Linux Test 1,2,3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?

$PS1

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.​

(h0,0)

Under what directory is the Linux kernel stored?

/boot

In Fedora 20, where are user configured settings for Xorg stored?​

/etc/X11/xorg.conf.d/

Under the root directory in Linux, which directory contains system commands and utilities?

/usr

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?

0

On Linux, the root user always has a UID of what number?​

0

What number represents the stdin file descriptor?

0

​reverse lookup

A DNS name resolution request whereby an IP address is resolved to a FQDN.

daemon​

A Linux system process that provides a system service.

disk mirroring

A RAID configuration consisting of two identical hard disks to which identical data are written in parallel, thus ensuring fault tolerance. Also known as RAID 1.

disk striping​

A RAID configuration in which a single file is divided into sections, which are then written to different hard disks concurrently to speed up access time; this type of RAID is not fault tolerant. Also known as RAID 0.​

​Internet SCSI

A SCSI technology that transfers data via TCP/IP networks.

target unit​

A Systemd term that is used to describe the number and type of daemons running on a Linux system. It is functionally equivalent to the UNIX SysV term runlevel .

runlevel​

A UNIX SysV term that defines a certain type and number of daemons on a Linux system.​

UNIX Sys V​

A UNIX standard that is used to provide the structure of the system initialization process on Linux systems.

checksum

A calculated value that is unique to a file's size and contents.

lsof command

A command that lists the files that are currently being viewed or modified by software programs and users.

gunzip command

A command used to decompress files compressed by the gzip command.

zmore command

A command used to view the contents of an archive created with compress or gzip to Standard Output in a page-by-page fashion.​

tripwire

A common IDS for Linux that monitors files and directories.​

True

A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator.

NIS client

A computer in an NIS domain that receives its configuration from an NIS master server or NIS slave server.

​firewall daemon (firewalld)

A daemon used on some Linux systems to provide for easier configuration of netfilter via the ipchains command.

terminator

A device used to terminate an electrical conduction medium to absorb the transmitted signal and prevent signal bounce.

Standard Output (stdout)

A file descriptor that represents the desired output from a command.

cron table​

A file specifying tasks to be run by the cron daemon​

​printer class

A group of CUPS printers that are treated as a single unit for the purposes of printing and management.​

package group

A group of RPM packages that are commonly installed to provide a specific function on the system.​

Zettabyte File System (ZFS)

A high-performance filesystem and volume management software that is often used to create volumes from multiple storage devices on Linux and UNIX systems.

baseline

A measure of normal system activity.

classless interdomain routing (CIDR) notation

A notation that is often used to represent an IP address and its subnet mask.

parent process

A process that has started other processes.

​child process

A process that was started by another process.

​Intrusion Detection System (IDS)

A program that can be used to detect unauthorized access to a Linux system.

NetBIOS

A protocol used by Windows computers that adds a unique 15-character name to file- and printer-sharing traffic.

​upstart

A recent version of the UNIX SysV system initialization process used on modern Linux distributions.

​Systemd

A relatively new software framework used on Linux systems that provides a system initialization process and system management functions.

True

A route table is a list of TCP/IP networks that is stored in system memory.

SSH agent

A software program that can be used to automatically authenticate users using their private key.

decision construct​

A special construct used in a shell script to alter the flow of the program based on the outcome of a command or contents of a variable. Common decision constructs include if, case, &&, and ||.

1024

By default, the shell on a Linux system limits the number of filehandles a program can have open to what value?

True

By default, the smb.conf file shares all printers and home directories for recognized Windows users.

True

CUPS contains versions of the lpr, lpc, lpq, and lprm commands.

True

Class D addresses are used for multicasting.

The software whose source code is not freely available from the original author; Windows 98 is an example.

Closed Source Software

What installation media source is the most common source for Linux packages?

DVD

target ID

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?

8-bit

Each octet in an IP address represents a binary number consisting of how many bits / bytes?

True

Each process can start an unlimited number of other processes.

What software type is software that is distributed free of charge, but the source code is not available?

Freeware

​The way in which a hard disk or SSD partition is formatted to allow data to reside on the physical media.

GUID Partition Table

False

Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully.

​@server

How can you specify the intended DNS server to query with the dig command?​

three

How many DNS servers can be configured in the /etc/resolv.conf file?

64

How many different kill signals can be sent by the kill command to a given process?

every ten minutes

How often are sar commands scheduled to run on both Fedora 20 and Ubuntu Server 14.04?

:

IPv6 IP addresses are delimited by what character below?

segmentation fault

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

SIGHUP

If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below:

TCP wrapper

If network services that are started by inetd or xinetd are in use, what can be used to provide extra security?

6

If no level of compression is specified, the gzip command assumes what compression level?

False

If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.

True

If the / filesystem becomes corrupted, the system is unstable and must be turned off.

True

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.

​/etc/X11/xorg.conf.d/

In Fedora 20, where are user configured settings for Xorg stored?​

2

In Linux, what runlevel is also known as the multiuser mode?

7

In a SCSI chain the highest priority SCSI device is given what SCSI ID?

sixth

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?

elif,else

In an if construct, what statements are optional?​

system-config-keyboard

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?

tzselect

In order to change the time zone of a system after installation, what command must be used?​

-l

In order to display a list of at job IDs, what option can be specified to the at command?

​apt-get

In order to download DPM packages, what command should be used below?​

​zfs get all

In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?​

/var/lib/dhcpd/dhcpd.leases,/var/lib/dhcpd/dhcpd6.leases

In order to look up IPv4 and IPv6 DHCP leases, what two files should be viewed?​

lp

In order to send a print job to a printer using CUPS, what command must be used?

1024

In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?

​(hd0,0)

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.​

image=

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?

True

Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond

​forking

The act of creating a new BASH shell child process from a parent BASH shell process.

authentication

The act of verifying a user's identity by comparing a user name and password to a system database (/etc/passwd and /etc/shadow)

​time slice

The amount of time a process is given on a CPU in a multiprocessing operating system.

chfn command

The command used to change the GECOS for a user.​

groupmod command​

The command used to modify the name or GID of a group on the system.​

cancel command​

The command used to remove print jobs from the print queue in the CUPS print system

background command​

The command used to run a foreground process in the background.​

X server

The component of X Windows that draws graphics to windows on the terminal screen.

​X client

The component of X Windows that requests graphics to be drawn from the X server and displays them on the terminal screen.

CUPS daemon​

The daemon responsible for printing in the CUPS printing system.​

echo $PS1

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?

​mutter window manager

The default window manager for the GNOME Desktop Environment in Fedora 13

jitter

The difference between time measurements from several different NTP servers.

offset

The difference in time between two computers that use the NTP protocol.​

overclocked

Term used to describe a CPU that runs faster than the clock speed for which it has been rated.​

fault tolerant

Term used to describe a device that exhibits a minimum of downtime in the event of a failure.​

True

The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length.​

40-50

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent?

​4 GB

The GUI components and related software take up how much space on a typical Linux installation?

​kwin,Qt toolkit

The K desktop environment utilizes what window manager and toolkit below?​

​rsyslog.conf,rsyslog.d

The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?​

514

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?​

True

The Very Secure FTP daemon is a stand-alone daemon.

​zpool status,zpool iostat

The ​state and performance of a RAID-Z volume can be viewed using what two commands?

False

To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.

/boot

Under what directory is the Linux kernel stored?

!

What FTP command runs a shell on the local computer?

pg_dump

What PostgreSQL command-line utility backs up PostgreSQL database settings?

SCSI-3 Ultra2 Wide

What SCSI type supports speeds of up to 80 MB/second?

alert

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?

​parent process ID

What can be used on a Linux system to trace the lineage of each child process?​

​#!

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?

colon

What character is used to delimit most Linux configuration files?

&

What character, when appended to a command, causes the command to be run in the background?

lilo -U

What command below can be used to uninstall the LILO bootloader from an active partition?​

​pstree

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?​

ifconfig

What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?

ulimit

What command can be used to change the maximum number of file handles that can be used by a program?​

​grubby

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?​

zcat

What command can be used to display the contents of a file that was compressed with the compress utility?

tr

What command can be used to replace characters in a file sent via Standard Input?

traceroute

What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?

hwclock

What command can be used to view and modify the date and time within the BIOS?​

​mdadm

What command is used to manage a software RAID configuration after installation?​

make

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?

/dev/nht0

What device file below indicates the first ATAPI IDE tape device (nonrewinding)?​

DirectoryIndex index.html

What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document?

/etc/profile

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?

ssh_host_dsa_key. pub

What file contains the DSA public key in the /etc/ssh directory?

​/etc/systemd/system/default.target

What file controls the default runlevel when using Systemd?​

ioports

What file in the /proc directory contains a list of memory address ranges reserved for device use?

​/proc/cpuinfo

What file in the /proc directory contains information about a computer's CPU?​

​modules

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?​

mput filename

What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.

256-bit

What is the Advanced Encryption Standard (AES) encryption algorithm​'s largest key length size?

60%-70%

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?

50

What is the default print job priority for all print jobs created by the lp command?

​graphical.target

What is the default target on a system with a GUI installed?​

15

What is the maximum number of characters that can be used in a NetBIOS name?

Hard disks

What is the most common hardware component to fail on a Linux system?

255.255.0.0

What is the subnet mask for a Class B IP address?

255.255.255.0

What is the subnet mask for a Class C IP address?

​ZFS volume

What is the term for a ZFS managed filesystem that is created from ZFS pools?​

​quiet

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?​

​SIGINT,2

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?​

SIGHUP

What kill signal stops a process, then restarts it with the same PID?

secure

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?

​127

What number indicates the lowest kernel priority (PRI) of a process possible?​

2

What number represents the stderr file descriptor?

0

What number represents the stdin file descriptor?

​!

What operator below is known as the NOT operator?

​-i

What option can be added to the netstat command in order to display network statistics?​

​-q

What option can be added to the rpm command in order to query packages?​

-V

What option can be specified with the rpm command to identify any missing files in a package or package dependency?

​-X

What option can be used with ssh to enable tunneling of X Windows information?​

-e

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?

-P

What option for the iptables command can be used to specify the default policy for a certain chain type?

-d

What option should be used in conjunction with the lp command in order to specify the destination printer name?

-e

What option, when added to the crontab command, opens the vi editor with a user's cron table?

read and execute

What permissions are required to execute a shell script in a manner similar to any other executable program on the system?

UDP 123

What port is used by the Network Time Protocol (NTP) for communication?

panic

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?​

0-1023

What range of ports is considered to be "well-known"?​

Stage1

What stage of the GRUB boot loader typically resides on the MBR / GPT?

​iSCSI initiator,iSCSI target

What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk?

Secure Shell (SSH)

What tool below was designed as a secure remote access utility that encrypts information that passes across the network?

​bye,quit

What two FTP commands below can be used to close the ftp utility?​

​0.0.0.0,255.255.255.255

What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?​

​ip route,route

What two commands below can be used to manipulate the routing table?

kill​,killall

What two commands below can be used to stop a process, either by PID number or process name?​

​bzmore,bzless

What two commands below can be used to view the contents of a bzip2-compressed file page by page?​

​free,vmstat

What two commands below can display memory information and swap usage?

​inetd,xinetd

What two daemons can be used to start and manage connections for smaller network daemons such as telnet and rlogin?​

​/dev/st0,/dev/nst0

What two device files below represent the first SCSI tape device, rewinding and non-rewinding?​

​/etc/profile,/etc/bashrc

What two files below are the first two BASH environment files to be executed?​

​/etc/cups/cupsd.conf,/etc/cups/printers.conf

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?

​-sport,-dport

What two iptables options are used to specify the source and destination ports for a rule?​

​wtmp,lastlog

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?​

​init,systemd

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes?

​A,AAAA

What two resource record types map FQDNs to IPv4 and IPv6 addresses respectively?​

​compiz,beryl​

What two window managers is the Compiz Fusion window manager based upon?​

​25

What well-known TCP port is utilized by the SMTP service?​

False

When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory.

%

When killing a background job with the kill command, the background job ID must be prefixed by what character below?

+

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?

-f

When used with the compress command, what option below can be used to compress symbolic links?

-c

When used with the uncompress command, what option displays the contents of the compress file to Standard Output?

.Z

When using the compress utility, each file specified for compression is renamed with what extension?

​The process is high priority.

When viewing the output of the ps ax​ command, what does a < symbol in the STAT column indicate for a process?

HELO

When working with Sendmail, what command can be used to test SMTP support?

True

When you print to a printer class, the print job is send to the first available printer in the printer class.

​/var/log/samba

Where are the log files for the Samba daemon located?​

curl

Which command below can be used at a BASH command prompt to obtain a web page?

service

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?

wc

Which command can be used to count the number lines, words, and characters in a file?

nmap

Which command can be used to see what network services are running on your network?

lpadmin

Which command should be used to restrict access to printers?

SIGQUIT

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?

-q

Which sar command option is used to display statistics for the processor queue?

​bit rot,misdirected writes

Which two problems below are typically seen on large systems that write large amounts of data to a non-ZFS filesystem?​

In Linux, the core component of the GUI is known as:

X Windows

The component of X Windows that requests graphics to be drawn from the X server and displays them on the terminal screen.

X client

The component of X Windows that draws graphics to windows on the terminal screen.

X server

False

You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.

​/var/log/boot.log

You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?​

True

You can use a small bootable Linux kernel (such as on a LiveCD) to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers.

True

You can use the sed command to remove unwanted lines of text.

False

Zombie processes are also known as defunct processes.​

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?

awk

The TCP/IP communication destined for all computers on a network.

broadcast

​A command used to decompress files compressed by the bzip2 command

bunzip2

​A calculated value that is unique to a file's size and contents.

checksum

The command used to change the GECOS for a user.​

chfn

On Linux systems that use the traditional ​UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?

chkconfig

​A system process that is not associated with a terminal.

daemon process

A list of all exported environment and user-defined variables in a shell can be viewed with what command below?

env

​The area of the system from which information is gathered when logging system events.

facility

The act of creating a new BASH shell child process from a parent BASH shell process.

forking

What is the default target on a system with a GUI installed?​

graphical.target

What yum command below can display a list of package group names?

grouplist

The command used to modify the name or GID of a group on the system.​

groupmod

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?

grub-mkconfig

A command used to decompress files compressed by the gzip command.

gunzip

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?

image=

Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?​

live media image

Which command should be used to restrict access to printers?

lpadmin

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?

newgrp

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?

quiet

​A command used to extract archives created with the dump command.

restore

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?

secure

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?

system-config-keyboard

To display a text file in reverse order, what command should be used?

tac

What command can be used to display the last five lines of a text file?

tail-5

​The amount of time a process is given on a CPU in a multiprocessing operating system.

time slice

What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?

traceroute

The process of ignoring a kill signal.​

trapping

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?

xvidtune

A command used to view the contents of an archive created with compress or gzip to Standard Output in a page-by-page fashion

zmore

What metacharacter can be used to refer to the current user's home directory?

~

8,24

​A Class A network uses how many bits for the network ID, and how many bits for the host ID?

​RAID-Z

​A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:

nmap command

​A command that can be used to scan ports on network computers.

bunzip2 command

​A command used to decompress files compressed by the bzip2 command

restore command

​A command used to extract archives created with the dump command.

Standard Error (stderr)

​A file descriptor that represents any error messages generated by a command.

​Standard Input (stdin)

​A file descriptor that represents information input to a command during execution.

​DNS cache file

​A file that contains the IP addresses of top-level DNS servers.

tarball

​A gzip-compressed tar archive.

octet

​A portion of an IP address that represents eight binary bits.

​Internet Protocol (IP) address

​A series of four 8-bit numbers that represent a computer on a network.

protocol

​A set of rules of communication used between computers on a network.

loop construct​

​A special construct used in a shell script to execute commands repetitively. Common decision constructs include for and while.

​spanning

​A type of RAID level 0 that allows two or more devices to be represented as a single large volume.

Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?​

​Artistic

The GNU General Public License (GPL) was developed by which organization?

​Free Software Foundation (FSF)

xwininfo

​If X Windows fails to start, what command can be used to troubleshoot the issue?

​The process is currently running on the processor.

​In the process state column, what does an "R" indicate?

​chroot

​Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment.

​-u,​-i

​Select the options to use with the cpio utility to cause the utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation:

The channel that allows a certain user to log in and communicate with the kernel via a user interface​

​Terminal

multicast

​The TCP/IP communication destined for a certain group of computers.

broadcast

​The TCP/IP communication destined for all computers on a network.

compression ratio​

​The amount of compression that occurred during compression algorithm.

facility

​The area of the system from which information is gathered when logging system events.

at command

​The command used to schedule commands and tasks to run at a preset time in the future.

​file handles

​The connections that a program makes to files on a filesystem.

​hashpling

​The first line in a shell script, which defines the shell that will be used to interpret the commands in the script file.

​primary group

​The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user.

False

​The minimum height of a rackmount server is 2 inches; this is called a 1U server.

​IP version 4 (IPv4)

​The most common version of IP used on the Internet. It uses a 32-bit addressing scheme organized into different classes

link local​

​The portion of an IPv6 address that refers to a unique computer. It is analogous to the host portion of an IPv4 address.

​redirection

​The process of changing the default locations of Standard Input, Standard Output, and Standard Error.

tunneling

​The process of embedding network packets within other network packets.

system backup

​The process whereby files are copied to an archive.

​environment variables

​The variables that store information commonly accessed by the system or programs executing on the system; together, these variables form the user environment.

​dpkg-query

​What command can be used to search for DPM package information?

ntp_query

​What command can be used to see what actual time servers are being used for synchronization?

ldd

​What command can be used to view what shared libraries are required by a certain program?

​login.defs

​What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

​for

​What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?

-P

​What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?

​-F

​What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?

​PWD,SHELL

​What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively?

​ntpd,chronyd

​What two NTP daemons below are commonly used on Linux systems?

​RAID5,​RAID6

​What two RAID types below utilize disk striping with parity, providing protection against one or two drive failures respectively?

chage,chsh

​What two commands below can be used to modify the password expiry information and a user's default shell?

​-d,-k

​What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

​-z,-Z

​What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?

​-f,-l

​What two ps options can be used to display a full list of information about each process, and a long list of information about each process?

/var/www/html

​Where is the default document root directory for the Apache web server?

​A variable that is altered by loop constructs to ensure that commands are not executed indefinitely.

​counter variable

The numeric labels used to define command input and command output.

​file descriptors

The first line in a shell script, which defines the shell that will be used to interpret the commands in the script file.

​hashpling

The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user.

​primary group

When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts

​systemctl

spooling

​the process of accepting a print job into a print queue.

​Select the mode below that corresponds to setting r-x

5

What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output?

;

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?

>

​Universal Access

Assistive technologies are configured using what utility on Fedora 20 in GNOME?​

True

Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.

False

Performance problems are caused by hardware, not software.

False

Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.

False

SLIP is a newer technology than PPP.

​turn off CPU cache memory, increase the number of memory wait states in BIOS

Segmentation faults can sometimes be fixed by performing what two tasks below?​

DROP DATABASE

Select the SQL statement below that can be used to delete a database:

ping

Select the command that can be used to send a small TCP/IP packet to another IP address and await a response:

\f

Select the escape sequence that is used for a form feed:

​\n

Select the escape sequence that starts a new line when used with echo:

|

Select the metacharacter that can be used to send the standard output of one command to another command as standard input:

-p

Select the option that can be used with the lpstat command to display a list of printers that are enabled:

-l

Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed:

-B

Select the option that, when used with the sar command, displays swap statistics:

​wc -l,wc -c

Select the two commands below that will provide the number of lines in a file, and the number of characters in a file, respectively:​

​\t,\v

Select the two escape sequences that represent a horizontal tab and a vertical tab, respectively:​

append=,boot=

Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded:​

​32,128

Select the two numbers below that represent the number of bits needed to make an IPv4 or IPv6 IP address:​

​metacity,mutter

Select the two window managers that have been used in GNOME:​

A file descriptor that represents any error messages generated by a command.

Standard Error (stderr)​

A file descriptor that represents information input to a command during execution.

Standard Input (stdin)

A file descriptor that represents the desired output from a command.

Standard Output

What option can be used in the journald configuration file to specify a file size limit to the event log?​

SystemMaxUse

In Linux, what runlevel is also known as the multiuser mode?

2

What number represents the stderr file descriptor?

2

​A utility that can be used to manage DPM packages using a graphical interface.

Aptitude

​daemon process

A system process that is not associated with a terminal.

pwconv

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?

route table

A table of information used to indicate which networks are connected to network interfaces.

iSCSI target​

A term that refers to a storage device within an iSCSI SAN.

process ID (PID)

A unique identifier assigned to every process as it begins.

User Identifier (UID)

A unique number assigned to each user account.

​host name

A user-friendly name assigned to a computer.

Aptitude

A utility that can be used to manage DPM packages using a graphical interface.

​counter variable

A variable that is altered by loop constructs to ensure that commands are not executed indefinitely.

lpstat

Adding the -t option to what command below will provide a list of all printers on the system and their status?

True

After a process has been started, you can change its priority by using the renice command.

​Run the ldconfig command.

After downloading an installing any shared libraries, what should be done to ensure ​the list of shared library directories and the list of shared libraries are updated?

grub-mkconfig

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​

True

All DNS servers contain a DNS cache file.

False

Almost all hardware problems are the result of damaged hardware.

hexadecimal

An IPv6 IP address consists of 16-bit numbers in what numbering scheme?

rpm2cpio

An RPM package can be converted to a cpio archive using what command?

buffer overrun​

An attack in which a network service is altered in memory

True

Any command that can be executed on the command line can also be placed inside any environment file.

RPM

Most Linux distributions make use of what package manager?

15

Most Parallel SCSI controllers are capable of supporting up to how many devices?

jabbering

Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called?​

​chkconfig

On Linux systems that use the traditional ​UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?

​0

On Linux, the root user always has a UID of what number?​

​/var/spool/at

On a Fedora based system, where are the shell environment and scheduled commands for at stored?​

​/var/log/secure,/var/log/auth.log

On a system that is not using Systemd, what two log files contain information related to PAM?

False

On most Linux systems, the logrotate utility is automatically scheduled to run weekly.

xvidtune

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:

Options

True

RAID level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance ​and allows up to two simultaneous hard disk drive failures while remaining fault tolerant.

nohup

Running background processes using what command allows you to exit your command-line shell without ending any background processes?

True

SCSI devices that act as a gateway are associated with a unique Logical Unit Number (LUN)​

True

The email command is an example of a Mail User Agent (MUA).​

127

The first software RAID volume on a system will​ use a multiple disk device file that starts with what number?

False

The killall command uses the PID to kill a process.

DHCPD daemon​

The most common Linux daemon used to provide IPv4 and IPv6 addresses to other computers on the network.

GRUB​

The most common boot loader used on Linux systems. It loads and executes the Linux kernel at boot time.

File Transfer Protocol (FTP)​

The most common protocol used to transfer files across networks such as the Internet.​

​file descriptors

The numeric labels used to define command input and command output.

​active partition

The partition searched for an operating system after the MBR/GPT.​

zone transfer

The process of copying resource records for a zone from a master to a slave DNS server.

trapping

The process of ignoring a kill signal.​

False

The secure log file contains information regarding the last user to log in to a system.​

​/etc/ssh/sshd_config

The sshd daemon is configured by editing what configuration file?​

Berkeley Internet Name Domain (BIND)

The standard that all DNS servers and configuration files adhere to.​


संबंधित स्टडी सेट्स

NCHES: Area of Responsibility 1: Assessment of Needs and Capacity (8th Ed.)

View Set

chapter 1 introduction to computers and programming

View Set

Frans ASO 1 Rallye 1 Circuit Rouge woorden vertalen ex 12,13,14 p 16,17

View Set

History U1 L18 Dissent and Discontent

View Set

Chapter 22: Seizing an American Empire

View Set

Angielski. Lekcja 1. Powitania, pozdrowienia.

View Set

Prep U: musculoskeletal disorders

View Set

Organizational Behavior Chapter 1

View Set

Chapter 2: Boot process and runlevels

View Set