UNIX II

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Ch. 9 Which of the software packages below are used to create virtual servers? (Check-all-that-apply)

Hyper-V VirtualBox VMware Xen

Ch. 19 Define HTML:

HyperText Markup Language

Ch. 24 What is the main component that enables virtualization a manages virtual machines?

Hypervisor

Ch. 4 What is the original process referred to that has cloned a process copy?

PPID

Ch. 16 Which type of DNS zone record is used in a reverse lookup table for dns queries based on IP Address-to-name translation?

PTR

Ch. 9 Which of the following below are the three main service models for Cloud Computing?

PaaS SaaS IaaS

Ch. 3 What is a piece of software (or a combination of software and hardware) that stores passwords for your organization in a secure fashion.

Password vault

Ch. 16 Which of the following DNS implementations is utilized the most in Unix installations? (Hint: In the Chapter Slides)

BIND

Ch. 16 Which type of DNS zone record below indicates a alias name for a host (nickname)?

CNAME

Ch. 14 If two systems start to talk to a third systems at the same time, a collision can occur. To handle collisions, the network uses a technical scheme called:

CSMA/CD

Ch. 28 Another useful tool, which uses RRDtool to store data, records and graphs SNMP data, and has an easy web-based interface.

Cacti

Define URL:

Uniform Resource Locator

Ch. 2 What are the steps in the boot process? (Check all that Apply)

Device detection and configuration Execution of system startup scripts Adminstrator intervention Reading of the boot loader from the master boot record. Loading and Initialization of the kernel Creation of kernel processes

Ch. 1 Which commands below would install the "wget" software package on variations of the Linux Operating System: (Check all that Apply)

Redhat: yum install wget Suse: yast --install wget Solaris: pkgutil --install wget Ubuntu: apt-get install wget

Ch. 3 What model assigns intermediate roles to assigned users instead of direct permissions.

Role-based access control

Ch. 1 Which protocol was developed for Unix & Linux systems to provide authentication security for TCP/IP applications when logging in and transferring files?

Secure Shell (SSH)

Ch. 16 What type of named server is an official representative of a zone?

authoritative

Ch. 5 When doing an ls command, which filetype symbol below indicates a character device file?

c

Ch. 20 What command below can be used to create a new physical volume?

pvcreate

Ch. 7 With no options, _______ displays the current listing of Bash environment and shell script variables.

set

What tricks can subvert the usage of sudo? (Check all that Apply)

shell escapes sudo su sudo /bin/sh

Ch. 2 What command is the safest, most considerate, and most thorough way to halt a system?

shutdown

Ch. 2 What command is used to restart the machine. (Click all that Apply)

shutdown -r reboot init 6

Ch. 18 What is the configuraton file that is utilized for sendmail?

/etc/mail/sendmail.cf

Ch. 16 When using a hostname only to identify a server, which file is used to identify whether to look locally on the system first or look at DNS first,? In this file, you can configure to look for the name to ip address translation in order: example: file dns

/etc/nsswitch.conf

Which configuration file below is used as a "service switch" configuration file:

/etc/nsswitch.conf

Ch. 17 Which commonly shared file below contains User account information database:

/etc/passwd

Ch. 8 Which file below contains a list of groups recognized by the system?

/etc/passwd

Ch. 8 Which file below contains a list of users recognized by the system?

/etc/passwd (pg. 245)

Ch. 21 Which path below contains startup scripts for Red Hat Linux:

/etc/rc.d/init.d/nfs

Ch. 21 Which path below contains startup scripts for AIX:

/etc/rc.nfs

Ch. 10 Which file below is the configuration file for syslog?

/etc/syslog.conf

Ch. 24 Where is the primary configuration directory for Xen?

/etc/xen

Ch. 5 Where are the default user directories located?

/home

Ch. 5 What directory below is specific to libraries and shared libraries?

/lib

Ch. 11 Another method of deploying additional software to a kernel is loadable kernel modules. Where are loadable kernel modules stored under in linux?

/lib/modules

Ch. 5 What directory below is used for optional software packages?

/opt

Ch. 29 Which of the following command provide source of hardware information on linux? (Check-All-that-Apply)

/proc/diskstats dmidecode

Ch. 29 Which of the following command provide source of hardware information on linux? (Check-All-that-Apply)

/proc/meminfo /proc/cpuinfo

Ch. 5 What directory below is the home directory of the superuser account?

/root

Ch. 5 What is the primary directory consisting of a hierarchy of secondary files and command to include directories such as sbin, share, src, lib, bin, and include.

/usr

Ch. 5 Where are the system - specific data and configuration files located and includes directories like adm, log and spool?

/var

Ch. 10 Which directories below contain log files?

/var/log /var/adm

Ch. 3 To navigate the UNIX/Linux directory structure, you use the ____ command.

cd

Ch. 2 What redhat command helps manage services?

chkconfig

What command changes the root directory of a process?

chroot

Ch. 2 What is the term traditionally used in unix system to boot the system just enough to run a shell on the system console?

single-user mode

Ch. 3 Special User Accounts, also known as Pseudo-users,, have their password replaced in the /etc/shadow file with a _________ so that their accounts cannot be logged in to.

star (*)

Ch. 3 What account substitutes the user identity, effectively allowing you to login as that user account.

su - username

Ch. 3 What program can be utilized to allow a user specific commands to be run as a different user, without giving full access to the users account. For example, the ability to cat a file that "root" owns.

sudo

Ch. 30 What arrangement optimizes the flow of cooling so that air inlets always breathe cool arid rather than another server's hot exhaust?

Having raised floors & hot and cold aisles

Ch. 31 Which of the following below are issues to consider when documenting standards? (Check all-that-apply)

Special-purpose software Supported Operating Systems Expiration of backup tapes Standard configurations

Ch. 14 When an initial network connection occurs between two devices, auto-negotiation occurs to determine the connection: (Check all-that-apply)

Speed Duplex

Ch. 18 A mail message has three distince parts: (Select-all-that-Apply)

an envelope a body a header

Ch. 7 What command can be used for matching patterns and perform an associated action?

awk

Ch. 7 What command can remove sections from each line?

cut

Ch. 7 Which command below would produce a list of unique sorted values in the password file :

cut -d: -f7 < /etc/password | sort - u

Ch. 15 Which term can be used as an equivalent to default router?

default gateway

Ch. 2 What is the default boot configuration for GRUB? (Select all that apply)

grub.conf menu.lst

Ch. 10 Which utility implements a variety of log management policies and is standard in Linux?

logrotate

Ch. 20 Select the commands that can be used to extend a volume group and logical volume respectively:

lvextend vgextend

Ch. 4 Which command below can show "live" information on the process status, similiar to "ps". This command provides more detailed cpu, memory, swap, and process information.

top (pg 101)

Ch. 4 Which commands below shows every system call that a process makes and every signal it receives? (Check All that Apply)

truss stace tusc

Ch. 4 Which "ps" command below shows a userful overview of all the processes running on HP & Solaris?

ps -ef

Ch.4 Which "ps" command below shows a useful overview of all the processes running on Linux and AIX?

ps aux

Ch. 8 What command can be used to reconcile the contents of the shadow file to those of the passwd file, picking up any new additions and deleting users that ar no longer listed in passwd?

pwconv (pg. 252)

Ch. 5 What command can be issued to confirm what directory you are in at a command line prompt?

pwd

Ch. 17 Which of the following commands is the easiest way to distribute files from a central server:

rdist

Ch. 5 What type of pathnames are interpreted as starting at the current directory?

relative

Ch. 4 Which command adjusts the nice value after initial creation?

renice

What command do you use to delete files in Unix/Linux?

rm

Ch. 5 Which command below is used to remove a directory?

rmdir

Ch. 11 What command is used to remove a loaded kernel module?

rmmod

Ch. 16 BIND includes a utility which allows command line administration of the named deamon from the local or remote host called:

rndc

Ch. 20 In what filesystem are most of the operating system files contained?

root

Ch. 17 Which command below is a souped-up version of scp that is scrupulous about preserving links, modifications times, and permissions?

rsync (pg. 594)

Ch. 17 Which command below transfers the /etc/passwd file to the machine lollipop.

rsync -gopt --password-file=/etc/rsync.pwd /etc/passwd lollipop::sysfiles

Ch. 4 Which Process state indicates the process can be executed?

runnable

Ch. 28 Which command below can be used to collect and report performance statistics over time?

sar

Ch. 29 Which command below can be used to collect and report performance statistics over time?

sar

Ch. 27 Which of the following below allows a user to execute a process of the user that owns the file.

setuid

Ch. 7 The _________ command, used to run a shell script, includes several options for debugging.

sh

Ch. 9 What does the NIST definition of Cloud Computing include: (Check-all-that-apply)

shared pool of configurable computing resources on-demand network access networks, servers, storage, applications, and services

Ch. 16 What type of named server is considered the secondary name server for a zone and copies its data from the master?

slave

Ch. 28 What useful tool can be used to obtain a complete list of available OIDs and their associate values?

snmpwalk

Ch. 6 The file below contained in the /etc/apt directory contains a list of universal packages and package source for "main" components of ubuntu.

sources.list (pg. 171)

Ch. 18 To handle delayed delivery of email, mail systems use a technique know as ______________.

spooling

Ch. 21 Determining what part of the system will track the files that each client has open is referred to generically as _______________.

state

Ch. 21 _____________ servers, each request is independent of the requests that have preceded it and the server does not know which clients have opened files.

stateless

Ch. 16 What type of named server is like a slave, but copies only name server data (not host data)?

stub

Ch. 1 A systems administrator can also be called the ______________, because a system administrator often has unlimited permission to alter the system as the "root" user.

superuser

Ch. 30 Which of the following below can be used to filter power spikes and produce the correct voltage levels: (Check all-that-apply)

surge protector UPS

Ch. 2 What command in Solaris changes the status of the service? For example, disable ssh.

svcadm

Ch. 29 Which command below can be used to obtain information on the amount of paging space being used?

swapon

Ch. 20 Select the two commands below that can be used to prepare a swap partition and then enable it for use:

swapon mkswap

Ch. 10 What is the process name of the integrated systems for logging in Unix/Linux?

syslogd

Ch. 10 Which of the following is the logging daemon and it's config file is: /etc/syslog.conf?

syslogd

Ch. 7 When analyzing a log file that is continuing to receive output from the application, what command can be used to read from the end of the file and wait for new lines to be printed?

tail -f

Ch. 11 Which files in the /proc/sys allow tunable kernel parameters (Check-all-that-apply)

tcp-fin-timeout inode-max shmmax

Ch. 7 What command is used to split the data stream and send a copy to another output?

tee

Ch. 31 What type of service is negotiated, agreed upon, and documented in IT organizations?

wrong Service Level Agreements Service contracts Service Level Agreements service contracts Service Level Agreements Service contracts Service Level Assessments Service Layer Agreements Service Level Agreements Service Level Assessments Service contracts Service Layer Agreements Service contracts service level assesments service level agreements

Ch. 20 Which of the following commands are used to obtain disk device information attached to a Unix or Linux System? (Check all that Apply)

wrong diskinfo - C - l lsdev - C - c disk ioscan - fNn - c disk diskinfo -C -l parted -l lsdev -C -c disk ioscan -fNn -c disk parted -l lsdev -C -c disk lsdev - C - c disk diskinfo - C - l

Ch. 17 Which of the following commands preserves permissions and modification times during the copying process from one server to another? (Check-all-that-apply)

wrong mv rsync rdist mv cp rsync mv rsync cp rdist cp rsync rdist cp rsync

Ch. 10 Which log files contain a record of users logins?

wtmp lastlog wtmpx

Ch. 7 Which elementary bash comparison operator is used to compare to numeric values to see if they are equal?

x -eq y

Ch. 6 Which of the following below is a metapackage manager based on RPM and similar to apt-get?

yum

Ch. 6 Which of the following below are Metapackage management systems:

yum apt

Ch. 4 Which Process state indicates the process is trying to die?

zombie

Ch. 7 Which files below in the user's home directory is used to set shell environment values?

~/.profile ~/.bash_profile

Ch. 4 Utilizing the "ps" command, the following information can be obtained: (Check all that Apply)

%MEMORY USER PID %CPU Command Stat USER or UID

Ch. 8 A user account can be locked with the usermod command using what option

-L

Ch. 7 Which base file evaluation operation is true if file exists only?

-e

Ch. 8 What option can be added to the userdel command to remove the home directory of the target user?

-r

Ch. 5 Which entry below refer to the directory itself?

.

Ch. 3 UNIX/Linux systems interpret ____ to mean the parent directory.

..

Ch. 5 Which entry below refer to the parent directory?

..

Ch. 11 A kernel can be modified by modifying which of the files below in the source directory:

.config

Ch. 6 Two package formats are in common use to install software packages:

.deb rpm

Ch. 8 Which files below are common startup files for csh when logging in?

.login .cshrc

Ch. 5 Where are the core operating system commands located?

/bin

Ch. 8 Which command below can be used as a fake shell?

/bin/false

Ch. 3 Pseudo-users also have their shells set to: (Check all that apply)

/bin/nologin /bin/false

Ch. 11 Which directory contains device files, which have a major and minor number associated with each device?

/dev

Ch. 20 Select the devices below that conform to standard naming of disks: (Check all that Apply)

/dev/hdisk0 /dev/disk/disk0 /dev/dsk/c0t0d0s2 /dev/sda

Ch. 16 Where is the named.conf file located in Linux (RHEL and SUSE)?

/etc

Ch. 21 Which file below is used to configure the exported directories (filesystems) on HP-UX?

/etc/dfs/dfstab

Ch. 21 Which file below is used to configure the exported directories (filesystems) on AIX?

/etc/exports

Ch. 21 Which file below is used to configure the exported directories (filesystems) on Linux?

/etc/exports

Ch. 21 What files can we modify to add an NFS to mount of an NFS filesystem at boot time? Depends on O/S. (Check all-that-apply)

/etc/fstab /etc/vfstab

Ch. 17 Which commonly shared file below defines UNIX groups:

/etc/group

What configuration file typically contains a list of groups and associated accounts associated with a group?

/etc/group

Ch. 21 Which path below contains startup scripts for Ubuntu:

/etc/init.d/nfs-kernel-serv er

Ch. 21 Which path below contains startup scripts for Solaris:

/etc/init.d/nfs.server

Ch. 17 Which commonly shared file below holds electronic mail aliases:

/etc/mail/aliases

Ch. 16 When configuring a linux system, which file below is used so that the linux system can do a dns lookup?

/etc/resolv.conf

Ch. 17 Which commonly shared file below holds user account passwords:

/etc/shadow

Ch. 8 What file contains a list of permitted shells?

/etc/shells

Ch. 5 Where are the main kernel components located?

/kernel

Ch. 8 On Linux, the root user always has a UID of what number?​?

0 (pg. 248)

Ch. 18 What occurs when a email server employs a mail alias expansion mechanism?

A forwarder allows each incoming message to be sent to one or more destinations.

Ch. 15 Which of the following statements best describes the term autonomous system?

A group of networks and routers controlled by a single administrative authority.

Ch. 13 What is a MAC Address?

A media access control address to identify a unique network interface controller card.

Ch. 21 Which of the following are major enhancements to NFS version 4. (Check all-that-apply)

Access control lists (ACLs) Strong, integrated security Good performance even on low-bandwidth connections Support for both UNIX and Windows clients Compatibility and cooperation with firewalls and NAT devices Stateful operation Support for Unicode filenames Support for replication and migration Integration of the lock and mount protocols into the core NFS protocol

Ch. 15 What main services are provided by the network layer of the TCP/IP model? (Choose two.)

Addressing Routing

Ch. 19 Using HTTP Protocol, what type of command does the browser send to specify which media or representations are acceptable?

An HTTP Accept

Ch. 19 Using HTTP Protocol, what type of command does the browser send to request a web page from the server.

An HTTP GET

Ch. 19 Using HTTP Protocol, what type of command does the browser utilize to send data to a web server? (Check-all-that-Apply)

An HTTP PUT An HTTP POST

Ch. 31 Which of the following are sample skills that demonstrate the needed skillsets and organization might need in IT? (Check all-that-apply)

Analyze log files Install new hardware Manage backups and restores Create users, remove user accounts

Ch. 6 Which tool below from SUSE is used for performing automated installations?

Autoyast

Ch. 15 In modern networks, what is the only EGP protocol used?

BGP

Ch. 15 Which of the following is considered to be an Exterior Gateway Protocol (EGP)?

BGP

Ch. 1 Linux uses the freeware ____ shell as its default command interpreter.

Bash

Ch. 7 The _____ shell, when compared to the other shells, has a more powerful programming interface.

Bash

Ch. 31 What are examples of services that might be in an SLA. Check all that apply

Business applications Internet and web browsing Email File servers Printing

Ch. 27 Which of the following below are additional sources for security information? (Check-all-that-Apply)

CERT Schneier Blog Securityfocus.com SANS

Ch. 27 Which of the following are certifications for security professionals? (Check-all-that-Apply)

CISA GIAC CISSP

Ch. 31 Which of the following standards and regulations are used today in information technology? (check all-that-apply)

CJIS COPPA FISMP COBIT

Ch. 14 What does CSMA/CD stand for: (Check all-that-apply)

Carrier Sense Collision Detection Multiple Access

Ch. 23 Which of the following below are popular CM systems? (check all-that-apply)

Chef Salt Puppet Ansible

Ch. 31 Which of the following are key areas in which IT interfaces with the rest of the organization? (Check-all-that-apply)

Communicate task status to users and the enterprise. Assist with regulatory compliance Plan for and be ready for disasters Monitor the computing environment

Ch. 16 Which protocol is used to translate a domain name to an IP address?

DNS

Ch. 31 Which of the following are key areas in which IT interfaces with the rest of the organization? (Check-all-that-apply)

Develop skills in its staff Work to ensure needs are met Maintain a list of open tasks Track emerging technologies

Ch. 14 What are the four major factors that contribute to the success of a network?

Development of a reasonable network design. Competent ongoing operations and maintenance. Selection of high-quality hardware Proper installation and documentation

Ch. 29 Which of the follow can be done to improve performance? (Check-All-that-Apply)

Double-check the configuration of the systems. Spread Traffic among several systems. Ensure the system has enought memory. Organize hard disks and filesystems

Ch. 13 DHCP protocol is defined as:

Dynamic Host Configuration Protocol

Ch. 14 Which standard below by the Telecommunications Industry Association covers telecommunication infrastructure of commercial buildings?

EIA-606

Ch. 15 Which of the following is considered to be a Hybrid routing protocol that utilizes features of both Distance Vector and Link State Protocols?

EIGRP

Ch. 15 Which of the following is considered to be an Interior Gateway Protocol (IGP)? (Check all that Apply)

EIGRP OSPF RIP IGRP

Ch. 10 What information should an Administrator consider at the least capturing from log files: (Check-all-that-Apply)

Even success or failure Date and Time of the incident Username or User ID event details Sensitive data added, altered, or removed Source address for network events

Ch. 22 Which processes below should be used when running Samba to ensure a basic level of security? (Check all-that-apply)

Explicitly specify which clients can access the resources. Block access to the server from outside your organization.

Ch. 19 Which of the protocols below can be used in URL's. (Check-all-that-apply

FTP http https ldap

Ch. 7 In Unix/Linux all shells support the same commands and programing statements. (T/F)

False

Ch. 22 CIFS provides which of the following services? (Check all-that-apply)

File Sharing Name resolution Service announcement (file server and printer "browsing) Network Printing Authentication and authorization

Ch. 18 Mail systems typically support several aliasing mechnisms.. Which of the following are considered mail alias mechnisms: (Check all-that-apply)

Flat-file maps (/etc/mail/aliases) LDAP databases mail routing databases NIS

Ch. 31 What makes users happy? (Check all-that-apply)

Friendly, knowledgeable help is available when needed Their applications software is installed and works as it's supposed to Their computers are up and running and they can login Their data files stay as they left them Their other resources such as printers and file servers are available

CH. 8 What information is contained in the GECOS field? (Check all that Apply)

Full Name Office Number and Building (pg. 249)

Ch. 8 Which fields below are in the /etc/group file? (Check all that Apply)

GID List of members Group Name Encrypted password or place holder (pg. 254)

Ch. 6 Which of the following are used to store live versions of files, allowing for check-in and checkout of files while editing?

Git subversion

Ch. 19 Which protocol below utilizes certificates to encrypt data between client and web server?

HTTPS

Ch. 10 Log data can become quite large, but also a necessity to keep. Administrators should keep these questions in mind when designing a overall log in strategy: (Check-all-that-apply)

How many systems and applications will be included? How long must logs be retained? What type of storage infrastructure is available? What types of events are important?

Ch. 14 Which type of device below sends ethernet frames to each port and acts like a repeater?

Hub

Ch. 9 Which of the following are deployment models for cloud computing? (Check-all-that-apply)

Hybrid Community Private Public

Ch. 9 What is the main component that enables virtualization and manages virtual machines?

Hypervisor

Ch. 16 What organization assigns names for top-level domains?

ICANN

Ch. 18 Which protocols below allow a client application retrieve email from a mail server?

IMAP4 POP3

Ch. 15 IP multicasting is available for both:

IPv4 IPv6

Ch. 13 DHCP permits a computer to obtain all the information needed to communicate on a given network including: (Check-all-that-Apply)

IPv4 Address Subnet Mask Default Router

Ch. 31 Which goal should be aligned with the goals of the larger organization?

IT Spending

Ch. 31 What affects everyone in the organization , and are important components of the organization's overall strategy?

IT policies

Ch. 31 Which standard has become the de factor standard for organizations seeking a comprehensive IT service management solution?

ITIL

Ch. 26 Which of the following types of tests does the CI/CD pipeline consider: (Check all-that-apply)

Infrastructure Tests Performance Tests Integration Tests Static code analysis

Ch. 15 The term Interior Gateway Protocol (IGP) as a generic description that refers to any protocol that ____________ routers use when they exchange routing information.

Interior

Ch. 18 What client email protocol allows users to view and manipulate messages on the mail server? This protocol connects with the users mailbox on the mail server.

Internet Message Access Protocol (IMAP4)

Ch. 6 Which tool below from Solaris is used for performing automated installations?

Jumpstart

Ch. 12 Which Desktop printing utility is the primariy printing tool for KDE?

KDEPrint

Ch. 13 What Layer of the OSI Model describes communication utilizing MAC address communication?

Layer 2

Ch. 8 The follow information below is contained in the password file. (Check all that Apply)

Login name Encrypted password placeholder Home directory UID Login Shell GECOS information GID

Ch. 14 If jumbo-frames are being used, to increase the associated size of the frame, the _________ must be increased.

MTU

Ch. 16 When a client queries DNS, a client must specify the type in its query; servers specify the data type in all resource records they return. A Type MX record is:

Mail Exchanger

What software, by Julian Field is an open source scanner for mail hubs and recognizes spam, viruses, and phishing attempts?

MailScanner

Ch. 31 Which of the following are sample skills that demonstrate the needed skillsets and organization might need in IT? (Check all-that-apply)

Manage software licenses Dubug mail server issues Package a Windows application in MSI format Create DNS entries

Ch. 6 Which of the following tasks do most administrators perform when it comes to software installation and management? (Check all-that-apply)

Managing add-on software packages. Automating mass installations of operating systems. Maintaining custom OS configurations for the local environment. Keeping systems and applications patched and up to date.

Ch. 29 Which of the following resources can effect performance? (Check-All-that-Apply)

Memory Network I/O Storage I/O CPU Utilization

Ch. 21 Which version of NFS utilizes TCP protocol only.

NFSv4

Ch. 17 What services was used for sharing of usernames, passwords, groups, nfs shares, hosts, and other data and was considered the first "prime time" administrative database. This service was released by Sun.

NIS

Ch. 16 Which type of DNS zone record below indicates a name server (dns)?

NS

ch. 13 Which layer of the TCP/IP network model specifies how packets travel end to end over a TCP/IP network?

Network

Ch. 21 What is the definition of NFS:

Network File System

Ch. 17 What does NIS stand for?

Network Information Service

Ch. 30 A data center is composed of: (Check all-that-apply)

Network connectivity throughout the data center, and to places beyond. Electric power sufficient to operate the installed devices. Racks that hold computer, network, and storage devices. Cooling, to keep the devices within their operating temperature ranges. A physically safe and secure space.

Ch. 15 BGP, similar to distance-vector routing protocols utilizes:

Next-Hop

Ch. 28 MIBs contain descriptions of specific data variables, which are referred to with names known as:

Object Identifiers (OIDs)

Ch. 25 Docker became of of the founding members of the ___________________________, a consortium whose mission is to guide the growth of container technology.

Open Container Initiative

Ch. 9 Which of the following platforms are used to control Hypervisor sessions across a large virtualized environment? (Check-all-that-Apply)

Openstack

Ch. 9 Each Virtual Machine has it's own: (Check-all-that-Apply)

Operating system Kernel Libraries and applications

Ch. 14 Which type of cable carries signals farther than copper pairs?

Optical fiber

Ch. 9 Which of the following are characteristics of cloud computer? (Check-all-that-Apply)

Rapid Elasticity On-demand Self-Service Broad Network Access Measured Service Resource Pooling

Ch. 20 What describes RAID?

Redundant Arrays of inexpensive disks

Ch. 14 Which type of device below forwards packets from one network to another network?

Router

Ch. 20 What is a lower - level system for abstracting storage, one that makes network storage look like a local hard disk?

SAN

Ch. 28 Which protocol below is the standard for network management in the TCP/IP protocol suite?

SMNP

Ch. 16 Which type of DNS zone record below defines the DNS zone and indicates that is the authority for the zone?

SOA

Ch. 20 Which hard disk technology below is faster, but has smaller disk size and more costly.

SSD

Ch. 7 Every process has at least three communication channels available in linux: (Click 3 choices)

STDERR (standard error) STDIN (standard input) STDOUT (standard output)

Ch. 22 Which of the following is an open source software package that implements server side of CIFS on Unix and Linux Hosts?

Samba

Ch. 20 Data is read from physical hard drives in concentric circles known as which of the following?

tracks

Ch. 14 When designing a network, one ethernet connection may be enough; however, four ethernet connections would be helpful for the following reasons (Check all-that-apply)

The can be uses with voice telephones It is much cheaper to do it initially rather than adding wires later. The can be used for visitors or demo machines The cost of materials is typically only 5% to 10% of the total cost.

Ch. 31 All of the types of information on ticketing systems below managers can extract, except:

The cpu percentage across all systems.

Ch. 17 A directory service like LDAP has some of the following data characteristics that are considered for candidates being included in the directory: (Check all-that-apply)

The database will be widely replicated and cached. The information is atttribute based. Data objecst are relatively small Data are read often but written infrequently. Searching is a common operation.

Ch. 11 The kernel abstracts several lower-level hardware features, including: (Select-all-that-apply)

The filesystem Signals and Semaphores Virtual Memory General input/output Interprocess communication Processes

Ch. 13 What does an ARP Table contain?

The table matches an IP Address with the associated MAC Address

Ch. 14 Most network design consists of specification of: (Check all-that-apply)

The types of media used The topology and routing of cables The use of switches and routers

Ch. 4 What is the identification number of the person that created or started the process called?

UID

Ch. 14 Which type of cable is the preferred cable medium for Ethernet?

UTP

Ch. 29 Which of the follow can be done to improve performance? (Check-All-that-Apply)

Use the correct RAID Solution and spread accross multiple disks Eliminate storage resources' dependence on mechincal devices. (Use SSD) Correct problems of usage Monitor the network.

Ch. 14 What does VLAN stand for?

Virtual Local Area Network

Ch. 19 What two main building blocks are used to implement the Web on top of the global Internet?

Web Server Web Browser

Ch. 19 Which of the following Servers are Application Servers? (Check-all-that-apply)

WebLogic WebSphere Tomcat

Ch. 15 A Link State routing protocol utilizes an algorithm that focuses on___________.

a destination network based on Shortest Path first, by computing topology information.

Ch. 10 Which log file attempts to keep a record of each user that is "currently" logged in?

utmp

Ch. 11 What is the standard name of the kernel file for Linux?

vmlinuz

Ch. 28 Which command below provide cpu usage information?

vmstat

Ch. 29 Which command below provide cpu usage information?

vmstat

Ch. 20 LVMs aggregate physical devices to form pools of storage called __________.

volume groups (pg. 741)

Ch. 30 When considering a UPS for a Data Center, the power all the devices consume, must be calculated to determine the size of the UPS needed. _____________________ is normally used to express power consumption of each device.

watts

Ch. 17 Which of the commands below would be an example of pulling a file:

wget

Ch. 18 What type of lists can an email server check to allow mail from specific sites?

whitelist

Ch. 18 A mail alias files can contain a list of users to send email to. In additional to a list of users, the file can contain: (Check all-that-apply)

a file to which messages should be appended a file containing a list of addresses a command to which messages should be given as input

Ch. 11 On Linux systems, device drivers are typically distributed in one of three forms:

a loadable module a patch against a specific kernel version an installation script or package that installs the drive

Ch. 12 Which of the following pieces does printing rely on? (Check-all-that-apply)

a network protocol a print spooler user-level utilities back ends that talk to the printing devices

Ch. 2 What is the standard term for "starting up a computer". During this process, the kernel is loaded into memory and begins executing.

bootstrapping

Ch. 30 If humidity is to high in a data center, the following can occur: (Check all-that-apply)

circuit boards oxidize circuit boards short circuit

Ch. 12 What defines a set of printers that share a print queue?

class

Ch. 17 Which ldap attribute below stands for common name?

cn

Ch. 16 Which of the following below are Top-Level Domain names: (Check-all-that-Apply)

com org gov edu net biz

Ch. 5 In what mode does the vi editor open by default?​

command mode

Ch. 25 A ________________ image simplifies matters by packaging an application an its prerequisites into a standard, portable file

container

Ch. 25 A ________________ is an isolated group of processes that are restricted to a private root filesystem and process namespace.

container

Ch. 26 ___________________ is the process of automatically deploying builds to nonproduction environments after the continuous integration process completes.

continuous delivery

Ch. 26 ___________________ closes the loop by deploying to live systems that serve real users without any operator intervention.

continuous deployment

Ch. 26 ___________________ is described as " closes the loop by deploying to live systems that serve real users without any operator intervention."

continuous deployment

Ch. 26 ___________________ is described as "a software development practice where members of a team integrate their work frequently."

continuous integration

Ch. 26 ___________________ is the process of collaborating on a shared code base, merging disparate code changes into a version control system, and automatically creating and testing builds

continuous integration

Ch. 1 What command below copies an entire directory and retrains the permissions:

cp -rp

Ch. 5 When doing an ls - ld on /usr/include, which item below indicates the filetype?

d

Ch. 10 Which of the following sylog.conf entries sends information about daemon and auth to a centralized syslog server on the network?

daemon,auth.info @netloghost

Ch. 17 Which ldap attribute below stands for domain component?

dc

Ch. 5 In vi, using command mode, what ​series of key presses below will cause the line on which the cursor is on to be deleted?

dd

Ch. 21 What type of automount map mounts filesystems that do not share a common prefix and use the full pathname?

direct maps

Ch. 17 Which file below would be used as a control file for the "rdist" command:

distfile

Ch. 10 What command below is used to view the kernel buffer and contains messages that were generated prior to "init" starting.

dmesg

Ch. 17 Select the correct distinguished name attribute for user gopher:

dn: uid=ghopper,ou=People,dc=navy,dc=mil

Ch. 18 What are the possible values in the nsswitch file for hosts? (Check all-that-apply)

dns nis files (pg. 614)

Ch. 25 The persistent daemon process that implements container and image operations for Docker is:

dockerd

Ch. 16 A ________________ reviews applications and assigns an organization a subdomain under one of the existing top-level domains.

domain name registrar

Ch. 16 With DNS, a client always contacts a local _______________ first.

domain name server

Ch. 16 The Domain Name System (DNS) is the system that provides name to address mapping for the Internet. DNS uses a hierachical naming scheme known as __________________.

domain names

Ch. 6 Which command installs, verifies and queries the status of packages in linux; Ubuntu as an example.

dpkg

Ch. 20 Select the command below that shows the size of a directory and its contents in kilobytes:​

du df

An __________________ system allows users to transfer memos across the Internet.

email

Ch. 10 Which of the following are syslog severity levels

emerg crit err (pg. 309)

Ch. 5 Which files below are used to attach filesystems, when the system is booted? (Check all that Apply)

etc/fstab /etc/filesystems /etc/vstab

Ch. 28 SNMP defines a low-level management protocol that provides for two conceptual operations:

fetch a value from a variable store a value into a variable

Ch. 20 A _____________mediates between the raw bag of blocks presented by a partition, RAID array, or logical volumen, and the standard ____________________ interface expected by most programs.

filesystem

Ch. 20 Errors on a filesystem are common on most filesystems. What do these errors indicate?

filesystem corruption

Ch. 18 Which of the following below do mail servers have: (Check all-that-apply)

filter mail for spam, viruses, and other malware Accept Outgoing Mail from MSAs or user agents receive incoming mail from the outside world allow users to access their mailxboxes with IMAP or POP deliver mail to end-users' mailboxes

Ch. 2 Which command-line options are available with GRUB? (Check all that apply)

find root kernel reboot

Ch. 7 Which find command below would find files only?

find . -type f -name '*.log'

Ch. 7 Which find command below would discard "permission denied" error messages only:

find / -name core 2> /dev/null

Ch. 20 What command can be used to check different kinds of filesystems on Linux for errors?

fsck

Ch. 23 Which of the following terminology across the different CM applications in the book identify an op type for each product? (check all-that-apply)

function module provider Resource Type, provider

Ch. 5 Which command below shows which users are actively using a filesystem?

fuser -c

Ch. 7 What command can be used to search text in a file and print lines that match a given pattern?

grep

Ch. 10 Which commands below can be used to view log files or text files?

grep cat tail

Ch 2 What command shuts the system down, kills nonessential processes, and executes a sync, waits for filesystem writes to complete, and stops the kernel?

halt (pg. 59)

Ch. 20 Which of the following below are considered storage devices? (Check all that Apply)

hard disk flash drive Solid State Device RAID array

Ch. 16 DNS utilizes a ________________ naming scheme.

hierarchal

Ch. 19 Which of the following are valid URL's (Check-all-that-apply)

http://www.google.com https://www.bankofamerica.com http://192.168.0.34

Ch. 30 If humidity is to low in a data center, the following can occur: (Check all-that-apply)

humidifiers might be needed static electricity problems

Ch. 19 Each web page is classified as a _______________ document.

hypermedia

Ch. 24 Virtual servers are created from ___________, which are templates of configured operatied systems that a hypervisor can load and execute.

images

Ch. 29 Which command below can be used to obtain information on disk performance?

iostat

Ch. 27 Which of the following commands below are used to filter tcp connections on linux? (Check-all-that-apply)

iptables ipf

Ch. 20 What technology implements a SAN with lower costing hardware rather than dedicated Fiber Channel network.

iscsi

Ch. 10 Which command below causes syslogd to close its log files, reread its configuration file, and start logging again?

kill -HUP

Ch. 8 What other authentication methods can be used that contain a database - like repository that can store user management data? (Check all that apply)

ldap Microsoft Active Directory

Ch. 18 What are the possible values in the nsswitch file for aliases (Check all-that-apply)

ldap nis files

What is the most important characteristic of a good password?

lenght

Ch. 2 Which run level boot the system to single-user mode?

level 1

Ch. 5 Which command below is used to create a symbolic link?

ln -s archived/secure /var/log/secure

Ch. 10 Which of the following is a user-level command that submits log entries from the shell?

logger (pg. 318)

Ch. 10 The syslog.conf file contains the following entry: local5.warning /tmp/evi.log Which logger command would send messages to the associated log file?

logger -p local5.warning "error message"

Ch. 20 Volume groups can be subdivided into ______________, similar to dividing a disk into partitions.

logical volumes

Ch. 12 Which command below enqueues jobs for printing. (Sends the job to the printer)?

lp

Ch. 12 Which command below configures printers and classes?

lpadmin

Ch. 12 Which of the following below are spoolers that run as stand-alone processes (daemons) to submit print jobs to the printer?

lpd lpsched

Ch. 12 Which cups command below shows available devices or drivers?

lpinfo

Ch. 12 Which command below sets system-wide defaults for printers?

lpoptions

Ch. 12 Which command below sends a file to be printed?

lpr

Ch. 12 Which command below cancels a print job?

lprm

Ch. 12 Which command below provides information on print jobs?

lpstat

Ch. 3 What command is used to determine the ownership of a file?

ls -l filename (pg. 67)

Ch. 11 What command is used to inspect the currently loaded kernel modules?

lsmod

Ch. 11 Linux has several make targets that let the administrator configure the kernel with different interfaces. Which make targets below have a configuration interface to assist with rebuiling kernels: (Check-all-that-Apply)

make menuconfig make config make xconfig make gconfig

Ch. 1 What command below is used to provide documentation for the "grep" command?

man grep

Ch. 16 What type of named server is considered the primary name server for a zone?

master

Ch. 21 What type of automount map contains a listing of the direct and indirect maps, which provides a list of all the maps to utilizing to automount filesystems?

master maps

Ch. 20 Which command below in Linux creates raid devices?

mdadm

Ch. 2 What is the command to attach a filesystem to the unix/linux operating system?

mount

Ch. 20 To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?

mount -a

Ch. 22 Which of the following would be used to mount a samba share across the network?

mount -t cifs -u username=joe //redmond/joes /home/joe/mnt

Ch. 29 Which command below generates cpu information for each individual processor?

mpstat

Ch. 20 What is the standard software for RAID implementation in Linux?

multiple disks (md)

Ch. 1 UNIX and Linux are ____ systems, which allow one user to execute more than one program at a time.

multitasking

Ch. 1 UNIX/Linux are ____ systems, which let many people simultaneously access and share the resources of a server computer.

multiuser

Ch. 6 Which tool below from AIX is used for performing automated installations?

nim

Ch. 27 Which tool below is a network port scanner:

nmap

Ch. 22 Most of Samba's functionality is implemented by two daemons

nmbd smbd

Ch. 16 What type of named server answers a query from cache and doesn't know if the data is still valid?

nonauthoritative

Ch. 17 Which ldap attribute below stands for organization?

o

Ch. 10 Which of the following is the library routines that submit messages to syslogd?

openlog

Ch. 27 Which tools below can be used for security power tools? (Check-all-that-apply)

ossec Nessus snort John the Ripper nmap Bro

Ch. 17 Which ldap attribute below stands for organizational unit?

ou

Ch. 4 What can be used on a Linux system to trace the lineage of each child process?​?

parent process ID

Ch. 7 A function name differs from a variable name because a function name is followed by a set of ____.

parenthesis

Ch. 20 What is a fixed - size subsection of a storage device?

partition

Ch. 7 Regular expressions, also called "regex", are used for:

pattern matching

Ch. 6 Which of the following below is the FreeBSD package manager?

pkg

Ch. 7 In shell scripts command lines begin with a(n)______

pound (#) symbol

Ch. 7 The variable symbol in a bash script contains the number of command-line arguments?

$#

Ch. 5 When doing an ls command, which filetype symbol below indicates a regular file?

-

Ch. 8 Which file below contains the actual user encrypted passwords recognized by the system?

/etc/shadow

Ch. 13 What range of IP networks below are used for private intranet ranges? (Select all that Apply)

10.0.0.0 169.254.0.0 192.168.0.0 172.16.0.0

Ch. 13 How many bits is an IPV6 Address?

128 bits

Ch. 13 From the following list, identify a valid Class B IP address:

129.112.54.6

Ch. 14 What is the typical packet size for transmission over ethernet?

1500 bytes (1518 with framing)

Ch. 30 Which Power-Tier model for racks in a data center would be an average wattage usage for High density 1U Servers?

16 KW

Ch. 15 Which IPv4 Multicast Address Space below announces and learns about other routers on this subnet

224.0.0.1

Ch. 30 According to the 2008 ASHRAE guidelines, data center humidity should be kept between?

30% to 55%

Ch. 13 How many bits is an IPV4 Address?

32 bits

Ch. 27 Which permissions below would set the id bit, so that the process runs as the users that owns the executable file?

4000

Ch. 13 How many bits is a MAC Address?

48 bits

Ch. 18 Which of the following Delivery status notifications (DSN codes) indicates "Mailbox is full"?

5.2.2

Ch. 13 Which of the following are public IP network IDs? (Choose two.)

8.0.0.0 172.32.0.0

Ch. 14 What is the designated protocol for Wireless Communication?

802.11

Ch. 5 At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes?

:q!

Ch. 7 To replace the file's existing content or create a new file, you use:

>

Ch. 7 To redirect STDOUT and STDERR, use the following:

>&

Ch. 7 To append output to an existing file, you use ______.

>>

Ch. 26 Which of the following are possible ways to deploy software: (Check all-that-apply)

A Shell script (ssh) a configuration management tool using a container image and use container management Use something

Ch. 13 Which protocol does a router use to obtain the MAC address of a PC host located on a directly connected subnet?

ARP

Ch. 13 ARP stands for:?

Address Resolution Protocol

Ch. 22 Which of the following cross platform services can Samba implement? (Check all-that-apply)

Authentication and authorization Network printing Service announcement (File and print server "browsing" Name resolution

Ch. 30 What is the standard for measuring heat load?

British Thermal Unit

Ch. 19 What does HTTP utilize to run scripts to obtain additional information?

Common Gateway Interference

Ch. 12 What is the definition of CUPS on Linus/Unix?

Common Unix Printing System (pg. 360)

Ch. 23 Which best describes what Configuration Management is?

Configuration Management Software automates the management of operation systems on a network.

Ch. 6 Before modifying a file, it is best practices to:

Create a backup revision of the file.

Ch. 13 What protocol can be used to automatically assign IP addresses and other parameters to a host or router?

DHCP

Ch. 13 Which term can be used as an equivalent to default router?

Default gateway

Ch. 16 DNS stands for:

Domain Name System

Ch. 13 An IP address consists of a 32-bit binary number. When written like this: 192.168.1.1, it is known as ________ notation.

Dotted-Decimal

Ch. 5 It is acceptable to use shell metacharacters when naming files.

False

Ch. 15 What is the processing of choosing the path for a packet?

Forwarding

Ch. 28 What are the most common uses of netstat. (Check all-that-Apply)

Inspecting interface configuration information Viewing operational statistics for various network protocols Monitoring the status of network connections. Examining the routing table Identifying the listening network service

Ch. 16 What does ICANN stand for?

Internet Corporation for Assigned Names and Numbers (ICANN)

Ch. 24 Each Virtual Machine has it's own: (Check-all-that-Apply)

Kernel Libraries and Applications Operating System

Ch. 17 The definition for LDAP is:

Lightweight Directory Access Protocol

Ch. 24 _________________ is helpful for high-availability load balancing, disaster recovery, server maintenance and gener system flexibility. This allows virtual machines to move between hypervisors running on different physical servers.

Live Migration

Ch. 28 Which popular SNMP tool that allows for graphing and polling of SNMP data and was written by Tobi Oetiker?

MRTG

SELinux utilizes an access control system in which all permissions are assigned by administrators and called:

Mandatory access control

Ch. 18 The first email messages consisted primarily of text. However, users needed to send attachments along with an email. In order to permit non-ASCII data items through the email, the following protocol was created to permit transmission of non-ASCII data items:

Multipurpose Internet Mail Extensions (MIME)

Ch. 15 What protocol allows a host to map between an IPv6 address and a hardware address (MAC)?

NDP

Ch. 21 Which protocol below lets you share file-systems among computers?

NFS

Ch. 21 Which version of NFS allows for "stateful" operations?

NFSv4

Ch. 15 Which of the following is considered to be a link state type routing protocol?

OSPF

Ch. 30 Which of the following below can be used to insure data center availability: (Check all-that-apply)

On-Site Generator UPS's Mechanical Systems Redundant Power Feeds

Ch. 27 What of the following below are good security practices for User Accounts and Passwords? (Check-all-that-Apply)

Password Aging Password Complexity Don't allow blank passwords

Ch. 27 Which of the following below comprises security? (Check-all-that-Apply)

Password not complex RootKits Worms Viruses

Ch. 27 What is PAM and what is its purpose? (Check-all-that-Apply)

Pluggable Authentication Module Implements authentication systems

Ch. 14 What is an extension of UTP Ethernet that transmits power to devices over the same UTP cable that carries Ethernet signals?

Power Over Ethernet (PoE)

Ch. 6 What is a standard protocol from Intel that allows systems to boot from a network interface?

Preboot eXecution Environment (PXE)

Ch. 20 Which RAID level is known as mirroring?

RAID Level 1

Ch. 20 Which RAID levels combined below indicate mirrors of stripes? (Check 2)

RAID Level 1 RAID level 0

Ch. 20 Which RAID level stripes both data and parity information, adding redundancy while improving read performance, but adds two parity disks?

RAID Level 6 (pg. 756)

Ch. 15 Which of the following is considered to be a Distance Vector type routing protocol? (Check all that Apply)

RIP IGRP

Ch. 21 Which of the following flavors of authentication can be uses with NFS. (Check all-that-apply)

RPSEC_GSS AUTH_SYS AUTH_NONE

Ch. 28 Which of the following is a database tool, also written by Tobi Oetiker, to storing graphical performance metrics?

RRDtool

Ch. 23 Which of the following are sample operations that a CM system can handle right out of the box? (check all-that-apply)

Restart a Service Create or remove a database account Add a cronjob Copy files to or from systems

Ch. 19 Define the SSL protocol:

Secure Sockets Layer

Ch. 2 Solaris revamped the boot process with the introduction of its:

Service Management Facility

Ch. 9 Which two attributes are Clouds defined?

Service Models Deployment Models

Ch. 31 Which of the following below are issues to consider when documenting standards? (Check all-that-apply)

Service times House calls Upgrade Policy Response Time

Ch. 27 Which of the following below are good security practices? (Check-all-that-Apply)

Set traps to help detect intrusions and attempted intrusions. Monitor Reports from security tools Look for unusual Activity

Ch. 4 What kill signal stops a process, then restarts it with the same PID?

Sighup

Ch. 18 The standard transfer protocol for sending email across the internet is:

Simple Mail Transfer Protocol (SMTP)

Ch. 28 What is SNMP:

Simple Network Management Protocol

Ch. 8 What scheme allows credentials to be more complex for authentication and allows a login to multiple systems from linux to Microsoft?

Single sign-on systems (SSO)

Ch. 4 Which Process state indicates the process is waiting for some resource?

Sleeping

Which of the following below are process states? (Check all that Apply)

Sleeping Zombie Runnable Stopped

Ch. 27 Which of the following below comprises security? (Check-all-that-Apply)

Software not patched Social Engineering Bugs Phising

Ch. 18 Which program below written in perl by Habeeb Dinu is used to eliminate spam from email.

SpamAssassasin

Ch. 26 Many development sites run at least three environment, some more. Select the three minimum environments.

Staging Production Development

Ch. 4 Which Process state indicates the process is suspended and not allowed to execute?

Stopped

Ch. 23 Which of the following are best practices for CM? (check all-that-apply)

Subdivide configurations ruthlessly. Sensitive data should be encrypted The CM Server should be well protected as it runs as root. Don't test on Production Servers. Keep the configuration base under version control. Keep different data under different directories or repositories.

Ch. 29 Which of the following steps below are using to analyze performance problems? (Check-All-that-Apply)

Summarize the evidenc both narratively and grahpically. Formulate the question Gather and clssify evidence Develop a conclusion statemen. Critically appraise the data

Ch. 14 Which device below is a link-layer device that takes an active role in forwarding ethernet frames locally?

Switch

Ch. 14 Which type of device below sends ethernet frames based on the MAC address and the associated port.

Switch

Ch. 15 BGP is considered a reliable routing protocol because it assumes reliable transport; therefore BGP uses the following communication:

TCP

Ch. 13 Internet Protocol defines two major protocols. What are the two major protocols:

TCP UDP

Ch. 19 What components below in a URL describe how to access the object? (Check-all-that-apply)

TCP/IP Port Directory Filename Protocol or Application Hostname

Ch. 24 Multiple virtual machines can exist on the same server.

True

Ch. 5 Linux uses a logical directory tree to organize files into different folders.

True

Ch. 24 Which type of hypervisor below runs directly on the hardware without a supporting OS?

Type 1 (bare-metal)

Ch. 2 For the Ubuntu operating system, init was replaced with:

Upstart

Ch. 14 What type of technology allows a switch to act as two seperate local area networks?

VLAN

Ch. 15 A Distance-Vector routing protocol utilizes an algorithm that focuses on___________.

a destination network and a next-hop router to reach the destination.

Ch. 5 What type of pathnames are interpreted as being the full location of the file or directory?

absolute

Ch. 18 Two fields in the switch file impact the mail system:

aliases hosts

Ch. 16 When a client queries DNS, a client must specify the type in its query; servers specify the data type in all resource records they return. A Type A record is:

an IPv4 Host Address

Ch. 16 When a client queries DNS, a client must specify the type in its query; servers specify the data type in all resource records they return. A Type AAAA record is:

an IPv6 Host Address

Ch. 2 Which command on Sun hardware boots to single-user mode?

boot -s

Ch. 7 The ______ statement simplifies the selection of a match when you have a list of choices.

case

Ch. 5 To display the contents of a text file called data, what command should be used?

cat data

Ch. 5 Which chmod command below would change privilege on a file to allow full privileges to owner and group, but only read privileges to everyone else?

chmod 774 file

Ch. 5 Which command below provide the ability to modify the group and ownership of a file? (Check all that Apply)

chown chgrp

Ch. 27 Which command below confines a process to a specified directly; also referred to as "jailed"

chroot

Ch. 25 Docker's primary product is a client/server application that builds and manages containers. Written in Go and highly module, the product is called:

container engine

Ch. 10 Which of the following are syslog facility names?

daemon kern auth

Ch. 6 Which tool below from Ubuntu is used for performing automated installations?

debian-installer

Ch. 20 Which command below provides the easiest method for monitoring free space on mounted filesystems?

df

Ch. 1 Which command below can be used as an editor in Unix-Linux? (Check all that Apply)

emacs vi vim

Ch. 5 The command strings /bin/echo displays the raw binary characters inside the /bin/echo binary executable program.

false

Ch. 21 Which of the following implement file locking in Unix using system calls? (Check all-that-apply)

fctnl flock lockf

Ch. 7 The ___________ command can be used to loop through a range of values?

for

Ch. 4 To create a new process, a process copies itself with the _______ system call.

fork (pg 93)

Ch. 13 What is the processing of choosing the path for a packet?

forwarding

Ch. 27 What is a reasonable approach to patching? (check-all-that-apply)

have a regular patch schedule a change plant that documents the impact of each set of patches a understanding of what patches are relevant to the environment.

Ch. 20 What linux utility can send secure erase commands, interact with firmware of SATA, IDE, and SAS hard disks?

hdparm

Ch. 7 What command reads the beginning of a file?

head

Ch. 28 Which of the following below are monitoring software?

icinga nagios SignalFX Solarwinds

Ch. 21 What type of automount map mounts several filesystems underneath a common directory?

indirect maps

Ch. 2 After the kernel is running, the _______ process begins executing startup scripts.

init

Ch. 2 What process defines one single-user and several network-enabled "run levels" to determine which of the system resources are enabled?

init

Ch. 28 Which command below can be used to obtain information on disk performance?

iostat

Ch. 18 Which email address below is a valid email address:

[email protected]

Ch. 30 When considering a UPS for a Data Center, the power all the devices consume, must be calculated to determine the size of the UPS needed. The amount of power a UPS can provide is typicalled labeld in:

kVA (kilovolt-amperes)

Ch .2 During the bootstrapping process, what is the first program loaded into memory to be executed?

kernel

Ch. 6 Which tool below from Red Hat is used for performing automated installations?

kickstart (pg. 156)

Ch. 10 Which daemon handles the kenre's ongoing loggin?

klogd

Ch. 5 When doing an ls command, which filetype symbol below indicates a symbolic link?

l

Ch. 10 Which command below accesses the log file which contains a record of users logins?

last

Ch. 5 Which command below is used to create a directory?

mkdir

Ch. 11 Which command can devices files be created manually with?

mknod

Ch. 11 What command is used to load a kernel module and look for dependencies?

modprobe

Ch. 11 What command is used to pass parameters to a loadable kernel module?

modprobe

Ch. 21 Which command below can be used to make a filesystem available on an NFS client.

mount

Ch. 28 Which command below generates cpu information for each individual processor?

mpstat

Ch. 16 Which file below, located in /usr/sbin on Linux, is the name server daemon?

named

Ch. 16 What configuration file is used in BIND that identifies each zone, zone type, and the associate file, which contains all the zone records?

named.conf

Ch. 29 What command below allows for looking at network information?

netstat

Ch. 8 To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?

newgrp

Ch. 17 Which of the following commands is primarily a "push" of files. For example, pushes files from a central server to another server in the infrastructure.

rdist

Ch. 6 Which command installs, verifies and queries the status of packages in linux; redhat as an example.

rpm (pg. 164)

Ch. 22 Which file below can be used to configure Samba options:

smb.conf

Ch. 22 Which of the following commands below would be used to diagnose any Samba issues?

smbstatus

Ch. 4 Which of the following below are process information files in the Linux "/proc" directory? (Check all that Apply)

stat fd environ maps

Ch. 21 _____________ servers keep track of all open files across the network.

stateful

Ch. 7 What command reads from the end of a file?

tail

Ch. 16 With DNS, hierarchical machine names are assigned according to the structure of organizations that obtain authority for parts of the namespace, not necessarily according to:

the structure of the physical network interconnections.

Ch. 7 A ____ is used to refer to the users' home directory.

tilde (~)

Ch. 11 Which deamon listens for messages from the kernel regarding device status changes?

udevd

Ch. 5 Which built - in shell command below sets the default permission for a user, when a file is initially created?

umask

Ch. 5 Which command below detaches a filesystem to the operating system?

unmount

Ch. 8 In order to create user accounts on a Linux system, what command should be utilized?

useradd

Ch. 20 What two commands can be used to show information about physical volumes and logical volumes respectively?

vgdisplay lvdisplay

Ch. 9 Which of the following of the two items defines cloud computing?

virtualization abstraction

Ch. 9 In order for something to be considered in the "cloud", the primary technology must be:

virtualized

Ch. 20 Which Linux command below provide the ability to partition filesystems? (Check all that Apply)

wrong fdisk cfdisk fdisk cfdisk idisk fdisk format fdisk cfdisk

Ch. 21 Which file below is used to configure the exported directories (filesystems) on Solaris?

/etc/dfs/dfstab

Ch. 2 Ubuntu uses job definition files instead of an inittab file to startup processes. The directory is located in:

/etc/event.d

Ch. 21 Access to NFS volumes is granted by the following file:

/etc/exports

Ch. 30 When cooling a datacenter, which of the following components need to be considered for heat load?

All of the above

Ch. 28 What is a MIB?

Management Information Base

Ch. 20 Which of the following below combines multiple storage devices into one virtualized device?

RAID array

Ch. 5 The more command should not be used on binary files.

True

Ch. 9 Multiple virtual machines can exist on the same server.

True

Ch. 6 It's possible to upgrade an entire system full of software with a single ____________ command.

apt-get

Ch. 4 Which command sets the process's nice value at the time of creation?

nice (pg 103)

Ch. 7 The ______ statement continues to look and execute commands or statements as long as a given condition or set of conditions is true.

while

Ch. 7 Which special character in regular expression matches one of the preceding element?

?

Ch. 20 Describe the Linux Recipe to add an additional partition.

?? Run sudo fdisk -l to list the system's disks and identify the new drive. Install a partition table using fdisk command. The n subcommand created a new partition.

Ch. 27 Which of the following tools are used for cryptographic utilities in Linux? (Check-all-that-Apply

PGP SSH Kerberos

Ch. 4 What is the unique process number that the kernel assigns to a process called?

PID

Ch. 19 Which of the following are embedded scripting modules for the Apache web server? (Check-all-that-apply)

Perl Ruby on Rails Python PHP

Ch. 18 What is the most popular protocol used to transfer email messages from a permanent remote mailbox to a local computer?

Post Office Protocol

Ch. 31 Which of the following processes below are part of the Information Technology Infrastructure Library? (Check all-that-apply)

Problem Management Configuration Management Help Desk Change Management Release Management Incident Management

Ch. 14 When designing a network, what are prime targets for central control: (Check all-that-apply)

Protocols, mostly to ensure that they interoperate Routing policy to the Internet The backbone network itself, including the connections to it. The network design, including the use of subnets, routers, switches, etc.. Host IP addresses, hostnames, and subdomain names

Ch. 11 Which methods below are used to configure a Linux Kernel?

Providing operational directives at boot time through the kernel loader. (GRUB) Loading new drives and modules into an exiting kernel on the fly. Modifying tunable kernel configuration parameters Build a kernel from scratch

Ch. 20 Which RAID level stripes both data and parity information, adding redundancy while improving read performance?

RAID level 5

Ch. 18 Which of the following are SMTP commands? (Check all-that-apply)

RCPT TO: fwdpath HELO hostname MAIL From: revpath DATA

Ch. 18 In theory, a mail system consists of the following components (Check all-that-apply)

access agent mail user agent mail submission agent delivery agent mail transport agent

Ch. 15 To handle large intranets and limit routing overhead, OSPF allows a site to partition its networks and routers into subset called ________.

areas (pg. 489)

Ch. 13 What command can be used on most modern PC operating systems to display the contents of the ARP cache from the CLI?

arp -a

Ch. 21 Instead of hard mounting an NFS filesystem at boot time, we can utilize the ______________ daemon process to mount the NFS filesystem, only when we need it. For example, using the change directory command "cd /filesystem:".

automountd

Ch. 8 Which files below are common startup files for bash, when logging in?

bashrc .bash_profile

Ch. 18 What type of lists can an email server check to reject mail from specific sites?

blacklist

Ch. 4 The _____________ of a process is a numeric hint to the kernel about how the process should be treated in relation to other processes contending for the CPU.

niceness (pg 102)

Ch. 2 Which file tells the "init" process what to do at each run level?

/etc/inittab

Ch. 2 What directory is the majority of scripts stored for each run level? Each rclevel.d directory, then contains a symbolic link to the primary directory where the scripts are stored.

/etc/int.d

Ch. 3 Which file stores protected passwords for accounts?

/etc/shadow

What two files on the Unix/Linux systems contain usernames and their passwords.

/etc/shadow /etc/passwd

Ch. 3 When sudo is run, which file is consulted and lists the people who are authorized to use sudo and the commands they are allowed to run on each host?

/etc/sudoers (pg 71)

Ch. 2 Many of RedHat Linux's configurations during the boot process are located under which directory:

/etc/sysconfig

Ch. 2 When a Unix or Linux Operating System on a PC or proprietary system is first turned on, the boot process begins at which level. (Check all that Apply)

Bios (PC) Firmware ROM

Ch. 4 What is the name of the filesystem that "ps" reads process status information from?

/proc

Ch. 4 What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?

-e

Ch. 4 What two ps options can be used to display a full list of information about each process, and a long list of information about each process?

-f -l

Ch. 1 The following operating system below is not a popular Linux Distribution:

AIX

Ch. 1 What are the essentilal duties of a Systems Administrator? (Check All that Apply)

Adding & Removing Hardward Monitoring the System Performing Backups Account Provisioning Installing and Upgrading Software Firefighting & Troubleshooting Documentation

Ch. 4 What is the effective user identification of a process called?

EUID

Ch 4. What is the identification number of the group that created or started the process called?

GID

Ch. 3 A _________ gives a group of users equal access files that they all share.

GID

Ch. 2 What is the default boot loader for most UNIX and Linux system with Intel Processors and loads the unix/linux kernel?

Grand Unifed Boot Loader (GRUB)

Ch. 2 Which type of file stops the process for the associated runlevel, when a Unix/Linux Server is shutdown?

K80cups

Ch. 3 _________ also deals with authentication similar to PAM, but uses a specific authentication method; unlike PAM which is a framework.

Kerberos (pg 81)

Ch. 2 When the BIOS selects the device to boot from, it tries to read the first block of the device, know as the:

Master Boot Record (MBR)

Ch. 3 In the Unix/Linux Operating System permissions on a files and directories consist of: (Ex... rwxrwxrwx (Check All that Apply)

Other Group Owner or user

Ch. 3 What technology is an authentication technology rather than an access control technology?

Pluggable Authentication Modules (PAM)

Ch. 4 Utilizing the kill command, what "number" would be used to send a Quit?

kill -3

Ch. 4 Utilizing the kill command, what "number" would be used to send a Kill?

kill -9

Ch. 2 Which run level "reboots" the system?

level 6

Ch. 1 What command below prints a list of manual pages that have the keyword "translate".

man -k translate

Ch. 1 What command shows the path to manual pages?

manpath

Ch. 5 Which command below attaches a filesystem to the operating system?

mount

Ch. 2 What state with the svcs command in Solaris indicates enabled and successfully started:

online

Ch. 4 In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?

process state

Ch. 4 Which command below sets the nice value to of process to 5?

renice 5 -u boggs

For security reasons, most Unix/Linux systems allow _________ logins to be disabled on terminals through network access, except on the main console.

root

Ch. 3 What account on a Unix System is known as the "superuser" account?

root (pg. 67)

Ch. 1 What command below would be utilized to check if the python package was installed on the Red Hat or SUSE Linux Operating Systems?

rpm -q python

Ch. 1 What is the easiest command to utilize to understand whether a command is available and installed on the system. For example, the Gnu C compiler. (Check All that apply)

which gcc


संबंधित स्टडी सेट्स

What governing body has the authority to revoke or suspend a nurse's license?

View Set

Chapter 37. The Bereaved Individual

View Set

Digital Camera/Photography Terms

View Set

Which of the following joints is most likely to be affected by arthritis associated with autoimmune thyroid disease?

View Set

Unit 1: Preparing to Work With Illinois Sellers

View Set

Lección 3 Contextos (Lesson, Contexts) 3 - Profesiones (Professions)

View Set