L+_Cards

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?​ a. -o loop b. --mode l c. --option l d. --loop

--loop

The command chmod 317 file1 would produce which of the following lines in the ls command?

--wx--xrwx 1 user1 root 0 apr 29 15:40 file1

To view a list of files and their type, use the _____ switch to the ls command.

-F

What option, when added to the rm command, is commonly referred to as the -resume option?

-r

You plug a USB flash memory drive into a system that has two SATA hard disks. How will the partition on this USB flash memory drive be identified by Linux?

/dev/sdc1

You plug a USB flash memory drive into a system that has two SATA hard disks. How will the partition on this USB flash memory drive be identified by Linux? a. /dev/sdb1 b. /dev/sda1 c. /dev/sda2 d. /dev/sdc1

/dev/sdc1

What character device file represents the second serial port on a system (COM2)?

/dev/ttyS1

What character device file represents the second serial port on a system (COM2)? a. /dev/ttyS1 b. /dev/tty2 c. /dev/tty1 d. /dev/ttyS0

/dev/ttyS1

To verify hardware settings, you can examine the contents of the ____ directory.

/proc

RAID level ____ is often referred to as disk mirroring.

1

Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his machine. Before he can use them for data storage and retrieval, what must he do?

1. Use the fdisk cmd to create one or more partions on each of the hard disk drives. 2. Mount any partitions created on the two hard drives so that they are accessible by the OS 3. Format any partitions created with a valid filesystem recognized by Linux.

In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?

1024

Some installations fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders.

1024

If a Linux installation ends abnormally and the screen displays a "fatal signal ____" error message, it indicates an error known as a segmentation fault.

11

The first software RAID volume on a system will use a multiple disk device file that starts with what number?

127

The first software RAID volume on a system will​ use a multiple disk device file that starts with what number?

127

Most Parallel SCSI controllers are capable of supporting up to how many devices?

15

Most Parallel SCSI controllers support up to ____ devices.

15

How many partitions linux requires?

2

What is the minimum number of user accounts that must be created at install time?

2

What is the recommended size for the /home directory?

200MB

-wx-w-r-x

325

A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices?

4

r--

4

How many primary partitions can you have?

4 max

what are the three numbers representing rwx?

421

Permissions: Octal Mode

4=read 2=write 1=execute

RAID level ____ is commonly referred to as disk striping with parity.

5

r-x

5

rw-

6

rw-r-xrwx

657

In a SCSI chain the highest priority SCSI device is given what SCSI ID?

7

The highest priority SCSI device is given a SCSI ID of ____.

7

What hex code is associated with a Linux swap type partition?​ a. ​96 b. 83 c. 12 d. 82

82

c. - - -r--rw

After typing the command umask 731, the permissions on all subsequently created files and directories will be affected. In this case, what will be the permissions on all new files? a. rw-rw-rw b. rwxrw-r-- c. - - -r--rw d.- - --wx--x

a. User1 has read and write permission, members of the root group have read and execute permissions, and all others have read permissions to the file.

After typing the ls -F command, you see the following line in the output: -rw-r-xr- - 1 user1 root 0 Apr 29 15:40 file1 What does this mean? a. User1 has read and write permission, members of the root group have read and execute permissions, and all others have read permissions to the file. b. Members of the root group have read and write permissions, user1 has read and execute permission, and all others have read permissions to the file. c. All users have read and write permissions, members of the root group have read and execute permissions, and user1 has read permission to the file. d. User1 has read and write permission, all others have read and execute permissions, and members of the root group have read permissions to the file.

cfdisk

Allow you to access your partitions

List the Linux advantages in regard to risk reduction.

Changes in the market or customer needs may cause companies to change software frequently. This can be costly and time-consuming. Support for closed source software may end because the vendor may go out of business or the software version may be retired. OSS products offer the opportunity to maintain and change the source code.

chown userowner:groupowner file.txt

Changes ownership of a file or directory

chmod

Changes permissions on file or directories

<ctrl> l

Clears the screen

List the Linux advantages in regard to meeting business needs.

Common software available for Linux includes the following: Scientific and engineering software Software emulators Web servers, Web browsers and e-commerce suites Desktop productivity software Graphics manipulation software Database software Security software

gzip

Compressed a file to a .gz file

bzip2

Compresses a file to a .bz2 file

Internet Protocol (IP) Address.

Computers communicating on a network need to be uniquely identified. Each computer of the internet is assigned a(n)

/etc/shadow

Contains encrypted passwords

ln -s

Creates a symbolic link

tar -cvf

Creates a tarball

mkdir {2007..2009}-{01..12}

Creates directories named: 2007-01 to 12 2008-01 to 12 2009-01 to 12 The hyphen is the separator used in the brace expansion

ssh-keygen

Creates keys if they are not already made

alias

Creates your own shortcut for a command

What key combination is commonly used in the vi editor command mode, displays current line statistics?

Ctrl+g

Delete character at the cursor

Ctrl-D

Kill text from the cursor location to the end of line.

Ctrl-K

Kill text from the cursor location to the beginning of the line.

Ctrl-U

Yank text from the kill-ring and insert it at the cursor location.

Ctrl-Y

What installation media source is the most common source for Linux packages?

DVD

To print the current date and time, type the command _________________________.

Date

Vi command: db

Delete previous word

Vi command: dd

Deletes a line

Vi command: dw

Deletes current word including trailing space

Vi command: d^

Deletes from beginning of the line to where you are

Vi command: d$

Deletes from the end of a line to the cursor

Vi command: X

Deletes one to the left of your cursor

Vi command: de

Deletes to the end of the current word

Vi command: x

Deletes where your cursor is

The _____ is a special file that serves as placeholders to organize other files.

Directory

____ is a type of RAID level 0 in which an individual file is divided into section and saved concurrently on multiple disks.

Disk striping

tree

Displays contents of a directory and all subdirectories

ls -li

Displays list of files and their inode number

less

Displays the content of a file with the ability to move up or down

!!

Does the last command

__________defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.

FHS

9. The less command offers less functionality than the more command. True or False?

False

A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when viewed using the ls -l command.

False

After a partition on a hard disk drive is formatted with a filesystem, all partitions on that hard disk drive must use the same filesystem.

False

After a partition on a hard disk drive is formatted with a filesystem, all partitions on that hard disk drive must use the same filesystem. True or false.

False

By default, Fedora 20 allows the root user to log into the GNOME desktop.​ True False

False

Each device attached to a system can be represented by multiple device files.

False

Fedora 20 makes use of the XFree86 ​implementation of X Windows. True False

False

In Linux, you are restricted to using only one type of filesystem on a system.

False

In the past, SATA hard disks were referred to as Integrated Drive Electronics (IDE).​ True False

False

Linux commands entered via the command line are not case sensitive. True False

False

Performance problems are caused by hardware, not software. True False

False

Performing regular system backups and identifying potential problem areas are examples of reactive maintenance. True False

False

SLIP is a newer technology than PPP. True False

False

Shell scripts do not require the execute permission in order to be run the same way binary programs are run.

False

T/F - Filenames can include up to 200 characters.

False

T/F - In Linux, the root directory is represented by a \ character.

False

T/F - Is the graphical Emacs editor harder to use than the Emacs editor?

False

Any line in a kickstart file that starts with a(n) ____ symbol is a comment line and is ignored by the installation program.

#

shebang

#!/bin/bash (what every script must start with)

The contents of a certain variable in memory can be viewed using which metacharacter in combination with the echo command?

$

What special characters do not lose their special meanings when double quoted ?

$, \ , `(backtick - older method of command substitution). That means parameter ($), arithmetic ($), and command substitution ($ or `) are not affected by double quotes.

echo "\$5.00"

$5.00 - Double quotes did not suppress \ so it prevented $ expansion.

Background command execution

&

In a file's mode, a permission that is unavailable is represented by what character?

-

State 3 facts about quotas and limits:

- Quotas can limit both user space and the number of files a user can own. - Hard limits can never be exceeded. - Soft limits allow a user to exceed them for a certain period of time.

T/F - The BIOS configurations on different computers are generally very similar or exactly the same.

False

kill -9 "process ID"

Forces the process to be killed

exit

Logs out and closes the terminal

Permissions-r

Read a file 4

find -exec

Redirects output to another command

>

Redirects to a file or directory erasing what's inside

rm

Remove a file

deluser —remove-home

Removes the user and their home directory

A Fedora 13 CD installation requires ____ CDs.

Six

Scalability

The ability for a computer to increase workload as the number of processors increases is called

A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator.

True

Any command that can be executed on the command line can also be placed inside any environment file. True False

True

Can CD-ROMs be ejected from the CD-ROM drive before the CD-ROM is properly unmounted?

True

Hard links need to reside on the same filesystem as the target, whereas symbolic links need not be on the same filesystem as the target.

True

Is ext3 the traditional filesystem used on Linux?

True

T/F. Fundamental to hacking was the idea of sharing knowledge.

True

T/F. GNU stands for "GNU is not UNIX".

True

T/F. Web servers host information on the web.

True

____ installation log file(s) is/are created by the Fedora installation program.

Two

/var/log

Where all the log files are found

15. Linux was developed by __________ to resemble the _________ operating system. a. Linus Torvalds, MINIX b. Linux Torvalds, GNU c. Richard Stallman, GNU d. Richard Stallman, MINIX

a. Linus Torvalds, MINIX

20. Which of the following can be used on Linux to provide file and print services? a. Samba b. Apache c. Quid d. pine

a. Samba

What does the /var directory contain?

a. various additional programs

The Linux kernel exists as a file named:​ a. vmlinuz b. kernel.0 c. krn.linux d. vmlinux

a. vmlinuz

help

asks for help

​The QT toolkit is utilized by which GUI environment? a. Enlightenment b. KDE c. Xfce d. GNOME

b. KDE

13. Who formed the Free Software Foundation to promote open development? a. Dennie Ritchie b. Richard Stallman c. Linus Torvalds d. Ken Thompson

b. Richard Stallman

After a background process has been started, what command below can be used to move it to the foreground? a. b2f b. fg c. fgd d. fgnd

b. fg

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics? a. $ c. Ctrl+g b. x d. P

c. Ctrl+g

What was created to define a standard directory structure and common file location for Linux? a. FSH b. root directory c. FHS d. X.500

c. FHS

What software type is software that is distributed free of charge, but the source code is not available? a. Shareware b. Open source software c. Freeware d. Close source software

c. Freeware

What are the three standard Linux permissions? a. read, write, examine b. full control, read-execute, write c. execute, read, write d. read, write, modify

c. execute, read, write

Where is the /proc filesystem stored? a. on the hard disk drive in the / directory b. on the hard disk drive in the /var directory c. in RAM d. on the hard disk drive in the /etc directory

c. in RAM

A production kernel refers to a kernel whose _________. a. revision number is even b. major number is odd c. minor number is even d. minor number is odd

c. minor number is even

What PostgreSQL command-line utility backs up PostgreSQL database settings? a. pg_restore b. pg_dumpall c. pg_dump d. pg_backup

c. pg_dump

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred? a. page fault b. IRQ fault c. segmentation fault d. RAM failure

c. segmentation fault

After logging into a terminal, a user will receive an interface known as which option below? a. processor b. swap memory c. shell d. user interface

c. shell

In order to change the time zone of a system after installation, what command must be used?​ a. tzmod b. tzchange c. tzselect d. time_zone

c. tzselect

What command can be used to change the maximum number of file handles that can be used by a program?​ a. ​pgmod b. fhlimit c. ulimit​ d. fhch

c. ulimit​

You want to see the filesystems that are presently in use on the system. What command could you use? a. cat /etc/fstab b. ls -l /etc/fstab c. cat /etc/mtab d. ls -l /etc/fstab

cat /etc/mtab

You want to see the filesystems that are presently in use on the system. What cmd could you use?

cat/etc/mtab

A device that transfers data in a character-by-character fashion is referred to as what type of device?

character

A device that transfers data in a character-by-character fashion is referred to as what type of device? a. text b. binary c. block d. character

character

In order to set all of the special permissions on a certain file or directory, which command should be used on a file named filename?

chmod 7777 filename

A file has the following permissions: r----x-w-. The command chmod 143 would have the same effect as the command ________.

chmod u=x, g=r, o=wx file1

Which of the following commands will change the user ownership and group ownership of file1 to user1 and root respectively?

chown user1:root file1

Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment.

chroot

​Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment.

chroot

cp

copy a file

ln

creates a hard link between files or directories

What option should be used in conjunction with the lp command in order to specify the destination printer name? a. -l b. -p c. -n d. -d

d. -d

In order to download DPM packages, what command should be used below?​ a. dpm-grab b. yum c. ​apt-search d. apt-get

d. apt-get

The ____ command can be used to provide a long listing for each file in a certain directory. a. ls -T c. ls -F b. ls -L d. ls -l

d. ls -l

The ____ command displays the last five lines of a text file. a. end -5 c. stop -5 b. head -5 d. tail -5

d. tail -5

In Fedora 20, what terminal is used for graphical login?​ a. tty0 b. tty2 c. tty4 d. tty1

d. tty1

What is the most common hardware component to fail on a Linux system? a. Video cards b. NICs c. Floppy drives d. Hard disks

d.Hard disks

16. The tac command __________.

displays the contents of a file in reverse order, last line first and first line last

What does the command dumpe2fs -h do?

displays the number of inodes used and available in an ext2 filesystem

Select the command below that shows the size of a directory and its contents in kilobytes.

du

Which command is used to edit quota?

edquota

It is acceptable to use shell metacharacters when naming files. (true/false)

false

Pressing the Esc key at the prompt while using the more command displays a help screen. (true/false)

false

The command "strings /bin/echo" displays the binary characters inside the /bin/echo binary executable program. (true/false)

false

Select the command that can be used to create partitions that will be stored in an MBR after installation:

fdisk

The ____ file in the /proc directory contains a list of memory address ranges reserved for device use.

ioports

What file in the /proc directory contains a list of memory address ranges reserved for device use?

ioports

GNU Network Object Model Environment (GNOME)

is a GUI environment in Linux that was written in the C programming language and uses the widely available gtk toolkit.

A Tarball

is a compressed archive of files containing scripts that install software to the correct location on the system. It has no central software database and is very difficult to manage, upgrade or remove programs.

An Application Server

is a computer running a program that acts as an intermediary between a client computer and the information, normally stored in a database, that the client needs.

A Database

is an organized collection of data that is arranged into tables of related information.

Freeware

is closed source software that is given out free of charge.

Shareware

is closed source software that is initially given out free of charge, but that requires payment after a certain period of use.

Open Source Software

is software in which the source code and software can be obtained free of charge and can be modified.

Apache

is the most common open source Web server available for Linux.

Device Driver

is the software containing the instructions that the OS uses to control and interact with a specific type of computer hardware. It tells the OS how to use that specific device.

In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?

journald

​In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?

journald

kill "process I'd"

kills a process

​Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table: (Select 2 answers) a. l b. a c. p d. v

l, p

ls

lists all files and directories in the working directory

ps -aux

lists all process running on the system

What does echo /usr/*/share do?

lists all the directories in /usr ex: /usr/kerberos/share /usr/local/share

A DNS server

maintains a list of proper FQDN to IP mappings.

The section of an inode that stores permissions is referred to as what?

mode

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?​

modules

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?

mount -a

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used? a. mount -f b. mount -u c. mount -o d. mount -a

mount -a

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, you can simply type which command?

mount -a

Which command mounts all existing filesystems in /etc/fstab?

mount -a

Which command mounts all existing filesystems in /etc/fstab? a. mount /etc/fstab b. mount -f c. mount -a d. mount /etc/mtab

mount -a

The ________ can be used to affect the process priority indirectly.

nice value

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:

options

Which of the following commands can be used to create partitions on either a MBR or GPT hard disk? a. parted b. gdisk c. fdisk d. cdskck

parted

What two commands below can be used to edit a GPT based hard disk's partitions?

parted and gdisk

In a file listing, the 9 characters following the file type (for example, -rwxr-xr-x) refer to the file's ____________

permissions

In a file listing, the 9 characters following the file type (ie. -rwxr-xr-x) refer to the file's _____.

permissions

When a user creates a file or directory, that user's name and ______ becomes the owner and group owner of the file, respectively.

primary group

grep

print lines matching a pattern

pwd

print working directory

A Firewall

protects companies from outside intruders on the Internet. Linux has support built into the kernel.

A network __________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.

protocol

Routing

provides interconnection between separate networks. It is the core service necessary for the Internet to function. Linux provides support for this core service and is easily customizable.

​What command below can be used to create a new physical volume?

pvcreate

​What command below can be used to create a new physical volume? a. lvcreate b. pvdisk c. pvcreate d. new_pv

pvcreate

14. What will typing q! at the : prompt in command mode do when using the vi editor?

quit without saving any changes

To copy a directory full of files in Linux, you must tell the cp command that the copy will be _____(involve files and subdirectories too) by using the -r option

recursive

Software

refers to a set of instructions or programs that allow the various hardware components to manipulate data (or files).

The Source Code

refers to the list of instructions that a software developer writes to make up a program

Text wildcards used to ease the searching of specific text information are called _____.

regular expressions

Text wildcards used to ease the searching of specific text information are called_____________ . .

regular expressions

delgroup "Groupname"

remove a group from the system

deluser

remove a user from the system, but their home directory will still exist with their User Id

rm -r

remove directory

What does the setfacl -b command do?

removes all extra ACL assignments

4. A special device file is used to __________.

represent hardware devices such as hard disk drives and ports

A Proxy Server

requests Internet resources such as Web sites and FTP sites on behalf of another computer inside the company.

12. If "resume" is the name of a file in the home directory off the root of the filesystem and your present working directory is home, what is the relative name for the file named resume?

resume

In what filesystem are most of the operating system files contained? a. boot b. data c. root d. mnt

root

The two partitions require in Linux

root and swap

bg

runs a program in the background

fg

runs a program in the foreground

10. Which command searches for and displays any text contents of a binary file?

strings

Most commands that are run by the shell are run in a separate _________ , which is created by the current shell.

subshell

What section of a filesystem contains information about the filesystem in general?

superblock

In the event that you wish to disable a swap partition, what command must be used?​

swapoff

In the event that you wish to disable a swap partition, what command must be used?​ a. umount b. ​swapoff c. ​swapdrop d. ​delete_swap

swapoff

To create a(n) _____ link, you use the -s option to the ln command.

symbolic

The _____ displays a file in reverse order.

tac command

Most files on a Linux system that contain configuration information are _____ files.

text

A special variable used to alter permissions by taking away select defaults?

unmask command

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?

​modules

After typing the command umask 731, the permissions on all the subsequently created files and directories will be affected. In this case, what will be the permissions on all new files?

---r--rw-

The mkfs command can be issued with what switch in order to specify a filesystem type?

-t

The mkfs command can be issued with what switch in order to specify a filesystem type? a. -o b. -f c. -c d. -t

-t

Given the following output from /etc/fstab, which filesystem will be automatically checked on boot by the fsck cmd? [BEGIN CODE] LABEL=/ / ext3 defaults 1 1 none /dev/pts devpts gid=5,mode=6201 0 none /proc proc defaults 0 1 none / dev/shm tmpfs defaults 1 0 /dev/hdc2 swap swap defaults 0 1 /dev/cdrom /mnt/cdrom iso9660 noauto,owner 0 0 /dev/fd0 /mnt/floppy auto noauto, owner 0 0 [END CODE]

/, /dev/pts and /dev/shm

Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? /dev/sda1 / ext4 defaults 1 1 none /dev/pts devpts gid=5,mode=620 1 0 none /proc proc defaults 0 1 none /dev/shm tmpfs defaults 1 0 /dev/sdc2 swap swap defaults 0 1 /dev/dvd /media/dvd iso9660 noauto,ro 0 0 /dev/fd0 /media/floppy auto noauto 0 0

/, /proc, and swap

Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? /dev/sda1 / ext4 defaults 1 1 none /dev/pts devpts gid=5,mode= 620 1 0 none /proc proc defaults 0 1 none /dev/shm tmpfs defaults 1 0 /dev/sdc2 swap swap defaults 0 1 /dev/dvd /media/dvd iso 9660 noauto,ro 0 0 /dev/fd0 /media/floppy auto noauto 0 0 a. none, as fsck must be run manually for each filesystem b. /, /dev/pts and /dev/shm c. /, /proc and swap d. all of them, as fsck is run automatically at boot for all filesystems

/,/dev/pts and dev/shm

The File system Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?

/boot

Which device file below represents the first primary partition on the second PATA hard disk drive?

/dev/hbd1

Which device file below represents the first primary partition on the second PATA hard disk drive? a. /dev/hdb1 b. /dev/hdc2 c. /dev/hdc1 d. /dev/hda1

/dev/hdb1

You plug a USB flash drive into a system that has two SATA hard disks. How will the partition on this USB flash memory drive by identified by Linux?

/dev/sdc1

What file in the /proc directory contains information about a computer's CPU?

/proc/cpuinfo

What file in the /proc directory contains information about a computer's CPU?​

/proc/cpuinfo

To ensure that Linux has detected the correct amount of RAM in the system after installation, you can view the contents of the ____ file.

/proc/meminfo

To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?

/proc/meminfo

The ____ is a file that contains a list of packages that were installed as well as a list of those that were not installed.

/root/install.log

____ is the file that lists all of the system events that occurred during the installation, such as the creation of user and group accounts.

/root/install.log.syslog

Under the root directory in Linux, which directory contains system commands and utilities?

/usr

You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?

/var/log/boot.log

Output of brace expansion - echo {01..15}

01 02 03 04 05 06 07 08 09 10 11 12 13 14 15

result of: echo $5.00 echo \$5.00

1) .00 2) $5.00 - Parameter expansion is escaped.

echo '\$5.00' echo '\\$5.00'

1) \$5.00 - both \ & $ special meaning is suppressed. 2) \\$5.00 - same as above

echo \\$5.00 echo "\\$5.00"

1) \.00 - \\ made \ lose its special meaning as an escape character. Thus, it was printed but did not suppress parameter expansion. 2) Same as above. Double quotes did not suppress \ or $. So \\ made \ lose its special meaning.

1. A RAID configuration in which a single file is divided into sections, which are then written to different hard disks concurrently to speed up access time; this type of RAID is not fault tolerant. Also known as RAID 0. 2. A term that refers to a storage device within an iSCSI SAN. 3. A SCSI technology that transfers data via TCP/IP networks. 4. A RAID configuration consisting of two identical hard disks to which identical data are written in parallel, thus ensuring fault tolerance. Also known as RAID 1. 5. A type of RAID level 0 that allows two or more devices to be represented as a single large volume. 6. Term used to describe a device that exhibits a minimum of downtime in the event of a failure. 7. A high-performance filesystem and volume management software that is often used to create volumes from multiple storage devices on Linux and UNIX systems. 8. Term used to describe a CPU that runs faster than the clock speed for which it has been rated. 9. A device used to terminate an electrical conduction medium to absorb the transmitted signal and prevent signal bounce. 10. The most common boot loader used on Linux systems. It loads and executes the Linux kernel at boot time.

1. disk striping 2. iSCSI target 3. internet SCSI 4. disk mirroring 5. spanning 6. fault tolerant 7. Zettabyte File System (ZFS) 8. overclocked 9. terminator 10. GRUB

The _____ symbol indicates a linked file.

@

Process

A Process is a program that is executing in memory.

d. chmod u=x,g=r,o=wx file1

A file has the following permissions: r- - --x-w-. The command chmod 143 would have the same effect as the command _________________. (Choose all that apply.) a. chmod u+x-r,g+r-x,o+w file1 b. chmod u=w,g=rw,o=rx file1 c. chmod u-r-w,g+r-w,o+r-x file1 d. chmod u=x,g=r,o=wx file1 e. chmod u+w,g+r-w,o+r-x file1 f. chmod u=rw,g=r,o=r file1

Hardware Compatibility List (HCL)

A list of hardware components that have been tested and deemed compatible with a given operating system.

False

A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when viewed using the ls -l command. True or False?

What types of expansions are suppressed by single quotes ?

All expansions and special characters including the \

ssh

Allows remote connection to other computers

$(command) or 'command'

Allows to nest commands

ping

Allows us to to examine and monitor a network, so we can see if our connection is up and our DNS is working

Convert the characters from the cursor location to the end of the word to lowercase.

Alt + L Alt + U for uppercase

Insert all possible completions. This is useful when you want to use more than one possible match.

Alt - *

>>

Append | Redirect to a file, adding to what was already in it

Vi command: a

Appends to the end of a line

There are two different types of programs that are executed on a computer. State them.

Applications Operating system (OS) software

The process of ______________ requires that each user must log in with a valid user name and password before gaining access to a user interface.​

Authentication

<tab>

Autocompletes the command

How do you expand the first $ but not the second $ in: echo The balance for user $USER is: $5.00

By adding \$5.00 to escape the second expansion selectively. If \$USER, then $USER will be printed instead of expanding.

3. Which of the following is an absolute pathname? (Choose all that apply.)

C:\myfolder\resume

<ctrl> c

Cancels current command

When applied to a directory, the SGID special permission _________.

Causes all new files created in the directory to have the same group membership as the directory and not the entity that created them

chgroup

Changes group ownership

chmod o=

Changes the "other" permissions

chmod g=

Changes the group permissions

chmod u=

Changes the user permissions

Clustering

Combining several smaller computers to act as one large supercomputer is called

What is command substitution ?

Command substitution allows us to use the output of a command as an expansion. example: echo $(ls) output: list of the directory contents

/etc/group

Contains group names and Group IDs

cp -r

Copy a directory

wget

Copy a file from the internet

touch

Create a new empty file

List the Linux advantages in regard to stability and security.

Customers using a closed source OS must rely on the OS vendor to fix any bugs. The user may be waiting for a "hot fix" for weeks or months. Bugs and security loopholes in OSS programs can be identified and fixed quickly. The source code is freely available and scrutinized by many developers.

What does the cmd dumpe2fs -h do?

Displays the number of inodes used and available in an ext2 filesystem

sudo crontab -e

Edits crontab jobs for the system

crontab -e

Edits crontab jobs to your personal crontab

An alternative to the vi editor that offers an equal set of functionality is the GNU _____________ .

Emacs editor

The ____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor. a. Kedit editor c. Emacs editor b. Mcedit editor d. Nedit editor

Emacs editor

The _____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor.

Emacs editor

VI command: i

Enters insert mode

Permissions- x

Execute 1

What are the three standard Linux permissions?

Execute, read, write

What was created to define a standard directory structure and common file location for linux?

FHS

________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.

FHS

Character devices typically transfer data more quickly than block devices True False

False

Character devices typically transfer data more quickly than block devices.

False

Character devices typically transfer data more quickly than block devices. True or false

False

T/F - RAID level 4 configurations are not fault tolerant.

False

T/F - The command strings /bin/echo displays the binary characters inside the /bin/echo binary executable program.

False

T/F - The rmdir command automatically removes a directory and all of its subdirectories and files.

False

T/F - To display the line number of each line in a file, in addition to its contents, would you use the cat -n command?

False

T/F - To perform a case-insensitive grep search, would you use the -a option to the grep command?

False

T/F - Up to 100,000 Serial Attached SCSI hard disks can be connected to a single SCSI controller via serial cables with small serial connectors.

False

T/F - When using the less command, can you use the cursor keys on the keyboard to scroll up and down the contents of the file?

False

T/F - When you first open the vi editor, you are placed in edit mode.

False

T/F - When you use disk imaging software to write a Linux ISO image onto a USB flash drive, the filesystem existing on the flash drive is maintained.

False

The less command offers less functionality than the more command. True False

False

The minimum height of a rackmount server is 2 inches; this is called a 1U server.

False

True or False: After a partition on a hard disk drive is formatted with a filesystem, all partitions on that hard disk drive must use the same filesystem

False

True or False: Character devices typically transfer data more quickly than block devices.

False

Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy.​

False

When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD.

False

Output of echo $(cal) echo "$(cal)"

February 2020 Su Mo Tu We Th Fr Sa 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 2nd command - Correctly formatted calendar that includes new line characters - new rows for each week. In the first instance, the unquoted command substitution resulted in a command line containing 38 arguments. In the second, it resulted in a command line with one argument that includes the embedded spaces and newlines. Double-quotes suppresses word splitting. The fact that newlines are considered delimiters by the word-splitting mechanism caused this affect on command substitution.

State several familiar distributions of Linux.

Fedora Core (Red Hat) Mageia openSuSE Ubuntu Linux Mint

____ is a version of RAID controlled by the system BIOS.

Firmware RAID

mkfs.ext3

Formats partition to ext3

mkfs.ext4

Formats the partition to ext4

State the two main competing GUI environments in Linux.

GNU Network Object Model Environment (GNOME) Kommon Desktop Environment (KDE)

b. two

Given the following output from the ls command, how many files are linked with file1? drwxr-xr-x 3 root root 4096 Apr 8 07:12 Desktop -rw-r--r-- 3 root root 282 Apr 29 22:06 file1 -rw-r--r-- 1 root root 282 Apr 29 22:06 file2 -rw-r--r-- 4 root root 282 Apr 29 22:06 file3 -rw-r--r-- 2 root root 282 Apr 29 22:06 file4 -rw-r--r-- 1 root root 282 Apr 29 22:06 file5 -rw-r--r-- 1 user1 sys 282 Apr 29 22:06 file6 a. one b. two c. three d. four

Vi command: A

Goes into insert mode and goes to the end of a line

Vi command: G

Goes to the last line of the file

Vi command: "number"G

Goes to the line specified by the number before the G

cd

Goes to your home directory

Linux provides workstation software that is designed for end users in office and home environments. State some this software.

Graphics editing software (such as GIMP) Desktop publishing software (such as Scribus) Media software (such as VLC) Financial software (such as GNUCash) Office productivity suites (such as LibreOffice) Bit torrent clients (such as qBitTorrent)

GID

Group ID

True

Hard links need to reside on the same filesystem as the target, whereas symbolic links need not be on the same filesystem as the target. True or False?

Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?​

Hardware Compatibility List (HCL)

Computers have two fundamental components. State them.

Hardware and Software

A device file ______. a. has no size b. has a fixed size of 300 kilobytes c. has no inode section d. displays a major and minor number in place of a file size

Has no data section d.displays a major and minor number in place of a file size

A device file _______________________.

Has no data section Displays a major and minor number in place of file size

A device file ______.

Has no data section displays a major and minor number in place of a file size

Production Kernel.

If the minor number of the kernel is even, the kernel is referred to as a___. This kernel has been thoroughly tested and is stable.

Developmental Kernel

If the minor number of the kernel is odd, the kernel is referred to as a___. This kernel has not been fully tested and may not be stable.

Berkeley Software Distribution (BSD)

In particular, AT&T Bell Laboratories gave the University of California @ Berkeley the source code of UNIX. The ___ is the version that had the original UNIX source code.

file $(ls -d /usr/bin/* | grep zip)

In this example of command substitution, the results of the pipeline became the argument list of the file command.

$ prompt

Indicates a standard user

# prompt

Indicates a super user

sudo apt install "application"

Installs the specified application

List some configurations of Linux.

Internet Servers File and Print Servers Application Servers Supercomputers Scientific Workstations Office/Personal Workstations

6. After typing the ls -a command, you notice that there is a file whose filename begins with a dot ( . ). What does this mean?

It is a hidden file.

7. After typing the ls -F command, you notice a filename that ends with an * (asterisk) character. What does this mean?

It is an executable file.

What must a user do to run cp or mv interactively and be asked if she wants to overwrite an existing file?

Just type cp or mv, because they run in interactive mode by default

In Fedora Linux, a ____ file is a script file that specifies the choices that you would normally choose when you install the operating system.

Kickstart

killall

Kill processes by name

stat

Let's you see inode data for a file

_____ are files that have an association with one another.

Linked files

Samba

Linux can share resources with other computers running other operating systems. The most common service used to allow clients to connect to shared information and printers on a Linux server is ___, which makes a Linux server appear as a Windows server to Windows clients.

ifconfig

Linux command for finding out a computer's IP address information

List the Linux advantages in regards to ease of obtaining support.

Linux documentation Documentation can be found on the Internet in the form of Frequently Asked Questions (FAQs) and HOWTO documents. Linux Newsgroups Linux User Groups (LUGs)

State the common uses of Linux.

Linux may be customized to provide services for a variety of companies in a variety of situations. Workstation services are services used on a local computer. Server services are services made available for other computers across a network.

Linus Torvalds

Linux was first developed by ___ in 1991 when he was experimenting with improving MINIX. MINIX (mini-UNIX) is a small educational version of UNIX developed by Andrew Tannenbaum for the Intel x86 platform.

tail

List last 10 lines by default

What is printed when you type echo * in the home directory ?

List the contents of the home directory. * is not printed. The shell first expands * into names of files in the current directory before the echo command is executed. The echo never saw * so it prints the list of the home directory that was expanded.

ls "directory name"/

Lists contents of the specified directory

head

Lists first 10 files by default

ls -l

Lists the contents of a directory in long list format

jobs

Lists the current running jobs

top

Lists the top processes running

Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?​

Live Media Image

find -mmin

Locates a file that was modified "xx" minutes ago

_____ is a file that contains the most recent entries at the bottom of the file.

Log file

____ is a unique identifier for each device attached to any given node in a SCSI chain.

Logical Unit Number (LUN)

<ctrl> d

Logout of current session

List some services available for Internet servers.

Mail Services Routing FTP Services Firewalls and proxy services Web services News Services DNS services

Vi command: o

Makes a new line at the bottom

Vi command: O

Makes a new line at the top

A user runs the fsck command with the -a option on a filesystem that is showing signs of corruption. How would that user locate any files the system was unable to repair?

Mount the filesystem and check the lost+found directory underneath the mount point

A user runs the fsck command with the -a option on a filesystem that is showing signs of corruption. How would that user locate any files the system was unable to repair? A user runs the fsck command with the -a option on a filesystem that is showing signs of corruption. How would that user locate any files the system was unable to repair? a. The system prompts the user for a target location when it comes across a file it cannot repair. b. View the contents of the directory /lost+found. c. Mount the filesystem and check the lost+found directory underneath the mount point. d. Look in the root of the filesystem.

Mount the filesystem and check the lost+found directory underneath the mount point

Vi command: h

Move cursor to the left

mv

Move or rename files or directories

Vi command: L

Move to the bottom of the SCREEN

Vi command: j

Move your cursor down

Vi command: l

Move your cursor to the right

Vi command: k

Move your cursor up

Vi command: M

Moves to the middle of the SCREEN

Vi command: H

Moves to the top of the SCREEN

A _____ identifies a channel that passes information from one process in memory to another, and in some cases can be mediated by files on the hard drive.

Named pipe

____ is a protocol that may be used to install Fedora via a network.

Network File System (NFS)

To perform a case-insensitive grep search, would you use the -a option to the grep command?

No

Output of brace expansion - echo Number_{1..5}

Number_1 Number_2 Number_3 Number_4 Number_5

State the four types of software types in Linux.

Open Source Closed Source Freeware Shareware

Older systems often use _________________ hard disks that physically connect to the computer in one of four different configurations.​

Parallel Advanced Technology Attachment (PATA)

What types of expansions are used here: echo "$USER $((2+2)) $(cal)"

Parameter, arithmetic and command substitution.

The _____________ environment variable contains a list of directories to search for executable programs.

Path

What type of expansion do wildcards work by ?

Pathname expansion example: echo *s will list items ending with s in current dir

What types of expansions are suppressed by when text is double quoted ?

Pathname expansion (wildcards), brace and tilde expansion are suppressed. word splitting is also suppressed. ls -l "two words.txt" works.

17. How can you specify a text pattern that must be at the beginning of a line of text using a regular expression?

Precede the string with a ^.

Display a list of possible completions

Press tab key second time

11. How can a user switch from insert mode to command mode when using the vi editor?

Press the Esc key.

echo -e \n5.00

Prints 5.00 on a new-line. -e option enables interpretation of escape sequences.

cat

Prints contents of a file to a screen

sed -n '0~3p' "file.txt"

Prints every third line starting from the beginning of the file

What does echo command do ?

Prints it's text arguments on standard output.

echo

Prints text to the screen

State the hardware components on a personal computer.

Processor (CPU) Physical memory (RAM) Hard disk, removable flash media drives and CD/DVD drives Sound cards and video cards Circuit boards

Vi command: p

Puts (pastes) text after position or after line

Vi command: P

Puts (pastes) text before position or line

<ctrl> z

Puts a process in the background without killing it

Vi command: :q!

Quit without saving

Vi command: :q

Quits the editor

Which of the following statements are true? a. Hard limits allow a user to exceed them for a certain period of time. b. Quotas can limit both user space and the number of files a user can own. c. Quotas can only limit user space. d. Quotas can only limit the number of files a user can own.

Quotas can limit both user space and the number of files a user can own.

Which of the following statements are true? (Choose all that apply.) a. Quotas can only limit user space. b. Quotas can only limit the number of files a user can own. c. Quotas can limit both user space and the number of files a user can own. d. Hard limits can never be exceeded. e. Hard limits allow a user to exceed them for a certain period of time. f. Soft limits can never be exceeded. g. Soft limits allow a user to exceed them for a certain period of time. h. Either a hard limit or a soft limit can be set, but not both concurrently.

Quotas can limit both user space and the number of files a user can own. Hard limits can never be exceeded. Soft limits allow a user to exceed them for a certain period of time.

A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:

RAID-Z

​A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:

RAID-Z

What RAID level is commonly referred to as disk striping with parity?

RAID5

​What RAID level is commonly referred to as disk striping with parity?

RAID5

What two RAID types below utilize disk striping with parity, providing protection against one or two drive failures respectively?

RAID6 RAID5

sed 's/day/night/g'

Replaces the first string with the second string for all lines (g)

Free Software Foundation (FSF)

Richard Stallman formed the___ to encourage free software development. A lot of free software was developed in the 1980s that ran on the UNIX system, however the problem was that UNIX was not free

GNU Project

Richard Stallman founded the___ in 1984 to promote free development for a free operating system that was not UNIX.

There are many advantages of using Linux. State them.

Risk Reduction Meeting business needs Stability and security Flexibility for different hardware platforms Ease of customization Ease of obtaining support Cost reduction

The root user utilizes the chgrp command to give ownership of a file to another user. What must the root user do to regain ownership of the file?

Run chgrp again listing the root user as the new owner.

!!

Run the previous command from history

~/.bashrc

Runs when user logs in

~/.bash_logout

Runs when user logs out

The ____ standard support speeds of up to 80 MB/second.

SCSI-3 Ultra2 Wide

What SCSI type supports speeds of up to 80 MB/second?

SCSI-3 Ultra2 Wide

Vi command: :wq

Saves and quits

Vi command: :w

Saves the file

<up arrow>

Scrolls back through your last commands

Vi command: ?"string"

Search backwards for the specified string

find -type f

Search for files

find -type d

Searches for directories

Vi command: /"string"

Searches forward for specified string

scp

Secure copy: allows you to securely copy files from one machine to another

The situation in which a program has accessed an area of RAM that was not assigned is called ____.

Segmentation fault

;

Separates commands (allows commands to be entered simultaneously)

cal

Shows a calendar and highlights the current date

ip a

Shows ip address

Vi command: :set number

Shows line numbers

What does the du /var command do?

Shows the size of all directories within the /var directory

What does the du /var command do? a. shows the size of all directories within the /var directory b. dumps the /var directory c. shows the users connected to the /var directory d. displays the amount of free space in the /var directory

Shows the size of all directories within the /var directory (FROM TEST displayes amount of free space in /var directory)

What does the du/var cmd do?

Shows the sizes of all directories within the /var directory

id

Shows your UID and GID of all the groups you are affiliated with

Data that an inode contains

Size, UID, GID, permissions

_____ is a file that allows a process on another computer to write to a file on the local computer while another process reads from that file.

Socket file

State some of the implications of Open Source Software (OSS).

Software is developed very rapidly through widespread collaboration. Software bugs (errors) are noted and promptly fixed. Software features evolve quickly based on users' needs. The perceived value of the software increases because it is based on usefulness and not on price.

____ is a type of RAID level 0 that consists of two hard disks that are seen as one large volume.

Spanning

_____ is a file that represents a device on the system, such as a hard disk or serial port.

Special device file

State the common flavors of UNIX today.

Sun Microsystems's Solaris UNIX Hewlett-Packard's HP-UX IBM's AIX UNIX

Vi command: <esc>

Switch to command/normal mode

What is System Rescue? Explain how you would activate this tool.

System rescue is a utility used to help restore failing items in the Linux environment. You can load the system rescue through a live ISO either on a CD or on a USB drive.

If you type enough unique letters of a directory and press _____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information.

Tab

Vi command: 0(zero)

Takes you to the beginning of the line

Vi command: $

Takes you to the end of the line

Each SCSI device is assigned a unique ID number known as a(n) ____.

Target ID

whoami

Tells me what username I am logged in under

who

Tells who else is logged into this computer

b. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1

The command chmod 317 file1 would produce which of the following lines in the ls command? a. --w-r--rwx 1 user1 root 0 Apr 29 15:40 file1 b. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1 c. -rwxrw-r-x 1 user1 root 0 Apr 29 15:40 file1 d. --w-rw-r-e 1 user1 root 0 Apr 29 15:40 file1

X Windows

The core component of the Linux GUI is___.

Linux Kernel

The core component of the Linux operating system is called the___. It is written almost entirely in the C programming language.

d. rwxrwxrwx and rw-rw-rwe.

The default permissions given by the system prior to analyzing the umask are ________________ for directories and ________________ for files. a. rw-rw-rw- and rw-rw-rwb. rw-rw-rw- and r- -r- -r- - c. rw-rw-rw- and rwxrwxrwx d. rwxrwxrwx and rw-rw-rwe. rwxrw-rw- and rwx-rw-rw-

The first floppy drive on the system is not responding. You enter the file/dev/fd0 cmd and receive the following output. What is the problem? [root@server1 root] # file/dev/fd0 /dev/fd0: ASCII text [root@server1 root] #

The device file has become corrupt

List the Linux advantages in regard to ease of customization.

The ease of customization is a big advantage of Linux because it gives the user the ability to control the inner workings of an OS. To use Linux as an Internet Web Server, you must compile the kernel to include only the support needed to be an Internet Web Server. This results in a much smaller and faster kernel. A Linux user can choose to install only software packages needed to perform required tasks. A Linux user can use shell and PERL scripts to customize or automate tasks.

init

The first process that the Linux kernel runs

What does this command do: ls -l $(which cp) ?

The output of the command (which cp) is sent to ls -l output: -rwxr-xr-x 1 root root 71516 2007-12-05 08:58 /bin/cp

List the Linux advantages in regard to flexibility for different hardware platforms.

The partial list of hardware platforms on which Linux can run are listed below: Intel x86/x64 Itanium Mainframe (S/390) ARM Alpha MIPS M68K PA-RISC SPARC UltraSPARC PowerPC Linux can be customized to work on mobile and embedded devices.

Erosion.

The process of moving a program to another computer was called

d. Run chown and list the root user as the new owner.

The root user utilizes the chgrp command to give ownership of a file to another user. What must the root user do to regain ownership of the file? a. Run chgrp again listing the root user as the new owner. b. Nothing, because this is a one-way, one-time action. c. Have the new owner run chgrp and list the root user as the new owner. d. Run chown and list the root user as the new owner.

Output of echo The total is $100.00

The total is 00.00 Parameter expansion substituted an empty string for the value of $1 because it was an undefined variable. The shell provides a mechanism called quoting to selectively suppress unwanted expansions.

d. searches for a file only in directories that are in the PATH variable

The which command ________________. a. can only be used to search for executables b. searches for a file in all directories, starting from the root c. is not a valid Linux command d. searches for a file only in directories that are in the PATH variable

False

There is no real difference between the "S" and "s" special permissions when displayed using the ls -l command. One just means it is on a file and the other that it is on a directory. True or False?

What does this command do ? echo .[!.]*

This pattern expands into every filename that begins with only one period followed by any other characters. This will work correctly with most hidden files (though it still won't include filenames with multiple leading periods).

find

To locate text within a record that matches characters you type.

2. The operating system software is necessary for a computer to function. True or False?

True

A Linux Distribution uses the commonly developed Linux operating system kernel & libraries, yet was packaged with add-on software specific to a certain use.

True

After a typical Fedora Linux installation, over 700 different device files are in the /dev directory. True or False?

True

Can any existing directory can be used as a mount point?

True

Can several different devices share the same major number?

True

If the / filesystem becomes corrupted, the system is unstable and must be turned off. True False

True

If you boot your computer from Linux live media, you will be able to use a fully functional Linux system prior to installing Linux on permanent storage. True False

True

Linux has only one root directory per directory tree. True or False? True False

True

Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project.​ True False

True

RAID level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance and allows up to two simultaneous hard disk drive failures while remaining fault tolerant

True

SCSI devices that act as a gateway are associated with a unique Logical Unit Number (LUN)

True

T/F - A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator.

True

T/F - It is good form to check the installation log files after installation as well as verify settings on the system after installation to ensure that all hardware was detected with the correct values.

True

T/F - Linux uses a logical directory tree to organize files into different folders.

True

T/F - Normally, kickstart files are text files.

True

T/F - RAID level 3 requires a minimum of three hard disk drives to function.

True

T/F - The more command should not be used on binary files.

True

T/F - The most common way to search for information using regular expressions is the grep command.

True

T/F - The three characters following a period in a file name are referred to as the filename extension.

True

T/F - To perform a Linux installation over a network, you can connect to a server with the appropriate installation files via FTP.

True

T/F - You can use a small bootable Linux kernel to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers.

True

T/F. AT&T Bell Laboratories, by court order, could not market UNIX so it sold it to several different companies and gave the source code to certain universities.

True

T/F. After being recompiled into machine language, all programs look the same to the computer operating system, regardless of the programming language from which they were written.

True

T/F. All distributions may appear different on the surface, but they run the same kernel and utilities.

True

T/F. Although a variety of software can be used to modify the appearance of Linux, the underlying kernel is common to all versions of Linux.

True

T/F. Any software published under the GPL license must be freely available with its source code. Any modifications made to the source code must be redistributed as well, keeping the software free forever.

True

T/F. Beowulf clustering is the most common method of Linux clustering.

True

T/F. Clustering computers often results in better scalability than adding processors to a single computer.

True

T/F. Ken Thompson, who had worked at AT&T Bell Laboratories on the MULTICs operating system, continued to experiment with operating systems after MULTICs was abandoned and developed an operating system called UNIX in 1969.

True

T/F. Linux is simply a by-product of OSS development.

True

T/F. Linux is well-suited for centrally sharing resources on a file and print server. It is more economical to share files and printers over a network. It is inherently fast and light. A distribution specific to a certain task can be installed on the central server.

True

T/F. Most Web servers do not provide means for users to communicate with each other.

True

T/F. Most distributions ship with a GUI that can be further customized to suit the needs of the user.

True

T/F. OSS products are designed with the betterment of software in mind.

True

T/F. Originally, UNIX was written in PDP-7 assembly language.

True

T/F. Shortly after, Dennis Ritchie, who also worked at AT&T Bell Laboratories, created the C programming language. The C programming language was a revolutionary language. Most programs at this time had to be specifically written to the hardware of a particular computer. Using the C programming language, it was easy to move programs to other computer systems.

True

T/F. The GNU project to make a free operating system never really took off.

True

T/F. The Linux OS is used to run a variety of applications on a variety of different hardware. It allows multiple users to access the system simultaneously. It has the ability to manage thousands of tasks at the same time. Hence, it is referred to as a multiuser and multitasking OS.

True

T/F. The Linux kernel versions are composed of a major number, a minor number and a revision number, i.e., 2.5.9. The major number is 2, the minor number is 5 and the revision number is 9.

True

T/F. The Linux kernel was developed collaboratively and was centrally managed.

True

T/F. The UNIX operating system was rewritten in the C programming language.

True

T/F. The concept of open source software (OSS) enables software developers to read the source code of other programmer's software and modify that source code to make the program better. The new source code can then be redistributed to other developer's who might improve the new source code further. Software developers learn new techniques from others.

True

T/F. The format and structure of source code follows certain rules defined by the programming language in which the program was written.

True

T/F. The most common proxy server used on Linux is Squid.

True

T/F. The scientific and engineering community often needs customized programs. Open source software programs can be used or modified to fit the needs of the user. OSS software exists for but is not limited to the following: physics, astrophysics, biophysics, fluid dynamics and geophysics, biocomputation, materials and polymer chemistry, general mathematics and optimization, data mining, number theory, computer/linear/array algebra, statistics and regression analysis, computer modeling, artificial intelligence, oceanography, etc.

True

T/F. To edit an existing program, you must edit the source code and recompile it.

True

T/F. Torvalds had published Linux under the GNU public license (GPL).

True

T/F. UNIX evolved from Multiplexed Information and Computing Service (MULTICS) which was a test project intended to reveal better ways of developing time-sharing operating systems. The MULTICS Project was abandoned in 1969.

True

T/F. Web servers can also process programs known as Common Gateway Interface (CGI) scripts and provide secure connections such as Single Socket Layer (SSL).

True

The SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file.

True

The cpio command has the ability to handle long filenames and can be used to back up device files.​ True False

True

The database for the locate command can be updated manually by using the updatedb command.

True

The lvextend command can be used to add additional unused space within a volume group to an existing logical volume.

True

The lvextend command can be used to add additional unused space within a volume group to an existing logical volume. True or false

True

The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations. True False

True

When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD.

True

You can use a small bootable Linux kernel (such as on a LiveCD) to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers.

True

You can use wildcard metacharacters with the find command. True False

True

Vi command: u

Undo previous command

A user mounts a device to a mount point directory and realizes afterward that there are files previously found within the mount point directory that are needed. What would this user do?

Unmount the device from the directory

A user mounts a device to a mount point directory and realizes afterward that there are files previously found within the mount point directory that are needed. What would this user do? a. Nothing; the files are lost and cannot ever be accessed. b. Unmount the device from the directory. c. Run the fsck command to recover the file. d. Nothing; the files could not have been there as you can only mount to empty directories. e. Look in the lost+found directory for the file.

Unmount the device from the directory

A user mounts a device to a mount point directory and realizes afterward there are files previously found within the mount point directory that are needed. What should the user do?

Unmount the device from the directory

gunzip

Unzips a .gz file

unzip

Unzips a zip file

sudo apt update

Updates the list of possible applications to install

You find that a device file in the /dev directory has become corrupted. You know that this device is /dev/tty3 and that it is a character device file. What should you do?

Use the /dev/MAKEDEV cmd to re-recreate the file

You find that a device file in the /dev directory has become corrupted. You know that this device is /dev/tty3 and that it is a character device file. What should you do?

Use the /dev/MAKEDEV command to re-create the file

Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his machine. Before he can use them for data storage and retrieval, what must he do?

Use the fdisk command to create one or more partitions on each of the hard disk drives mount any partitions created on the two hard drives so that they are accessible by the operating system Format any partitions created with a valid filesystem recognized by Linux

Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his machine. Before he can use them for data storage and retrieval, what must he do? a. Mount a filesystem to each of the hard disk drives. b. Mount any partitions created on the two hard drives such that they are accessible by the operating system. c. Use the vi editor to edit /etc/mtab and create an entry for the controller card and the hard disk drives. d. Mount the two hard drives so they are accessible by the operating system. e. Remove the format of any partitions created with a valid filesystem recognized by Linux. f. Use the btrfs command to create one or more partitions on each of the hard disk drives.

Use the fdisk command to create one or more partitions on each of the hard disk drives mount any partitions created on the two hard drives so that they are accessible by the operating system Format any partitions created with a valid filesystem recognized by Linux (FROM TEST Mount any partitions created on the two hard drives such that they are accessible by the operating system)

After typing the ls -F command, you see the following line in the output: -rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1 What does this mean?

User1 has read and write permissions, members of the root group have read and execute permissions, and all others have read permissions on the file

Which of the following statements regarding LVM structure are correct?

VG's are composed of one or more PV's

Which of the following statements regarding LVM structure is correct?

VGs are composed of one or more PVs

Which of the following statements regarding LVM structure is correct? a. VGs are comprised of one or more PVs b. PVs are collections of VGs c. LVs are created from the free space available within PVs d. PVs use the space within LVs to create VGs

VGs are composed of one or more PVs

getent password

View all users that have access to the LDAP system

crontab -l

View personal crontab jobs

What term describes the physical hardware and the underlying operating system upon which a virtual machine runs?​

Virtual Host

c. execute, read, write

What are the three standard Linux permissions? a. full control, read-execute, write b. read, write, modify c. execute, read, write d. read, write, examine

b. spools and log files

What does the /var directory contain? a. various additional programs b. spools and log files c. temporary files d. files that are architecture independent e. local variance devices

c. It moves a directory. d. It moves a file.

What does the mv command do? (Choose all that apply.) a. It makes a volume. b. It makes a directory. c. It moves a directory. d. It moves a file.

e. Just type cp or mv, because they run in interactive mode by default.

What must a user do to run cp or mv interactively and be asked if she wants to overwrite an existing file? a. There is no choice, because the new file will overwrite the old one by default. b. Type interactive cp or interactive mv. c. Type cp -i or mv -i. d. Type cp -interactive or mv -interactive. e. Just type cp or mv, because they run in interactive mode by default.

c. FHS

What was created to define a standard directory structure and common file location for Linux? a. FSH b. X.500 c. FHS d. root directory

a. causes all new files created in the directory to have the same group membership as the directory, and not the entity that created them

When applied to a directory, the SGID special permission ________________. a. causes all new files created in the directory to have the same group membership as the directory, and not the entity that created them b. cannot be used, because it is applied only to files c. allows users to use more than two groups for files that they create within the directory d. causes users to have their permissions checked before they are allowed to access files in the directory

d. the data in the file you modified as well as the data in all hard-linked files are modified,

When you change the data in a file that is hard-linked to three others, ________________. a. only the data in the file you modified is affected b. only the data in the file you modified and any hard-linked files in the same directory are affected c. the data in the file you modified and the data in all hard-linked files are modified, because they have different inodes d. the data in the file you modified as well as the data in all hard-linked files are modified, because they share the same data and all have the same inode and file size

b. mv

Which command do you use to rename files and directories? a. cp b. mv c. rn d. rename

a. chown user1:root file1

Which of the following commands will change the user ownership and group ownership of file1 to user1 and root, respectively? a. chown user1:root file1 b. chown user1 : root file1 c. This cannot be done, because user and group ownership properties of a file must be modified separately. d. chown root:user1 file1 e. chown root : user1 file1

What is expansion?

With expansion, we enter something, and it is expanded into something else before the shell acts upon it. example: echo * will not print * but it will expand into listing all files of current directory.

Permissions- w

Write to a file 2

Vi command: y

Yanks text (copy text into cut buffer)

To display the line number of each line in a file, in addition to its contents, would you use the cat -n command?

Yes

When using the less command, can you use the cursor keys on the keyboard to scroll up and down the contents of the file?

Yes

What is the term for a ZFS managed filesystem that is created from ZFS pools?

ZFS volume

What is the term for a ZFS managed filesystem that is created from ZFS pools?​

ZFS volume

19. Using wildcard metacharacters, how can you indicate a character that is NOT a or b or c or d?

[!a-d]

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?

[1-4]

What operator below is known as the NOT operator? a.​ ! b. -a c. -o d. %

a. !

The ____ regular expression metacharacter matches 0 or more occurrences of the previous character. a. * c. + b. ? d. ^

a. *

When used with the uncompress command, what option displays the contents of the compress file to Standard Output? a. -c b. -r c. -f d. -v

a. -c

What option can be added to the rpm command in order to query packages?​ a. -q b. -v c. -i d. -h

a. -q

Which sar command option is used to display statistics for the processor queue? a. -q b. -v c. -c d. -r

a. -q

What option, when added to the rm command, is commonly referred to as the -resume option? a. -r b. -i c. -f d. -d

a. -r

What file in the /proc directory contains information about a computer's CPU?​ a. /proc/cpuinfo b. /proc/meminfo c. /proc/cpu_info d. /proc/proc_info

a. /proc/cpuinfo

You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?​ a. /var/log/boot.log b. /var/log/wtmp c. /var/log/messages d. /var/log/startup.log

a. /var/log/boot.log

What zone configuration file contains a PTR record used to identify the loopback adapter? a. /var/named/named.local b. /var/named/named.ca c. /etc/named.loop d. /etc/named.conf

a. /var/named/named.local

Which RAID level is also referred to as mirroring? a. 1 b. 5 c. 0 d. 4

a. 1

5. Which of the following kernels are developmental kernels? (Choose all that apply.) a. 2.3.4 b. 2.5.5 c. 2.2.7 d. 2.4.4

a. 2.3.4 and b. 2.5.5

Which of the following kernels are developmental kernels? (Choose all that apply.) a. 3.5.5 b. 3.2.7 c. 3.4.4 d. 3.3.4

a. 3.5.5 d. 3.3.4

Which RAID level uses striping with parity? a. 5 b. 2 c. 1 d. 4

a. 5

The ____ symbol indicates a linked file. a. @ c. & b. * d. =

a. @

Which of the following are characteristics of Open Source Software? (Choose all that apply.) a. Any bugs are fixed quickly. b. The software is developed collaboratively. c. The source code for software is available for a small fee. d. The value of the software is directly related to its price.

a. Any bugs are fixed quickly. b. The software is developed collaboratively.

What is the most common open source Web server available for Linux? a. Apache b. pine c. Samba d. Squid

a. Apache

12. Which two people are accredited with creating the UNIX operating system? (Choose two answers.) a. Dennis Ritchie b. Richard Stallman c. Linus Torvalds d. Ken Thompson

a. Dennis Ritchie d. Ken Thompson

17. Which common GUI environments are available in most Linux distributions? (Choose all that apply.) a. GNOME b. CDE c. KDE d. RPM

a. GNOME c. KDE

After typing the ls -a command, you notice that there is a file whose filename begins with a dot ( . ). What does this mean? a. It is a hidden file. b. It is a system file. c. It is a file in the current directory. d. It is a binary file.

a. It is a hidden file.

After typing the ls -F command, you notice a filename that ends with an * asterisk character. What does this mean? a. It is an executable file. b. It is a special device file. c. It is a hidden file. d. It is a linked file.

a. It is an executable file.

10. What are some good reasons for using Linux in a corporate environment? (Choose all that apply.) a. Linux software is unlikely to become abandoned by its developers. b. Linux is secure and has a lower total cost of ownership than other operating systems. c. Linux is widely available for many platforms and supports many programming languages. d. Most Linux software is closed source.

a. Linux software is unlikely to become abandoned by its developers. b. Linux is secure and has a lower total cost of ownership than other operating systems. c. Linux is widely available for many platforms and supports many programming languages.

7. Many types of software are available today. Which type of software does Linux represent? a. Open Source Software b. closed source software c. freeware d. shareware

a. Open Source Software

Who formed the Free Software Foundation to promote open development? a. Richard Stallman b. Ken Thompson c. Dennis Ritchie d. Linus Torvalds

a. Richard Stallman

After typing the ls -F command, you see the following line in the output: -rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1 What does this mean? a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file. b. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. c. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file. d. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file.

a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.

What is the term for a ZFS managed filesystem that is created from ZFS pools?​ a. ZFS volume b. ZFS store c. ZFS lake d. ZFS vault

a. ZFS volume

Which of the following could result in a segmentation fault (fatal signal 11) during a Fedora installation? a. all of the above b. improper device driver c. overclocked CPU d. RAM problems

a. all of the above

What two NTP daemons below are commonly used on Linux systems? Select one or more: a. chronyd b. ntpd c. timed d. sntpd

a. chronyd b. ntpd

What two commands below can be used to modify the password expiry information and a user's default shell? Select one or more: a. chsh b. chexp c. chage d. shellmod

a. chsh c. chage

In an if construct, what statements are optional?​ Select one or more: a. else b. then c. elif d. fi

a. else c. elif

What two commands below can display memory information and swap usage? Select one or more: a. free b. swap_stat c. vmstat d. memtop

a. free c. vmstat

What two commands below can be used to stop a process, either by PID number or process name?​ Select one or more: a. kill​ b. end c. killall d. stop

a. kill​ c. killall

Linux is __________ and __________ operating system. a. multiuser, multitasking b. processing, closed source c. production, stable d. large, useful

a. multiuser, multitasking

Which command do you use to rename files and directories? a. mv b. rename c. rn d. cp

a. mv

18. Which of the following are factors that determine which Linux distribution a user will use? (Choose all that apply.) a. package manager support b. hardware platform c. kernel features d. language support

a. package manager support b. hardware platform c. kernel features d. language support

What two FTP commands below can be used to close the ftp utility?​ Select one or more: a. quit b. exit c. close d. bye

a. quit d. bye

A special device file is used to ___________. a. represent hardware devices such as hard disk drives and ports b. enable proprietary custom-built devices to work with Linux c. do nothing in Linux d. keep a list of device settings specific to each individual user

a. represent hardware devices such as hard disk drives and ports

The environment variables that are set by default and their current values can be viewed with what command? a. set b. get c. env d. setenv

a. set

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. sixth b. first c. second d. fifth

a. sixth

What does the /var directory contain? a. spools and log files b. local variance devices c. various additional programs d. temporary files

a. spools and log files

​Select the two commands below that can be used to prepare a swap partition and then enable it for use: Select one or more: a. swapon b. swapit c. mkswap d. mkfs.swap

a. swapon c. mkswap

14. Which culture embraced the term GNU (GNU's Not UNIX) and laid the free software groundwork for Linux? a. the hacker culture b. the MIT culture c. the cracker culture d. the Artificial Intelligence culture

a. the hacker culture

4. The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need to have support in Linux for new hardware b. when you need another user interface c. when you need to increase the stability of Linux d. when you need to use kernel modules

a. when you need to have support in Linux for new hardware, and c. when you need to increase the stability of Linux

The ____ metacharacter can also be used to refer to the current user's home directory. a. ~ c. & b. @ d. #

a. ~

What two resource record types map FQDNs to IPv4 and IPv6 addresses respectively?​ Select one or more: a. AAAA b. CNAME c. A d. NS

a. ​AAAA c. A

Output of echo a{A{1,2},B{3,4}}b

aA1b aA2b aB3b aB4b

addgroup "groupname"

add a group to the system

adduser "username"

add a user to the system

addgroup "username" "groupname"

adds a user to a group

News servers

allow users to post messages in forums called Newsgroups and allow other users to read and reply to those messages.

Open Source Software (OSS)

are programs that are distributed and licensed so that the source code is available to anyone who wants to examine, utilize or improve upon it.

System Services

are the applications that handle system-related tasks such as printing, scheduling programs and managing network access.

File Transfer Protocol

are the most common and efficient method for transferring files over the Internet.

(n) _________________________ specifies the parameters that tailor a command to the particular needs of the user.

argument

added to a ch or ls command for attributes?

attr

What two characters below should not be used in filenames?​ Select one or more: a. _ b. $ c. ​. d. *

b. $ d. *

Select the two ​filename extensions that are associated with C++ programming language source code files: Select one or more: a. .c b. .cpp c. .cc d. .c++

b. .cpp c. .cc

Under the root directory in Linux, which directory contains system commands and utilities? a. /opt b. /usr c. /var d. /boot

b. /usr

The first software RAID volume on a system will​ use a multiple disk device file that starts with what number? a. 255 b. 127 c. 254 d. 128

b. 127

In what year was the source code for the Linux kernel released? a. 1987 b. 1991 c. 1993 d. 1990

b. 1991

How many different kill signals can be sent by the kill command to a given process? a. 32 b. 64 c. 128 d. 16

b. 64

Each octet in an IP address represents a binary number consisting of how many bits / bytes? a. 4-bit b. 8-bit c. 4-byte d. 8-byte

b. 8-bit

Each octet in an IP address represents a binary number consisting of how many bits / bytes? a. 8-byte b. 8-bit c. 4-byte d. 4-bit

b. 8-bit

19. What is the most common open source Web server available for Linux? a. Samba b. Apache c. Quid d. pine

b. Apache

To which license does Linux adhere? a. Artistic license b. GNU General Public License c. Free source license d. Open license

b. GNU General Public License

Which of the following statements are true? (Choose all that apply.) a. Soft limits can never be exceeded b. Hard limits can never be exceeded c. Hard limits allow a user to exceed them for a certain period of time d. Quotas can limit both user space and the number of files a user can own. e. Soft limits allow a user to exceed them for a certain period of time

b. Hard limits can never be exceeded d. Quotas can limit both user space and the number of files a user can own. e. Soft limits allow a user to exceed them for a certain period of time

What does the mv command do? (Choose all that apply.) a. It makes a directory. b. It moves a directory. c. It moves a file. d. It makes a volume.

b. It moves a directory. c. It moves a file.

Which common GUI environments are available in most Linux distributions? (Choose all that apply.) a. CDE b. KDE c. RPM d. GNOME

b. KDE d. GNOME

What Linux distribution is the most commonly used distribution within organizations today? a. Debian b. Red Hat c. Mandrake d. SuSE

b. Red Hat

If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below: a. SIGTERM b. SIGHUP c. SIGINT d. SIGQUIT

b. SIGHUP

If you type enough unique letters of a directory and press ____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information. a. Alt c. Ctrl b. Tab d. Esc

b. Tab

8. Which of the following are characteristics of Open Source Software? (Choose all that apply.) a. The value of the software is directly related to its price. b. The software is developed collaboratively. c. The source code for software is available for a small fee. d. Any bugs are fixed quickly.

b. The software is developed collaboratively and d. Any bugs are fixed quickly.

​What two Linux distributions below utilize the Debian package manager by default? Select one or more: a. SUSE Linux b. Ubuntu Linux c. Linux Mint d. Red Hat Linux

b. Ubuntu Linux c. Linux Mint

Assistive technologies are configured using what utility on Fedora 20 in GNOME?​ a. Accessibility b. Universal Access c. Access Helper d. Usability

b. Universal Access

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4? a. 1-4 c. [1234] b. [1-4] d. [1,2,3,4]

b. [1-4]

To move from the /home/joe/test/data to the /home/joe directory, use the ____ command. a. cd .. c. /home/joe b. cd ../.. d. cd ./..

b. cd ../..

The tac command _________. a. displays the contents of a file in reverse order last word on the line first and first word on the line last b. displays the contents of a file in reverse order last line first and first line last c. displays the contents of hidden files d. is not a valid Linux command

b. displays the contents of a file in reverse order last line first and first line last

Which of the following is NOT a piece of information that the Fedora installation program prompts you for? a. installation destination b. firewall settings c. keyboard layout d. time zone

b. firewall settings

​What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on? a. switch b. for c. while d. case

b. for

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file? a. o+r-w b. g+r-w c. u+r+w d. g-r+w

b. g+r-w

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​ a. grub-compile b. grub-mkconfig c. grub-config d. grub2-install

b. grub-mkconfig

elect below the command and the associated alias available on most Linux systems that displays ​a long listing for each file in a directory? Select one or more: a. ls -F b. ll c. ls -l d. lf

b. ll c. ls -l

In order to send a print job to a printer using CUPS, what command must be used? a. print b. lp c. pl d. pr

b. lp

Which command is used to format a partition on a hard disk drive with the ext4 filesystem? a. format_ext4 device b. mkfs -t ext4 device c. makeext4FS device d. ext4mkfs device

b. mkfs -t ext4 device

3. Linux is a ___________ and ___________ operating system. a. production, stable b. multiuser, multitasking c. processing, operating d. large, useful

b. multiuser, multitasking

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. groupmod b. newgrp c. newgroup d. groupadd

b. newgrp

Which of the following commands can be used to create partitions on either a MBR or GPT hard disk? a. gdisk b. parted c. fdisk d. cfsck

b. parted

The ____ command will confirm the system directory that you are currently in. a. dir c. whereami b. pwd d. ld

b. pwd

The default permissions given by the system prior to analyzing the umask are ___________for directories, and __________ for files. a. rw-rw-rw- and rwxrwxrwx b. rwxrwxrwx and rw-rw-rw- c. rw-rw-rw- and rw-rw-rw- d. rw-rw-rw- and r--r--r--

b. rwxrwxrwx and rw-rw-rw-

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a: a. DBMS b. tarball c. router d. package manager

b. tarball

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a: a. package manager b. tarball c. router d. DBMS

b. tarball

In order to quickly create an empty file, what command can be used?​ a. echo file1 b. vim file1 c. create file1 d. touch file1

b. vim file1

The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need another user interface b. when you need to increase the stability of Linux c. when you need support in Linux for new hardware d. when you need to use kernel modules

b. when you need to increase the stability of Linux c. when you need support in Linux for new hardware

​What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively? Select one or more: a. -e b. -Z c. -z d. -u

b. ​-Z c. -z

When performance issues arise, you can compare the output of performance utilities to the _________ values found in the system log book.

baseline

Which two problems below are typically seen on large systems that write large amounts of data to a non-ZFS filesystem?

bit rot ​misdirected writes

Which prompt does the root user receive when logged in to the system? a. ! b. @ c. # d. $

c. #

Which prompt do regular users receive when logged in to the system? a. ! b. @ c. $ d. #

c. $

To view a list of files and their type, use the ____ switch to the ls command. a. -T c. -F b. -L d. -l

c. -F

Linux servers are typically installed in a rack using rackmount server hardware. Which of the following is used to describe the minimum height of a rackmount server? a. Series A b. Level 5 c. 1U d. Type A

c. 1U

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?​ a.​ 23 b. ​827 c. 514 d. 1012

c. 514

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics? a. x b. $ c. Ctrl+g d. P

c. Ctrl+g

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?​ a. dd b. Ctrl+a c. Ctrl+k d. Ctrl+d

c. Ctrl+k

9. To which license does Linux adhere? a. open license b. artistic license c. GNU Public License d. free source license

c. GNU Public License

What must a user do to run cp or mv interactively and be asked if she wants to overwrite an existing file? a. There is no choice as the new file will overwrite the old one by default. b. Type cp -i or mv-i. c. Just type cp or mv as they run in interactive mode by default. d. Type interactive cp or interactive mv.

c. Just type cp or mv as they run in interactive mode by default.

16. When the core components of the Linux operating system are packaged together with other Open Source Software, it is called a: a. new kernel b. new platform c. Linux distribution d. GNU Project

c. Linux distribution

How can a user switch from insert mode to command mode when using the vi editor? a. Type in a : character b. Press the Del key c. Press the Esc key d. Press the Ctrl+Alt+Del keys simultaneously

c. Press the Esc key

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Alt b. Ctrl c. Tab d. Esc

c. Tab

Which of the following commands will change the user ownership and group ownership of file1 to user1 and root respectively? a. chown root:user1file1 b. chown user1 : root file1 c. chown user1:root file1 d. chwon root : user1file1

c. chown user1:root file1

What character is used to delimit most Linux configuration files? a. tab b. semicolon c. colon d. space

c. colon

What command can be used to view what shared libraries are required by a certain program? a. ldlist b. showlibs c. ldd​ d. ​ldconfig

c. ldd​

When displaying a large text file, what two commands provide the ability to show text in a page by page fashion?​ a. buffer b. paged​ c. less d. more

c. less d. more

1. Every computer consists of physical components and logical components. The logical components of a computer that understand how to work with the physical components are referred to as: a. hardware b. records c. software d. processors

c. software

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes? Select one or more: a. kthreadd b. syslogd c. systemd d. init

c. systemd d. init

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called? a. device ID b. SCSI controller c. target ID d. SCSI number

c. target ID

Most files on a Linux system that contain configuration information are ____ files. a. system c. text b. directory d. program

c. text

How many DNS servers can be configured in the /etc/resolv.conf file? a. two b. five c. three d. four

c. three

What two commands can be used to show information about physical volumes and logical volumes respectively?​ Select one or more: a. ​showvg b. showlv c. ​lvdisplay d. vgdisplay

c. ​lvdisplay d. vgdisplay

A calendar for the current month can be shown on the command line by issuing which command?

cal

You want to see the filesystems that are presently in use on the system. What command could you use?

cat /etc/mtab

20. A user typed in the command pwd and saw the output: /home/jim/sales/pending. How could that user navigate to the /home/jim directory?

cd ../..

To move from the /home/joe/test/data to the /home/joe directory, use the _____ command.

cd ../..

5. If a user's current directory is /home/mary/project1, which command could she use to move to the etc directory directly under the root?

cd /etc

cd "directory name"

changes to the specified directory

8. The vi editor can function in which two of the following modes? (Choose both that apply.)

command insert

zip

compressed file to a .zip file

mount

connects a file system to a point in the root file system

Hardware

consists of the physical components inside a computer and are electrical in nature.

/etc/passwd

contains usernames, user Ids, and comments on the user

Errors on a filesystem are often referred to as filesystem as?

corruption

Select the iptables option that specifies the destination address of packets for a rule: a. -D b. -L c. -F d. -d

d. -d

Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? /dev/sda1 / ext4 defaults 1 1 none /dev/pts devpts gid=5,mode=620 1 0 none /proc proc defaults 0 1 none /dev/shm tmpfs defaults 1 0 /dev/sdc2 swap swap defaults 0 1 /dev/dvd /media/dvd iso9660 noauto,ro 0 0 /dev/fd0 /media/floppy auto noauto 0 0 a. none, as fsck must be run manually for each filesystem b. /, /dev/pts and /dev/shm c. all of them, as fsck is run automatically at boot for all filesystems d. /, /proc and swap

d. /, /proc and swap

In what year was the source code for the Linux kernel released? a. 1990 b. 1993 c. 1987 d. 1991

d. 1991

In order to redirect a file to the standard input of a command, what metacharacter should be used? a.| b.# c.> d.<

d. <

When issuing the ls -F command, what special character indicates a linked file? a. * b. & c. = d. @

d. @

What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document? a. DocumentRoot index.html b. UseIndex index.html c. Index index.html d. DirectoryIndex index.html

d. DirectoryIndex index.html

What service provides a method for the efficient transfer of files over the Internet? a. Telnet b. HTML c. SMTP d. FTP

d. FTP

What software type is software that is distributed free of charge, but the source code is not available? a. Shareware b. Open source software c. Close source software d. Freeware

d. Freeware

Which of the following is the greatest expense for companies using Linux? a. Additional software b. Software upgrades c. Operating system cost d. Hiring people to maintain the Linux system

d. Hiring people to maintain the Linux system

What DNS resource record type is used to provide the IP address for the e-mail server for a zone?​ a. CNAME b. NS c. SOA d. MX

d. MX

The mutt software is an example of what type of mail service software on Linux?​ a. ​Mail Delivery Agent b. Mail Transfer Agent c. Mail Transport Agent d. Mail User Agent

d. Mail User Agent

Proxy servers keep track of the information passed to each client by maintaining what type of table?​ a.​ routing b. firewall c. caching d. Network Address Translation (NAT)

d. Network Address Translation (NAT)

What option can be used in the journald configuration file to specify a file size limit to the event log?​ a. Max_file_size b. SizeLimit c. Journal_Limit d. SystemMaxUse

d. SystemMaxUse

You noticed a file in your home directory that has a + symbol appended to the mode. What does this indicate?

d. additional entries exist within the ACL of the file that can be viewed using the getfac1 command

11. Which of the following are common methods for gaining support for Linux? a. HOWTO documents at http://www.linuxdoc.org b. a local Linux User Group c. Internet newsgroups d. all the above

d. all the above

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below? a. grep b. nl c. sed d. awk

d. awk

To display the contents of a file called data, use the command ____. a. disp data c. ls -l data b. ls data d. cat data

d. cat data

In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued? a. cd .. b. cd ./.. c. /home/joe d. cd ../..

d. cd ../..

After a background process has been started, what command below can be used to move it to the foreground? a. b2f b. fgnd c. fgd d. fg

d. fg

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file? a. u+r+w b. g-r+w c. o+r-w d. g+r-w

d. g+r-w

What utility in the sysstat package measures the flow of information to and from disk devices?​ a. drivemon b. iodump c. mpstat d. iostat

d. iostat

Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called?​ a. dumping b. hiccuping c. flooding d. jabbering​

d. jabbering​

Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat

d. lpstat

6. A production kernel refers to a kernel whose: a. revision number is even b. minor number is odd c. major number is odd d. minor number is even

d. minor number is even

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database? a. alias b. mail c. sendmail d. newaliases

d. newaliases

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. PID b. process flag c. process priority d. process state

d. process state

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwd b. passwdconv c. pwdcv d. pwconv

d. pwconv

In what filesystem are most of the operating system files contained? a. boot b. data c. mnt d. root

d. root

What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file? a. execute b. sticky bit c. read d. write

d. write

Which is an extended regular expression metacharacter? a. . c. ^ b. [...] d. {}

d. {}

Select the escape sequence that starts a new line when used with echo: a. \a b. \r c. \\ d. \n

d. ​\n

The easiest method for monitoring free space by mounted filesystems is to use which command?

df

Which command below provides the easiest method for monitoring free space on mounted filesystems?

df

Which command below provides the easiest method for monitoring free space on mounted filesystems? - du - df - fs - fd

df

Which command is used to display the amount of free space that exists on a filesystem?

df

Which command is used to display the amount of free space that exists on a filesystem? a. du b. df c. quota d. fsck

df

Which cmd is used to display the amount of free space that exists on a filesystem?

df (disk free)

2>/dev/null

discard stderr error messages by redirecting to /dev/null

What does the command dumpe2fs -h do? a. is not a valid command b. displays the number of inodes used and available in an ext2 filesystem c. backs up an ext2 filesystem d. dumps an ext2 filesystem

displays the number of inodes used and available in an ext2 filesystem

!"number"

does the command back however many of the number specified

Select the command below that shows the size of a directory and its contents in kilobytes:​ - du - sizeof - df - dir

du

General syntax for using echo arithmetic operations

echo $((expression))

Example of tilde expansion?

echo ~ (defaults to home dir) echo ~username (list the home dir of username)

The quotas for certain users can be edited by using which command?

edquota

The quotas for certain users can be edited by using which command? - chquota - usrquota - repquota - edquota

edquota

The _____ displays lines of text that match extended regular expressions.

egrep command

After a shell is no longer needed, what command can be given to exit the shell?

exit

tar -xvf

extracts a tar file

Select the command that can be used to create partitions that will be stored in an MBR after installation: - fdisk - formatdisk - partition - format

fdisk

Which command is used to create partitions?

fdisk

/etc/fstab (filesystem table)

file is used to mount devices at boot time and it is also consulted when users do not specify enough arguments with the mount command

13. What will the following wildcard regular expression return: file[a-c]?

filea, fileb, filec

Errors on a filesystem are common on most filesystems. What do these errors indicate?

filesystem corruption

Errors on a filesystem are common on most filesystems. What do these errors indicate? a. filesystem corruption b. raid degradation c. hard drive failures d. filesystem breaks

filesystem corruption

Creating a filesystem on a device is commonly referred to as?

formatting

What command can be used to check different kinds of filesystems on Linux for errors?

fsck

What command can be used to check different kinds of filesystems on Linux for errors? - chkdsk. - errorchk - fs_check - fsck

fsck

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?

g+r-w

The _____________ command can be used to create and work with up to 128 primary partitions on a GPT hard disk using an interface that is nearly identical to fdisk.​

gdisk

​What two commands below can be used to edit a GPT based hard disk's partitions? (Select 2 answers) - gdisk - parted - fdisk - gtpedit

gdisk, parted

The ____ editor is functionally analogous to the Windows Wordpad and Notepad editors. a. XEmacs c. Emacs b. vi d. gedit

gedit

cd ..

goes back one directory

The _____ displays the first ten lines of a text file.

head command

The file .file.dat is an example of a _____ file.

hidden

When a user logs into their Linux system, he is placed in the _____ directory.

home

____ is a remote disk to which a computer connects using iSCSI.

iSCSI target

What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk?

iSCSI target iSCSI initiator

The GUI Environment

includes X Windows in combination with a window manager and desktop environment.

Kommon Desktop Environment (KDE)

is a GUI environment in Linux that was written in the C++ programming language and uses the qt toolkit.

A Database Management System (DBMS)

is a collection of programs and tools designed to allow for the creation, modification, manipulation, maintenance and access of information from databases.

A Graphical User Interface (GUI)

is a component of an OS that provides a user-friendly interface.

User Interface

is a program that accepts user input indicating what is to be done, forwards this input to the operating system for completion, and, after it is completed, gives the results back to the user.

A Mail User Agent (MUA)

is a program that allows e-mail to be read by a user.

A CGI

is a program that runs on the Web server and enables connections to a resource running on another server on the network not connected to the Internet, such as a database.

SSL

is a secure method of communicating with a web server in which the information passing between the client computer and the Web server is encrypted to keep it secure.

A Mail Deliver Agent (MDA)

is a service that downloads e-mail from the e-mail server.

A Package Manager.

is a software system that installs and maintains software. It keeps track of installed software, requires a standard format and documentation, and can manage and remove software from a system by recording all relevant software information in a central software database on your computer. It is similar to the Add/Remove Programs applet in Windows

A(n) Artistic License

is an OSS license that ensures that the source code of the program is freely available, yet allows the original author of the source code some control over the changes made to it.

A Linux User Group (LUG) is an open forum of Linux users who discuss and assist each other in using and modifying the Linux OS.

is an open forum of Linux users who discuss and assist each other in using and modifying the Linux OS....

Closed Source Software

is software in which the source code is not available and is usually quite costly.

A Cracker

is someone who illegally uses computers for personal benefit or to cause damage.

A Hacker

is someone with the intent to expand their computing knowledge through experimentation.

ps

lists current processes of the current user

pstree

lists parent child process relationships

Select the file in the /proc directory that contains statistics on the performance of the processor:

loadavg

The ____ file in the /proc directory contains statistics on the performance of the processor.

loadavg

What command utilizes a premade database that contains a list of all the files on a system:

locate command

locate "text"

locate files with the strings specified

An extended partition can contain many subpartitions called?

logical drives

The _____ command can be used to provide a long listing for each file in a certain directory.

ls -l

output of ls -l two words.txt

ls: cannot access two: No such file or directory ls: cannot access words.txt: No such file or directory Word splitting caused this to be treated as two separate arguments rather than the desired single argument. To correct: ls -l "two words.txt"

Select the commands that can be used to extend a volume group and logical volume respectively:

lvextend and vgextend

​Select the commands that can be used to extend a volume group and logical volume respectively: (Select 2 answers) a. lvextend b. vgextend c. lvm_extend d. pgextend

lvextend, vgextend

mkdir

make a new directory

The apropos list command produces the same results as which command below?

man - k list

A Fully Qualified Domain Name (FQDN)

masks the IP addresses with user-friendly names.

What command is used to manage a software RAID configuration after installation?

mdadm

What command is used to manage a software RAID configuration after installation?​

mdadm

Select the utility below that when run will start and perform a thorough check of RAM for hardware errors:​

memtest86

Crontab format

min(0-59) hr(0-23) date(1-31) month(1-12) day(0-6, 0=Sunday) command

Select the command that can be used to check an ext2, ext3, or ext4 filesystem:​ a. mke2fs b. ext2fsck c. fdisk d. e2fsck

mke2fs

Which command is used to format a partition on a hard disk drive with the ext4 filesystem?

mke2fs -t ext4 device

Which command is used to format a partition on a hard disk drive with the ext4 filesystem? a. format_ext4 device b. e2mkfs -t ext4 device c. ext4mkfs device d. makeext4FS device

mke2fs -t ext4 device FROM TEST e2mkfs -t ext4 device

Select the two commands below that can be used to prepare a swap partition and then enable it for use:

mkswap and swapon

​Select the two commands below that can be used to prepare a swap partition and then enable it for use: (Select 2 answers) a. swapit b. mkswap c. ​swapon d. mkfs.swap

mkswap, swapon

Which command do you use to rename files and directories?

mv

The default permissions given by the system prior to analyzing the umask are ________ for directories and ________ for files.

rwxrwxrwx and rw-rw-rw-

<ctrl> r

search history

Each track on a hard disk is divided into ____________________ of information.

sectors

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

segmentation fault

A Mail Transfer Agent (MTA)

services is an e-mail server.

After logging into a terminal, a user will receive an interface known as which option below?

shell

date

shows current date and time

history

shows last 1,000 commands

w

similar to who but more verbose

A GNU Public License (GPL)

stipulates that the source code of any software published under its license must be freely available.

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called

target ID

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?

target ID

tar -tvf

tells what's in the tar file

To prevent signals from bouncing back and forth on a SCSI cable, each end of the cable must have a(n)________ to stop signals from being perpetuated.

terminator

When you change the data in a file that is hard-linked to three others, _________.

the data in the file you modified as well as the data in all hard-linked files are modified, because they share the same data and all have the same inode and file size.

The first floppy drive on the system is not responding. You enter the file /dev/fd0 command and receive the following output. What is the problem? [root@server1 root]# file /dev/fd0 /dev/fd0: ASCII text

the device file has become corrupt

The first floppy drive on the system is not responding. You enter the file /dev/fd0 command and receive the following output. What is the problem? [root@server1 root]# file /dev/fd0 /dev/fd0: ASCII text [root@server1 root]# a. The device file has become corrupt. b. The floppy drive is seen as a character device. c. There is no floppy disk in the drive. d. The floppy drive cable has come loose.

the device file has become corrupt

15. A user types in the command head /poems/mary. What will be displayed on the terminal screen?

the first 10 lines of the file mary

Data is read from physical hard drives in concentric circles known as which of the following?

tracks

Data is read from physical hard drives in concentric circles known as which of the following? a. blocks b. tracks c. sectors d. cylinders

tracks

The more command should not be used on binary files. (true/false)

true

The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations.

true

In Fedora 20, what terminal is used for graphical login?​

ttyl1 (:0)

Segmentation faults can sometimes be fixed by performing what two tasks below?

turn off CPU cache memory increase the number of memory wait states in BIOS

What file system below is used by software programs that write to a CD-RW or DVD-RW drive?

udf

What file system below is used by software programs that write to a CD-RW or DVD-RW drive? - udf - ntfs - hpfs - ext2

udf

What must you do to successfully run the fsck command on a filesystem?

umount the filesystem

What must you do to successfully run the fsck command on a filesystem? a. Choose yes when warned that running fsck on a mounted filesystem can cause damage. b. Unmount the filesystem. c. Run the fsck command with the -u option to automatically unmount the filesystem first. d. Ensure that the filesystem is mounted.

umount the filesystem

What must you do to successfully run the fsck cmd on a filesystem?

unmount the filesystem

bunzip2

unzips a .bz2 file

What mode corresponds to setting r-x:

user

UID

user ID

What two commands can be used to show information about physical volumes and logical volumes respectively?

vgdisplay and lvdisplay

What two commands can be used to show information about physical volumes and logical volumes respectively?​ (Select 2 answers) a. showvg b. showlv c. lvdisplay d. vgdisplay

vgdisplay, lvdisplay

​In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit? - w - s - q - d

w

The _____ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.

which

What permission grants a user the ability to open, read, and edit the contents of a file?

write

The ___________ command can be used to search Internet software repositories for RPM packages that map to your architecture, and automatically install or upgrade those packages on your system.

yum

The __________command can be used to search Internet software repositories for RPM packages that map to your architecture, and automatically install or upgrade those packages on your system.

yum

In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?

zfs get all

In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?​

zfs get all

The state and performance of a RAID-Z volume can be viewed using what two commands?

zpool iostat ​zpool status

Which is an extended regular expression metacharacter?

{}

What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output?

|

The _____ metacharacter can also be used to refer to the current user's home directory.

~

What directory under / contains the log files and spools for a Linux system?​

​/var

You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?​

​/var/log/boot.log


संबंधित स्टडी सेट्स

Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol

View Set

What is a partnership and how does it work

View Set

Quiz 20 Fundamentals of organizational structure

View Set

Chapter 14, Section 14.2: Computing Partial Derivatives Algebraically

View Set

Evidence for Evolution and Speciation

View Set

SPANISH 201 Lección 10 | Lesson Test

View Set