Unix/Linux Study Guide Part 1
179. The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.
0.0.0.0; 255.255.255.255
85. RAID level ____ is often referred to as disk mirroring.
1
212. The shell restricts the number of file handles that programs can open to ____ by default.
1024
90. If a Linux installation ends abnormally and the screen displays a "fatal signal ____" error message, it indicates an error known as a segmentation fault.
11
200. NetBIOS names can be up to ____ characters long.
15
82. Most Parallel SCSI controllers support up to ____ devices.
15
10. The source code for Linux was released in ____.
1991
118. In Linux, runlevel ____ is also known as multiuser mode.
2
98. The file descriptor stderr is represented by the number ____.
2
21. The recommended size for the /home directory is ____ per user.
200 MB
180. The subnet mask for a Class B IP address is ____.
255.255.0.0
181. The subnet mask for a Class C IP address is ____.
255.255.255.0
20. Hard disks can contain a maximum of ____ major partitions
4
161. The compression algorithm used by the compress utility has an average compression ratio of ____%.
40-50%
167. If no level of compression is specified, the gzip command assumes the number ____.
5
86. RAID level ____ is commonly referred to as disk striping with parity.
5
148. By default, all print jobs have a priority of ____.
50
133. There are ____ different kill signals that the kill command can send to a certain process.
64
164. The average compression ratio for gzip is ____%.
67-70%
63. When using the chmod command, the mode rwx can be represented by the number ____.
7
83. The highest priority SCSI device is given a SCSI ID of ____.
7
178. Each octet in an IP address represents a(n) ____ binary number.
8-bit
182. IPv6 IP addresses are delimited by the ____ character.
:
31. ____ is the metacharacter for command termination.
;
100. You can redirect a file to the standard input of a command using the ____ metacharacter.
<
99. You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file.
>
39. The ____ symbol indicates a linked file.
@
25. The shell that is used by default in Linux is the ____ shell.
BASH
46. Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?
Ctrl+g
193. ____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet.
DNS
207. The ____ SQL statement is used to delete a database.
DROP DATABASE
198. The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.
DirectoryIndex Index.html
47. The ____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor.
Emacs editor
14. A(n) ____ service provides an efficient method for transferring files over the Internet.
FTP
4. The ____ stipulates that the source code of any software published under its license must be freely available.
GNU General Public License
204. When working with Sendmail, you can use the ____ command to test SMTP support.
HELO
124. The two most common desktop environments that are used on Linux are ____ and ____.
KDE and GNOME
7. HOWTO documents are centrally collected by the ____.
Linux documentation project
15. A(n) ____ service allows users to post messages in forums.
News
203. Client computers can retrieve e-mail from e-mail servers via ____ or ____.
POP and IMAP
174. Most Linux distributions today use ____ as their package manager.
RPM
13. ____ Linux is the most common Linux distribution used today.
Red Hat
84. The ____ standard support speeds of up to 80 MB/second.
SCSI-3 Ultra2 Wide
134. The ____ kill signal stops a process and then restarts it with the same PID.
SIGHUP
213. When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.
SIGHUP
135. The ____ kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory.
SIGQUIT
114. ____ of the GRUB boot loader typically resides on the Master Boot Record.
Stagel
197. Apache daemon listens for HTTP requests on port ____.
TCP 80
220. A(n) ____ is a program that can start a network daemon.
TCP wrapper
177. The most common LAN protocol used today is ____.
TCP/IP
92. ____ installation log file(s) is/are created by the Fedora installation program.
Two
195. NTP uses port ____.
UPD 123
22. The ____ filesystem is compatible with the Windows FAT filesystem.
VFAT
11. The core component of the GUI in Linux is referred to as ____.
X Windows
123. ____ is a freely available version of X Windows used in many Linux distributions.
XFree86
41. Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?
[1-4]
112. The test statement ____ would be used to determine if A is numerically greater than B.
[A -gt B]
111. The ____ escape sequence represents a form feed.
\f
154. The ____ priority used by the System Log Daemon indicates an error that should be rectified immediately, such as a corrupt system database.
alert
104. The ____ command can be used to extract, manipulate, and format text using pattern-action statements.
awk
29. The command that displays the calendar for the current month is ____.
cal
42. To display the contents of a file called data, use the command ____.
cat data
35. To move from the /home/joe/test/data to the /home/joe directory, use the ____ command.
cd../..
65. Devices that transfer data in a character-by-character fashion are referred to as ____ devices.
character
64. To set all of the special permissions on a certain file or directory, you can use the command ____, where name is the name of the file or directory.
chmod 7777 name
105. Most configuration files on Linux systems are delimited using ____ characters.
colon
78. Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.
corruption
52. Copying a file can be accomplished using the ____ command.
cp
199. The ____ command can be used in the BASH prompt to obtain a Web page from the Apache server.
curl
129. A system process that is not associated with a terminal is called a(n) ____ process.
daemon
1. A(n) ____ is a piece of software that tells the operating system how to use a specific hardware device.
device driver
77. The easiest method for monitoring free space by mounted filesystems is to use the ____ command.
df
107. The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.
echo $PS1
80. You can edit the quotas for certain users by using the ____ command.
edquota
108. To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command.
env
28. Which Linux command gets you out of your current shell?
exit
73. CD-ROMs typically use the ____ filesystem type.
ext3
76. To create partitions after installation, you can use the ____ command.
fdisk
139. After a background process has been started, it can be moved to the foreground by using the ____ command.
fg
9. Solaris, HP-UX and AIX are all ____ of Unix.
flavors
5. ____ is software that is distributed free of charge, but the source code is not available.
freeware
79. To check a filesystem for errors, you can use the ____ command, which can check filesystems of many different types.
fsck
62. When using the chmod command for a specific file, the ____ argument would add read permission and remove write permission for the group permissions.
g+r-w
48. The ____ editor is functionally analogous to the Windows Wordpad and Notepad editors.
gedit
115. To create an encrypted password for use in the /boot/grub/grub.conf, you can use the ____ command
grub-md5-crypt
210. ____ are the most common hardware component to fail on Linux systems.
hard disks
183. IPv6 IP addresses are written using eight 16-bit ____ numbers.
hexadecimal
8. Which of the following is the greatest expense for companies using Linux?
hiring people to maintain the linux System
186. Computer names are called ____.
host names
184. The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.
ifconfi
116. In the /etc/lilo.conf file, the ____ keyword specifies the absolute pathname to the Linux kernel.
image=
117. In the /etc/lilo.conf file, the ____ keyword specifies the file that contains the physical layout of the disk drive.
install=
18. ____ is the most common method of installing Linux.
installation from a DVD
95. The ____ file in the /proc directory contains a list of memory address ranges reserved for device use.
ioports
88. In Fedora Linux, a ____ file is a script file that specifies the choices that you would normally choose when you install the operating system.
kickstart
57. To create a hard link, you must use the ____ command.
ln
96. The ____ file in the /proc directory contains statistics on the performance of the processor.
loadavg
54. The fastest method to search for files in the Linux directory tree is to use the ____ command.
locate
145. To send a print job to a printer, you must first use the ____ command and specify what to print.
lp
150. You can restrict who can print to certain printers by using the ____ command.
lpadmin
146. To see a list of all printers on the system and their status, you can use the -t option to the ____ command.
lpstat
40. The ____ command can be used to provide a long listing for each file in a certain directory.
ls l
175. The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.
make
32. To find all of the commands that have the word "list" in their name or description, you would type ____.
man -k list
125. The ____ window manager is used for the GNOME desktop in Red Hat Fedora Core 2.
metacity
2. The ____ indicates the stability of a Linux kernel.
minor number
59. The section of an inode that stores permissions is called the ____ of the file.
mode
72. To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, you can simply type the ____ command.
mount -a
201. The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.
mput filename
205. When working with Sendmail, if you modify the /etc/aliases file, you need to run the ____ command to rebuild the aliases database.
newaliases
160. To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the ____ command.
newgrp
173. You can perform up to ____ different incremental backups using the dump/restore utility.
nine
219. To see what network services are running on your network, you can run the ____ command.
nmap
217. Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.
nohup
122. Which utility can be used to modify runtime configuration files so that they start and stop daemons when entering a particular runlevel?
ntsysv
3. The concept of ____ enables software developers to read other developers' source code, modify that source code to make the software better, and redistribute that source code to other developers who might improve it further.
open source software
26. ____ are specific letters that start with a dash ("-").
options
208. The ____ PostgreSQL command-line utility backs up PostgreSQL database settings.
pg_dump
185. The ____ command sends a small TCP/IP packet to another IP address and awaits a response.
ping
17. Because you need to document so many pieces of hardware and software information, you should create a ____ that contains all important installation information as well as hardware information.
preinstallation checklist
131. In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.
process state
223. Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.
public and private
155. To convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.
pwconv
33. The ____ command will confirm the system directory that you are currently in.
pwd
110. If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.
read and execute
189. The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.
rlogin
53. The ____ command takes a list of arguments specifying the absolute or relative pathnames of files to remove.
rm
70. The ____ filesystem contains most of the operating system files.
root
152. The ____ log file contains information and error messages regarding network access generated by daemons such as sshd and xinetd.
secure
191. ____ is a remote administration tool that encrypts information that passes across the network.
secure shell (SSH)
121. You can use the ____ command to start, stop, or restart any daemons listed within the /etc/rc.d/init.d directory.
service
106. To see a list of the environment variables and their current values on a system, you can use the ____ command.
set
24. In Linux, a(n) ____ is used to accept input from the user and pass the input to the kernel for processing.
shell
87. A Fedora 13 CD installation requires ____ CDs.
six
143. The ____ field in a cron table contains the absolute pathname to the command to be executed.
sixth
224. In SSH, the /etc/ssh directory stores the DSA public key in the ____ file.
ssh_host_dsa_key. pub
6. Consider the phrase "collaboration between several developers with a common need speeds up software creation, and when bugs in the software are found by these users, bug fixes are created very quickly" from the chapter. This statement describes which advantage of the Linux operating system?
stability and security
218. The ____ command can be used to obtain root access when you need to perform an administrative task.
su
56. The ____ section of a filesystem is the section that contains information about the filesystem in general.
superblock
16. Companies and institutions using computers to perform extraordinarily large calculations that would be unsuitable for most computers would employ a(n) ____.
supercomputer
127. To configure your keyboard, you can use the ____ command from either a GUI or terminal environment and restart X Windows.
system-config-keyboard
36. If you type enough unique letters of a directory and press ____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information.
tab
206. Databases store information in the form of ____, each of which contains ____.
tables and records
43. The ____ command displays the last five lines of a text file.
tail -5
12. A ____ is merely a compressed archive of files that usually contain scripts that install the software contents to the correct location on the system.
tarball
81. Each SCSI device is assigned a unique ID number known as a(n) ____.
target ID
214. By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.
ten
37. Most files on a Linux system that contain configuration information are ____ files.
text
91. Some installations fail to place a boot loader on the hard disk properly
this is often the case with large hard disk drives that have over ____ cylinders.;1024
136. You can execute ____ main types of Linux commands.
three
187. The /etc/resolv.conf file can contain up to ____ DNS servers.
three
209. All Linux problems can be divided into ____ categories.
three
101. The ____ command can be used to replace characters in a file sent via Standard Input.
tr
75. Data is read off of hard disks in concentric circles called ____.
tracks
19. During Linux installation, you need to configure a minimum of ____ user account(s).
two
58. The chgrp command takes ____ argument(s) at minimum.
two
74. Linux requires ____ partition(s) at minimum.
two
69. The ____ filesystem is used by software programs that write to a CD-RW or DVD-RW drive.
udf
156. You can create user accounts on the Linux system by using the ____ command.
useradd
192. Remote computers can connect to a configured VNC server using the ____ command.
vneviewer
103. The ____ command counts the number of lines, words, and characters in a file.
wc
27. Which Linux command displays your login name?
whoami
61. If a user has ____ permission for a file, they can open, read, and edit the contents of a file.
write
132. The ____ option to the ps command displays all processes that do not run on terminals.
x
128. After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility within the desktop environment.
xvidtune
163. The ____ command can be used to display the contents of a compressed file.
zcat
44. Which is an extended regular expression metacharacter?
{}
102. You can send the standard output of one command to another command as standard input using the ____ shell metacharacter.
|
34. The ____ metacharacter can also be used to refer to the current user's home directory.
~
138. When killing a background job with the kill command, you must prefix the background job IDs by a(n) ____.
%
137. When you append a(n) ____ to a command, the command is run in a background process.
&
30. The ____ metacharacter indicates background command execution.
&
45. The ____ regular expression metacharacter matches 0 or more occurrences of the previous character.
*
140. When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.
+
60. In a file's mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode.
-
215. The ____ option for the sar command is used to display swap statistics.
-B
38. To view a list of files and their type, use the ____ switch to the ls command.
-F
158. To lock an account, you can use the usermod command with the ____ option.
-L
221. The ____ option to the iptables command can be used to specify the default policy for a certain chain type.
-P
211. To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.
-V
166. When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.
-c
147. The lp command uses the ____ option to specify the destination printer name.
-d
222. The ____ option to the iptables command can be used to specify the destination address of packets for a rule.
-d
130. To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.
-e
144. To create or edit a user cron table, you can use the ____ option to the crontab command.
-e
176. To remove a package from the system, you can use the ____ option to the rpm command.
-e
165. When used with the compress command, the ____ option can be used to compress symbolic links.
-f
142. To display a list of at Job IDs, you can specify the ____ option to the at command.
-l
168. The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.
-l
172. When using the cpio utility, the ____ option causes a new archive to be created.
-o
149. The ____ option to the lpstat command causes a list of printers that are enabled to be displayed.
-p
170. When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames.
-p
216. The ____ option for the sar command is used to displays statistics for the processor queue.
-q
159. You can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents.
-r
71. To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.
-t
171. The ____ option can be used with the tar command to extract a specified archive.
-x
188. A common utility used to troubleshoot routing is the ____ command.traceroute
...
162. When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.
.Z
169. The filename extension given to files compressed with bzip2 is ____.
.bz2
113. The Linux kernel is stored in the ____ directory.
/boot
49. In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader.
/boot
68. If you do not know the type, major, or minor number of a device, you can use the ____ command to re-create the device based on the common name.
/dev/MAKEDEV
66. The ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave).
/dev/hdbl
67. The ____ device file represents the second serial port on the system (COM2).
/dev/ttyS1
126. If your system uses the X.org implementation of X Windows, the mouse, keyboard, monitor, and video adapter card information is stored in the ____ file in text format.
/etc/X11/xorg.conf
190. One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.
/etc/hosts.equiv
109. The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.
/etc/profile
120. After the entries in /etc/inittab have been executed, the ____ file is executed to perform tasks that must occur after system startup.
/etc/rc.d/rc.local
157. The skeleton directory on most Linux systems is ____.
/etc/skel
93. To verify hardware settings, you can examine the contents of the ____ directory.
/proc
94. To ensure that Linux has detected the correct amount of RAM in the system after installation, you can view the contents of the ____ file.
/proc/meminfo
50. In the FHS, the ____ directory is the root user's home directory.
/root
23. The ____ directory contains system commands and utilities.
/usr
51. In the FHS, the ____ directory contains most system commands and utilities.
/usr
151. Log files are typically stored in the ____ directory.
/var/log
194. The ____ zone configuration file contains a PTR record used to identify the loopback adapter.
/var/named/named.local
119. A Linux system in runlevel ____ is a system that has no daemons active in memory and is ready to be powered off.
0
141. Processes are started with a nice value of ____ by default.
0
196. In NTP, stratum ____ consists of atomic devices or GPS clocks.
0
97. The file descriptor stdin is represented by the number ____.
0
202. The ____ ftp utility command runs a shell on the local computer.
!
153. Any line that starts with a(n) ____ character is a comment in the /etc/rsyslog.conf file.
#
89. Any line in a kickstart file that starts with a(n) ____ symbol is a comment line and is ignored by the installation program.
#
55. You can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command.
$