Test 2 (Linux Server)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet? a. NIS b. DNS c. NTP d. DHCP

DNS

Which device file below represents the first primary partition on the second PATA hard disk drive? a. /dev/hdc1 b. /dev/hdc2 c. /dev/hda1 d. /dev/hdb1

/dev/hbd1

What character device fIle represents the second serial port on a system (COM2)? o a. /dev/ttyl o b./dev/ttyS1 o c. /dev/tty2 o d. /dev/ttySO

/dev/ttyS1

What piece of software tells the operating system how to use a specific hardware device?

Device Driver

The GUI components and related software take up how much space on a typical Linux installation? a. 2 GB b. 4 GB c. 1 GB d. 3 GB

4 GB (WRONG)

Select the mode below that corresponds to setting r-x: o a.5 o b.6 o c.l o d.2

5

How many different kill signals can be sent by the kill command to a given process? o a. 16 o b. 32 o c. 64 o d. 128

64

At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes? o a. :! o b. :exit o c. :q! o d. :q

:q!

When issuing the ls -F command, what special character indicates a linked file? a. * b. @ c. & d. =

@

_____________ are a collection of programs and tools designed to allow for the creation, modification, manipulation, maintenance, and access of information from databases.

DBMS

The mutt software is an example of what type of mail service software on Linux? o a. Mail User Agent o b. Mail Transport Agent o c. Mail Delivery Agent o d. Mail Transfer Agent

Mail User Agent

What two disk systems allow for the use of more than four hard drives or SSDs in a single system? o a. SCSI o b. SAN o c. SATA o d. PATA

SATA, SCSI

What command can be used to check different kinds of filesystems on Linux for errors? o a. errorchk o b.fs_check o c. fsck o d.chkdsk

fsck

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file? a. g+r-w b. o+r-w c. g-r+w d. u+r+w

g+r-w

What is the default target on a system with a GUI installed? a. single-user.target b. graphical.target c. gui.target d. multi-user.target

graphical.target

Select the commands that can be used to extend a volume group and logical volume respectively: o a.lvextend o b.lvm_extend o c. vgextend o d. pgextend

lvextend and vgextend

In Linux, what runlevel is also known as the multiuser mode? a. 1 b. 2 c. 3 d. 4

2

What is the minimum number of user accounts that must be created at install time? a. one b. two c. three d. four

2

What number represents the stderr file descriptor? a. 0 b. 1 c. 2 d. 3

2

What two options below are examples of common UNIX flavors? a. Mac OSX b. HP-UX c. Red Hat d. Open SuSe

Mac & HP

A(n) _________________________ is a computer or special hardware device that provides interconnection between company networks, home networks, and institutional networks.

Router

A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.

Runlevel

What kill signal stops a process, then restarts it with the same PID? o a. SIGlNT o b. SIGHUP o c. SIGTERM o d. SIGQUIT

SIGHUP

The ____________________ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.

which

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script? a. @! b. -> c. #! d. //

#!

The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command? a. $ b. & c. # d. *

$

When killing a background job with the kill command, the background job ID must be prefixed by what character below? a. $ b. % c. # d. &

%

What metacharacter indicates background command execution? o a. @ o b. & o c. A o d. !

&

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive. a. (hda,1) b. (hd0,0) c. (hd1,1) d. (hda,0)

(hd0,0)

Select the regular expressIon metacharacter that matches 0 or more occurrences of the previous character. o a.* o b.+ o c.? o d. A

*

What two characters below should not be used in filenames? a. * b. $ c. _ d. .

* and $

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol? o a.* o b.+ o c.- o d./

+

In a file's mode, a permission that is unavailable is represented by what character? a. + b. ? c. * d. -

-

Which switch below can be added to the 1s command to show a list of files and their type? o a. -L o b. -T o c. -l o d. -F

-F

What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is? a.-s b.-h c. -d d.-k

-d -k

What option, when added to the crontab command, opens the vi editor with a user's cron table? o a. -e o b. -u o c. -c o d. -f

-e

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH? a. ~/.bash_login b. /etc/profile c. ~/.profile d. ~/.bash_profile

/etc/profile

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory? a. /bin b. /root c. /home/root d. /boot

/root

Under the root directory in Linux, which directory contains system commands and utilities? a. /opt b. /usr c. /var d. /boot

/usr

What directory under / contains the log files and spools for a Linux system? o a. /var o b. /usr o c. /boot o d. /opt

/var

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off? o a. 0 o b. I o c. 6 o d. 7

0

What number represents the stdin file descriptor? o a. 0 o b. 1 o c. 2 o d. 3

0

What is the recommended size for the /home directory? o a. l00MB o b. 200MB o c. 500MB o d. 1000MB

200MB

By default, the shell on a Linux system limits the number of filehandles a program can have open to what value? A. 256 B. 512 C. 1024 D. 2048

1024

What number indicates the lowest kernel priority (pR!) of a process possible? o a. 0 o b. 127 o c. -20 o d. 20

127

Select the two numbers below that represent the number of bits needed to make an IPv4 or IPv6 IP address: a. 48 b. 128 c. 64 d. 32

128 32

In what year was the source code for the Linux kernel released? o a. 1987 o b. 1990 o c. 1991 o d. 1993

1991

What two device files below represent the first SCSI tape device, rewinding and non-rewinding?​ a. /dev/st0 b. /dev/ht0 c. /dev/ftape d. /dev/nst0

A. /dev/st0 D. /dev/nst0

What two commands below can be used to view the contents of a bzip2-compressed file page by page?​ a. bzless b. bzmore c. bzbuffer d. ​bzpaged

A. bzless B. bzmore

Select the command below that utilizes a premade database that contains a list of all the files on a system:

Answer

Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it? o a. Artistic o b.GPL o c. Freeware o d. Shareware

Artistic

Some peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ____________________.

Bus mastering

Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system? a. C b. Cobalt c. Java d. Basic

C

How often are sar commands scheduled to run on both Fedora 20 and Ubuntu Server 14.04? a. every two minutes b. every five hours c. every ten minutes d. every thirty days

C. Every Ten Minutes

In order to switch between terminals in Linux, a user can press what two keys in combination with the F1-F6 keys? a. Ctrl b. Shift c. Tab d. Alt

Ctrl and Alt

An alternative to the vi editor that offers an equal set of functionality is the GNU

Emacs

The LISP artificial intelligence programming language can be used with which text editor below? a. Emacs editor b. Joe editor c. Kedit editor d. Nedit editor

Emacs Editor

After a shell is no longer needed, what command can be given to exit the shell? a.quit b.exit c. reset d.stop

Exit

Which filesystems below perform journaling?

Ext3, Ext4, And Reiser

____________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.

FHS

What service provides a method for the efficient transfer of files over the Internet?

FTP

Errors on a filesystem are common on most filesystems. What do these errors indicate? a. filesystem breaks b. hard drive failures c. raid degradation d. filesystem corruption

Filesystem corruption

Any command that can take standard input and transform it into standard output is called a(n) ____________________ command.

Filter

The iptables software on Linux is an example of what kind of software? o a. Routing o b. Proxy o c. Firewall o d. Anti-virus

Firewall

The two main competing GUI environments available in Linux are: o a.X.org o b. GNU Network Object Model Environment (GNOME) o c. XFree86 o d. K Desktop Environment (KDE)

GNOME and KDE

What stipulates that the source code of any software published under its license must be freely available. o a. Freeware o b. Free Software Foundation o c. GNU Public License o d. Artistic License

GNU Public Liscense

The GNOME 3 desktop environment utilizes what window manager and toolkit below? a. Qt toolkit b. mutter c. kwin d. GTK+ toolkit

GTK+ toolkit

Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below? a. Known Working Devices (KWD) b. Hardware Compatibility List (HCL) c. Software / Hardware List (SHL) d. Compatible Hardware List (CHL)

Hardware Compatibility List (HCL)

Filenames that start with a period, such as .file, are referred to as ___________ files

Hidden

Which of the following is the greatest expense for companies using Linux? a. Additional software b. Software upgrades c. Operating system cost d. Hiring people to maintain the Linux system

Hiring people to maintain the linux system

The QT toolkit is utilized by which GUI environment? o a .GNOME o b. KDE o c. Xfce o d. Eulightenment

KDE

The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.

Kern

The Linux kernel was developed and released in 1991 by: a. Andrew Tannenbaum b. Richard Stallman c. Dennis Ritchie d. Linus Torvalds

Linus Torvalds

The _________________________ is the core component of the Linux operating system.

Linux Kernel

An extended partition can contain many subpartitions called ____________________.

Logical Drives

Because Linux has the ability to manage thousands of tasks at the same time, including allowing multiple users to access the system simultaneously, it is referred to as an operating system that is: a. multiaccess b. multilevel c. multitasking d. multiuser

Multiuser, Multitasking (Correct)

Proxy servers keep track of the information passed to each client by maintaining what type of table? a. Firewall b. Routing c. NAT d. Caching

NAT

When using command-line terminal, specific letters that start with a dash (n -n) and appear after command names are considered to be: o a. Keywords o b. Arguments o c. Metacharacters o d. Options

Options

Older systems often use _________________ hard disks that physically connect to the computer in one of four different configurations.

PATA (Correct)

The ____________ environment variable contains a list of directories to search for executable programs

PATH

What two protocols below are used for mail retrieval? a.SMTP b.POP c. SNTP d.IMAP

POP IMAP

What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively? a. SHELL b. PATH c. PWD d. CWD

PWD and SHELL

In a file listing, the 9 characters following the file type (for example, -rwxr-xr-x) refer to the file's _________________________.

Permissions

The ________________ of a VG decides the block size for saving data since it cannot be safely changed later.

Physical Extent (PE)

When a user creates a file or directory, that user's name and ____________________ becomes the owner and group owner of the file, respectively.

Primary Group

A set of information that is sent to a printer at the same time is called a(n) ____________________.

Print Job

The K desktop environment utilizes what window manager and toolkit below? a. kwin b. mutter c. GTK+toolkit d. Qt toolkit

Qt toolkit

The _______________command takes user input from stdin and places it in a variable specified by an argument

Read

If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?

Read and write

What Linux distribution is the most commonly used distribution within organizations today?

Red Hat

Text wildcards used to ease the searching of specific text information are called

Regular Expressions

In the initial stage of the DHCP lease process, the client sends a(n) __________________ to all hosts on the network.

Request

Processes that have encountered an error during execution and continuously uses up system resources are referred to as _________________ processes.

Rogue

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? a. SIGTERM b. SIGINT c. SIGKILL d. SIGQUIT

SIGQUIT

What are the two most common technologies that provide asymmetric encryption on Linux systems? a.Secure Shell (SSH) b.Telnet c. GNU Privacy Guard (GPG) d.Apache httpd

SSH GPG

What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file? o a.SQllD o b.SUID o c. SGID o d. sticky bit

SUID and SGID

To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.

Samba

The ability for a computer to increase workload as the number of processors increases is known as ______________

Scalability

Each track on a hard disk is divided into _____________ of information

Sectors

The amount of time a process has to use the CPU is called the ___________

Slice

What stage of the GRUB boot loader typically resides on the MBR / GPT? o a. Stage1 o b. Stage 1.5 o c. Stage2 o d. Stage2.5

Stage 1

____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.

Subnetting

To create a(n) ____________ link, you use the -s option to the ln command

Symbolic

The Apache daemon listens for HTTP requests on what port by default? a.TCP 20 b.TCP 25 c. TCP 80 d.TCP 110

TCP 80

What is the most commonly used LAN protocol? a.TCP/IP b.UDP/IP c. IPX/SPX d.DLC

TCP/IP

When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process? a. The process is high priority. b. The process is accepting redirected input from a terminal. c. The process is currently active on the processor. d. The process is exiting.

The process is accepting redirected input from a terminal

The overall cost of using a particular operating system is known as? a. Owner Related Expense (ORE) b. Return on Investment (ROI) c. Total cost of ownership (TCO) d. Cost to Own (CTO)

Total Cost of Ownership (TCO)

What file system below is used by software programs that write to a CD-RW or DVD-RW drive? a. ntfs b. udf c. ext2 d. hpfs

UDF

What port is used by the Network Time Protocol (NTP) for communication? a.UDP 69 b.UDP 123 c. TCP 20 d.TCP 25

UDP 123

In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit? a. w b. q c. s d. d

W

What two resource record types map FQDNs to IPv4 and IPv6 addresses respectively? a. CNAME b. A c. AAAA d. NS

c. AAAA

In Linux, the command __________ displays currently logged-in users.

Who

What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file? a. sticky bit b. read c. execute d. write

Write

In Linux, the core component of the GUI is known as: a. Red Hat b. X Windows c. KDE d. GNOME

X Windows

The __________ implementation of X Windows is the latest implementation, and is based on the original MIT X Windows project that was released as OSS in 2004.

X.org

The two different implementations of X Windows are called: o a.Gnome o b.XFree86 o c.KDE o d.X.org

XFree86 and X.org

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4? o a. 1-4 o b. [1234] o c. [1-4] o d. [1,2,3,4]

[1-4]

Select the escape sequence that is used for a form feed: o a. /n o b. /f o c. \f o d. \n

\f

Select the escape sequence that starts a new line when used with echo: a. \a b. \n c. \r d. \\

\n

Select the two escape sequences that represent a horizontal tab and a vertical tab, respectively: a. \t b. \v c. \V d. \b

\t \v

What two regular expression characters can be used to match the characters at the beginning or end of a line, respectively? a. . b. ^ c. + d. $

^ and $

Select the option that, when used with the sar command, displays swap statistics: a. -B b. -b c. -s d. -q

a. -B

What two iptables options are used to specify the source and destination ports for a rule? a. -sport b. -src c. -dport d. -dst

a. -sport c. -dport

An IPv6 IP address consists of 16-bit numbers in what numbering scheme? a. hexadecimal b. binary c. octal d. decimal

a. hexadecimal

​Asymmetric encryption uses a pair of keys that are unique generated on each system. What are these two keys called? a. public key b. normal key c. private key d. secret key

a. public key c. private key

The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc? a. rsyslog.d b. log.conf c. rsyslog.conf d. log.d

a. rsyslog.d c. rsyslog.conf

A(n) _____________ specifies the parameters that tailor a command to the particular needs of the user.

argument

The process of ______________ requires that each user must log in with a valid user name and password before gaining access to a user interface.

authentication

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below? a.nl b.awk c. grep d.sed

awk

Select the option that can be used with the lpstat command to display a list of printers that are enabled: a. -o b. -p c. -a d. -e

b. -p

What two commands below can be used to modify the password expiry information and a user's default shell? a. chexp b. chage c. shellmod d. chsh

b. chage d. chsh

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?​ a. xferlog b. lastlog c. secure d. wtmp

b. lastlog d. wtmp

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. process flag b. process state c. PID d. process priority

b. process state ?

When performance issues arise, you can compare the output of performance utilities to the ____________________ values found in the system log book.

baseline

Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded: o a. map= o b. initrd= o c. append= o d. boot=

boot= and append=

The ____________________ utility uses the Burrows-Wheeler Block Sorting Huffman Coding algorithm when compressing files.

bzip2

What zone configuration file contains a PTR record used to identify the loopback adapter? a. /var/named/named.ca b. /etc/named.conf c. /var/named/named.local d. /etc/named.loop

c. /var/named/named.local

What is the subnet mask for a Class C IP address? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

c. 255.255.255.0

On a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.

cancel

In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued? a.cd .. b./home/joe c. cd ../.. d.cd ./..

cd ../..

A device that transfers data in a character-by-character fashion is referred to as what type of device? a. binary b. block c. text d. character

character

What two commands below will grant only the execute permission to username bob on file1, assuming that bob is the file's owner? a. chmod a+rwx file1 b. chmod 777 file1 c. chmod 0110 file1 d. chmod u=x file1s

chmod 0110 file1 chmod u=x file1

In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename? a. chmod 7777 filename b. chmod 777 filename c. chmod 0000 filename d. chmod 6666 filename

chmod 7777 filename

What character is used to delimit most Linux configuration files?

colon

In what mode does the vi editor open by default? a. append mode b. insert mode c. overview mode d. command mode

command mode

What two window managers is the Compiz Fusion window manager based upon? a. beryl o b.sawfish o c. fvwm o d. compiz

compiz and beryl

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line? a. Ctrl+d b. dd c. Ctrl+k d. Ctrl+a

ctrl+k

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd? a. wtmp b. dmesg c. messages d. secure

d. secure

What file system below is used by software programs that write to a CD-RW or DVD-RW drive? a. hpfs b. ext2 c. ntfs d. udf

d. udf

To print the current date and time, type the command _________________________.

date

In vi, using command mode, what series of key presses below will cause the linie on which the cursor is on to be deleted? a. dd b. yw c. X d. d

dd

Which of the following is not one of the three main types of Linux commands? a. shell functions b. device calls c. binary programs d. shell scripts

device calls

What piece of software tells the operating system how to use a specific hardware device? o a. graphical user interface o b. system service o c. user interface o d. device driver

device driver

Which command below provides the easiest method for monitoring free space on mounted filesystems? a. du b. fs c. fd d. df

df

Viewing the output of the ____________________ command, journalctl -b command, or the contents of the /var/log/boot.log and /var/log/messages log files can isolate most hardware problems.

dmesg

Select the command below that shows the size of a directory and its contents in kilobytes: a. df b. sizeof c. du d. dir

du

Select the command that can be used to check an ext2, ext3, or ext4 filesystem: a.ext2fsck b.e2fsck c. mke2fs d.fdisk

e2fsck

The quotas for certain users can be edited by using which command? o a. chquota o b. usrquota o c. repquota o d. edquota

edquota

In an if construct, what statements are optional? o a. elif o b. then o c. else o d. fi

else and elif

A list of all exported environment and user-defined variables in a shell can be viewed with what command below? a.set b.env c. setenv d.getenv

env

A case construct must be ended by _____________.

esac

What file controls the default runlevel when using Systemd? a. /etc/systemd/system/default.target b./etc/inittab c. /etc/systemd.conf d. /etc/systemd/initttab.target

etc/systemd/system/default.target

What permissions are required to execute a shell script in a manner similar to any other executable program on the system? o a. read and execute o b. read o c. execute o d. write and read

execute

Which two filesystems below do not perform journaling? a. ext2 b. VFAT c. ext3 d. REISER

ext2 and VFAT

Select the command that can be used to create partitions that will be stored in an MBR after installation: a. format b. formatdisk c. fdisk d. partition

fdisk

After a background process has been started, what command below can be used to move it to the foreground? a.fgd b.b2f c. fg d.fgnd

fg

What command is most effective at identifying different types of files? a.ls -l b.ll c. file d.stat

file

After modifying the fete/default/grub file, what command should be run to rebuild the grub config files? o a. grub-compile o b. grub-config o c. grub2-install o d. grub-mkconfig

grub -mkconfig

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?

grubby

What two commands below will halt a Linux system immediately? a.shutdown -r now b.poweroff c. halt d.shutdown -H now

halt AND shutdown -H now

Processes can initiate numerous connections, called ____________________, to files on the filesystem in addition to standard input, standard output, and standard error.

handles

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel? a. root= b. install= c. image= d. default=

image=

In the letc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel? o a. install= o b. default= o c. root= o d. image=

image=

A(n) ____________________ backup backs up only the data that has been changed since the last backup.

incremental

The first daemon process on a system is called the ________ daemon.

initialize, init

The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.

kern

What two commands below can be used to stop a process, either by PID number or process name?

killall and kill

Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image? a. runtime media image b. live media image c. open media image d. forensic media image

live media image

What two commands below can be used to locate files on a filesystem? a. locate b. query c. search d. find

locate and find

In order to send a print job to a printer using CUPS, what command must be used? a.pr b.pl c. print d.lp

lp

Select below the command and the associated alias available on most Linux systems that displays a long listing for each file in a directory? a. ls -l b. lf c. ll d. ls -F

ls -l and ll

The first DNS server in a zone is called the ____________________ DNS server.

master

Select the two window managers that have been used in GNOME: a. metacity b. lxde c. kwin d. mutter

metacity and mutter

Select the two commands below that can be used to prepare a swap partition and then enable it for use: o a.mkfs _ swap o b.swapit o C.mkswap o d.swapon

mkswap and swapon

When displaying a large text file, what two commands provide the ability to show text in a page by page fashion? a. paged b. more c. less d. buffer

more and less

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used? o a. mount -f o b. mount -a o c. mount -u o d. mount -0

mount -a

The ____________________ can be used to affect the process priority indirectly.

nice value

What two NTP daemons below are commonly used on Linux systems? a. ntpd b.sntpd c. chronyd d. timed

ntpd chronyd

Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table: a. p b. l c. a d. v

p and l

What can be used on a Linux system to trace the lineage of each child process? a. process ID b. process fork ID c. parent process ID d. execution order ID

parent process ID

What two commands below can be used to edit a GPT based hard disk's partitions? a.fdisk b.parted c. gdisk d.gptedit

parted and gdisk

A(n) __________ refers to a program that is running in memory and on the cpu.

process

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. process priority b. PID c. process state d. process flag

process state

A network _______________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.

protocol

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon? o a. pshead o b. psparent o c. pstree o d. psbranch

pstree

What command below can be used to create a new physical volume?

pvcreate

What command can be issued to confirm what directory you are in at a command line prompt? a. pwd b. dir c. whereami d. ld

pwd

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup? a.noerror b.quiet c. whisper d.silent

quiet

To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -r option

recursive

What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove? a.rm b.delete c. remove d.del

rm

What two commands below will work recursively if specified with the -R option? a.mkdir b.mv c. cp d.rm

rm and cp

In what filesystem are most of the operating system files contained? a. mnt b. data c. boot d. root

root

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory? a. daemon b. service c. manip-daemon d. daemon-service

service

The environment variables that are set by default and their current values can be viewed with what command? a. set b. env c. get d. setenv

set

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. first b. second c. fifth d. sixth

sixth

What stage of the GRUB boot loader typically resides on the MBR / GPT? a. Stage1 b. Stage1.5 c. Stage2 d. Stage2.5

stage 1

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command? o a. system-config-keyboard o b. system-config-kb o c. sys-config-keyboard o d. sys-conf-kb

system-config-keyboard

When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts? a. syscontroller b. systemctl c. service d. chkconfig

systemctl

To display a text file in reverse order, what command should be used? a.cat b.tac c. tee d.sed

tac

What command can be used to display the last five lines of a text file? a. tail -5 b. end -5 c. stop -5 d. head -5

tail -5

The section of an inode that stores pennissions is referred to as what? o a. the accessor of the file o b. the head of the file o c. the mode of the file o d. the tail of the file

the mode of the file

The section of an inode that stores permissions is referred to as what? a. the head of the file b. the tail of the file c. the mode of the file d. the accessor of the file

the mode of the file

In order to quickly create an empty file, what command can be used? a. create file1 b. touch file1 c. echo file1 d. vim file1

touch file1

What command can be used to replace characters in a file sent via Standard Input? a. st b. ts c. tr d. rt

tr

Data is read from physical hard drives in concentric circles known as which of the following? a. cylinders b. sectors c. tracks d. blocks

tracks

What two commands can be used to show information about physical volumes and logical volumes respectively? a.vgdisplay b.showvg c. showlv d.lvdisplay

vgdisplay and lgdisplay

What two ps options can be used to display a full list of information about each process, and a long list of information about each process? a. -e b. -l c. -p d. -f

-e and -l

When used with the compress command, what option below can be used to compress symbolic links? a.-c b.-v c. -f d.-r

-f

When used with the compress command, what option below can be used to compress symbolic links? a. -c b. -r c. -f d. -v

-f

In order to display a list of at job IDs, what option can be specified to the at command? a.-d b.-a c. -u d.-l

-l

Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory? o a. -option I o b. -mode I o c. -loop o d. -o loop

-loop

The mkfs command can be issued with what switch in order to specify a filesystem type? a.-c b.-f c. -o d.-t

-t

Packages in the Red Hat Package Manager format have filenames that indicate the hardware architecture for which the software was compiled, and end with the ____________________ extension.

.rpm

The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files? a. /bin b. /mnt c. /load d. /boot

/boot

At installation, Fedora linux creates a sybolic link called ______________ to the correct device file for your first CD-ROM drive

/dev/cdrom

The _________________ file often contains a single uncommented line that configures the default runlevel for a system.

/etc/inittab

A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices? a. 4 b. 8 c. 16 d. 32

4

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent? a. 30-40 b. 40-50 c. 50-60 d. 60-70

40-50

What hex code is associated with a Linux swap type partition? a. 83 b. 82 c. 12 d. 96

82

IPv6 IP addresses are delimited by what character below? a. , b. ; c. . d. :

:

In order to redirect a file to the standard input of a command, what metacharacter should be used? a. > b. < c. | d. #

<

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file? a. > b. < c. # d. |

>

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics? a. P b. x c. Ctrl+g d. $

Ctrl+g

What computer system was the first to run the UNIX operating system? a. DEC PDP-7 b. IBM 5150 c. Sun SPARC d. Apple II

DEC PDP-7

What installation media source is the most common source for Linux packages? a. hard disk b. DVD c. NFS d. CD-ROM

DVD

In a process referred to as ________________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.

Forking

The GNU General Public License (GPL) was developed by which organization? a. Microsoft b. Electronic Frontier Foundation (EFF) c. Sun Microsystems d. Free Software Foundation

Free Software Foundation

What software type is software that is distributed free of charge, but the source code is not available? o a. Close source software o b. Shareware o c. Open source software o d. Freeware

Freeware

What two processes below will show up as PID I, depending on whether a system uses UNIX Sys V or Systemd init processes? o a. kthreadd o b. systemd o c. init o d. syslogd

Init and systemd

What does the setfacl -b command do? a. It removes all extra ACL assignments on a given file b. The file's ACL assignments are created and are then ready to be modified. c. It sets 7777 on a given file or folder for all users / groups d. The file's user / group ownership is changed to to root / root

It removes all extra ACL assignments on a given file

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process? o a. 1 o b.SIGHUP o c. 2 o d.SIGINT

SIGINT and 2

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Esc b. Ctrl c. Tab d. Alt

Tab

What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document? a. DirectoryIndex index.html b. DocumentRoot index.html c. Index index.html d. UseIndex index.html

a. DirectoryIndex index.html

On a system that is not using Systemd, what two log files contain information related to PAM? a. /var/log/auth.log b. /var/log/secure c. /var/log/messages d. /var/log/pam.log

a. /var/log/auth.log b. /var/log/secure

In NTP, what stratum consists of atomic devices or GPS clocks? a. 0 b. 1 c. 2 d. 5

a. 0

What two commands below can be used to edit a GPT based bard disk's partitions? o a.parted o b.gptedit o. fdisk o d.gdisk

gdisk and parted

The apropos list command produces the same results as which command below? a.man -k list b.man -j list c. man -m list d.man -l list

man -k list

The ____________ command can be used to start X Windows and the default window manager or desktop environment.

startx

Most commands that are run by the shell are run in a separate __________, which is created by the current shell.

subshell

What section of a me system contains information about the me system in general? o a. inode table o b.inode o c. superblock o d. data blocks

superblock

What term describes the physical hardware and the underlying operating system upon which a virtual machine runs? a. virtual host b. virtual leader c. virtual gateway d. virtual center

virtual host

The Linux kernel exists as a file named: a. vmlinux b. vmlinuz c. krn.linux d. kernel.0

vmlinuz

Which command can be used to count the number lines, words, and characters in a file? o a. pr o b. tr o c. nl o d. wc

wc

Select the two commands below that will provide the number of lines in a file, and the number of characters in a file, respectively: a. wc -l b. count -c c. pr -d d. wc -c

wc -l and wc -c

Select the two cormnands below that will provide the number of lines in a file, and the number of characters in a file, respectively: o a. wc -1 o b. wc -c o c. count -c o d. pr -d

wc -l and wc -c

Which Linux command can be utilized to display your current login name? o a.who o b.id o c.w o d.whoami

whoami

Due to the fact that the * character can be used to match all characters in a filename, or all files in a directory, it is referred to as a _____________ metacharacter.

wildcard

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?

xvidtune

What command can be used to display the contents of a file that was compressed with the compress utility? a.acat b.cat c. zcat d.ccat

zcat

Which character(s) below represent extended regular expression metacharacter(s)? a. [ ... ] o b. {} o c. A o d. .

{}

Select the metacharacter that can be used to send the standard output of one command to another command as standard input: a. | b. # c. < d. >

| (Pipe)

What metacharacter can be used to refer to the current user's home directory? o a. & o b. ~ o c. @ o d. #

~


Ensembles d'études connexes

Chapter 9 - The Judiciary (Court System)

View Set

Ch 3 Types of Business Ownership

View Set

Human Biological Variation Midterm

View Set

Retail Image: Layout and Visual Merchandising

View Set

Chapter 5: Life History- Growth and Development

View Set

AP Human Geography Unit 5 quizlet

View Set

ICND 1 Chapter 4 (Fundamentals of IPv4 addressing and routing)

View Set

Chapter 8 - Childhood Development

View Set