CIS204 Test 3 Study guide
Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.
public ; private
To Convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.
pwconv
Databases store information in the form of ____, each of which contains ____.
records; tables
The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.
rlogin
The ____________________ command is used to view the current SELinux status.
sestatus
You can use the ____________________ command to connect to both Samba and Windows servers.
smbclient
In SSH, the /etc/ssh directory stores the DSA public key in the ____ file.
ssh_host_dsa_key. pub
The ____ command can be used to obtain root access when you need to perform an administrative task.
su
By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.
ten
A common utility used to troubleshoot routing is the ____ command.
traceroute
You can create user accounts on the Linux system by using the ____.
useradd
Remote computers can connect to a configured VNC server using the ____ command.
vncviewer
The____ command can be used to display the contents of a compressed file.
zcat
The _____ option can be used with the tar command to extract a specified archive.
-x
When using the compress utility, each file is renamed with a(n)_____ filename extension to indicate that is compressed.
.Z
The Filename extension given to files compressed with bzip2 is ____.
.bz2
Packages in the Red Hat Package Manager format have filenames that indicate the hardware architecture for which the software was compiled, and end with the ____________________ extension.
.rpm
When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.
False
When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.
False
_______________________________________________________ represents a text description of the user and is typically left blank.
GECOS or GECOS field or General Electric Comprehensive Operating System or General Electric Comprehensive Operating System (GECOS)
When working with Sendmail, you can use the ____ command to test SMTP support.
HELO
____ are the most common hardware component to fail on Linux systems.
Hard disks
Computer names are called ____.
Host names
To send a print job to a printer, you nust first use the ___ command and specify what to print.
Ip
You can restrict who can print to certain by using the ____ command.
Ipadmin
The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.
Kern
The ____ command looks for makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for local hardware architecture.
make
The first DNS server in a zone is called the ____________________ DNS server.
master or primary
The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.
mput filename
Two or more computers that are connected with media that can exchange information are called a(n) ____________________.
network
When working with Sendmail, if you modify the /etc/aliases file, you need to run the ____ command to rebuild the aliases database
newaliases
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the _____ command.
newgrp
You can perform up to____ different incremental backups using the dump/restore utility.
nine
To see what network services are running on your network, you can run the ____ command.
nmap
Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.
nohup
The ____ PostgreSQL command-line utility backs up PostgreSQL database settings.
pg_restore
The ____ command sends a small TCP/IP packet to another IP address and awaits a response.
ping
When using the cpio utility, the ___ option causes a new archive to be created.
-o
The ___ option to the ipstat command causes a list of printers that are enabled to be displayed.
-p
____________________ is used to reduce the size of a file or set of files.
Compression
The ____ SQL statement is used to delete a database.
DROP DATABASE
NTP uses port ____.
UDP 123
When used with the tar utility, the ___ option causes filenames to be stored in an archive using absolute pathnames.
-p
The ____ option for the sar command is used to displays statistics for the processor queue.
-q
You can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents.
-r
The ____ ftp utility command runs a shell on the local computer.
!
Any line that starts with a(n) ___ character is a comment in the /etc/rsyslog.conf file.
#
The ____ option for the sar command is used to display swap statistics.
-B
The______ option, when used with the Gzip Command, causes the compression ratio for files that have been compressed to be listed.
-I
To lock an account, you can use the usermod command with the____ option.
-L
The ____ option to the iptables command can be used to specify the default policy for a certain chain type.
-P
To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.
-V
When used with the uncomress command, the ___ option displays the contents of the compressed file to Standard Output.
-c
The ____ option to the iptables command can be used to specify the destination address of packets for a rule.
-d
The ip command uses the ___ option to specify the destination printer name.
-d
To remove a package from the system, you can use the ___ option to the rpm command.
-e
When used with the uncompressed command, the _____ option can be used to compress symbolic links.
-f
One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.
/etc/hosts.equiv
The Skeleton directory on most Linux systems is ______.
/etc/skel
LOg files are typically stored in the _____ directory.
/var/log
The ____ zone configuration file contains a PTR record used to identify the loopback adapter.
/var/named/named.local
In NTP, stratum ____ consists of atomic devices or GPS clocks.
0
The IP addresses___and___ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.
0.0.0.0; 255.255.255.255.
The shell restricts the number of file handles that programs can open to ____ by default.
1024
NetBIOS names can be up to ____ characters long.
15
The subnet mask for a Class B IP address is ____.
255.255.0.0
The subnet mask for a Class C IP address is ____.
255.255.255.0
All Linux problems can be divided into ____ categories.
3
The compression algorithm used by the compass utility has an average compression ratio of _____%
40-50
By default, all print jobs have a priority of____.
50
If no level of comression is specified, the gzip command assumes the number____.
6
The average compression ratio for gzip is ______%
60-70
Each octet in an IP address represents a(n)_____ binary number.
8-bit
IPv6 IP addresses are delimited by the ____ character.
:
Most printers are plug and play compatible and must be manually configured when they are plugged into the system.
False
The _____ priority used by the system log daemon indicates an error that should be rectified immediately, such as a corrupt system database.
Alert
Performance problems are caused by hardware, not software.
False
SLIP is a newer technology than PPP
False
On a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.
Cancel
____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet.
DNS
The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.
DirectoryIndex index.html
Almost all hardware problems are the result of damaged hardware.
False
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the SU command.
False
Client computers can retrieve e-mail from e-mail servers via ____ or ____.
POP; FTP
Most linux distributions today use____ as their package manager.
RPM
When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.
SIGHUP
To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.
Samba
The ___ log file contains information and error messages regarding netork access generated by daemons such as sshd and xinetd.
Secure
____ is a remote administration tool that encrypts information that passes across the network.
Secure Shell (SSH)
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
Subnetting
Apache daemon listens for HTTP requests on port ____.
TCP 80
A(n) ____ is a program that can start a network daemon.
TCP wrapper
The most command LAN protocol used today is____.
TCP/IP
The /etc/resolv.conf file can contain up to ____ DNS servers.
Three(3)
A route table is a list of TCP/IP networks that is stored in system memory.
True
All DNS servers contain a DNS cache file
True
Class D addresses are used for multicasting.
True
Passwords used by the PPP daemon are stored in two files:/etc/ppp/pap-secrets and /etc/ppp/chap-secrets.
True
The compress utility preserves the original ownershi, modification, and access time for each file that it compresses.
True
The tar utility cannot back up device files or files with filenames longer than 255 characters
True
The use of NFS is less common than the use of FTP to transfer files on public networks.
True
The very secure FTP Daemin is a stand-alone Daemon.
True
In the PostgreSQL utility, the ____________________ built-in command is used to list available databases.
\l
In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.
authentication
When performance issues arise, you can compare the output of performance utilities to the ____________________ values found in the system log book.
baseline
Some peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ____________________.
bus mastering
To view the contents of a file that was compressed with the bzip2 utility, you must use the ____________________ command.
bzcat
The ____ command can be used in the BASH prompt to obtain a Web page from the Apache server.
curl
The IP address of the network interface on the router to which you send packets is called the ____________________.
default gateway
Viewing the output of the ____________________ command or the contents of the /var/log/boot.log and /var/log/messages log files can isolate most hardware problems.
dmesg
Processes can initiate numerous connections, called ____________________, to files on the filesystem in addition to standard input, standard output, and standard error.
file handles
IPv6 IP addresses are written using eight 16-bit ____ numbers.
hexadecimal
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.
ifconfig
A(n) ____________________ backup backs up only the data that has been changed since the last backup.
incremental
To see a list of all printers on the system and their status, you can use the -t option to the _____ command.
ipstat