, the _______ directory should be on a separate partition if possible because it is world writeable.

Answer: /tmp

An administrator wants to determine the geometry of a particular window in X, so she issues the __________ -metric command and then clicks on the window.

Answer: /usr/bin/xwininfo

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Answer: /usr/bin/xwininfo, xwininfo

You have written a custom tool on your local system. Following the Filesystem Hierarchy Standard (FHS), where should you install the binaries to be available to all users on your system?

Answer: /usr/local/bin

The system's timezone may be set by linking /etc/localtime to an appropriate file in which directory? (Provide the full path to the directory, without any country information)

Answer: /usr/share/zoneinfo/

The system's timezone may be set by linking /etc/localtime to an appropriate file in which directory? (Provide the full path to the directory, without any country information)

Answer: /usr/share/zoneinfo/

Typically, which top level system directory is used for files and data that changes regularly while the system is running and are to be kept between reboots? (Specify only the the top level directory) Answer:

Answer: /var

The dmesg command outputs information from which file, inlcude full path?

Answer: /var/log/dmesg

What file contains kernel level logging information such as output from a network driver module when it is loaded?

Answer: /var/log/kern.log

What file contains kernel level logging information such as output from a network driver module when it is loaded?

Answer: /var/log/messages

The last command functionality needs what log file to be present to operate properly? Type the full path and name of the file.

Answer: /var/log/wtmp

Type the full path and name of the file whose global read bit you would change to deny normal users the ability to get useful information from the who and w commands.

Answer: /var/run/utmp

The normal filesystem location for the LPD queue directory is:

Answer: /var/spool/lpd

Machines with IPs `on the 131.230.55 and 131.230.56 networks need to be allowed to connect to a service protected with TCP wrappers. How would the network and netmask pair be expressed in /etc/hosts.allow?

Answer: 131.230.55.0/255.255.254.0

In the vi editor, what vi command will copy (but not paste) from the current line at the cursor and the following 16 lines (17 lines total)? Enter the correct vi command without spaces

Answer: 17yy

The priority of any process can range from -20 to ________ . (Provide only the numerical value)

Answer: 19

With a Class C address, and a subnet mask of 255.255.255.0, how many host addresses are assignable?

Answer: 254

You are formatting a single hard disk for a Linux install. What is the maximum number of primary partitions you can create?

Answer: 4

An administrator is configuring a secured webserver, however connecting to https://127.0.0.1 is not working. She runs netstat -ntl, which returns the following output: tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN What port should be listening before a successful connection is possible? (Provide only the numerical value of the port)

Answer: 443

What is the default port for HTTPS under Apache?

Answer: 443

Your ISP has given you an IP block for your use. The block is 192.168.112.64/26. If your network administrator uses the first usable IP for the router he's installed on your network, how many usable IPs do you have left?

Answer: 61

With IPv6, how many bits have been used for the host identifier portion of an address? (Please enter the number and not a word)

Answer: 64

What section of the Man pages are system administration commands in? Type the numeral of the section.

Answer: 8

What is the assigned port number for the HTTP service? (Provide the number with digits and not as a word)

Answer: 80

What command is used to view pending jobs for the at command? (Do NOT specify path).

Answer: ATQ,AT-L

With X11 forwarding in ssh, what environment variable is automatically set in the remote host shell that is not set when X11 forwarding is not enabled? (Specify only the environment variable without any additional commands or values.)

Answer: DISPLAY, $DISPLAY

What word will complete an if statement in bash such as the following: if [ -x "$file" ]; then echo $file _____

Answer: FI

What word is missing from the following SQL statement? select count(*) _____ tablename;

Answer: FROM

Which protocol uses two (2) TCP/IP ports one of them being port 20 for data transfer?

Answer: FTP,FTP

Which environment variable you have to setup to use shared libraries that are not in the standard search path?

Answer: LD_LIBRARY_PATH

You just configured a kernel and now you want to check the dependencies. Please enter the command and its argument(s).

Answer: MAKEDEP

What word is missing from the following SQL statement? update tablename ____ fieldname='value' where id=909;

Answer: SET

Which environment variable should be set in order to change the time zone for the commands run from within the environment variable's scope? (Specify the variable name only.)

Answer: TZ

When you execute the "ls" command, you suspect an alias is set for the command, how can you just execute the command? Type the exact string that will accomplish this.

Answer: \ls

You wish to execute the ls command but it appears to be aliased. What is the easiest way of execute the orignal ls command without the alias?

Answer: \ls

USB fax/modems that conform to this subclass of the Communication Device Class (CDC) vendor neutral standard are Linux compatible (answer is a 3 letter acronym)

Answer: acm

What command displays all aliases defined in the current shell? (Specify the command without any path information)

Answer: alias, alias -p

Which utility can be used to convert a . rpm package to .deb package format? (Without arguments)

Answer: alien

The _________ command is the Apache HTTP server control interface.

Answer: apachectl

Type in the command that is equivalent to man -k

Answer: apropos

You started configuring pppd and you used the command man to get help. Now you would like to get more information about pppd related programs. Which command would you use? Please enter only the command without path, arguments or options.

Answer: apropos

What command will show pending jobs that will be executed once on a given date and time? Type just the command to accomplish this.

Answer: atq

You are working an evening shift and want to look a which jobs are pending for the at command. What command would you use?

Answer: atq

You have a job schedueled to run at 16:30 using the AT schedueler. When you type atq it displays the following information [root@localhost root]# atq 2 2003-03-14 16:00 a root [root@localhost root]# Type in the command to remove only this job

Answer: atrm 2

To enable restricted shell mode in BASH, how must bash be called? (Please include the command only without the path.) Answer:

Answer: bash-r

What command can put suspended jobs into the background?

Answer: bg

In an xinetd config file, which attribute specifies the network address that will be used to offer the service?

Answer: bind

In an xinetd configuration file, which attribute specifies the network address that will be used to provide the service?

Answer: bind, interface

The USB device filesystem can be found under /proc/ _______ /usb/. (Please fill in the blank with the single word only)

Answer: bus

A user complains that his laptop shows the wrong time when it is not connected to the network. What command must the superuser run to adjust the laptop's clock without entering in BIOS?

Answer: date

You've downloaded an image file of a boot floppy disk to your hard drive. What is the best utility to create a boot floppy from the disk image? (Specify a single command without options.)

Answer: dd

Which utility is used to create or update the modules.dep file? Type the command only.

Answer: depmod

Type in the simplest command, including any switchs, to rebuild the modules.dep file after you have made changes to the modules.conf file.

Answer: depmod -a

Which command (without options) would you use to display how much space is available on all partitions?

Answer: df

For xinetd service definitions, which config option will disable the service?

Answer: disable=yes

Upon booting one of your Linux boxes, you notice a message scrolling by that does not look right, but it goes so fast, you do not have a chance to read it. What command could you use to view that message after the boot process completes?

Answer: dmesg

When booting your system, you believe you saw an error message go by too quickly to see. Type in the command that will show the last system bootup messages

Answer: dmesg

Which command displays the contents of the Kernel Ring Buffer on the command line? (Provide only the command name without any options or path information) answer:

Answer: dmesg

Which command will display messages from the kernel that were output during the normal bootup sequence? Answer:

Answer: dmesg

If you need to view per-user disk space usage on a filesystem, the ______ command can provide that information if the kernel is built to support it.

Answer: du

Which option, when passed to the gpg command, will enter an interactive menu enabling the user to perform key management related tasks? (Provide only the option)

Answer: edit-key

You have a text file with tab-separated values, but your application needs them space-separated. What command would you use from the Bash shell to achieve this? Please fill in the command only, without any options.

Answer: expand

You added /usr/local/bin to your PATH environment variable. Next you executed the command make, which calls gcc. This failed because gcc couldn't find the executable in /usr/local/bin that it needed. To fix this, you should execute: ______PATH allowable

Answer: export

When a change is made to the file controlling what files are made available by NFS, what command must be run to make the changes effective? (Provide only the command name, not the path or any command switches.)

Answer: exportfs

An administrator has sent their current vi process with a PID of 1423 to the background on the command line. Assuming no other processes are in the background, what single command with no options or parameters will bring the vi process to the foreground?

Answer: fg

Your users report that they are using the program dia to create diagrams. They are having problems with the software and they think there is a bug. What command will give you help with functionality and contact information to report a possible bug? Do not give the path or any options.

Answer: flea

In what section of the man pages would you expect to find the man page that documents / dev/null?

Answer: four

Which protocol uses two (2) TCP/IP ports one of them being port 20 for data transfer?

Answer: ftp

The ________ command is used to add a group to the system.

Answer: groupadd

Which command is used to add an empty group to the system? (Specify ONLY the command without any path or parameters.)

Answer: groupadd, /usr/sbin/groupadd

What command will tell you which groups you belong to?

Answer: groups

You are logged in as root. How to check user brown's group?

Answer: groups brown

You are logged in as root. What command do you run to find out what groups User Company belongs to?

Answer: groups company

The _________ command is used to assign an IP address to a device. (Please specify the command with or without path information)

Answer: ifconfig

What is the command most often used for configuring network interfaces?

Answer: ifconfig

You need to view the hardware address and IP address information for all of your configured and active interfaces. Type the simplest command string that will accomplish this.

Answer: ifconfig

To change your Ethernet interface eth0 to the IP address 10.4.4.100 with a default class C subnet mask, type the full command string to accomplish this.

Answer: ifconfig eth0 10.4.4.100 netmask 255.255.255.0

What is the preferred documentation tool of the FSF? Type in the name of the tool only

Answer: info

You build and configured a bastion host to act as a router between two internal networks. Both eth0 and eth1 can see hosts on their respective networks, but the hosts on each network cannot see any hosts on the other network. After verifying that the hosts have the correct gateway route, you decide the bastion host does not have IP forwarding turned on. To check this cat the file /proc/sys/net/ipv4/ _______ to ensure it has a 1.

Answer: ip_forward

What command will print the shared libraries for the file /usr/lib/libpng12.so? (Provide the full command with library name but without any other options or parameters)

Answer: ldd/usr/lib/libpng12.so

You boot a freshly installed system loaded with all the defaults, xdm loads and crashes, and the system halts. How can you force the system to multi-user text mode with networking from the LILO: or boot: prompt?

Answer: linux 3

After configuring printing on a Linux server, the administrator sends a test file to one of the printers and it fails to print. What command can be used to print the status of the printer's queue? (Provide only the command, without any options or parameters)

Answer: lpq

After configuring printing on a Linux server, the administrator sends a test file to one of the printers and it fails to print. What command can be used to display the status of the printer's queue? (Specify ONLY the command without any path or parameters.)

Answer: lpq, /usr/bin/lpq, lpstat, /usr/bin/lpstat

What command will flush all jobs on all print queues on a Linux system that uses the LPD daemon? Type the command with any options and arguments

Answer: lprm -a all

What command will most effectively send a list of certain files from a directory to the tar or cpio command? Type just the command name.

Answer: ls

The _____ command will list the currently loaded kernel modules.

Answer: lsmod

To produce a compiled kernel with slightly better than standard compression, type the command with and any options and arguments to accomplish just the compilation.

Answer: make bzImage

On a Red Hat system, with a single floppy drive and a returned output from the uname command of 2.4.20-12, what exact command string will create a customized boot disk for this system? Type the full command string to accomplish this.

Answer: mkbootdisk --device /dev/fd0 2.4.20-12

You want to create a boot floppy using a given image file on your hard disk. What utility would you use to do so?

Answer: mkbootdisk --device /dev/fd0 `uname -r`

________ /dev/sda3 will create a swap area on the device/dev/sda3.

Answer: mkswap

You wish to get infomation on a module called msdos.o. Type in the simplest command that would list all information including author and description for the module.

Answer: modinfo msdos

If the module file name is given without directories or extension, insmod will search for the module in some common default directories. What environment variable can be used to override this:

Answer: modpath

You have a module called msdos.o which has a dependancy on fat.o. What single command will load msdos.o and its dependant fat.o module in one command line?

Answer: modprobe msdos

You are using insmod. You do not want to use the default configuration file /etc/modules.conf. What environment variable should you modify:

Answer: moduleconf

In which file you can find these lines? alias eth0 ne2k-pci options ne2k-pci io=0x300 irq=5 Answer:

Answer: modules.conf

In the /etc/resolv.conf file are entries that describe where DNS queries can resolve names to IP addresses. Given a DNS server with an IP address of 192.168.33.254, type the exact entry that should appear in this file

Answer: nameserver 192.168.33.254

You wish to change you network settings permanently using a text/graphical tool. Type in the command to start this tool?

Answer: netconfig

The _____________ command is used to print the network connections, routing tables, and interface statistics.

Answer: netstat

What command will display the active connections and Unix domain sockets for a running Linux machine with networking configured? Type just the command to accomplish this.

Answer: netstat

You can run the ________ command to see active network and UNIX domain socket connection.

Answer: netstat

Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.)

Answer: netstat, /bin/netstat, ss, /usr/bin/ss

You need an additional email address for a user in your department. You decide to add just an alias on your sendmail email server. What command must be executed to make the changes take effect?

Answer: newaliases

After adding a new email alias to the configuration, which command must be run in order to ensure the MTA knows about it? (Specify the command without any path but including all required parameters.)

Answer: newaliases, sendmail -bi

Type in the name of the samba daemon that is responsible for WINS names resolution.

Answer: nmbd

There is any entry like the following in the file /etc/ftpusers: #root Will root be allowed to connect via ftp to this host?

Answer: no

You want to temporarily prevent users from logging in. Please complete the following command: touch /etc/________

Answer: nologin

To exclude all log messages of a given logging facility, you should use a logging priority of:

Answer: none

You use the public NTP server time.nist.gov to make sure your system clock is accurate before using it to adjust your hardware clock. Complete the following command to accomplish this: ______ time.nist.gov

Answer: ntpdate

You wish to change the daemons that start at a run level 3. Type in the command that would give a text menu based application to set the daemons for this runlevel

Answer: ntsysv --level 3

Your user matt has forgotten his passwd and you wish to reset it. Type in the command line to change his password. You are currently logged in as root.

Answer: passwd matt

The _________ command is used to send ICMP ECHO_REQUEST packets to other hosts over the network.

Answer: ping

What program will determine basic connectivity to a remote host? Type just the name of the program.

Answer: ping

The _____________ command displays ISA plug-and-play devices resource information.

Answer: pnpdump

What command was typed in to produce the output shown below. The entries shown are the full output of the command, less the actual command. Type the command and the options to reproduce similar output. USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 394 0.0 0.0 1200 444 tty1 S 01:05 0:00 /sbin/getty 38400 tty1 root 396 0.0 0.0 1200 444 tty3 S 01:05 0:00 /sbin/getty 38400 tty3 root 397 0.0 0.0 1200 444 tty4 S 01:05 0:00 /sbin/getty 38400 tty4 root 398 0.0 0.0 1200 444 tty5 S 01:05 0:00 /sbin/getty 38400 tty5 root 399 0.0 0.0 1200 444 tty6 S 01:05 0:00 /sbin/getty 38400 tty6 root 423 0.0 0.0 1200 444 tty2 S 01:06 0:00 /sbin/getty 38400 tty2 root 426 0.2 0.3 2880 1964 pts/0 S 01:07 0:00 -bash

Answer: ps -aux

Which command is used to enable disk quotas on a particular filesystem? (Provide only the command, with no options or parameters)

Answer: quotaon

The dpkg-____ command will ask configuration questions for a specified package, just as if the package were being installed for the first time.

Answer: reconfigure

To change the priority of a running process, you use the _______ command (Specify command only with no options.)

Answer: renice

What kind of DNS entries are used to get the hostname of a given IP address? Please enter exactly one word.

Answer: reverse

You wish to remove a module from the kernel called fat. Type in the simplest command to do this. Assume this module has no dependancies.

Answer: rmmod fat

To immediately stop a DDOS attack from 10.1.1.128, what can you do? Type the command with the necessary options and arguments.

Answer: route add 10.1.1.128 lo

Your IP address is 1.2.3.3. Which command would add a default gateway using the network 1.2.3.4?

Answer: route add default gw 1.2.3.4

Which command will convert an RPM package file to a cpio archive? (Provide only the command with no options or parameters)

Answer: rpm2cpio

Type in the simplest command to display the previous and current run level?

Answer: runlevel

The local domain name has changed from test.example.org to lpic1.example.org. What directive in /etc/resolv.conf needs to be changed so that you don't have to specify the fully qualified domain name when connecting to hosts?

Answer: search

What word is missing from the following SQL statement? __________ count(*) from tablename; (Please specify the missing word using lower-case letters only.)

Answer: select

To slave your NTP daemon to an external source, you need to modify the ______ variable in your /etc/ntp.conf file.

Answer: server

Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)

Answer: server

You wish to restart the network daemon on a Redhat Server. Type in the command and any arguments that to accomplish this without using any absolutes pathnames

Answer: service network restart

You wish to restart both Samba daemons. Type in the command and any arguments that to accomplish this without using any absolutes pathnames

Answer: service smb restart

The___________command allows you to view or change serial port configuration.

Answer: setserial

Type in the name of the samba daemon that is responsible for printer and file sharing?

Answer: smbd

Type in the command to monitor connections to Samba

Answer: smbstatus

Enter the command/servicename that dynamically assigns ports for Remote Procedure Calls (RPC) services like NIS, NFS and similar.

Answer: startsrc/portmap

The ________ partition is used for virtual memory

Answer: swap

What one filesystem should you never restore (and therefore not backup): _______.

Answer: swap

Which command will disable paging and swapping on a device? (Provide only the command with no additional options or parameters)

Answer: swapoff

You wish to archive and compress all the files in your home directory starting with the word projects into a file called myprojects.tar.gz. You are currently in your home directory. Type in the command that would do this?

Answer: tar -czf myprojects.tar.gz projects*

What command with options will show you the contents with associated pathnames of an archive file named archive.tar.gz? The file must not be unpacked with the command string. Type the full command string to accomplish this.

Answer: tar -tzvf archive.tar.gz

You have a tarball called myprojects.tar.gz and you wish to view the permissions and ownership of its contents without unpacking it. Type in the simplest command to do this.

Answer: tar -tzvf myprojects.tar.gz

You have just downloaded an application called rdesktop from the internet. The file downloaded is named rdesktop.tar.gz. Type in the simplest command to decompress and untar this file into the current directory.

Answer: tar -zxf rdesktop.tar.gz

You have an automated backup via tar to your tape drive /dev/st0 that runs each night. You've decided to manually check last night's tape. The command to list the contents of the tape is __________?

Answer: tartvf /dev/st0

You wish to send the output of a command to standard output (stdout) and save it to a file. The command to use is ______________. (Do not specify arguments)

Answer: tee

You are about to do some administration tasks on a server. Which command would you use to change the runlevel?

Answer: telinit

Type the command to check the syntax and contents of the smb.conf file.

Answer: testparm

What command will most effectively track a network path problem?

Answer: traceroute

When searching for files owned by the root user, which option is required in the following command line: find . ________ 0 -print (Provide only the missing argument)

Answer: uid, -uid

Which command prints or adjusts the current limits on resources available to the shell and to processes started by it, such as the maximum size of a core file or the maximum number of processes running? (Please include the command only, without arguments or path.)

Answer: ulimit

Type in the command to list your current kernel version, including any switches

Answer: uname -a

You issued the command: export CFLAGS="-march-i586". You can remove this environment variable by using the command: ________CFLAGS

Answer: unset

Which parameter must be passed to ifconfig to activate a previously inactive network interface? (Specify the parameter only without any command, path or additional options)

Answer: up

What option, when passed to the yum command, will update the entire system? (Specify ONLY the option name with no additional parameters)

Answer: update

What command with switches allows you to set the defaults for the useradd command? Type the command with any options and arguments.

Answer: useradd -D

What command will insert a single "!" symbol in from of the encrypted password in the system's shadow file? Type the command with any options and arguments.

Answer: usermod -L passwd -l

User rick has been suspended from your company and you wish to lock his account to stop anyone using it. Type in the simplest command to do this

Answer: usermod rick -L

To prevent users from seeing who is logged in with the who command, you must remove the world readable but from the file /var/run ______.

Answer: utmp

Type in the command that is equivalent to man -f

Answer: whatis

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Answer: xorg.conf

Consider the following output: prompt> myapp [1]+ Stopped myapp This output was the result of the user pressing the keyboard combination of the Ctrl key and what letter key? Enter only the single (1) letter as your answer

Answer: z

The ________ command is used to modify or set the password expiration for a user?

Answer:chage

What is the command to delete the default gateway from the system IP routing table? (Please specify the complete command with arguments)

Answer:routedeldefault

Which of the following parameters are used for journalctl to limit the time frame of the output? (Choose TWO correct answers.) A. --from= B. --since= C. --until= D. --upto= E. --date=

B. --since= C. --until=

When piping the output of find to the xargs command, what option to find is useful if the filenames have spaces in them? A. -rep-space B. -print0 C. -nospace D. -ignore-space

B. -print0

What is the name of standard Linux service which provide RIP (Routing Information Protocol)? A. zebra B. -routed C. -ipchains

B. -routed

A user complained that programs started from his shell won't use his favorite editor. Which of the following files should you edit to change this? A. .editor B. .bashrc C. .bash_rc D. ~/bash.conf

B. .bashrc

Which file would be used to configure a user's interactive bash shell? A. ~/.int_bash B. .bashrc C. .profile D. .bash

B. .bashrc

What file must you create in your home directory in order to enable mail forwarding? A. .redirect B. .forward C. .plan D. .mail E. None of the choices

B. .forward

Which command will print to standard out only the lines that do not begin with # (pound symbol) in the file foobar? A. /bin/grep ^# foobar B. /bin/grep -v ^# foobar C. /bin/grep #$ foobar D. /bin/grep -v #$ foobar

B. /bin/grep -v ^# foobar

What configuration file contains the list of directories shared via NFS? A. /etc/share B. /etc/exports C. /etc/dfs/dfstab D. /etc/fstab

B. /etc/exports

Select the files that are associated with TCP Wrappers. Choose all that apply. A. /etc/hosts B. /etc/hosts.allow C. /etc/hosts.deny D. /etc/allow.hosts E. /etc/allow.deny

B. /etc/hosts.allow C. /etc/hosts.deny

What file on a system contains a list of hosts that can't connect to the machine's services? A. /etc/hosts/denial B. /etc/hosts.deny C. /etc/host.notallow D. /etc/inetd.conf E. /etc/hosts.not

B. /etc/hosts.deny

What file is read by the program ldconfig? A. /lib/ld.so B. /etc/ld.so.conf C. /etc/ld.so.cache D. /etc/modules.conf

B. /etc/ld.so.conf

The network connection needs to be started during bootup which requires that the drive module for the network card be loaded properly. Which of the following files is used to map an Ethernet device (eth0, for example) to a specific driver module? A. /etc/module/config B. /etc/modules.conf C. /etc/conf/modules D. /etc/insmod.conf

B. /etc/modules.conf

Which of the following configuration files should be modified to set default shell variables for all users? A. /etc/bashrc B. /etc/profile C. ~default/.bash_profile D. /etc/skel/.bashrc E. /etc/skel/.bash_profile

B. /etc/profile

George is planning a partition scheme for a new Linux installation. Which THREE directories should he consider for separate partitions? (Select three) A. /etc B. /home C. /var D. /lib E. /tmp

B. /home C. /var E. /tmp

You are running an email server configured with the default settings. In which directory will you find the delivered mail for the user foo? A. /var/spool/mail B. /home/foo/mail C. /var/mail/spool D. /var/users/mail

B. /home/foo/mail

What command changes the priority of the process running with process id of 12345 to the highest priority? A. /usr/bin/renice +20 1234 B. /usr/bin/renice -20 12345 C. /bin/setpriority +20 12345 D. /bin/setpriority -20 12345

B. /usr/bin/renice -20 12345

What umask will set the file permissions on a newly created file to -rw-r--r-- (644)? A. 0002 B. 0022 C. 0224 D. 0246

B. 0022

What is the recommended setting for StartServers in a medium sized Apache installation? A. 5 B. 10 C. 15 D. 20

B. 10

Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.) A. 127.0.0.0/8 B. 10.0.0.0/8 C. 169.255.0.0/16 D. 172.16.0.0/12 E. 192.168.0.0/16

B. 10.0.0.0/8 D. 172.16.0.0/12 E. 192.168.0.0/16

Pressing the Ctrl-C combination on the keyboard while a command is executing in the foreground sends which of following signal codes? A. 1 (SIGHUP) B. 2 (SIGINT) C. 3 (SIGQUIT) D. 9 (SIGKILL) E. 15 (SIGTEPM)

B. 2 (SIGINT)

To create a user account, keep in mind that the username is at most ____ characters long. A. 6 B. 8 C. 12 D. 18

B. 8

While editing a file in vi, you realize that you are changing the wrong file. What vi command sequence will allow you to quit without saving your changes? A. :Q! B. :q! C. :w! D. :wq!

B. :q!

How can you enable onscreen (non-printing) numbers in a vi session? A. :set num B. :se nu C. :set -o number D. :set +o num E. None of the choices

B. :se nu

Which of the following shell redirections will write standard output and standard error output to a file named filename? A. 2>&1 >filename B. >filename 2>&1 C. 1>&2>filename D. >>filename E. 1&2>filename

B. >filename 2>&1

All items are required to enable USB support on a Linux system EXCEPT. A. A kernel that has USB driver support B. A USB 2.0 compatible device C. A supported controller chip such as DHCI, UHCI, or EHCI D. A kernel that supports hot-pluggable devices

B. A USB 2.0 compatible device

How is the file format of /etc/crontab different from a normal crontab file? (Select TWO correct answers) A. The /etc/crontab file can specify a year field. B. A normal crontab file must be installed with the crontab command. C. A normal crontab file allows for environment variable substitution. D. The /etc/crontab file has a user field for commands.

B. A normal crontab file must be installed with the crontab command. D. The /etc/crontab file has a user field for commands.

Ghostscript can be used as: A. A Line Printer Daemon B. A print filter to convert PostScript data for non-PostScript printers C. A print filter to allow correct printing on PostScript printers D. A print filter to remove "ghosting" and "staircase" effect problems E. A graphical viewer for PostScript files

B. A print filter to convert PostScript data for non-PostScript printers

Suppose that the command netstat-a hangs for a long time without producing output. You might suspect: A. A problem with NFS B. A problem with DNS. C. A problem with NIS. D. A problem with routing. E. That the netstat daemon has crashed.

B. A problem with DNS.

What is NTP? A. A more secure protocol replacement for FTP. B. A protocol and system for maintaining time on computers. C. A routing aid for finding next hops on a network. D. A simple tunneling protocol for computers behind firewalls.

B. A protocol and system for maintaining time on computers.

After running the command umount /mnt, the following error message is displayed: umount: /mnt: device is busy. What is a common reason for this message? A. The kernel has not finished flushing disk writes to the mounted device. B. A user has a file open in the /mnt directory. C. The previous rm command has not finished. D. The files in /mnt have been scanned and added to the locate database. E. The kernel thinks that a process is about to open a file in /mnt for reading.

B. A user has a file open in the /mnt directory.

What is true regarding the command sendmail? A. With any MTA, the sendmail command must be run periodically by the cron daemon. B. All MTAs, including Postfix and Exim, provide a sendmail command. C. The sendmail command prints the MTAs queue history of which mails have been sent successfully. D. It is only available when the sendmail MTA is installed.

B. All MTAs, including Postfix and Exim, provide a sendmail command.

Where are user specific crontabs stored? A. In the database file /etc/crontab.db which is shared by all users. B. As individual per-user files within /var/spool/cron. C. As individual per-user files in /etc/cron.user.d. D. In the .crontab file in the user's home directory. E. In the file /var/cron/user-crontab which is shared by all users.

B. As individual per-user files within /var/spool/cron.

While checking your security, you discover that you can connect to one of the machines on the network via port 23. What should you do to the network service on this machine? A. Deactivate it, you don't need a SMTP server there. B. Deactivate it, you should not use TELNET. C. Leave active, SSH is safe. D. Deactivate it, you don't need a FTP server there.

B. Deactivate it, you should not use TELNET.

What does the following command do? cat '$TEST' A. Displays a bash syntax error message. B. Displays the contents of the file named $TEST if it exists. C. Waits for the user to enter text and then echos the text back. D. Displays the contents of the file named inside the back quotes. E. Displays the contents of the named by the environment variable TEST.

B. Displays the contents of the file named $TEST if it exists.

Which of the following protocols uses two different network ports? A. NTP B. FTP C. Rsh D. HTTP E. Telnet

B. FTP

What will the following line in the /etc/exports file do? /data snowblower(rw) badhost (ro) A. Give snowblower rw access to the data share, deny badhost any access, and allow ro for all other hosts B. Give snowblower rw access to the data share, give badhost ro access to share and deny all others C. Give snowblower no access to the data share, give badhost rw access and set ro access for all others D. Cause a syntax error

B. Give snowblower rw access to the data share, give badhost ro access to share and deny all others

Keyboards and mice are members of which class of USB devices? A. Communication Device Class B. Human Interface Device Class C. Mass Storage Device Class D. Data Interface Device Class

B. Human Interface Device Class

Which of the following describes the Linux ping packet or datagram? A. IP packet with a packet type B. ICMP packet with a message type C. ICMP packet with a payload D. UDP datagram with a protocol type E. UDP datagram with a payload

B. ICMP packet with a message type

Which of the following is true about IPv6? A. With IPv6, the TCP port numbers of most services have changed. B. IPv6 no longer supports broadcast addresses. C. IPv4 addresses can be used without any change with IPv6. D. IPv6 no longer supports multicast addresses. E. For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.

B. IPv6 no longer supports broadcast addresses.

Why is the xhost program considered dangerous to use? A. It makes it difficult to uniquely identify a computer on the network. B. It allows easy access to your X server by other users. C. It logs sensitive information to syslog. D. It makes your computer share network resources without any authentication. E. It is a graphical DNS tool with known exploits.

B. It allows easy access to your X server by other users.

What is the purpose of the & character at the end of a command line? A. It causes standard error to be unbuffered. B. It causes the command to be run in the background of the current shell. C. It puts the command under the job control facilities of the current shell. D. It causes the command to be run as a child of the initial login shell of the user.

B. It causes the command to be run in the background of the current shell.

The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section? A. It is placed in curly brackets as in Section SectionName { ... }. B. It is placed between a line containing Section "SectionName" and a line containing EndSection. C. It is placed between the tags <Section name="SectionName"> and </Section> D. It is placed after the row [SectionName]. E. It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.

B. It is placed between a line containing Section "SectionName" and a line containing EndSection.

How is a display manager started? A. It is started by a user using the command startx. B. It is started like any other system service by the init system. C. It is started by inetd when a remote hosts connects to the X11 port. D. It is started automatically when a X11 user logs in to the system console.

B. It is started like any other system service by the init system.

When the command echo $$ outputs 12942, what is the meaning of 12942? A. It is the process ID of the echo command. B. It is the process ID of the current shell. C. It is the process ID of the last command executed. D. It is the process ID of the last command which has been placed in the background.

B. It is the process ID of the current shell.

What benefit does an alias provide? A. It provides faster lookups for commands. B. It prevents having to type long commands C. It hides what command you are running from others. D. It creates a local copy of a file from another directory.

B. It prevents having to type long commands

What is a purpose of an SSH host key? A. It must be sent by any SSH client in addition to a user key in order to identify the client's host. B. It provides the server's identity information to connecting SSH clients. C. It is the root key by which all user SSH keys must be signed. D. It authenticates any user that logs into a remote machine from the key's host. E. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.

B. It provides the server's identity information to connecting SSH clients.

What is the default action of the split command on an input file? A. It will break the file into new files of 1,024 byte pieces each. B. It will break the file into new files of 1,000 line pieces each. C. It will break the file into new files of 1,024 kilobyte pieces each. D. It will break the file into new files that are no more than 5% of the size of the original file.

B. It will break the file into new files of 1,000 line pieces each.

When installing XWindows the monitor wasn't recognised but now a data sheet with its specification is available. Which xorg.conf section must be edited to specify the correct values for several variables? A. Screen B. Monitor C. Border D. Modeline E. Device

B. Monitor

Which of the following may occur as a consequence of using the command ifconfig? (Choose THREE correct answers.) A. New name servers may be added to the resolver configuration. B. Network interfaces may become active or inactive. C. The routing table may change. D. IP addresses may change. E. The system's host name may change.

B. Network interfaces may become active or inactive. C. The routing table may change. D. IP addresses may change.

Which of the following tasks can be accomplished using the command date? (Choose TWO correct answers.) A. Synchronize the hardware and system clocks. B. Output date and time in different formats. C. Set the system clock. D. Set the hardware clock. E. Update the time via NTP.

B. Output date and time in different formats. C. Set the system clock.

Which of the following statements is a TRUE difference between GRUB Legacy and GRUB 2? A. GRUB 2 no longer requires a configuration file. B. Partition numbers start at 0 in GRUB Legacy and 1 in GRUB 2. C. grub-mkconfig only works with GRUB Legacy if the -version 1 option is used. D. The configuration file menu.lst (and grub.conf) have been replaced with grub.config.

B. Partition numbers start at 0 in GRUB Legacy and 1 in GRUB 2.

The system is having trouble and the engineer wants to bypass the usual /sbin/init startup and run /bin/sh. What is the usual way to pass this change to the kernel from your boot loader? A. Start in runlevel 1 B. Pass init=/bin/sh on the kernel parameter line C. Pass /bin/sh on the kernel parameter line D. Pass start=/bin/sh on the kernel parameter line

B. Pass init=/bin/sh on the kernel parameter line

Which configuration option can you use to prevent the root user from logging directly onto a machine using ssh? A. NoRootLogon B. PermitRootLogon No C. NoRootLogon Yes D. RootLogin = No E. ProhibitRootLogon No

B. PermitRootLogon No

You've been reviewing your security checklist and one of the items calls for reviewing the /etc/passwd file. You cat the file and notice that, while most users have an x in the second column, a few have a 14 character string in the second column. What action, if any, should you take? A. No action. The users with an x have their accounts locked. B. Run pwconv to convert the unix passwords to shadow passwords. C. Use the passwd program to give the users with the hashed passwords new passwords. D. Use the passwd program to give the users with the x new passwords. E. No action. Linux knows how to handle the situation and allow user logins.

B. Run pwconv to convert the unix passwords to shadow passwords.

Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders? A. SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type; B. SELECT order_type,COUNT(*) FROM orders GROUP BY order_type; C. COUNT(SELECT order_type FROM orders); D. SELECT COUNT(*) FROM orders ORDER BY order_type; E. SELECT AUTO_COUNT FROM orders COUNT order_type;

B. SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;

To avoid spammers using your mail server to relay their messages, you need to _______. A. Disable the relay control in /etc/aliases B. Set up a ruleset for this in /etc/sendmail.cf C. Set up relay control in your DNS's MX record. D. Recompile sendmail with the NORELAY flag.

B. Set up a ruleset for this in /etc/sendmail.cf

Which statements are true regarding the following syslog.conf configuration directive? *.err;kern.notice;auth.notice /dev/console (Select THREE correct answers) A. Severity crit messages from all facilities will be directed to /dev/console B. Severity notice messages from the auth facility will be directed to /dev/console C. Severity notice messages from the kern facility will be directed to /dev/console D. Severity err messages from the mail facility will be directed /dev/console E. Severity notice messages from all facilities will be directed to /dev/console

B. Severity notice messages from the auth facility will be directed to /dev/console C. Severity notice messages from the kern facility will be directed to /dev/console D. Severity err messages from the mail facility will be directed /dev/console

In XF86Config which section is concerned with fonts? A. the Fonts section B. The Files section C. The xfsCodes section D. The Graphics section E. The modeline section

B. The Files section

What is the main difference between the batch and at commands? A. The batch command will run multiple times.The at command will only run once. B. The batch command will run when system load is low. The at command runs at a specific time. C. The at command reads commands from standard input. The batch command requires a command line argument. D. The at command e-mails results to the user. The batch command logs results to syslog.

B. The batch command will run when system load is low. The at command runs at a specific time.

Which of the following explanations are valid reasons to run a command in the background of your shell? A. The command does not need to execute immediately. B. The command has to run immediately but the user needs to log out. C. The system is being shut down and the command needs to restart execution immediately after the reboot. D. The command can run at a lower priority than normal commands run on the command line.

B. The command has to run immediately but the user needs to log out.

Which of the following is a limitation of the cut command? A. The cut command can only select output by field position. B. The cut command cannot reorder fields. C. The cut command only works on ASCII text. D. The cut command will always print one line of output for every line of input.

B. The cut command cannot reorder fields.

Which of the following can the chage command <b>NOT</tt> change? A. The number of days since January 1, 1970 on which the users account will no longer be accessible B. The number of days since January 1, 1970 when the password can change C. The number of days since January 1st, 1970 when the password was last changed D. The maximum number of days during which a password is valid E. The number of days of inactivity after a password has expired before the account is locked

B. The number of days since January 1, 1970 when the password can change

What output will the following command seq 10 produce? A. A continuous stream of numbers increasing in increments of 10 until stopped. B. The numbers 1 through 10 with one number per line. C. The numbers 0 though 9 with one number per line. D. The number 10 to standard output.

B. The numbers 1 through 10 with one number per line.

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.) A. The user issuing the command must be in the group script. B. The script file must be found in the $PATH. C. The script file must have the executable permission bit set. D. The script must begin with a shebang-line (#!) that points to the correct interpreter. E. The file system on which the script resides must be mounted with the option scripts.

B. The script file must be found in the $PATH. C. The script file must have the executable permission bit set. D. The script must begin with a shebang-line (#!) that points to the correct interpreter.

Which of the following is observed and corrected by a NTP client? A. The skew in time between the system clock and the hardware clock. B. The skew in time between the system clock and the reference clock. C. Changes in the time zone of the current computer's location. D. Adjustments needed to support Daylight Saving Time.

B. The skew in time between the system clock and the reference clock.

This is the file /etc/named.boot from the computer named tellus with IP address 128.66.12.10. directory /etc secondary company.com 128.66.12. company.com.hosts secondary 66.128.IN-ADDR.ARPA 128.66.12.5 128.66.rev primary 0.0.127.IN-ADDR.ARPA named.local cache named.ca From this file, you know that: A. tellus is the primary DNS server for domain company.com. B. There is a secondary DNS server for domain company.com at the IP address 128.66.12.5. C. tellus is a secondary DNS server for domain company.com and it downloads the domain data from the server at IP address 128.66.12.5. D. The server at IP address 128.66.12.5 is allowed to download domain and reverse lookup data From tellus.

B. There is a secondary DNS server for domain company.com at the IP address 128.66.12.5.

Of the ways listed, which is the best method to temporarily suspend a user's ability to interactively login? A. Use passwd -d username to give the user an empty password. B. Use chage to expire the user account. C. Change the user's password. D. Add the command exit to the user's .login file.

B. Use chage to expire the user account.

You are looking into a new script you received from your senior administrator. In the very first line you notice a #! followed by a path to a binary. Linux will: A. Ignore the script B. Use that binary to interpret the script. C. Use that binary to compile the script. D. Be replaced by that binary.

B. Use that binary to interpret the script.

On a system running the K Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed? A. When KDM starts B. When a user's X session exists C. When KDM crashes D. When X is restarted E. When X crashes

B. When a user's X session exists

The command cat /proc/dma will show you what? A. Whether DMA is enabled B. Which DMA channels are in use C. Which DMA mode is in use D. General information about DMA on the machine

B. Which DMA channels are in use

You have a USB storage device that you cannot get working. You have enabled all appropriate USB options in the latest 2.2 kernel but still cannot get your device working. What is most likely the source of the problem? A. You have not configured your usb.usermap properly B. You are using the wrong kernel for this type of device C. The USB device is not USB 2.0 compliant D. There is a USB resource conflict

B. You are using the wrong kernel for this type of device

You have just recompiled a new kernel and rebooted your system with the new kernel. Unfortunately you are getting "Can't locate module" error messages. Which of the following is most likely to be the source of the problem? A. You copied the modules to the wrong directory. B. You did not configure modular support into the kernel. C. You did not run depmod after installing the modules. D. You dud not install the modules.

B. You did not configure modular support into the kernel.

You have replaced inetd with xinetd. What must be done after installing to ensure that your machine will work correctly? A. You must add a symbolic link from inetd.conf to xinetd.conf. B. You don't have to do anything because they are compatible. C. You must create a new configuration file for xinetd. D. You must run xinetd-configure first.

B. You don't have to do anything because they are compatible.

You are running Linux 2.0.36 and you need to add a USB mouse to your system. Which of the following statements is true? A. You need to rebuild the kernel B. You need to upgrade the kernel C. You need to load the USB modules for your existing modular kernel D. USB support is not available in Linux

B. You need to upgrade the kernel

You are running Linux 2.0.36 and you need to add a USB mouse to your system. Which of the following statements is true? A. You need to rebuild the kernel. B. You need to upgrade the kernel. C. You need to load the USB modules for your existing modular kernel. D. USB support is no available in Linux.

B. You need to upgrade the kernel.

What command can be used to shut down the Apache server gracefully? A. apacheshut B. apachectl C. apachestop D. apachestart

B. apachectl

Which of the following commands is used to test if the syntax of Apache's configuration files are correct? A. apacheconftest -a B. apachectl configtest C. ab -ct D. httest -c

B. apachectl configtest

Which of the following commands can be used to perform a full text search on all available packages on a Debian system? A. apt B. apt-cache C. apt-get D. apt-search E. dpkg

B. apt-cache

Which of the following commands enables the setuid (suid) permission on the executable called /bin/foo? A. chmod 1755 /bin/foo B. chmod 4755 /bin/foo C. chown u-s /bin/foo D. chmod 755+s /bin/foo

B. chmod 4755 /bin/foo

A Makefile typically contains which targets? A. CFLAGS, CPPFLAGS, LIBS, LDFLAGS B. clean, install, uninstall C. PATHS, DESTDIR, LIBS, LDFLAGS D. prefix, exec_prefix, bindir, mandir

B. clean, install, uninstall

You find you execute a series of commands on a recurring basis. You want this series of commands available from your login to run in the current shell. Choose the best solution: A. create a shell program B. create a function C. use the up arrow in BASH to find the command D. use BASH's built-in ! function to run the last iteration of the command by the same name

B. create a function

Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query? A. dnsq B. dig C. hostname D. dnslookup E. zoneinfo

B. dig

Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.) A. resolv B. dns C. remote D. files E. hosts

B. dns D. files

Your server has two fully functional NIC's with correct IP configuration. The server is not forwarding traffic between the NIC's. Which command string will set the cards to forward properly? A. setparam 1 > /proc/sys/net/ipv4/ip_autoconfig B. echo 1 > /proc/sys/net/ipv4/ip_forward C. set $=1 /proc/sys/net/ipv4/route D. cat $1 > /proc/sys/net/ethernet E. vi +/1 /proc/sys/net/unix/max_dgram_qlen

B. echo 1 > /proc/sys/net/ipv4/ip_forward

You have read/write permission on an ordinary file foo. You have just run ln foo bar. What would happen if you ran rm foo? A. foo and bar would both be removed. B. foo would be removed while bar would remain accessible. C. foo would be removed. bar would still exist but would be unusable. D. Both foo and bar would remain accessible. E. You would be asked whether bar should be removed.

B. foo would be removed while bar would remain accessible.

Which of the following commands would display the lines containing capital letters form the file "turkey.txt"? A. cat turkey.txt|wc -| B. grep -n [A-Z] turkey.txt C. cat turkey.txt|wc -w [A-Z] D. grep -v [A-Z] < turkey.txt E. for [A-Z] in turkey.txt | count

B. grep -n [A-Z] turkey.txt

You want to search the file myfile for all occurances of string containing at least five characters, where character number 2 and 5 are 'a' and character number 3 is NOT 'b'. Which command would you use? A. grep a*^b*a myfile B. grep .a[^b].a myfile C. grep .[a].*.[a] myfile D. grep .a*^b..a myfile

B. grep .a[^b].a myfile

What is the proper option to put in /etc/fstab to enable group quotas for a particular parition? A. groupquota B. grpquota C. groupquoatas D. grpquotas

B. grpquota

What ppp option governs how long an interrupted connection will remain down before it attempts to reconnect? A. holddown B. holdoff C. inactive D. delay E. wait

B. holdoff

The file myfile.txt contains the following data: joe:x:100:100:Joe:/home/joe:/bin/bash mike:x:101:101:Mike:/home/mike:/bin/sh kevin:x:102:102:Kevin:/home/kevin:/bin/sh matt:x:103:103:Matt:/home/matt:/bin/sh What output will be displayed on the screen when the following command is executed: grep -o home myfile.txt A. No output will be displayed on the screen B. home home home home C. /home/joe /home/mike /home/Kevin /home/matt D. joe mike Kevin matt

B. home home home home

On a dual boot system, every time the system is booted back into Linux the time has been set backward by one day. Which of the following commands will correct the problem? A. date -d '+ 1 day' B. hwclock --systohc --localtime C. ntpdate pool.ntp.org D. time hwclock

B. hwclock --systohc --localtime

Runlevels are configured ___________. A. in the kernel B. in /etc/inittab C. in /etc/runlevels D. using the rl command E. in rc.sysinit or rc.local

B. in /etc/inittab

You are having some trouble with a disk partition and you need to do maintenance on this partition but your users home directories are on it and several are logged in. Which command would disconnect the users and allow you to safely execute maintenance tasks? A. halt 1 B. init 1 C. logout -all now D. runlevel 1 E. shutdown -maintenance now

B. init 1

Your gateway to the internet is using iptables and NAT to allow your private network to access the Internet. You've verified that the gateway is not set up to block packets, but you need to verify that it is properly masquerading them. Which of the following commands would you use to look at your NAT tables? A. iptables -L -n B. iptables -t nat -L C. iptables -t mangle -L D. iptables -t filter -L

B. iptables -t nat -L

What command would rebuild the ld.so.cache file? A. ldd B. ldconfig C. ld.so.cache -rebuild D. ld

B. ldconfig

What tool can you use to print shared library dependencies? A. ldconfig B. ldd C. libdep D. libpath E. ldev

B. ldd

Which of the following commands can be used to view kernel messages? A. less dmesg B. less /var/log/boot.log C. cat /proc/kernel |less D. cat /proc/dmesg

B. less /var/log/boot.log

Which command will set the local machine's timezone to UTC? A. cat UTC > /etc/timezone B. ln -s /usr/share/zoneinfo/UTC /etc/localtime C. date -timezone=UTC D. mv /usr/timezone/UTC /etc

B. ln -s /usr/share/zoneinfo/UTC /etc/localtime

You are working in a graphical environment and trying to configure PPP, but are having problems. You know that PPP uses the local2 facility for logging. To better watch what's going on, you decide to open an Xconsole session and sent all local2 messages there. How should you configure /etc/syslog.conf to show you all messages sent from PPP? A. local2.* /dev/console B. local2.* /dev/xconsole C. *.local2 /dev/xconsole D. *.local2 *

B. local2.* /dev/xconsole

Which of the following commands will print the file putty on the printer hplaserj? Choose all that apply. A. lpr -P hplaserj -F putty B. lpr -Phplaserj putty C. lpc printer=hplaserj file=putty D. lpr -p hplaserj putty E. lpr -P hplaserj putty

B. lpr -Phplaserj putty E. lpr -P hplaserj putty

In order to bypass print filters using lpr, which of following switches should be used: A. lpr -o nofilter B. lpr -l C. lpr -o raw D. lpr -r

B. lpr -l

Which command will print out the attributes of the file foobar? A. ls --attr foobar B. lsattr foobar C. printattr foobar D. fileattr foobar

B. lsattr foobar

When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this? A. debug B. lsof C. nessus D. strace E. traceroute

B. lsof

What command should be used to print a listing of email in the system's mail queue? A. lpq B. mailq C. mlq D. sendmail -l

B. mailq

Which of the following removes all of the object files and some other things that an old version leaves behind? A. make dep B. make clean C. make_dep D. make_install

B. make clean

What does "make bzImage" do as opposed to "make zImage"? A. makes a bz encrypted kernel B. makes a kernel with a better compression ratio C. makes a kernel with built in gzip application D. nothing

B. makes a kernel with a better compression ratio

What commands will load a kernel module? (Select TWO answers) A. ldmod B. modprobe C. loadmod D. insmod E. modload

B. modprobe D. insmod

As root you have navigated to directory /B. You wish to move all of the files and directories from directory /A to directory /B. Which of the following options would be the most appropriate command line to execute this task? A. cp /a/* . B. mv -f /A/* . C. mv -Rf /a/* . D. cp -f /a/* .. E. cp -rf /A/* /b/

B. mv -f /A/* .

Which of the following keywords can be used in the file /etc/resolv.conf? (Choose TWO correct answers.) A. substitute B. nameserver C. search D. lookup E. method

B. nameserver C. search

Which command will print line numbers before each line in a file? A. ln B. nl C. cat -n D. numline

B. nl

These lines are taken from /etc//samba/smb.conf: workgroup = group1 guest account = nobody What else is needed for this to work? A. nobody must be a valid group on the server. B. nobody must be a user name listed in /etc/passwd. C. group1 must be a valid group on the server. D. workgroup must be a valid group on the server.

B. nobody must be a user name listed in /etc/passwd.

To ensure that a running process continues to execute after you log out, the process should be started with what command? A. live B. nohup C. saferun D. sh

B. nohup

Which command would you use to apply the changes in a diff file to your existing kernel source? A. up2date B. patch C. rpm D. dpkg E. diff

B. patch

What key combination is used to forcibly halt the X server in the event of the graphical session becoming unusable (e.g., desktop manager or full screen application hanging)? A. press CTRL+ALT+DEL B. press CTRL+ALT+BACK_SPACE C. press CTRL+ALT+DEL twice D. press CTRL+ALT+F1 then run

B. press CTRL+ALT+BACK_SPACE

Which of the following commands will list the quota for the user foobar? A. repquota foobar B. quota foobar C. lsquota foobar D. printquota foobar

B. quota foobar

How can you turn off the group quota in /pub? A. quotaoff /pub B. quotaoff -gv /pub C. quotadown /pub D. rm /pub/quota.group

B. quotaoff -gv /pub

Select from the list below the daemons that are present on a standard Linux server to support routing. Choose all that apply. A. gated B. ripd C. routed D. ospfd E. bgpd

B. ripd C. routed D. ospfd E. bgpd

Which fstab option governs that all root ID are mapped to anonymous ID when mounting a NFS mounted file system? A. no-root-squash B. root-squash C. all-squash D. squash-root

B. root-squash

Which RPM command will output the name of the package which installed the file /etc/exports? A. rpm -F /etc/exports B. rpm -qf /etc/exports C. rpm -Kl /etc/exports D. rpm -qp /etc/exports E. rpm -ql /etc/exports

B. rpm -qf /etc/exports

Which of the following commands will replace every instance of the word list with LIST from the file myfile.txt and print the results on the screen? A. sed --in-place -e "s/list/LIST/" myfile.txt B. sed -e "s/list/LIST/" myfile.txt C. sed --in-place -e "/list/LIST/" myfile.txt D. sed -e "/list/LIST/" myfile.txt

B. sed -e "s/list/LIST/" myfile.txt

Which of the following commands lists all defined variables and functions within Bash? A. env B. set C. env -a D. echo $ENV

B. set

Which of the following is the best way to list all defined shell variables? A. env B. set C. env -a D. echo $ENV

B. set

Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.) A. ssh --port 2222 example.com B. ssh -p 2222 example.com C. ssh -o Port=2222 example.com D. ssh -o GatewayPort=2222 example.com E. ssh example.com:2222

B. ssh -p 2222 example.com C. ssh -o Port=2222 example.com

What command is used to hold keys during a login session to be used for automatic authentication while logging in to other machines using ssh? A. sshd B. ssh-agent C. ssh-keygen D. ssh-add

B. ssh-agent

Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH? A. sshd B. ssh-agent C. ssh-keygen D. ssh-add

B. ssh-agent

You've just rebooted your server. Users complain that the server is refusing secure connections. Which of the following is most likely causing this problem? A. The clients are not resolving the server name properly. B. sshd is not configured to start in the default runlevel. C. sshd is using tcpwrappers for security. D. The public keys have been corrupted on the server. E. The users need to restart their ssh-agent.

B. sshd is not configured to start in the default runlevel.

Which of the following commands can be used to enable a file for paging and swapping? A. mkswap B. swapon C. inswap D. modswap

B. swapon

Which command will show you the contents of a gzip compressed tar archive? A. gzip archive.tgz | tar xvf - B. tar ztf archive.tgz C. gzip -d archive.tgz | tar tvf - D. tar cf archive.tgz

B. tar ztf archive.tgz

In xorg.conf, which section is concerned with fonts? A. the Fonts section B. the Files section C. the xfsCodes section D. the Graphics section E. the modeline section

B. the Files section

In the following command and its output, echo $$ 12942 what is 12942? A. the process ID of the echo command B. the process ID of the current shell C. the process ID of the last command executed D. the process ID of the last backgrounded command

B. the process ID of the current shell

Which of the following commands will print important system information such as the kernel version and machine hardware name? A. sysinfo B. uname C. lspci D. arch E. info

B. uname

Which of the following apt-get commands will install the newest versions of all currently installed packages without removing any packages or installing new packages that are not already installed? A. auto-update B. upgrade C. dist-upgrade D. install E. update

B. upgrade

When starting vi with the file nohup.out, which of the following will enable onscreen numbers? A. vi +/set num nohup.out B. vi +"se nu" nohup.out C. vi /+"set number" nohup.out D. vi +":set num" nohup.out E. echo "set numb" | vi nohup.out

B. vi +"se nu" nohup.out

You are looking for an executable file foo. Select the command that would search for foo within directories set in the shell variable, PATH. A. locate B. which C. find D. query E. whereis

B. which

With xorg 7.0, what is the name of the default font server? A. xfserv B. xfs C. fonts D. xfstt E. fserv

B. xfs

Which of the following files, when existing, affect the behavior of the Bash shell? (Choose TWO correct answers.) A. ~/.bashconf B. ~/.bashrc C. ~/.bashdefaults D. ~/.bash_etc E. ~/.bash_profile

B. ~/.bashrc E. ~/.bash_profile

On a system using shadowed passwords, the correct permissions for /etc/passwd are ____- and the correct permission for /etc/shadow are _______. A. -rw-r-----, -r-------- B. -rw-r--r--, -r--r--r-- C. -rw-r--r--, -r-------- D. -rw-r--rw-, -r-----r-- E. -rw--------, -r-------

C. -rw-r--r--, -r--------

On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___ and the most correct permissions for /etc/shadow are ___. A. -rw-r-----, -r-------- B. -rw-r--r--, -r--r--r-- C. -rw-r--r--, -r-------- D. -rw-r--rw-, -r-----r-- E. -rw-------, -r--------

C. -rw-r--r--, -r--------

What command option of rmmod specifies that all outputs be sent to syslog? A. -a B. -i C. -s D. -d

C. -s

Which of the following is the default XFree86 configuration file? A. /usr/X11R6/etc/XF86Config B. /var/X11/XF86Config C. /etc/X11/XF86Config D. /usr/etc/X11/XF86Config

C. /etc/X11/XF86Config

Which of the following is the default Xorg configuration file? A. /usr/X11R6/etc/xorg.conf B. /var/X11/xorg.conf C. /etc/X11/xorg.conf D. /usr/etc/X11/xorg.conf

C. /etc/X11/xorg.conf

Which configuration file should be modified to disable the ctrl-alt-delete key combination? A. /etc/keys B. /proc/keys C. /etc/inittab D. /proc/inittab E. /etc/reboot

C. /etc/inittab

You need to change the default run-level for the machine. Which file do you need to edit? (Write the full path including the filename) A. /etc/init.d B. /etc/init-table C. /etc/inittab D. /etc/init

C. /etc/inittab

What file should be edited to make the system aware of newly added library files? A. /etc/modules.conf B. /etc/conf.modules C. /etc/ld.so.conf D. /etc/ld.so.cache E. /etc/LD_LIBRARY_PATH.conf

C. /etc/ld.so.conf

Which of the following files is responsible for defining various options and values to control the printing and spooling of print jobs? A. /etc/printers B. /etc/print.conf C. /etc/printcap D. /etc/printd.conf

C. /etc/printcap

Which configuration file does sudo read when determining if a user is permitted to run applications with root privileges? A. /etc/groups B. /etc/passwd C. /etc/sudoers D. /etc/sudo.conf

C. /etc/sudoers

You are building a server that will undergo many hardware and operating system upgrades. The server is the file server for all users on your 100 user network. Which directory should have its own mountpoint and/or hard drive? A. /boot B. /sbin C. /home D. /etc

C. /home

You have a Linux system routing 3 networks through 3 separate NICs and are having trouble with your IP forwarding. What file would you check to ensure that IP forwarding is enabled? A. /etc/defaultrouter B. /proc/net/tcp C. /proc/sys/net/ipv4/ip_forward D. /var/log/messages

C. /proc/sys/net/ipv4/ip_forward

According to the FHS, where are user mailboxes kept? Assume that mail is not being delivered to somewhere in their home directories. A. /var/spool B. /etc/mail C. /var/mail D. /usr/mail

C. /var/mail

To correct crontab entry to execute the script chklog once per hour between 3 p.m. and 5 p.m.on Monday and Thursday each week is: A. 0 3,4,5 * * 2,5 chklog B. 0 3,4,5 * * 1,4 chklog C. 0 15,16;17 * * 1,4 chklog D. 0 15,16,17 1,4 * * chklog E. * 15,16,17 * * 1,4 chklog

C. 0 15,16;17 * * 1,4 chklog

What is the process ID number of the init program? A. -1 B. 0 C. 1 D. It is different with each reboot. E. It is set to the current run level.

C. 1

How many spare server processes are required by Apache for the typical, low-to-moderate volume website? A. 1 B. 50 C. 10 D. 200

C. 10

Which of the following represents a class C netmask? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255

C. 255.255.255.0

A new department's local area network has to be connected to the existing LAN using a router. This new department's LAN uses IP addresses from 192.168.112.64/26 and the first free IP address there was reserved for the router. How many IP addresses were left for other hosts to be connected? A. 63 B. 24 C. 61 D. 42

C. 61

How many SCSI ids for peripherals can SCSI-1 support? A. 5 B. 6 C. 7 D. 8

C. 7

To prevent a command run as root from sending both standard out (stdout) and standard error (stderr) to any terminal or other file or device, which of the following strings should be appended to the command? A. >/dev/null B. >/dev/null 1>&2 C. >/dev/null 2>&1 D. 1>&2 >/dev/null E. 2>&1 >/dev/null

C. >/dev/null 2>&1

What can you do to recover a lost passphrase for a DSA or RSA authentication key? A. Run the ssh-keygen command. B. Run the ssh -recover command. C. A lost passphrase cannot be recovered. D. Decrypt the authentication key with gpg. E. Decrypt the authentication key with ssh -decrypt.

C. A lost passphrase cannot be recovered.

What is pool.ntp.org? A. A deprecated feature for maintaining system time in the Linux kernel B. A website which provides binary and source packages for the OpenNTPD project C. A virtual cluster of various timeservers D. A community website used to discuss the localization of Linux

C. A virtual cluster of various timeservers

To prevent a specific user from scheduling tasks with at, what should the administrator do? A. Add the specific user to /etc/at.allow file. B. Add the specific user to [deny] section in the /etc/atd.conf file. C. Add the specific user to /etc/at.deny file. D. Add the specific user to nojobs group. E. Run the following: atd --deny [user].

C. Add the specific user to /etc/at.deny file.

Which of the following is true when hard-linked files are present? A. The output of stat will report "hard" instead of "regular file" B. The hard-linked files may not be empty C. Both files will share the same inode D. Issuing a long directory listing with ls -1 will indicate the link with "->" E. The file permissions will be prefixed by an "h", eg. hrwxr-x-r-x

C. Both files will share the same inode

What is the difference between the commands test -e path and test -f path? A. They are equivalent options with the same behaviour. B. The -f option tests for a regular file. The -e option tests for an empty file. C. Both options check the existence of the path. The -f option also confirms that it is a regular file. D. The -f option tests for a regular file. The -e option tests for an executable file.

C. Both options check the existence of the path. The -f option also confirms that it is a regular file.

When using pppd which authentication protocol is the most secure? A. clear text B. PAP C. CHAP D. LAP

C. CHAP

Of the ways listed, which is the best way to temporarily suspend a user's ability to interactively login? A. Changing the user's UID. B. Changing the user's password. C. Changing the user's shell to /bin/false. D. Removing the user's entry in /etc/passwd. E. Placing the command logout in the user's profile.

C. Changing the user's shell to /bin/false.

You are having problems with a particular font and you want to see if its directory is included in XF86Config. Which section contains this information? A. Paths B. Fonts C. Files D. Graphics

C. Files

Which ONE of the following lines from /etc/X11/xorg.conf indicates that fonts can be found on a font server? A. FontPath= server B. Fonts "unix/:7100" C. FontPath "unix/:7100" D. Fonts= server E. Fontserver = "servername"

C. FontPath "unix/:7100"

Which of the following lines from /etc/X11/XF86Config indicates what fonts can be found on a font server? A. FontPath= server B. Fonts "unix/:7100" C. FontPath "unix/:7100" D. Fonts= server E. Fontserver = "servername"

C. FontPath "unix/:7100"

What is the purpose of the file /etc/profile? A. It contains the welcome message that is displayed after login. B. It contains security profiles defining which users are allowed to log in. C. It contains environment variables that are set when a user logs in. D. It contains default application profiles for users that run an application for the first time.

C. It contains environment variables that are set when a user logs in.

When the command echo $ outputs 1, which of the following statements is true? A. It is the process ID of the echo command. B. It is the process ID of the current shell. C. It is the exit value of the command executed immediately before echo. D. It is the exit value of the echo command.

C. It is the exit value of the command executed immediately before echo.

What effect does the sticky bit have when set on a directory? A. There is no effect because the sticky bit has been deprecated in Linux. B. It provides a hint to the kernel that files in this directory should be cached in memory, if possible. C. It restricts deletion of files in this directory to only the root user and the file owner regardless of write permissions for other users. D. It instructs the kernel to keep the underlying data for the files in the directory intact to allow for undeletion of important files.

C. It restricts deletion of files in this directory to only the root user and the file owner regardless of write permissions for other users.

Where does lilo store its boot information? A. Boot ROM B. Boot RAM C. Master Boot Record D. /boot partition

C. Master Boot Record

When using PAP with PPP, the /etc/ppp/pap-secrets file must be: A. World-readable. B. Readable only by the ppp user. C. Readable only by root. D. Readable and executable by user root and group ppp.

C. Readable only by root.

What are reverse DNS entries used for? A. Reverse DNS enable diagnostic commands like traceroute to work. B. Reverse DNS gives you information about the owner of the DNS entry. C. Reverse DNS provides the hostname for a particular numeric IP address. D. Reverse DNS provides geographical information about the DNS net location.

C. Reverse DNS provides the hostname for a particular numeric IP address.

Which of the following SQL statements will select the fields name and address from the contacts table? A. SELECT (name, address) FROM contacts; B. SELECT (name address) FROM contacts; C. SELECT name, address FROM contacts; D. SELECT name address FROM contacts;

C. SELECT name, address FROM contacts;

What is a well-known service that binds port 25 and is it required on all hosts? A. SNMP and it should be turned off if not needed. B. SMTP and it is a required service. C. SMTP and it is only required on MX hosts. D. SLPD and it is required if you run LDAP services. E. SSHD and it is required for secure logins.

C. SMTP and it is only required on MX hosts.

Your server was rebooted. Users have complained that the server refuses secured connections. What is the mostly likely cause? A. The public keys have been corrupted on the server. B. The clients are not resolving the server name properly. C. Sshd is not configured to start in the default runlevel. D. The users need to ssh-keygen.

C. Sshd is not configured to start in the default runlevel.

User Joseph has successfully extracted and compiled a program from source code. Installing the binaries produces errors. What is the most likely reason? A. The source code was compiled for a different CPU B. The permissions set in the /usr/bin directory are wrong C. The binaries require root privileges to be installed D. The wrong prefix was used during configuration of the source code

C. The binaries require root privileges to be installed

What is true regarding a default route? A. The default route is always used first. When the default route is not available more specific routes are tried. B. When a default route is set, all other routes are disabled until the default route is deleted. C. The default route is only used if there is not a more specific route to a destination host or network. D. Without a default route, no network communication even in directly attached networks is possible.

C. The default route is only used if there is not a more specific route to a destination host or network.

This is a line from the file /etc/exports: /product company(rw) What does it mean? A. Only user company may access the filesystem /product when it is NFS mounted. B. This computer will mount the filesystem /product on company via NFS. C. The filesystem /product is exported for NFS mount to computer company. D. All NFS access to /product will use suid company.

C. The filesystem /product is exported for NFS mount to computer company.

You need to run a second Apache server on the same IP address. Which of the following is true? A. You cannot run more than one Apache on one IP address. B. You have to add a new entry in /etc/services. C. The second Apache server must listen on another port. D. The second Apache must be a child process of the first.

C. The second Apache server must listen on another port.

What is the conventional purpose of Linux UIDs that are lower than 100? A. They are reserved for super user accounts. B. They are reserved for the system admin accounts. C. They are reserved for system accounts. D. They are unused, aside from 0, because they are targets of exploits. E. They are used to match with GIDs in grouping users.

C. They are reserved for system accounts.

You have run out of disk space on a partition. Which of the following would be an easy way to move data to a new partition without reconfiguring the path to the data in existing applications? A. Run ext2fs ACL. B. Use a hard link. C. Use a symbolic link. D. Use the loopback device. E. Create a block device offset.

C. Use a symbolic link.

You are about to install a new program on an RPM based Linux system. Which of the following would be the best way to accomplish this? A. Get the source code in a tarball and install from that source. B. Get a source RPM and use rpm to install it. C. Use rpm to install the program's binaries from an RPM package. D. Use cpi to extract the binaries from a source RPM and use rpm to install those sources.

C. Use rpm to install the program's binaries from an RPM package.

Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records? A. CASE B. FROM C. WHERE D. IF

C. WHERE

Which of the following words is used to restrict the records that are returned from a SELECT query based on a supplied criteria for the values in the records? A. LIMIT B. FROM C. WHERE D. IF

C. WHERE

When should grep -F or the fgrep command be used to search the content of text files? A. When files need to be searched that contain non-ASCII text. B. When only the presence of the search pattern needs to be reported and not every line that matches the search. C. When the text being searched for does not contain any regular expression patterns. D. When the text files will be searched multiple times. Subsequent calls to fgrep will run faster.

C. When the text being searched for does not contain any regular expression patterns.

You've decided to convert from standard shadow passwords to MD5 passwords. You make the appropriate changes to the /etc/pam.d/ files. What do you do next? A. Nothing, the passwords will be changed as users login and out. B. Nothing, users will be automatically prompted to change their passwords at the next login. C. You need to manually change all the passwords using the passwd program. D. Delete and recreate all the users. E. Change the /etc/pam.d files back because shadow passwords and MD5 passwords are incompatible.

C. You need to manually change all the passwords using the passwd program.

You want to find the man pages for utilities and tools related to PPP, but you don't know the name of the specific commands. How can you get a list of man pages that contain information about PPP? A. whatis ppp B. man ppp C. apropos ppp D. mandb ppp

C. apropos ppp

You have not run apt-get on a system for some time, but it has been run on the system before. What apt-get command would you run to download the latest list of packages, but not the packages themselves? A. apt-get build-dep B. apt-get mirror-select C. apt-get update D. apt-get upgrade E. apt-get dist-upgrade

C. apt-get update

Which chown command will change the ownership to foo and the group to bar on a file named biglist? A. chown foo/bar biglist B. chown -u foo -g bar biglist C. chown foo:bar biglist D. chown --user foo --group bar biglist

C. chown foo:bar biglist

What command would execute cmd1 followed by cmd2, regardless of the exit status of cmd1? A. cmd1 cmd2 B. cmd1 | cmd2 C. cmd1 ; cmd2 D. cmd1 && cmd2 E. cmd1 || cmd2

C. cmd1 ; cmd2

The main collection of Linux usenet newsgroups are found in which usenet hierarchy? A. sys.linux B. comp.linux C. comp.os.linux D. comp.sys.linux E. comp.opsys.linux

C. comp.os.linux

You need to pause the CUPS printer HPLaserjet4, and you want to cancel all print jobs with a message, "hello". Which command will do this? A. cupsreject -c -r hello HPLaserjet4 B. cupsreject -p -m hello HPLaserjet4 C. cupsdisable -c -r hello HPLaserjet4 D. cupsdisable -p -m hello HPLaserjet4

C. cupsdisable -c -r hello HPLaserjet4

You have just added new modules to your system. What command would you execute to rebuild the modules.dep file? A. depmod --rebuild B. update-dependancies C. depmod -a D. insmod -dependancies

C. depmod -a

Your machine's IP address used to function, but it's only got the localhost "lo" entry now. What three clientmode commands could you possibly use to get a new DHCP address? A. dhcpd B. ipconfig C. dhclient D. pump E. dhcpcd

C. dhclient D. pump E. dhcpcd

What is a reasonable command to uninstall a Debian package from your system? A. dpkg -Ra pkgname B. dpkg -R pkgname C. dpkg -r pkgname D. dpkg -ra pkgname

C. dpkg -r pkgname

To test a shell script called myscript, the environment variable FOOBAR must be removed temporarily. How can this be done? A. unset -v FOOBAR B. set -a FOOBAR="" C. env -u FOOBAR myscript D. env -i FOOBAR myscript

C. env -u FOOBAR myscript

How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only? A. unset -v FOOBAR;./myscript B. set -a FOOBAR="";./myscript C. env -u FOOBAR./myscript D. env -i FOOBAR./myscript

C. env -u FOOBAR./myscript

Which command should be added to /etc/bash_profile to change the language of messages from an internationalised program to Portuguese (pt)? (Select TWO correct answers) A. export LANGUAGE="pt" B. export MESSAGE="pt" C. export LANG="pt" D. export LC_MESSAGES="pt" E. export ALL_MESSAGES="pt"

C. export LANG="pt" D. export LC_MESSAGES="pt"

Given the following output: Prompt > myapp [1]+ Stopped myapp prompt> Which of the following commands will resume executing the stopped process while allowing the user to continue to type commands at the command prompt? A . bg myapp A. continue myapp B. exec myapp C. fg myapp D. myapp &

C. fg myapp

The command used to determine a file's type is A. type B. find C. file D. ls

C. file

inetd.conf was changed. How to reinit changes? A. restart inetd B. find inetd's PID and send signal 15 to it C. find inetd's PID and send signal SIGHUP to it

C. find inetd's PID and send signal SIGHUP to it

You have two shell scripts, foo and bar. You wish to have bar execute if foo returns an exit status of 0 Select the correct command: A. foo; bar B. foo || bar C. foo && bar D. foo % bar

C. foo && bar

What configuration file is used for settings and conversion parameters for the ftp daemon? A. ftpusers B. ftpconvert C. ftpconversions D. in.ftpd E. ftpdefaults

C. ftpconversions

We have bash script ~/myscript shown below: Shift echo $2 We call this script: ~/myscript alpha beta gamma delta. What will we see? A. alpha B. beta C. gamma D. delta

C. gamma

Which of the following commands will print the first few lines of a text file to the shell? A. cat -n 10 filename B. dump -n 10 filename C. head -n 10 filename D. print -n 10 filename

C. head -n 10 filename

Which of the following lines would you find in the file /etc/nsswitch.conf? A. order hosts,bind B. 192.168.168.4 dns-server C. hosts: files dns D. domain mycompany.com

C. hosts: files dns

On a dual boot system, every time the system is booted back into Linux the time has been set backward by two hours. Which of the following commands will correct the problem so it will not occur again? A. ntpdate pool.ntp.org B. date -d 'two hours' C. hwclock -hctosys -localtime D. time hwclock

C. hwclock -hctosys -localtime

You are working on a server that has multiple ethernet network interfaces, and you wish to find out the IP address assigned to the eth1 interface. Which of the following commands will print the necessary information? A. ipconfig /dev/eth1 B. ethconfig -d eth1 C. ifconfig eth1 D. prntconf eth1

C. ifconfig eth1

Which of the following commands can be used to activate a specific network interface? A. ipup B. net C. ifup D. netup

C. ifup

Which of the following could be used to load kernel modules for a 2.4.x kernel? A. vi/proc/modules B. rmmod C. kmod D. depmod

C. kmod

After modifying LILO's configuration file, what command should you run for the changes to take effect? A. kill -HUP 'pidof lilo' B. lilo-install C. lilo D. reboot

C. lilo

Which of the following commands will provide locale-specific information about your system and its environment? A. loconfig B. getlocale C. locale D. tzconfig E. tzselect

C. locale

Which of the following commands can typically be used to configure a kernel? A. ./config B. ./configure C. make config D. make configure

C. make config

According to the PPP HOWTO which piece of software could help you test a modem? A. chat B. dhcpd C. minicom D. Hylafax E. netconfig

C. minicom

On a debian system which of the following would build a boot disk? A. mkboot /dev/floppy B. makeboot --device /dev/fd0 2.4.18-12 C. mkboot --device /dev/fd0 2.4.18-12 D. mkboot /boot/vmlinux-2.4.18-12 E. mkbootdisk /boot/vmlinux-2.4.18-12

C. mkboot --device /dev/fd0 2.4.18-12

You need to create a simple hierarchy of directories: images/photos/summer/ottawa/. None of the directories on that path exists. What command will create all of the needed directories in one step? A. mkdir -r images/photos/summer/ottawa/ B. mkdir -R images/photos/summer/ottawa/ C. mkdir -p images/photos/summer/ottawa/ D. mkdir -P images/photos/summer/ottawa/ E. mkdir -m images/photos/summer/ottawa/

C. mkdir -p images/photos/summer/ottawa/

Which of the following commands will load a kernel module along with any required dependency modules? A. depmod B. insmod C. modprobe D. module_install E. loadmod

C. modprobe

What command would load the module msdos.o and all its dependancies? A. modinfo -a msdos B. lsmod -a msdos C. modprobe msdos D. insmod -d msdos

C. modprobe msdos

When reading man pages, a lot of extra characters are shown on screen. Which of the following commands can help to deal with this problem? A. col B. grep C. more D. pg E. row

C. more

Which of the following is used to establish a PPP link to another computer? A. pppconn B. linkppp C. pppd D. pppconf

C. pppd

Which of the following commands is used to restore files from backups made with dump? A. extract B. cpio -d C. restore D. udump

C. restore

What RPM command would show you detailed information for a package called openssh- 3.6.i386.rpm? A. rpm --showinformation openssh-3.6.i386.rpm B. rpm --showdetails --package openssh-3.6.i386.rpm C. rpm --query --info --package openssh-3.6.i386.rpm D. rpm --verify openssh-3.6.i386.rpm

C. rpm --query --info --package openssh-3.6.i386.rpm

How can you update a package only if an earlier version is currently installed on the system? A. rmp -- update rpmname B. rpm -U rpmname C. rpm -F rpmname D. rpm -- force rpmname E. rpm -u rpmname

C. rpm -F rpmname

You see following output while trying to install an updated package: [root@example pub]# rpm I gthumb- 2.2.0.i386.rpm package gthumb- 1.0.1.i386.rpm is already installed. Which command will allow you to install the updated version? A. rpm -i gthumb-2.2.0.i386.rpm B. rpm -ivh gthumb-2.2.0.i386.rpm C. rpm -U gthumb-2.2.0.i3S6.rpm D. rpm -qu gthumb-2.2.0.i386.rpm E. rpm -qiv gthumb-2.2.0.i386.rpm

C. rpm -U gthumb-2.2.0.i3S6.rpm

The GRUB_TIMEOUT parameter specifies a timeout period when booting in what unit of time? A. milliseconds B. tenths of seconds C. seconds D. minutes

C. seconds

What BASH environment variable will prevent you from overwriting a file with a ">" or ">>"? A. set -o safe B. set -o noglob C. set -o noclobber D. set -o append E. set -o nooverwrite

C. set -o noclobber

Which bash option will prevent you from overwriting a file with a ">"? A. set -o safe B. set -o noglob C. set -o noclobber D. set -o append E. set -o nooverwrite

C. set -o noclobber

What command should be invoked to give the user sally read and write, but not execute, access to the file strategy.txt using Extended ACL entries? A. setfacl -setperm sally:rw strategy.txt B. setfacl -m user::sally+rw strategy.txt C. setfacl -m user:sally:rw strategy.txt D. setfacl -setperm user:sally+rw strategy.txt

C. setfacl -m user:sally:rw strategy.txt

Which daemon allows Linux to share it's file systems and printers with unmodified Windows clients? A. X Window B. nmbd C. smbd D. WINS E. NFS

C. smbd

What command is used to monitor connections to the SMB server? A. smbclient B. testparm C. smbstatus D. smbstat

C. smbstatus

Which of the following services would you be least likely to configure to be governed over by the Internet Super Server? A. ftp B. telnet C. ssh D. finger E. bind

C. ssh

What command do you use to generate an OpenSSH host key? A. sshd B. ssh-agent C. ssh-keygen D. ssh-add

C. ssh-keygen

In Bash, inserting "1>&2" after a command redirects A. standard error to standard input B. standard input to standard error C. standard output to standard error D. standard error to standard output E. standard output to standard input

C. standard output to standard error

You are logged in as user tux1, but now you want to switch users to tux2 with tux2's environment. How would you do this? A. su tux2 B. su -e tux2 C. su - tux2 D. su -m tux2 E. su -f tux2

C. su - tux2

Which of the following commands will display the last 30 lines of /var/log/bigd.log as well as new content as it is appended to the file by another process? A. cut -30 -v /var/log/bigd.log B. head -30 -e /var/log/bigd.log C. tail -f -n 30 /var/log/bigd.log D. tac -30 /var/log/bigd.log E. cat -r -n 30 /var/log/bigd.log

C. tail -f -n 30 /var/log/bigd.log

What single command (no options or arguments) can be used to fully extract a file called abc.tar.bz2? A. gzip B. gunzip C. tar D. bz2unzip

C. tar

Which of the following lines would you expect to see in the file /etc/services? A. in.tftpd: LOCAL B. tftp dgram upd wait root /usr/sbin/tcpd in.tftpd C. tftp 69/tcp D. udp 17 UDP

C. tftp 69/tcp

What is NOT contained in the locale setting of the operating system? A. currency symbol B. language C. timezone D. thousands separator

C. timezone

Which of the following commands will change all CR-LF pairs in an imported text file, userlist.txt, to Linux standard LF characters and store it as newlist.txt? A. tr '\r\n' '' < userlist.txt > newlist.txt B. tr -c '\n\r' '' < newlist.txt > userlist.txt C. tr -d '\r' < userlist.txt > newlist.txt D. tr '\r' '\n' userlist.txt newlist.txt E. tr -s '^M' '^J' userlist.txt newlist.txt

C. tr -d '\r' < userlist.txt > newlist.txt

Which utility would you use to change how often a filesystem check was performed over an EXT2 filesystem (without losing any data stored on that filesystem)? A. mod2fs B. fsck C. tune2fs D. mke2fs E. fixe2fs

C. tune2fs

Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes? A. core B. edquota C. ulimit D. quota

C. ulimit

Which of the following commands can be used to limit the amount of memory a user may use? A. umask B. usermod C. ulimit D. passwd E. chage

C. ulimit

To allow a regular user account to mount and unmount a filesystem (for instance, a cdrom or floppy), which option will need to be added to the corresponding line in /etc/fstab? A. nouidchk B. alluser C. user D. auto

C. user

The files in the /etc/skel directory are used by the A. pwconv command. B. pwunconv command. C. useradd command. D. passwd command.

C. useradd command.

User Bob Swanson (bswanson) has left Company.com. His data has already been removed from his directory. How do you remove his account and directory? A. rm -rf /home/bswanson B. deluser /home/bswanson C. userdel -r bswanson

C. userdel -r bswanson

Which of the following commands will lock the user foobar's account? A. userdel -r foobar B. moduser -l foobar C. usermod -L foobar D. userconf -l foobar

C. usermod -L foobar

Which of the following programs will only find files that are in your PATH? A. locate B. slocate C. which D. find

C. which

Which one of the following programs will only find files that are in your PATH? A. locate B. slocate C. which D. find

C. which

To learn more about the management or ownership of a website, what's the best utility to use? A. tracert B. traceroute C. whois D. ping E. telnet

C. whois

After installing and configuring Xfree86, you notice that when you start X, the display is not centered. What program can you run to find a better modeline setting? A. XF86Setup B. xf86config C. xvidtune D. xvideoagent

C. xvidtune

Which of the following commands shows the current color depth of the X Server? A. xcd B. xcdepth C. xwininfo D. xcolordepth E. cat /etc/X11

C. xwininfo

X is running okay but you're concerned that you may not have the right color depth set. What single command will show you the running color depth while in X? A. xcd B. xcdepth C. xwininfo D. xcolordepth E. cat /etc/X11

C. xwininfo

You are the system administrator for a consulting firm where several people use Linux as their desktop operating system. One of your users has installed a commercial publishing program that works under X on a variety of UNIX and Linux platforms. The user made a series of configuration changes regarding the initial window size, location and color. Now, he is having difficulty undoing these changes and is asking for your help. In which file would you think you would most likely find the configuration settings you are seeking to change? A. ~/.xinitrc B. ~/.xconfig C. ~/.Xdefaults D. ~/.XF86Config E. /etc/X11/XF86Config

C. ~/.Xdefaults

You have just set up the Gnome Display Manager as your default display manager. What file should you edit to change the default greeting for it? A. /etc/X11/prefdm B. /etc/X11/XF86Config C. /etc/X11/gdm.conf D. /etc/X11/gdm/lnit/Default

D. /etc/X11/gdm/lnit/Default

Which file should be edited to select the network locations from which Debian installation package files are loaded? A. /etc/dpkg/dpkg.cfg B. /etc/apt/apt.conf C. /etc/apt/apt.conf.d D. /etc/apt/sources.list E. /etc/dpkg/dselect.cfg

D. /etc/apt/sources.list

A file exists on a server, but has no content. Users cannot submit jobs to an attached printer. Choose the correct file that must be edited to fix this problem. A. /etc/hosts B. /etc/hosts.allow C. /etc/host.deny D. /etc/hosts.lpd E. /var/spool/hosts.lpd

D. /etc/hosts.lpd

You have a standard Apache web server installation and want to make it respond to requests on port 8088. To do this, what configuration file do you need to change? A. None. This is the default port. B. /etc/httpd/apache.conf C. /etc/httpd/ports.conf D. /etc/httpd/httpd.conf E. /etc/httpd/access.conf

D. /etc/httpd/httpd.conf

What file is typically used to display messages at the login prompt when remote users telnet in to the machine? A. /etc/issue B. /etc/motd C. /etc/net.banner D. /etc/issue.net

D. /etc/issue.net

In the LPD system, a print queue is defined in what file? A. /etc/lprconf B. /etc/printer C. /etc/printqueue D. /etc/printcap

D. /etc/printcap

The following output shows an excerpt from a standard network configuration file: time 37/tcp timserver time 37/udp timeserver rlp 39/udp resource # resource location name 42/udp nameserver whois 43/tcp nickname # usually to sri-nic domain 53/tcp domain 53/udp mtp 57/tcp # deprecated bootps 67/udp # bootp server bootpc 68/udp # bootp client tftp 69/udp Which file could this be from? A. /etc/hosts B. /etc/inetd.conf C. /etc/named.conf D. /etc/services E. /etc/syslog.conf

D. /etc/services

Which file contains the date of the last change of a user's password? A. /etc/gshadow B. /etc/passwd C. /etc/pwdlog D. /etc/shadow E. /var/log/shadow

D. /etc/shadow

Which directory contains additional information about installed packages? A. /usr/share/documentation B. /usr/local/share/documentation C. /usr/local/doc D. /usr/share/doc E. /usr/packages/doc

D. /usr/share/doc

Which of the following looks like a correct entry in the /etc/hosts file? A. localhost 127.0.0.1 localhost.localdomain B. localhost.localdomain localhost 127.0.0.1 C. localhost localhost.localdomain 127.0.0.1 D. 127.0.0.1 localhost.localdomain localhost E. localhost.localdomain 127.0.0.1 localhost

D. 127.0.0.1 localhost.localdomain localhost

Which two of the following Class B IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose two) A. 128.0.0.0 B. 169.16.0.0 C. 169.254.0.0 D. 172.16.0.0 E. 172.20.0.0

D. 172.16.0.0 E. 172.20.0.0

The correct crontab entry to execute the script chklog three times per month between 3 p.m. and 5 A. m.: B. * 3,4,5 1 * * chklog C. 3 3,4,5 1 * * chklog D. 3 15,16,17 * * * chklog E. 0 15,16,17 1 * * chklog F. * 15,16,17 1 * * chklog

D. 3 15,16,17 * * * chklog

Which of the following crontab entries will execute myscript at 30 minutes past every hour on Sundays? A. 0 * * * 30 myscript B. 30 * * * 6 myscript C. 30 0 * * 0 myscript D. 30 0-23 * * 0 myscript E. 0 0-23 * * 30 myscript

D. 30 0-23 * * 0 myscript

How many cron fields are there for specifying the time to execute a cron job? A. 1 B. 3 C. 4 D. 5 E. 6

D. 5

While editing a file in vi, the file changes due to another process. Without exiting vi, how can the file be reopened for editing with the new content? A. :r B. :n C. :w D. :e

D. :e

The hosts.lpd file provides: A. A list of network printer IP addresses. B. A listening of printers available on the local network. C. A listening of computers that have printer (lpd) daemons running. D. A listening of hosts allowed to use printers on the local machine. E. A list of hosts on the local network that are not allowed access to printers attached to the local machine.

D. A listening of hosts allowed to use printers on the local machine.

If Linux detects an ACPI BIOS on bootup, what does it automatically deactivate? A. PnP B. PCI C. ATA D. APM

D. APM

Which of the following PPP authentication protocols never sends a password in the clear? A. PAM B. PAP C. PGP D. CHAP

D. CHAP

You have generated a DSA authentication key on host linux1. In order to log into host linux2 with the new key, what do you need to do? A. Copy the new authentication key into /etc/ssh/sshd_config on linux2. B. Copy the new authentication key into $HOME/.ssh/authorized_keys on linux2. C. Copy the new authentication key into $HOME/.ssh/id_dsa on linux2. D. Copy the new authentication key into $HOME/.ssh/id_dsa on linux1. E. Log into linux2 using the command ssh --key.

D. Copy the new authentication key into $HOME/.ssh/id_dsa on linux1.

On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate? A. The local routing information may be corrupted and must be re-validated using a routing protocol. B. One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout. C. There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default. D. DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.

D. DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.

You want a secure and fast DNS server that must also be quickly accessible remotely. You should: A. Reject all udp packets. B. Reject all icmp packets. C. Reject all icmp untrusted-host packets. D. Disable inetd, run ssh_d and named as standalone daemons. E. Use tcpwrappers to only allow connections to ports 22 and 53.

D. Disable inetd, run ssh_d and named as standalone daemons. E. Use tcpwrappers to only allow

You have a user whose account you want to disable but not remove. What should you do? A. Edit /etc/gshadow and just remove his name. B. Edit /etc/passwd and change all numbers to 0. C. Edit /etc/shadow file and remove the last field. D. Edit /etc/passwd and insert an * after the first :. E. Edit /etc/group file and put a # sign in front of his name.

D. Edit /etc/passwd and insert an * after the first :.

Your senior system administrator asked you to edit the /etc/inetd.conf file in order to disable the time service. After doing so, what would be the next thing to do? A. Reboot the machine B. Restart the inetd C. Find the PID of inetd and kill it with kill -15 D. Find the PID of inetd and send it a SIGHUP

D. Find the PID of inetd and send it a SIGHUP

Which protocol is used by ping? A. TCP B. UDP C. SMB D. ICMP E. OSPF

D. ICMP

Which of the following benefits does an alias in bash provide? A. It provides faster lookups for commands in the system directory. B. It creates a local copy of a file from another directory. C. It hides what command you are running from others. D. It allows a string to be substituted for the first word of a simple command.

D. It allows a string to be substituted for the first word of a simple command.

What is true about the file /etc/localtime? A. It is a plain text file containing a string such as Europe/Berlin. B. It is created and maintained by the NTP service based on the geolocation of the system's IP address. C. It is a symlink to /sys/device/clock/ltime and always contains the current local time. D. It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin.

D. It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin.

What does the command mount -a do? A. It mounts the floppy disk for all users B. It shows all mounted file systems C. It opens /etc/fstab to edit D. It mounts all file systems listed in /etc/fstab

D. It mounts all file systems listed in /etc/fstab

What does the command mount -a do? A. It mounts the floppy disk for all users. B. It shows all mounted file systems. C. It opens /etc/fstab to edit. D. It mounts all file systems listed in /etc/fstab.

D. It mounts all file systems listed in /etc/fstab.

What is the purpose of the command mailq? A. It fetches new emails from a remote server using POP3 or IMAP. B. It is a multi-user mailing list manager. C. It is a proprietary tool contained only in the qmail MTA. D. It queries the mail queue of the local MTA. E. It is a command-line based tool for reading and writing emails.

D. It queries the mail queue of the local MTA.

What does the + symbol mean in the following grep regular expression: grep '^d[aei]\+d$' /usr/share/dict/words A. Match the preceding character set ([aei]) one or more times. B. Match the preceding character set ([aei]) zero or more times. C. Match the preceding character set ([aei]) zero or one times. D. Match a literal + symbol.

D. Match a literal + symbol.

Each entry in a crontab must end with what character? A. Tab B. Space C. Backslash D. Newline

D. Newline

You decide to use xinetd instead of inetd. What must be done in order to properly configure xinetd? A. You must create a new configuration file for xinetd. B. You must add xinetd to /etc/services. C. You must add xinetd support to your tcpwrappers configuration files. D. Nothing, xinetd uses the same configuration files as inetd.

D. Nothing, xinetd uses the same configuration files as inetd.

In the following output, which is representative of the host performing gateway functions? Destination Gateway Genmask Flags Metric Ref Use Iface 10.3.3.0 192.168.1.1 255.255.255.255 UGH 0 0 0 eth0 192.168.1.0 * 255.255.255.0 U 0 0 0 etho0 192.168.77.0 * 255.255.255.0 U 0 0 0 vmnet1 127.0.0.0 * 255.0.0.0 U 0 0 0 lo default 192.168.1.1 0.0.0.0 UG 0 0 0 etho0 A. The default gateway is on 192.168.77.0 network B. The current host is the also the default gateway C. Its eth0 interface is incorrectly configured D. The 192.168.1.1 is the default gateway

D. The 192.168.1.1 is the default gateway

You want to make the directory /local available via NFS. Everything works fine, but on the client machine, the super user is unable to read any files on the NFS-mounted file system. Why? A. The NFS protocol does not allow this. B. The super user has different user IDs on the client and the server machine. C. The client, when mounting the NFS filesystem, must specify the option trusted. D. The exports entry on the server machine does not include the option no_root_squash

D. The exports entry on the server machine does not include the option no_root_squash

You are writing a script and want to test the exit status of a process. Which of the following is true? A. The normal exit value differs. B. You can't test the normal exit value. C. The normal exit value is $EXIT. D. The normal exit value is 0.

D. The normal exit value is 0.

An administrator is looking into a new script they received from a senior executive. In the very first line the administrator notices a #! followed by a file path. This indicates that: A. The file at that location was used to make the script. B. This script provides identical functionality as the file at that location. C. This script will self-extract into a file at that location. D. The program at that location will be used to process the script.

D. The program at that location will be used to process the script.

What is the purpose of the dig command? A. To adjust a directory's hidden permissions B. To search for files on the filesystem C. To adjust a file's hidden permissions D. To perform hostname lookups E. To ping all known hosts on the current subnet

D. To perform hostname lookups

What is the purpose of the bash built-in export command? A. To allow disks to be mounted remotely. B. To run a command as a process in a sub-shell. C. To make the command history available to sub-shells. D. To setup environment variables for applications. E. To share NFS partitions for use by other systems on the network.

D. To setup environment variables for applications.

What does the following command accomplish: "export PATH=$PATH:$APPLICATIONS" A. Changes path to the applications directory. B. Updates the path with the value of $APPLICATIONS. C. All NFS users can mount the applications directly. D. Updates path with the applications directory.

D. Updates path with the applications directory.

What is true regarding the file ~/.forward? A. As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command. B. After editing ~/.forward the user must run newaliases to make the mail server aware of the changes. C. Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses. D. When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.

D. When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.

You are preparing a new set of shared libraries in /usr/local/applib and you have written and compiled some code that uses these libraries. You have already performed and ldconfig, however the system still cannot find the shared libraries. What is most likely the cause of this? A. You used the wrong compiler. B. You did not update your PATH variable. C. You compiled the code with wrong library. D. You forgot to put the library path in ld.so.conf

D. You forgot to put the library path in ld.so.conf

In order to save and restore your sound card's configuration between sessions, the ALSA sound system uses what program? A. setalsa B. setsound C. soundctl D. alsactl E. alsaset

D. alsactl

You are a junior administrator of a high-traffic production web server. Which of the following commands would you run to restart the Apache web service without aborting existing connections? A. apachectl reload B. apachectl restart C. apachectl -k stop; apachectl start D. apachectl graceful E. /etc/init.d/httpd reload

D. apachectl graceful

You need to find all references in your system documentation to the word "copy". Which of the following will best accomplish this task? A. man copy B. which copy C. locate copy D. apropos copy E. grep "copy" /usr/man/*

D. apropos copy

Which of the following commands makes /bin/foo executable by everyone but only writable by its owner? A. chmod 557 /bin/foo B. chmod o +rwx, a+rx /bin/foo C. chown 557 /bin/foo D. chmod 755 /bin/foo

D. chmod 755 /bin/foo

Which chown command will change the ownership to dave and the group to staff on a file named data.txt? A. chown dave/staff data.txt B. chown -u dave -g staff data.txt C. chown -user dave -group staff data.txt D. chown dave:staff data.txt

D. chown dave:staff data.txt

To increase system security, it is often desirable to run daemons for system services with nonroot user ids. Which one of the following services can be run as a non-root user? A. inetd B. named C. rlogind D. crond E. telnetd

D. crond

Which of the following commands will print the amount of disk space used by files specified on the command line? A. dc B. dd C. df D. du

D. du

Which of the following commands should be added to /etc/bash_profile in order to change the language of messages for an internationalized program to Portuguese (pt)? A. export LANGUAGE="pt" B. export MESSAGE="pt" C. export UI_MESSAGES="pt" D. export LC_MESSAGES="pt" E. export ALL_MESSAGES="pt"

D. export LC_MESSAGES="pt"

Given the following output: prompt> myapp [1]+ Stopped myapp prompt> Which of the following commands will resume executing the stopped process and make it the current job? A. bg myapp B. continue myapp C. exec myapp D. fg myapp E. myapp &

D. fg myapp

Which of the following commands can be used to convert text files in one character encoding to another character encoding? A. cat B. convert C. dd D. iconv E. utf2utf

D. iconv

You are using iptables to protect your private network but allow it to access the Internet. What command do you run to view the current list of rules for masquerading? A. iptables -L masquerade B. iptables -t filter -L C. iptables -t block -L D. iptables -t nat -L

D. iptables -t nat -L

The system utility that automatically creates new log files and moves old ones is called what? A. newlog B. mvlog C. rotatelog D. logrotate

D. logrotate

Which of the following commands is used to rotate, compress, and mail system logs? A. rotatelog B. striplog C. syslogd --rotate D. logrotate E. logger

D. logrotate

Which of the following tools is used to configure CUPS? A. lpc B. lpadmin C. lpr D. lpd E. lpctrl

D. lpd

The legacy program, provided by CUPS for sending files to the printer queues on the command line is: A. lpd B. lpp C. lpq D. lpr

D. lpr

Which of the following is a legacy program provided by CUPS for sending files to the printer queues on the command line? A. lpd B. lpp C. lpq D. lpr

D. lpr

In order to append the output of ls to a file called bazz, which of the following command lines would you use? A. ls > bazz B. ls > & bazz C. ls &> bazz D. ls >> bazz

D. ls >> bazz

The file /etc/ssh_known_hosts typically contains hosts keys for ______. A. all hosts that have logged into this server via ssh B. all hosts that users have logged into from this server via ssh C. clients allowed to connect to this host via ssh D. machines the system administrator trusts users to connect to using ssh

D. machines the system administrator trusts users to connect to using ssh

What command will compile the Linux kernel and leave a file called bzImage in the floppy disk? A. make bzImage B. make compile C. make Image D. make bzdisk

D. make bzdisk

You have just added a CD-ROM drive (/dev/hdd) to your system and have added it to your fstab. Typically you can use which of the following commands to mount media in that drive to /mnt/cdrom? A. mount/dev/cdrom/mnt/cdrom B. mount/dev/cdrom C. mount -t cdrom/dev/cdrom/mnt/cdrom D. mount/mnt/cdrom E. automount/mnt/hdd/mnt/cdrom

D. mount/mnt/cdrom

The _____ is used by the local host to determine which hosts are on the local subnet, and which hosts are on remote networks. A. DNS B. ARP C. gateway D. netmask E. routing protocol

D. netmask

After modifying GRUB's configuration file, what command should you run for the changes to take effect? A. kill HUP `pidof grub` B. grubinstall C. grub D. no action is required

D. no action is required

When in Normal mode in vi, which command character will insert a blank line below the current cursor position and place the insert cursor at the beginning of the new line? A. a B. i C. n D. o

D. o

Which file inside the CUPS configuration directory contains the definition of the printers? A. cups-devices.conf B. snmp.conf C. printcap.conf D. printers.conf E. cupsd.conf

D. printers.conf

Which of the following commands will produce the following output: USERPID %CPU %MEMVSZ RSS TTY STAT STARTTIME COMMAND root 1255 4.4 0.9 6071634824 tty7 Ss+ 09:25 19:04 /usr/bin/X :0 - root 2016 0.0 0.0 792 560 tty1 Ss+ 09:26 0:00 /sbin/getty -8 matt 5204 0.0 0.1 6320 3696 pts/4 Ss 13:12 0:00 bash matt 5219 0.0 0.0 3988 624 pts/4 S+ 13:12 0:00 man bash matt 5229 0.0 0.0 3584 932 pts/4 S+ 13:12 0:00 pager -s matt 6768 0.0 0.1 10504 3880 pts/2 S+ 15:11 0:00 vi README.txt A. jobs B. proclist C. netstat D. ps

D. ps

Which of the following commands is run last during boot on a system with quotas enabled? A. fsck B. mount C. quotacheck D. quotaon

D. quotaon

The file /etc/ssh/ssh_host_rsa_key should be: A. world-readable B. readable to group sys C. readable to root only D. readable by all SSH users

D. readable by all SSH users

When you run the command newaliases, it will: A. ask for input on stdin to create new mail aliases. B. restart sendmail. C. remove the aliases currently configured. D. rebuild the aliases database for the file /etc/aliases

D. rebuild the aliases database for the file /etc/aliases

When you run the command newaliasses, it will: A. ask for input on stdin to create new mail aliases. B. restart sendmail. C. remove the aliases currently configured. D. rebuild the aliases database for the file /etc/aliases.

D. rebuild the aliases database for the file /etc/aliases.

Identify the statement that would create a default route using a gateway of 192.168.1.1 A. netstat-add default gw B. route default 192.168.1.1 C. ip route default 192.168.1.1 D. route add default gw 192.168.1.1 E. ifconfig default gw 192.168.1.1 eth0

D. route add default gw 192.168.1.1

You want to preview where the package file, apache-xml.i386.rpm, will install its files before installing it. What command do you issue? A. rpm -qp apache-xml.i386.rpm B. rpm -qv apache-xml.i386.rpm C. rpm -ql apache-xml.i386.rpm D. rpm -qpl apache-xml.i386.rpm

D. rpm -qpl apache-xml.i386.rpm

You have created a really long letter and after you are done, you notice that you used the name "Bob" many times but your forgot to capitalize it in many instances. Which command would you replace "bob" with "Bob" in all instances and generate a new letter for printing? A. sed `/bob/Bob' letter > newletter B. sed s/bob/Bob/ letter < newletter C. sed `s/bob/Bob' letter > newletter D. sed `s/bob/Bob/g' letter > newletter E. sed s/bob, Bob/' letter > newletter

D. sed `s/bob/Bob/g' letter > newletter

Many people like the vi text editor but the default bash command line editor recognizes emacs keystrokes. What command entered into abash initialization file will have bash recognize vi keystrokes after login? A. history -p vi B. alias emacs=vi C. HISTCMD=vi D. set -o vi E. unset emacs

D. set -o vi

In bash, inserting 2>&1 after a command redirects A. standard error to standard input. B. standard input to standard error. C. standard output to standard error. D. standard error to standard output. E. standard output to standard input.

D. standard error to standard output.

When you start XWindows, which series of programs and/or scripts would most closely describe the start-up process? A. xdm --> xinit --> xinitrc --> Xclients B. kde --> xinitrc --> xinit --> Xclients C. startx --> xinitrc --> Xclients --> kde D. startx --> xinit --> xinitrc --> Xclients E. startx-->xinit-->Xclients-->xinitrc

D. startx --> xinit --> xinitrc --> Xclients

When you start the X Window System, which series of programs and/or scripts would most closely describe the start-up process? A. xdm -> xinit -> xinitrc -> Xclients B. kde -> xinitrc -> xinit -> Xclients C. startx -> xinitrc -> Xclients -> kde D. startx -> xinit -> xinitrc -> Xclients E. startx -> xinit -> Xclients -> xinitrc

D. startx -> xinit -> xinitrc -> Xclients

In the command foo < bar | foobar, which ONE of the following statements is correct? A. the stdout from the command foobar is saved to the file foo. B. the stdout from the command foo is saved to the file foobar. C. the command foobar receives its stdin from the stderr of foo. D. the command foobar receives its stdin from the stdout of foo. E. the command bar receives its stdin from the contents of the file foobar.

D. the command foobar receives its stdin from the stdout of foo.

Which command will allow an administrator to adjust the number of mounts after which an existing filesystem will be checked by e2fsck? A. debugfs B. dumpe2fs C. mode2fs D. tune2fs E. mke2fs

D. tune2fs

Which of the following lines would you expect to see in the file /etc/protocols? A. in.tftpd: LOCAL B. tftp dgram udp wait root /usr/sbin/tcpd in.tftpd C. tftp 69/udp D. udp 17 UDP

D. udp 17 UDP

Which command is used to display user resource limits? A. uname B. limit -a C. usrlmt D. ulimit

D. ulimit

According to the File System Hierarchy Standard, the lost+found directory is used for: A. files with unknown owners B. missing device files found by/proc C. unknown binary files found by find D. unlinked files found by fsck

D. unlinked files found by fsck

Once a shell variable has been created, how can the variable be removed from the environment? A. VAR= B. set -d VAR C. set -u VAR D. unset VAR

D. unset VAR

Which option must be listed in /etc/fstab to activate user quotas automatically? A. quota B. user C. quotaon D. usrquota

D. usrquota

Which of the following commands will write a message to the terminals of all logged in users? A. bcast B. mesg C. print D. wall E. yell

D. wall

Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow? A. * B. - C. s D. x

D. x

Which of the following commands will print the current video settings to stdout in XF86Config "Modeline" format? A. xinfo -mode B. xset -info C. xf86config -list D. xvidtune -show

D. xvidtune -show

In the vi editor, which of the following commands will copy the current line into the vi buffer? A. c B. cc C. 1c D. yy E. 1y

D. yy

Some loadable kernel modules accept options at load time. This can be used to set interrupt or IO addresses, for example. The place to set these options is? A. /etc/conf.modules B. /etc/lilo.conf C. /boot/System.map D. /etc/sysconfig E. /boot/module-info

E. /boot/module-info

Which crontab entry could be used to set the system time at regular intervals? A. 1 0 * * * date $d $t $24 B. 1 0 * * * settime $d $t $24 C. 1 0 * * * date<ntp1.digex.net D. 1 0 * * * /usr/sbin/runcron date <ntp1.digex.net E. 1 0 * * * /usr/sbin/ntpdate ntp1.digex.net > /dev/null 2>1

E. 1 0 * * * /usr/sbin/ntpdate ntp1.digex.net > /dev/null 2>1

Which crontab entry could be used to set the system time at regular intervals? A. 10 * * * date $d$t$24 B. 10 * * * settime $d$t$24 C. 10 * * * date<ntpl.digex.net D. 10 * * * /usr/sbin/runcron date <ntpl.digex.net E. 10 * * * /usr/sbin/ntpdate ntp1.digex.net> /dev/null2>&1

E. 10 * * * /usr/sbin/ntpdate ntp1.digex.net> /dev/null2>&1

The lspci command can display information about devices except the following: A. Card bus speed (e.g. 66Mhz) B. Card IRQ settings C. Card vendor identification D. Card AGP rate (e.g. 1x, 2x, 4x) E. Card Ethernet MAC address

E. Card Ethernet MAC address

To disable telnet service on a system, which action should you take? A. Put NONE in /etc/telnet.allow B. Remove the appropriate telnet init script. C. Put a line `ALL:ALL' in /etc/hosts.deny D. Comment the telnet entry in /etc/inittab E. Comment the telnet entry in /etc/inetd.conf

E. Comment the telnet entry in /etc/inetd.conf

What is the purpose of the iconv command? A. It converts bitmap images from one format to another such as PNG to JPEG. B. It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS). C. It displays additional meta information from icon files ending in .ico. D. It changes the mode of an inode in the ext4 file system. E. It converts files from one character encoding to another.

E. It converts files from one character encoding to another.

What would the following line accomplish if run as root? chown -R bert /home/bert/* A. Nothing, this command is invalid. B. It would revoke bert's ownership of all files in /home/bert to bert. C. It would change user ownership of all files in /home/bert to bert. D. It would set the group ownership of the directory /home/bert to bert E. It would set ownership of all files and subdirectories in /home/bert to bert

E. It would set ownership of all files and subdirectories in /home/bert to bert

What can the tee command be used for? A. Print the contents of a file in reverse order B. Use the output of one command as arguments to another C. Add line numbers to the output of a command D. Pipe the output of one command into the input of another E. Send a command's output to stdout and a to file at the same time

E. Send a command's output to stdout and a to file at the same time

The directory /usr/share/doc/ contains: A. HTML versions of man pages B. Man pages for installed packages C. Programs for reading documentation D. User-created documentation about the system E. Supplemental information about installed packages

E. Supplemental information about installed packages

What is the disadvantage of using the command kill -9 ? A. A core dump file will be created. B. It affects the entire process group. C. It makes excessive use of system resources. D. The action can be blocked by buggy or malicious processes. E. The affected process is unable to clean up before exiting.

E. The affected process is unable to clean up before exiting.

You are trying to make a hard link to an ordinary file but ln returns an error. Which of the following could cause this? A. The source file is hidden. B. The source file is readonly. C. The source file is a shell script. D. You do not own the source file. E. The source and the target are on different filesystems.

E. The source and the target are on different filesystems.

You have just upgraded your PC to a 60 gigabyte IDE drive. While partitioning the drive, you notice that only 32 gigabytes are available. Which of the following will most likely allow you to use the entire drive? A. Create two smaller partitions of 30 gigabytes each. B. Set the PC BIOS to use LBA mode. C. Create a partition that resides entirely below the first 1024 cylinders. D. Use GRUB or the latest version of LILO as a bootloader. E. Upgrade the PC BIOS to the latest version available.

E. Upgrade the PC BIOS to the latest version available.

Which shell built-in command can be used to create a shortcut or pseudonym for a longer command? Assume a modern bourne-like shell, such as bash. A. shortcut B. ln C. sudo D. link E. alias

E. alias

What command would help you identify the I/O address range being used by the network card? A. cat/proc/modules B. cat/proc/devices C. cat/proc/meminfo D. cat/io/dma E. cat/proc/ioports

E. cat/proc/ioports

You want to change the aging information in the /etc/shadow file. What is the best utility to use to do this? A. vi B. emacs C. usermod D. modinfo E. chage

E. chage

Which utility is used to create the modules.dep file that is required by modprobe? A. ksyms B. makemod C. makedep D. lsmod E. depmod

E. depmod

How do you get a list of files that have been installed from a dpkg package? A. dpkg -l pkgname B. dpkg -C pkgname C. dpkg -s pkgname D. dpkg -S pkgname E. dpkg -L pkgname

E. dpkg -L pkgname

What command will uninstall a package but leave its configuration files in case a package is re- installed? A. none, no command will do this B. dpkg -s pkgname C. dpkg -L pkgname D. dpkg -P pkgname E. dpkg -r pkgname

E. dpkg -r pkgname

What is the name of the primary configuration file for Apache? A. srm.cfg B. httpd.cfg C. access.cfg D. apache.conf E. httpd.conf

E. httpd.conf

Which of the following commands is equivalent to kill 1234? A. kill -1 1234 or kill -s SIGHUP 1234 B. kill -2 1234 or kill -s SIGINT 1234 C. kill -3 1234 or kill -s SIGQUIT 1234 D. kill -9 1234 or kill -s SIGKILL 1234 E. kill -15 1234 or kill -s SIGTERM 1234

E. kill -15 1234 or kill -s SIGTERM 1234

While performing a security audit, you discover that a machine is accepting connections on TCP port 184, but it is not obvious which process has the port open. Which of the following programs would you use to find out? A. traceroute B. strace C. debug D. nessus E. lsof

E. lsof

Which of the following is NOT a Mail Transport Agent? A. exim B. postfix C. sendmail D. qmail E. mail

E. mail

Which of the following is not a valid make command during a kernel recompile? A. make dep B. make clean C. make xconfig D. make modules E. make gzlilo

E. make gzlilo

QUESTION 181 Bob accidentally created the subdirectory \bobsdir in his home directory. He tried to remove the subdirectory with the command rmdir \bobsfile only to receive the error, "No such file or directory." Which command will remove the directory? A. rmdir 'bob/\bobsdir' B. rmdir "bob/\bobsdir" C. rmdir ~bob/ 'bobsdir' D. rmdir bob/\bobsdir E. rmdir ~bob/\\bobsdir

E. rmdir ~bob/\\bobsdir

You installed a beta rpm package, but are experiencing some problems with it. How can you remove this package? A. rpm -qe rpmname B. rpm -V --remove rpmname C. rpm -r rpmname D. rpm -d rpmname E. rpm -ev rpmname

E. rpm -ev rpmname

Which command will list all the files installed from the RPM package file named, vorbis-tools- 1.1.i386. rpm? A. rpm -qf vorbis-tools-1.1.i386.rpm B. rpm- F vorbis-tools-1.1.i386.rpm C. rpm -pf vorbis-tools-1.1.i386.rpm D. rpm -ql vorbis-tools-1.1.i386.rpm E. rpm -qlp vorbis-tools-1.1.i386.rpm

E. rpm -qlp vorbis-tools-1.1.i386.rpm

Which of the following commands will NOT execute the bash script /usr/local/bin/runme.sh? A. source /usr/local/bin/runme.sh B. . /usr/local/bin/runme.sh C. /bin/bash /usr/local/bin/runme.sh D. /usr/local/bin/runme.sh E. run /usr/local/bin/runme.sh

E. run /usr/local/bin/runme.sh

Which file system should never be backed up, and therefore never have to be restored? A. ufs B. usr C. tmp D. home E. swap

E. swap

An administrator suspects that a gateway machine on the network has failed but they are unsure which machine. Which of the following commands will help locate the problem? A. ps B. netstat C. nslookup D. ifconfig E. traceroute

E. traceroute

If you suspect that a gateway machine on your network has failed but you are unsure which machine, which command will help locate the problem? A. ps B. netstat C. nsloopup D. ifconfig E. traceroute

E. traceroute

Which command manipulates the TTL (Time to Live) field in the IP protocol in order to get ICMP responses from gateways along the path to a host? A. dig B. host C. ping D. tcpdump E. traceroute

E. traceroute

Which of the following commands will help identify a broken router between the local and the remote machine? A. ps B. netstat C. nslookup D. ifconfig E. traceroute

E. traceroute

Which of the following programs can be used to determine the routing path to a given destination? A. dig B. netstat C. ping D. route E. traceroute

E. traceroute

Which of the following commands can remove a user from a group? A. grouprm B. groupmod C. passwd D. usergroups E. usermod

E. usermod


Ensembles d'études connexes

Accounting: Manufacturing Overhead

View Set

Using Triangle Congruence Theorems Quiz

View Set

Chapter 5 - Learning and Conditioning

View Set

Personal Finance: Budget Variances and Tax Planning

View Set

Chapter 3 The External Assessment

View Set