Exam 3
The ____ ftp utility command runs a shell on the local computer.
!
The ____ option for the sar command is used to display swap statistics.
-B
The ____ option to the iptables command can be used to specify the default policy for a certain chain type.
-P
To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.
-V
When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.
-c
The ____ option to the iptables command can be used to specify the destination address of packets for a rule.
-d
To remove a package from the system, you can use the ____ option to the rpm command.
-e
When used with the compress command, the ____ option can be used to compress symbolic links.
-f
The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.
-l
When using the cpio utility, the ____ option causes a new archive to be created.
-o
The ____ option for the sar command is used to displays statistics for the processor queue.
-q
The ____ option can be used with the tar command to extract a specified archive.
-x
When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.
.Z
The filename extension given to files compressed with bzip2 is ____.
.bz2
One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.
/etc/hosts.equiv
The file that contains a list of directories that contain shared libraries.
/etc/ld.so.conf
The directory that contains most system log files.
/var/log
The ____ zone configuration file contains a PTR record used to identify the loopback adapter.
/var/named/named.local
In NTP, stratum ____ consists of atomic devices or GPS clocks.
0
The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.
0.0.0.0 & 255.255.255.255
A notation that is often used to represent an IP address and its subnet mask
CIDR
A hierarchical namespace used for host names
DNS
____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet.
DNS
A server that contains the IP addresses of DNS servers that hold top-level DNS zones.
DNS cache file
The ____ SQL statement is used to delete a database.
DROP DATABASE
The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.
DirectoryIndex index.html
A host name that follows DNS convention
FQDN
Almost all hardware problems are the result of damaged hardware.
False
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
False
Performance problems are caused by hardware, not software.
False
Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.
False
When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory.
False
When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.
False
When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.
False
When working with Sendmail, you can use the ____ command to test SMTP support.
HELO
____ are the most common hardware component to fail on Linux systems.
Hard Disks
A company that provides internet access
ISP
The networks in which the computers are all close in proximity
LANs
A room where you lock important computers, such as Linux servers, and to which only Linux administrators or trusted users have key access is commonly called a(n) server closet.
True
All DNS servers contain a DNS cache file.
True
By default, the smb.conf file shares all printers and home directories for recognized Windows users.
True
If the / filesystem becomes corrupted, the system is unstable and must be turned off.
True
It is good form to read the Makefile after you run the configure script.
True
The Very Secure FTP daemon is a stand-alone daemon.
True
The compress utility preserves the original ownership, modification, and access time for each file that it compresses.
True
The tar utility cannot back up device files or files with filenames longer than 255 characters.
True
The use of NFS is less common than the use of FTP to transfer files on public networks.
True
NTP uses port ____.
UDP 123
The networks in which computers are separated geographically by large distances.
WLAN
A utility that can be used to obtain graphical utilities from a remote Linux computer in order to perform system administration
X Windows
Can symbolic links be compressed by the gzip utility?
Yes
Can the contents of a compressed file be viewed page-by-page?
Yes
Should system documentation be printed?
Yes
A portion of the Domain Name Space that is administered by one or more DNS servers.
Zone
The ____ command can be used in the BASH prompt to obtain a Web page from the Apache server.
curl
A line within the httpd.conf configuration file.
directive
A directory that contains the default Web site that is used on a server.
document root
A DNS name resolution request whereby a FQDN is resolved to an IP address.
forward lookup
IPv6 IP addresses are written using eight 16-bit ____ numbers.
hexadecimal
Computer names are called ____.
host names
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.
ifconfig
The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.
make
The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.
mput filename
When working with Sendmail, if you modify the /etc/aliases file, you need to run the ____ command to rebuild the aliases database
newaliases
To see what network services are running on your network, you can run the ____ command.
nmap
Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.
nohup
The ____ PostgreSQL command-line utility backs up PostgreSQL database settings.
pg_dump
The ____ command sends a small TCP/IP packet to another IP address and awaits a response.
ping
The measures taken to reduce future system problems.
proactive maintenance
Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.
public; private
The measures taken when system problems arise.
reactive maintenance
A DNS resolution request that was resolved with the use of top-level DNS servers.
recursive query
A DNS name resolution request whereby an IP address is resolved to a FQDN.
reverse lookup
The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.
rlogin
In SSH, the /etc/ssh directory stores the DSA public key in the ____ file.
ssh_host_dsa_key. pub
The ____ command can be used to obtain root access when you need to perform an administrative task.
su
A command that gives users the ability to run certain commands as the root user.
sudo
Databases store information in the form of ____, each of which contains ____.
tables; records
A utility that can be used to run remote applications on a Linux computer
telnet
By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.
ten
All Linux problems can be divided into ____ categories.
three
The /etc/resolv.conf file can contain up to ____ DNS servers.
three
A common utility used to troubleshoot routing is the ____ command.
traceroute
A command that can be used to increase the number of processes that users can start in the shell.
ulimit
A utility that can be used to indicate whether more physical memory is required.
vmstat
Remote computers can connect to a configured VNC server using the ____ command.
vncviewer
The ____ command can be used to display the contents of a compressed file.
zcat
The compression algorithm used by the compress utility has an average compression ratio of ____%.
40-50
If no level of compression is specified, the gzip command assumes the number ____.
6
The average compression ratio for gzip is ____%.
60-70
Each octet in an IP address represents a(n) ____ binary number.
8-bit
IPv6 IP addresses are delimited by the ____ character.
:
Open source program for Braille translation
Orca
Client computers can retrieve e-mail from e-mail servers via ____ or ____.
POP; IMAP
A tool used by network applications that authenticate users.
Pluggable Authentication Modules (PAM)
When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.
SIGHUP
A programming language used to store and access data in databases.
SQL
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic
SSH
____ is a remote administration tool that encrypts information that passes across the network.
Secure Shell (SSH)
Apache daemon listens for HTTP requests on port ____.
TCP 80
A(n) ____ is a program that can start a network daemon.
TCP Wrapper
The most common LAN protocol used today is ____.
TCP/IP
NetBIOS names can be up to ____ characters long.
15
The subnet mask for a Class B IP address is ____.
255.255.0.0
The subnet mask for a Class C IP address is ____.
255.255.255.0
The shell restricts the number of file handles that programs can open to ____ by default.
1024
A protocol that allows computers to share files transparently.
Network File System (NFS)
You can perform up to ____ different incremental backups using the dump/restore utility.
Nine
Are hardware-related problems typically more difficult to identify and resolve than software-related problems?
No
Can the bzip2 utility be used to compress a directory full of files?
No
Does the tar utility compress files inside an archive?
No
When implementing possible solutions to a problem, should you apply all of the changes simultaneously?
No
Most Linux distributions today use ____ as their package manager.
RPM