CIT 352 Exam 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Find the match for the fields in /etc/passwd. # getent user1 passwd user1:x:1000:1000:Adam Smith:/home/user1:/bin/bash

Field - userid Field 2 - password Field 6 - home directory Field 7 - shell

When working with Sendmail, what command can be used to test SMTP support?

HELO

How can you bypass the wait function and send a user process to the background once it was started as a foreground process?

You can use the Ctrl+z key combination and the bg command.

The pkill command terminates _________.

all instances of a process with the same name matched by a regular expression

Which commands can you use or could you have used to install a package on Ubuntu? (Select all that apply)

apt aptitude apt-get dpkg

Which of the following commands can be used to remove the test DPM package, including any test configuration files?

apt purge test

When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information.

facility, priority

Which one is NOT a typical program used on a Linux server to download a tarball?

firefox

A process spawning or initiating another process is referred to as _____.

forking

What command do you use to display all the groups a user belongs to? (Select three)

grep <userid> /etc/group id <userid> getent group | grep <userid>

Which of the following utilities can be used to check TCP/IP configuration or test network connectivity? (Choose all that apply.)

ifconfig iwconfig ping nmcli

Which process has a PID of 1 and a PPID of 0?

init/systemd

Which commands may be used to display the configured ip address information? (Select three)

ip a ip address show ifconfig

A runaway process that is faulty and consuming mass amounts of system resources ________.

is a rogue process

Which command can be used to see processes running in the background?

jobs

What command can you use to view journald log entries on a system that uses Systemd?

journalctl

Which of the following commands should be run following the installation of a shared library to update the /etc/ld.so.conf and /etc/ld.so.cache files?

ldconfig

What is the name of the utility used to rotate log files?

logrotate

The IP address of 127.0.0.1 is also referred to as the _____.

loopback address

Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)

lp -d Printer1 file lp file

When compiling source code into a binary program, which command does the compiling using the GNU C Compiler?

make

What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.

mput

Which commands may be used to display a routing path from the source to the destination? (Select two)

mtr tracerout

Which commands can be used to display TCP/IP connections on your Linux system? (Choose all that apply.)

netstat -t ss -t

Which command can be used to temporarily alter the primary group associated with a given user?

newgrp

Which commands can you use to find the IP address of a host by name? (Select two)

nslookup host

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.)

nslookup hostname dig hostname host hostname

Every process has a process ID and a_______.

parent process ID

Which commands could you use to (effectively) lock a user account? (Select three)

passwd -l <userid> usermod -L <userid> usermod -s /sbin/nologin <userid>

Which command would you use to unlock a user account?

passwd -u username

The daemons associated with network services listen for network traffic associated with a particular _____.

port

The process of sending print jobs from the print queue to the printer is called _____.

printing

Which command entered without arguments is used to display a list of processes running in the current shell?

ps

Which commands can you use to view process information? (Select two)

ps top

Which of the following commands will most likely increase the chance of a process receiving more time slices?

renice -12

Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)

route ip

Which of the following command can be used to display the package to which the specified file belongs in RPM?

rpm -qf <file>

Which of the following commands can be used to list the files contained within an installed RPM package?

rpm -ql packagename

The at command is used to _______________.

schedule processes to run at a single instance in the future

Which of the following can be used to provide graphical remote administration? (Choose all that apply.)

ssh -X VNC

Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?

/etc/login.defs

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

What is the name of the file that contains a listing of all users on the system and their home directories?

/etc/passwd

Which file stores the IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the network interface?

/etc/resolv.conf

Where do you find the configuration file for enp0s3 on a modern Fedora?

/etc/sysconfig/network-scripts/ifcfg-enp0s3

Which file would you modify to permanently change the IP address of a network interface on a Fedora 28 system?

/etc/sysconfig/network-scripts/ifcfg-enp8s0

Most log files on the system are found in which directory?

/var/log

Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system?

/var/spool/cron/username

In NTP, what stratum consists of atomic devices or GPS clocks?

0

Which dump level indicates a full backup?

0

Match the level to the priority.

0 - emergency 1 - alart 2 - critical 3 - error 4 - warning 5 - notice

You have created a full backup and four incremental backups. In which order must you restore these backups?

0, 1, 2, 3, 4

Which of the following port numbers is associated with SSH?

22

What kill level signal cannot be trapped?

9

What is a shared library? (Select two)

A binary file that contains function calls that are used by multiple applications Placed under /lib/ or /lib64/ directory typically

Which of the following are stand-alone daemons? (Choose all that apply.)

Apache (httpd) DNS (named)

What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.)

DNS /etc/hosts

What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document?

DirectoryIndex index.html

Find the match.

Disable - 7 Accept - 3 Printing - 9 Reject - 4 Spooling - 8 Enable - 6 Ip - 2 cupsd - 1 /var/spool/cups - 5

Which methods describe a typical Linux software installation process? (Select two)

Download a tarball, and manually extract, compile, and install Download a package and let the package manager extract and install.

Along with a listing of user accounts, the /etc/passwd file contains information on account expiry.

False

Each Linux workstation or server is configured with a default gateway and one or more DNS servers that exist on the local subnet.

False

Incremental backups back up the data that has been changed since the last full backup.

False

Only the administrator can display the content of /etc/passwd

False

Standalone daemons are started on demand using xinetd.

False

The Debian Package Manager (DPM) is the default package manager used by Fedora 28.

False

The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface.

False

The bzip2 and gzip utilities use similar compression algorithms.

False

The network interface configuration entered by ip or ifconfig command will survive the reboot.

False

To install a new program from RPM software repositories on the Internet, you can use the dnf update programname command.

False

To kill a process running in the background, you must place a % character before its process ID.

False

UIDs and GIDs are unique to the system and, once used, can never be reused.

False

When the same program is executed twice it will have the same PID.

False

When you run the ps command, how are daemon processes recognized?

There is a question mark in the TTY column.

As daemon processes are not associated with terminals, you must use an option such as -e alongside the ps command to view them.

True

For the network interface configuration to survive the reboot, it must be saved in a configuration file.

True

Linux system can function as a router by enabling IP forwarding and entering the static IP routes and/or running a dynamic routing protocol such as RIP.

True

Most source code is typically available on the Internet in tarball format or as a git repository. True or False?

True

SSH encrypts all traffic that passes across the network, whereas telnet does not.

True

The -9 option to the gzip utility results in a higher compression ratio.

True

The line that configures the host name for the computer at boot time can be found in /etc/hostname.

True

You can clear a log file simply by redirecting nothing into it. True or False?

True

You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd.

True

dnf resolves package dependencies automatically.

True

How do you place a command that's running in the foreground into the background?

Type CTRL+z followed by bg and press the enter key.

What port is used by the Network Time Protocol (NTP) for communication?

UDP 123

Which one is NOT a Linux backup tool?

ee

What FTP command runs a shell on the local computer?

!

How do you display the background processes running in the current shell?

$ jobs

How do you start a sleep command to run in the background?

$ sleep <time> &

Why does everyone have 'x' in the password field of /etc/passwd file?

'x' means the actual password is saved in /etc/shadow

What value will be displayed at (1) and (2)? $ ls file1 (file1 exists) $ echo "$?" (1) $ ls file2 (file2 does not exist) $ echo "$?" 2 $ echo "$?" (2)

(1) 0, (2) 0

Nice values are used to affect process priorities using a range between _____________.

-20 and 19

Which option to the dpkg command can be used to list the files that comprise a package?

-L

Which option to the rpm command can be used to remove a package from the system?

-e

When compiling source code into a binary program, which command performs a system check and creates the Makefile?

./configure

Which filename extension indicates a tarball?

.tar.xz

Files that have been compressed using the xz utility typically have the ______ extension.

.xz

Under which conditions can user1 schedule a command using at command? (Select two)

/etc/at.allow does not exist. /etc/at.deny exists with user2 in it, not user1 /etc/at.allow exists with user1 in it. /etc/at.deny also exists with user1 in it

Which of the following statements is true? (Choose all that apply.)

If /etc/at.allow exists, only users listed in it can use the at command. If /etc/cron.allow exists, only users listed in it can use the cron command. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command.

Which describe journald? (Select two)

One log file for almost all system services Uses journalctl to view/extract log entries

Which Windows program is often used to connect to a Linux server via SSH?

Putty

Which statements are true regarding packages and package mangers. (Select two)

Red Hat Package has the extension of .rpm rpm is the command to run Red Hat Package Manager

What is VNC?

Remote desktop application

Which statements describe logrotate? (Select two)

Renames log files with a numeric or date extension before creating a new one. Older log files beyond the specified logging cycle are removed

Find the match:

SIGHUP - 1 SIGINT - 2 SIGKILL - 3 SIGTERM - 15

The Apache daemon listens for HTTP requests on what port by default?

TCP 80

Which one is NOT a common cloud architecture?

TaaS

Which statements are true? (Select two)

The lower the nice value is, the higher the chance will be for the specified process to receive more time slice. An owner of a process can "be nice" to other processes by increasing the nice value.

What is the term used to describe a user providing a user name and password to log in to a system?

authentication

You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue?

cancel Printer1-17 Printer1-21

Docker uses _________ technology.

container

Which of the following commands extracts an archive?

cpio -vicdu -I /dev/fd0

What command is used to view and modify user jobs scheduled to run with cron?

crontab

Which command below can be used at a BASH command prompt to obtain a web page?

curl

What is the name given to a process not associated with a terminal?

daemon process

Which command can be used to create an image backup of a partition?

dd

Before a computer can use a router, what configuration information must it be provided?

default gateway

How do you assign an IPv4 address using DHCP on modern Fedora? (Select two)

dhclient <INTF> BOOTPROTO=dhcp (in configuration file)

You want to generate SSH keys for your user account and copy them to a remote computer to simplify future SSH authentication. What two commands can you use to perform these actions? (Choose two answers.)

ssh-keygen ssh-copy-id

Which of the following commands creates a zipped archive?

tar -zcvf /dev/st0 *

Which command is used to extract the tarball?

tar -zxvf gimp-2.10.14.tar.gz

Which one is NOT a command used to terminate a process or processes?

terminate

When a printer is disabled, ________.

the print queue accepts jobs into the print queue and holds them there until the printer is enabled again

When a printer is rejecting requests,____________.

the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

Which command is used to gain real-time information about processes running on the system, with the most processor-intensive processes listed at the beginning of the list?

top

What command do you use to delete a user account along with his/her home directory?

userdel -r <userid>

Which command is used to delete a user account?

userdel username

Which command can you use to lock a user account?

usermod -L username

Which one is NOT a Linux compression tool?

zap / unzap


संबंधित स्टडी सेट्स

IB Biology 1 Unit 1- Properties of Water

View Set

Module 1 Section 2 the Institutes "Marketing"

View Set

Module 11 Long Term Care Insurance

View Set

Chapter 23: Nursing Care of the Newborn with Special Needs

View Set