TCU Linux System Administration Final Scherger

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When killing a background job with the kill command, the background job ID must be prefixed by what character?

%

What character, when appended to a command, causes the command to be run in the background?

&

When there are multiple background processes executing in the shell, the jobs command indicates the most recent onw with which symbol?

+

A user account can be locked with the useradd command by using what option?

-L

When used with the uncompress command, what option displays the contents of the compress file to Standard Output?

-c

When used with the compress command, what option can be used to compress symbolic links?

-f

In order to display a list of job ID's, what option can be specified to the at command?

-l

What options can be added to the userdel command to remove the home directory of the target user?

-r

What option(s) should you use with the cpio utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation?

-u; -i

Files with what two file extensions are commonly known as tarballs?

.tar.gz; .tgz

What device file indicates the first ATAPI IDE tape device (nonrewinding)?

/dev/nht()

What two files contain settings for the CUPS daemon and the configuration info for each printer installed on a system, respectfully?

/etc/cups/cupsd.conf; /etc/cups/printers.conf

On Linux, the root user always has a UID of what number?

0

What number indicates the lowest kernel priority(PRI) of a process possible?

127

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?

514

How many different kill signals can be sent by the kill command to a given process?

64

True or False: On most Linux systems, the logrotate utility is automatically scheduled to run weekly

False

True or False: The killall command uses the PID to kill a process

False

True or False: The secure log file contains information regarding the last use to log into a system

False

True or False: When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio

False

Most Linux distributions make use of what package manager?

RPM

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?

SIGINT; 2

Which kill signal terminate a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?

SIGQUIT

True or False: After a process has been started, you can change it's priority by using the renice command

True

True or False: Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script

True

True or False: CUPS contains versions of the lpr, lpc, lpq, and lprm commands

True

True or False: Each process can start at unlimited number of other processes.

True

True or False: If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.

True

True or False: Logs from the cron daemon (crond) can be viewed using the command journalctl_COMM=crond

True

True or False: The compress utility preserves the original ownership, modification, and access time for each file that it compresses

True

True or False: The cpio command has the ability to handle long filenames and can be used to back up device files

True

True or False: The tar utility cannot back up device files or files with longer names than 255 characters

True

True or False: When you print to a printer class, the print job is sent to the first available printer in the print class

True

True or False: Zombie processes are known as defunct processes

True

A(n) ________________ backup backs up only the data that has been changed since the last backup

incremental

What two commands can be used to stop a process, either by PID number of process number?

kill; killall

Which command should be used to restrict access to printers?

lpadmin

Adding the -t option to what command below will provide a list of all printers on the system and their status

lpstat

What command looks for a Makefile and uses the information within to compile the source code into binart programs using the appropriate compiler program for the local hardware architecture?

make

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command?

newgrp

RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?

package dependancy

What priority used by the System Log Daemon indicates a very serious condition that would normally be broadcast to all users?

panic

What can be used on a Linux system to trace the lineage of each child process?

parent process ID

A set of information that is sent to a printer at the same time is called a(n)

print job

A(n) ____________________ refers to a program that is running in memory and on the CPU

process

What command is used to display the lineage of a process by tracing it's PPID's until the init daemon?

pstree

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command

pwconv

Processes that have encountered an error during execution and continuously uses up system resources are referred to as ______ processes

rogue

An RPM package can be converted to a cpio archive using what command?

rpm2cpio

The Sys Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?

rsyslog.conf; rsyslog.d

The amount of time a process has to use the CPU is called a(n)

time slice

In order to create user accounts on a Linux system, what command should be used?

useradd

The _____________ command can be used to search internet software repositories for RPM packages that map to your architecture, and automatically install or upgrade those packages on your system

yum

What command can be used to display the contents of a file that was compressed with the compress utility?

zcat

In the process called _____________, a user's user name and password are checked against a system database that contains all user account information

authentication

To view the contents of a file that was compressed the bzip2 utility, you must use the __________________ command

bzcat

On a CUPS printing system, to remover a print job what is in the print queue, you can use the _____________ command followed by the print job ID's of the jobs to remove

cancel

Which of the following is not one of the three main types of Linux commands?

device calls

What command can be used to search for APM package information?

dpkg-query

In order to download DPM packages, what command should be used?

dpm-grab


Ensembles d'études connexes

The Art of Creating Suspense: Central Ideas of Two Authors Quiz

View Set