Linux+ Final Exam parts of Chapter 10-12
What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?
-F
A user account can be locked with the usermod command using what option?
-L
Which option to the dpkg command an be used to list the files that comprise a package?
-L
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?
-P
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?
-d -k
Which option to the rpm command can be used to remove a package from the system?
-e
What option can be added to the rpm command in order to query packages?
-q
What option can be added to the userdel command to remove the home directory of the target user?
-r
When compiling source code into a binary program, which command performs a system check and creates the Makefile?
./configure
Which filename extension indicates a tarball?
.tar.gz
Files with what two file extensions are commonly known as tarballs?
.tar.gz .tgz
Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?
/etc/login.defs
Which file holds the methods to be used and the order in which they will be applied for host name resolution?
/etc/nsswitch.conf
What is the name of the file that contains a listing of all users on the system and their home directories?
/etc/passwd
Which file stores the TCP/IP address of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC?
/etc/resolv.conf
Where is the skeleton directory located on most Linux systems?
/etc/skel
Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system?
/etc/sysconfig/network-scripts/ifcfg-eth0
On Linux, the root user always has a UID of what number?
0
What range of ports is considered to be "well-known"?
0-1023
A Class A network uses how many bits for the network ID and how many bits for the host ID?
8 24
IPv6 addresses are delimited by what character below?
:
What are two means available to resolve a host name to the appropriate TCP/IP address?
DNS /etc/hosts
Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry. True or False?
False
The Debian Package Manager (DPM) is the default package manager used by Fedora 20. True or False?
False
To install a new program from RPM software repositories on the Internet, you can use the yum update programname command. True or False?
False
UIDs and GIDs are unique to the system and once used can never be reused. True or False?
False
Most Linux distributions make use of what package manager?
RPM
A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False?
True
Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. True or False?
True
Most source code is available on the Internet in tarball format. True or False?
True
SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?
True
The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?
True
The line that configures the host name for the computer at boot time can be found in /etc/sysconfig/network. True or False?
True
You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?
True
In order to download DPM packages, what command should be used below?
apt-get
What is the name used to describe a user providing a user name and password to log in to a system?
authentication
Before a computer can use a router, with what configuration information must it be provided?
default gateway
What command can be used to search for DPM package information?
dpkg-query
An IPv6 IP address consists of 16-bit numbers in what numbering scheme?
hexadecimal
What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?
ifconfig
Which of the following utilities can be used to check TCP/IP configuration and test network connectivity?
ifconfig ping netstat -i
Which command would be used to activate the NIC aliased as eth0?
ifup eth0
What configuration file contains parameters that set the default location for e-mail, password expiration, minimum password length, and the range of UIDs and GIDs available for use?
login.defs
The TCP/IP address of 127.0.0.1 is also referred to as the __________.
loopback address
What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?
make
When compiling source code into a binary program, which command does the compiling using the GNU C Compilier?
make
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the _____ command.
newgrp
Which command can be used to alter the primary group associated with a given user temporarily?
newgrp
To test DNS configuration by resolving a host name to IP address, which command or commands can you use? (Choose all that apply.)
ns lookup hostname dig hostname host hostname
RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?
package dependency
Select the command that can be used to send a small TCP/IP packet to another IP address and await a response?
ping
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?
pwconv
What devices are used to transfer information from one network to another?
routers
Which of the following commands can be used to list the files contained within an installed RPM package?
rpm -ql packagename
Which of the following commands creates an archive (tarball)?
tar -zcvf/dev/st0*
In order to create user accounts on a Linux system, what command should be utilized?
useradd
Which command is used to delete a user account?
userdel username
Which command can you use to lock a user account?
usermod -L username
Which command would you use to unlock a user account?
usermod -U username
What yum command below can display a list of package group names?
yum grouplist
Which of the following commands can be used to search for packages that contain the word "oobla" on RPM software repositories?
yum search oobla
What is the subnet mask for a Class B IP address?
255.255.0.0
What is the subnet mask for a Class C IP address?
255.255.255.0
Which of the following commands can be used to remove the test DPM package, including any test configuration files?
apt -get purge test
What two commands can be used to modify the password expiry information and a user's default shell?
chsh chage