43
Which character in the /etc/shadow file's encrypted password field means no password has been set for this user?
!
What operator below is known as the NOT operator?
!
What character, when appended to a command, causes the command to be run in the background?
&
When there are multiple background process executing in the shell, the jobs command indicates the most recent one with which symbol?
+
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.
+
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?
+
In a file's mode, a permission that is unavailable is represented by what character?
-
What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?
-F
When used with the uncompress command, what option displays the contents of the compress file to Standard Output?
-c
To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.
-e
When used with the compress command, the ____ option can be used to compress symbolic links.
-f
When used with the compress command, what option below can be used to compress symbolic links?
-f
The mkfs command can be issued with what switch in order to specify a filesystem type? a. -o b. -f c. -c d. -t
-t
The ____ option can be used with the tar command to extract a specified archive.
-x
What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?
-z -Z
dd
. In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted?
200 MB
. What is the recommended size for the /home directory?
When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.
.Z
The filename extension given to files compressed with bzip2 is ____.
.bz2
Which of the following files can you add filenames to so that the git add * command will not stage them?
.gitignore
Files with what two file extensions are commonly known as tarballs?
.tar.gz .tgz
The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?
/boot
The filesystem Hierarchy Standard specifies what directory as containing the Linux Kernel and the boot loader configuration files?
/boot
Under what directory is the Linux kernel stored?
/boot
Which device file below represents the first primary partition on the second PATA hard disk drive? a. /dev/hdb1 b. /dev/hdc2 c. /dev/hdc1 d. /dev/hda1
/dev/hdb1
In Fedora 20, where are user configured settings for Xorg stored?
/etc/X11/xorg.conf.d/
A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs?
/etc/cron.deny
The _________________ file often contains a single uncommented line that configures the default runlevel for a system.
/etc/inittab
Which of the following files is where the default runlevel is set on some Linux systems?
/etc/inittab
The configuration file(s) that is/are used to configure the BIND/DNS server:
/etc/named.conf
Which file holds the methods to be used and the order in which they will be applied for host name resolution?
/etc/nsswitch.conf
Which file contains user account information?
/etc/passwd
The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.
/etc/profile
What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?
/etc/profile
Match the file with the order in which the BASH shell environment files are read: First Second Third Fourth
/etc/profile /etc/profile.d/* /etc/bashrc ~/.bashrc
Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC?
/etc/resolv.conf
The sshd daemon is configured by editing what configuration file?
/etc/ssh/sshd_config
Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system?
/etc/sysconfig/network-scripts/ifcfg-eth0
What file in the /proc directory contains information about a computer's CPU?
/proc/cpuinfo
What file in the /proc directory contains information about a computer's CPU? a. /proc/meminfo b. /proc/cpuinfo c. /proc/cpu_info d. /proc/proc_info
/proc/cpuinfo
In addition to /etc/localtime, some Linux distributions also have an /etc/timezone text file that contains a reference to the correct time zone file contained in which directory?
/usr/share/zoneinfo
You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process? a. /var/log/boot.log b. /var/log/messages c. /var/log/startup.log d. /var/log/wtmp
/var/log/boot.log
Where are the log files for the Samba daemon located?
/var/log/samba
Where are the log files for the Samba daemon located?
/var/log/samba
Directory storing the shell environment and scheduled commands.
/var/spool/at
On a Fedora based system, where are the shell environment and scheduled commands for at stored?
/var/spool/at
On Linux, the root user always has a UID of what number?
0
Process are started with what nice value by default?
0
Processes are started with a nice value of ____ by default.
0
Processes are started with what nice value by default?
0
The file descriptor stdin is represented by the number ____.
0
What number represents the stdin file descriptor?
0
Which of the following represents stderr at the command line when used for redirection?
2
Which of the following port numbers is associated with telnet?
23
A Class A network uses how many bits for the network ID, and how many bits for the host ID?
24 bits for network ID 8 bits for host ID
What well-known TCP port is utilized by the SMTP service?
25
What well-known TCP port is utilized by the SMTP service?
25
What is the subnet mask for a Class B IP address?
255.255.0.0
What is the subnet mask for a Class C IP address?
255.255.0.0
What is the subnet mask for a Class C IP address?
255.255.255.0
What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?
255.255.255.255 0.0.0.0
What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size?
256-bit
What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size?
256-bit
Select the mode below that corresponds to setting r-x:
5
The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?
514
The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?
514
What value in the /etc/shadow file's password expiration field means the user's password never expires?
99999
IPv6 IP address are delimited by what character?
:
At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off? a. 0 b. 1 c. 6 d. 7
A
IPv6 IP addresses are delimited by what character below? a. : b. . c. , d. ;
A
In order to display a list of at job IDs, what option can be specified to the at command? a. -l b. -u c. -a d. -d
A
In order to display a list of at job IDs, what option can be specified to the at command? a. -l b. -u c. -a d. -d
A
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel? a. image= b. default= c. install= d. root=
A
In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. process state b. process flag c. process priority d. PID
A
In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. process state b. process flag c. process priority d. PID
A
On Linux, the root user always has a UID of what number? a. 0 b. q c. 23 d. 500
A
What character, when appended to a command, causes the command to be run in the background? a. & b. $ c. # d. %
A
Which command should be used to restrict access to printers? a. lpadmin b. lpa c. lpr d. admin
A
Which command should be used to restrict access to printers? a. lpadmin b. lpa c. lpr d. admin
A
RAID-Z
A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:
What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively? Multiple Answer a. PWD b. CWD c. PATH d. SHELL
A and D
cal
A calendar for the current month can be shown on the command line by issuing which command?
character
A device that transfers data in a character-by-character fashion is referred to as what type of device?
4
A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices?
Under what directory is the Linux kernel stored? a. / b. /boot c. /root d. /krnl
B
What character is used to delimit most Linux configuration files? a. tab b. colon c. space d. semicolon
B
What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted? a. grub-install b. grub2-install c. install_grub d. install_grub2
B
What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted? a. grub-install b. grub2-install c. install_grub d. install_grub2
B
What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon? a. psbranch b. pstree c. psparent d. pshead
B
What command below is used to display the lineage of a process by tracking its PPID until the init daemon? a. psbranch b. pstree c. psparent d. pshead
B
What command can be used to display the contents of a file that was compressed with the compress utility? a. acat b. zcat c. cat d. ccat
B
What device file below indicates the first ATAPI IDE tape device (nonrewinding)? a. /dev/st0 b. /dev/nht0 c. /dev/nst0 d. /dev/ht0
B
What file controls the default runlevel using Systemd? a. /etc/inittab b. /etc/systemd/system/default.target c. /etc/systemd/inittab.target d. /etc/systemd.comf
B
What file controls the default runlevel when using Systemd? a. /etc/inittab b. /etc/systemd/system/default.target c. /etc/systemd/inittab.target d. /etc/systemd.conf
B
What is the subnet mask for a Class B IP address? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255
B
What option can be added to the dpkg command to remove specified package from the system, including any configuration files used by the package? a. -d b. -P c. -D d. -r
B
What option can be added to the rpm command in order to query packages? a. -i b. -q c. -v d. -h
B
What option should be used in conjunction with lp command in order to specify destination printer name? a. -n b. -d c. -p d. -l
B
What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users? a. alert b. panic c. crit d. error
B
What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users? a. alert b. panic c. crit d. error
B
What yum command below can display a list of packagegroup names? a. yum list --groups b. yum grouplist c. yum -- list -g d. yum show groups
B
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol? a.* b. + c. - d. /
B
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol? a. * b. + c. - d. /
B
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? a. SIGINT b. SIGQUIT c. SIGKILL d. SIGTERM
B
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? a. SIGINT b. SIGQUIT c. SIGKILL d. SIGTERM
B
In the process state column, what does an "R" indicate? a. The indicated process is being restarted because it resceived a SIGHUP kill signal. b. The process is currently running on the processor. c. The process is reading from the local hard disk. d. The process is recovering from a fatal error, and may potentially become a zombie.
B
The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below? a. 780 b. 631 c. 4586 d. 8080
B
What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed? Multiple Answers a. secure b. wtmp c. lastlog d. xferlog
B and C
The GNOME 3 desktop environment utilizes what window manager and toolkit below? Multiple Answer a. kwin b. mutter c. Qt toolkit d. GTK+ toolkit
B and D
What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process? Multiple Answers a. SIGHUP b. SIGINT c. 1 d. 2
B and D
What two commands below can be used to modify the password expiry information and a user's default shell? Multiple Answers a. chexp b. chage c. shellmod d. chsh
B and D
____ is burning software that comes with Red Hat Fedora Core 2.
Brasero Disc Burner
After a background has been started, what command below can be used to move it to the foreground? a. b2f b. fgd c. fg d. fgnd
C
After a background process has been started, what command below can be used to move it to the foreground? a. b2f b. fgd c. fg d. fgnd
C
How many different kill signals can be sent by the kill command to a given process? a. 16 b. 32 c. 64 d. 128
C
If no level of compression is specified, the gzip command assumes what compression level? a. 4 b. 5 c. 6 d. 7
C
In order to download DPM packages, what command should be used below? a. yum b. apt-search c. apt-get d. dpm-grab
C
In order to send a print job to a printer using CUPS, what command must be used? a. print b. pl c. lp d. pr
C
In order to send a print job to a printer using CUPS, what command must be used? a. print b. pl c. lp d. pr
C
Most Linux distributions make use of what package manager? a. PRM b. MPR c. RPM d. RMP
C
Select the escape sequence that starts a new line when used with echo: a. \\ b. \a c. \n d. \r
C
Select the option that can be used with the lpstat command to display a list of printers that are enabled: a. -o b. -a c. -p d. -e
C
Select the test statement that can be used to determine if A is numerically greater than B: a. [ A -g B ] b. [ A -ge B ] c. [ A -gt B ] d. [ A +eq B ]
C
The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system? a. 827 b. 1012 c. 514 d. 23
C
The environment variables that are set by default and their current values can be viewed with what command? a. env b. get c. set d. setenv
C
The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file? a. # b. < c. > d. |
C
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. newgroup b. groupmod c. newgrp d. groupadd
C
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. newgroup b. groupmod c. newgrp d. groupadd
C
What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders? a. boot-config b. loaderconf c. grubby d. parted
C
What command can be used to search for DPM package information? a. dpkg-search b. dpkg-info c. dpkg-query d. dpkg-list
C
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm? a. 40%-50% b. 50%-60% c. 60%-70% d. 70%-80%
C
What is the default print job priority for all print jobs created by the lp command? a. -50 b. 0 c. 50 d. 100
C
What is the default print job priority for all print jobs created by the lp command? a. -50 b. 0 c. 50 d. 100
C
What is the default target on a system with a GUI installed? a. multi-user.target b. single-user.target c. graphical.target d. gui.target
C
What is the default target on a system with a GUI installed? a. multi-user.target b. single-user.target c. graphical.target d. gui.target
C
What is the most commonly used LAN protocol? a. DLC b. UDP/IP c. TCP/IP d. IPX/SPX
C
What is the subnet mask for a Class C IP address? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255
C
What kill signal stops a process, then restarts it with the same PID? a. SIGINT b. SIGQUIT c. SIGHUP d. SIGTERM
C
What option should be used in conjunction with the lp command in order to specify the destination printer name? a. -n b. -p c. -d d. -l
C
When using Systemd, what command can be used to start, stop and configure daemons to start automatically when the system starts? a. chkconfig b. service c. systemctl d. syscontroller
C
When using the compress utility, each file specified for compression is renamed with what extension? a. .cmp b. .c c. .Z d. .cpz
C
Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory? a. daemon b. manip-daemon c. service d. daemon-service
C
Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory? a. daemon b. manip-daemon c. service d. daemon-service
C
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package? a. -r b. -D c. -P d. -d
C
What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system? a. -c b. -U c. -F d. -z
C
When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts? a. chkconfig b. service c. systemctl d. syscontroller
C
Select the two window managers that have been used in GNOME:' Multiple Answer a.kwin b. lxde c. metacity d. mutter
C and D
The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc? Multiple Answers a. log.conf b. rsyslog.conf c. rsyslog.d d. log.d
C and D
What two commands below can be used to stop a process, either by PID number or process name? Multiple Answers a. end b. stop c. kill d. killall
C and D
What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively? Multiple Answers a. /etc/prnt.config b. /etc/cupsd.conf c. /etc/cups/cupsd.conf d. /etc/cups/printers.conf
C and D
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is? Multiple Answers a. -s b. -h c. -d d. -k
C and D
Which of the following commands can be used to create a BASH variable named CREATOR with the value of Torvalds?
CREATOR="Torvalds"
____ are values that are calculated using a MD5 algorithm, a SHA-1 algorithm, or a SHA-256 algorithm. Read Answer Items for Question 13.
Checksum
An IPv6 IP address consists of 16-bit numbers in what numbering scheme? a. decimal b. octal c. binary d. hexadecimal
D
What device file below indicates that the first ATAPI IDE tape device (nonrewinding)? a. /dev/st0 b. /dev/nst0 c. /dev/ht0 d. /dev/nht0
D
What keyword tells the Linux kernel to avoid printing errors to the screen during system startup? a. silent b. noerror c. whisper d. quiet
D
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd? a. wtmp b. messages c. dmesg d. secure
D
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd? a. wtmp b. messages c. dmesg d. secure
D
What number indicates the lowest kernel priority (PRI) of a process possible? a. -20 b. 0 c. 20 d. 127
D
What option, when added to the crontab command, opens the vi editor with a user's cron table? a. -u b. -c c. -f d. -e
D
What permissions are required to execute a shell script in a manner similar to any other executable program on the system? a. read b. write and read c. execute d. read and execute
D
Which command can be used to count the number lines, words, and characters in a file? a. pr b. nl c. tr d. wc
D
Which of the following is not one of the three main Linux commands? a. binary programs b. shell scripts c. shell functions d. device calls
D
Which of the following is not one of the three main types of Linux commands? a. binary programs b. shell scripts c. shell functions d. device calls
D
What command can be used to search for DPM package information? a. dpkg-search b. dpkg-list c. dpkg-info d. dpkg-query
D
What are two means available to resolve a host name to the appropriate TCP/IP address? (choose two answers)
DNS /etc/hosts
A system process that is not associated with a terminal is called a(n) ____ process.
Daemon
tracks
Data is read from physical hard drives in concentric circles known as which of the following?
True
Each process can start an unlimited number of other processes.
An alternative to the vi editor that offers an equal set of functionality is the GNU _________________________.
Emacs (Editor MACroS) editor
The LISP artificial intelligence programming language can be used with which text editor below? a. Kedit editor b. Nedit editor c. Joe editor d. Emacs editor
Emacs editor
____________________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.
FHS
Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. True or False?
False
T/F - The killall command uses the PID to kill a process.
False
Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy.
False
What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system? T/F
False
When using the gzip utility, the -l option is also known as best compression and results in a higher compression ratio. True or False?
False
Zombie processes are also known as defunct processes. True or False
False
What command is most effective at identifying different types of files?
File
____ are labels representing command input and output.
File descriptors
Archiving all data on a filesystem is performing a ____.
Full backup
An IPv6 address consists of 16-bit numbers in what numbering scheme?
Hexadecimal or Expanded numbering scheme
Filenames that start with a period, such as .file, are referred to as
Hidden Files
chmod 7777 filename
In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?
swapoff
In the event that you wish to disable a swap partition, what command must be used?
process state
In the output of th ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?
The process is currently running on the processor.
In the process state column, what does an "R" indicate?
root
In what filesystem are most of the operating system files contained?
command mode
In what mode does the vi editor open by default?
Which of the following will the split command do on a file when no other options are specified?
It will split a file into new equally sized files that are 1/10th of the original file size.
The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.
Kern
A user account can be locked with the usermod command using what option?
L
Which of the following options is passed to the Linux kernel from the GRUB2 configuration file to set the locale?
LANG
In order to send a print job to a printer using CUPS, what command must be used?
Lp
Describe the purpose the process state column displayed by the ps -l command. What values may appear in this column, and what do these values indicate?
the -l option to the ps command lists even more information about each process than the -f option. The process state (S) column is the most valuable to systems administrators because it indicates what the process is currently doing. The values that may appear are the (S) value for sleeping, the (R) value is for running, the (T) value is for a process that has stopped or is being traced by another process and the (Z) value indicates a zombie process
Multicast
the TCP/IP communication destined for a certain group of computers
broadcast
the TCP/IP communication destined for all computers on a network
What two RAID types below utilize disk striping with parity, providing protection against one or two drive failures respectively? a. RAID6 b. RAID0 c. RAID5 d. RAID1
RAID 5 & RAID 6
A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:
RAID Z
A ZFS volume that uses a variable stripe size and requires a minimum of 3 hard disks to protect against a single disk failure is known as
RAID-Z
A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as: a. RAID+ b. RAID-Z c. RAID 5 d. ZFS Extended RAID
RAID-Z
forking
the act of creating a new BASH shell child process from a parent BASH shell process
What SCSI type supports speeds of up to 80 MB/second?
SCSI-3 Ultra2 Wide
What SCSI type supports speeds of up to 80 MB/second? a. SCSI-3 Ultra b. SCSI-2 Wide c. SCSI-3 Ultra2 Wide d. SCSI-3 Ultra3 Wide
SCSI-3 Ultra2 Wide
What kill signal stops a process, then restarts it with the same PID?
SIGH UP
The ____ kill signal stops a process and then restarts it with the same PID.
SIGHUP
What kill signal stops a process, then restarts it with the same PID?
SIGHUP
time slice
the amount of time a process is given on a CPU in a multiprocessing operating system
background (bg) command
the command used to run a foreground process in the background
at command
the command used to schedule commands and tasks to run at a preset time in the future
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?
SIGQUIT
What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file?
SUID SGID
Explain why scheduling commands can be beneficial, and detail some of the methods available for scheduling commands.
Scheduling system maintenance commands to run during nonworking hours is good practice, as it does not disrupt normal business activities. There are two different methods to schedule commands: At daemon (atd) - which can be used to schedule a command to execute once in the future cron daemon (crond) - which is used to schedule a command to execute repeatedly in the future
What tool is designed as a secure remote access utility that encrypts information that passes across the network?
Secure Shell (SSH)
What tool below was designed as a secure remote access utility that encrypts information that passes across the network?
Secure Shell SSH
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
Segmentation fault
ls -l
Select the command below that can be used to provide a long listing for each file in a directory:
chroot
Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment
mke2fs
Select the command that can be used to check an ext2, ext3, or ext4 filesystem:
fdisk
Select the command that can be used to create partitions that will be stored in an MBR after installation:
\f
Select the escape sequence that is used for a form feed:
\n
Select the escape sequence that starts a new line when used with echo:
loadavg
Select the file in the /proc directory that contains statistics on the performance of the processor
5
Select the mode below that corresponds to setting r-x:
*
Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.
[ A -gt B ]
Select the test statement that can be used to determine if A is numerically greater than B
[ A gt B ]
Select the test statement that can be used to determine if A is numerically greater than B
memtest86
Select the utility below that when run will start and perform a thorough check of RAM for hardware errors:
____ are files that are typically used to create custom programs that perform administrative tasks on Linux systems.
Shell scripts
Which of the following does Click Assist do?
Simulates a right click by holding down the left mouse button
link local
the portion of an IPv6 address that refers to a unique computer, it is analogous to the host portion of an IPv4 address
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?
the process is high priority
Trapping
the process of ignoring a kill signal
When you run the ps command, how are daemon process recognized?
there is a question mark in the TTY column
How many DNS servers can be configured in the /etc/resolv.conf file?
three
The amount of time a process has to use the CPU is called a(n) ____________________.
time slice
The amount of time a process has to use the CPU is called a(n) __________________________.
time slice
Which of the following commands will list the time zones available on a Linux system?
timedatectl list-timezones
Which command is used to gain real-time information about processes running on the system, with the most processor-intensive processes appearing at the beginning of the list?
top
Which of the following commands will show a list of process names along with their process ID (PID)? (Choose two.)
top ps
The ____ command can be used to replace characters in a file sent via Standard Input.
tr
What command can be used to replace characters in a file sent via Standard Input?
tr
Data is read from physical hard drives in concentric circles known as which of the following?
tracks
Data is read from physical hard drives in concentric circles known as which of the following? a. blocks b. tracks c. sectors d. cylinders
tracks
What is the name of the concentric circles from where data is read from in a physical hard drive?
tracks
A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator. true or false
true
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets. true or false
true
The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length. true or false
true
The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations.
true
When you print to a printer class, the print job is send to the first available printer in the printer class. true or false
true
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?
Sixth
The ____ field in a cron table contains the absolute pathname to the command to be executed.
Sixth
live media image
Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?
What stage of the GRUB boot loader typically resides on the MBR / GPT?
Stage 1
___________________ is the process in which a single large network is subdivided into several smaller network to control traffic flow and improve manageability.
Subnetting
What option can be used in the journald configuration file to specify a file size limit to the event log?
SystemMaxUse
Which of the following is a valid Linux initialization process?
Systemd SysV
What is the most commonly used LAN protocol?
TCP-IP
What is the most commonly used LAN protocol?
TCP/IP
Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. T/F --
TRUE
Which of the following system variables can you modify to override the default system timezone within your current shell?
TZ
If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Tab b. Ctrl c. Alt d. Esc
Tab
Filenames that end with the .tar.gz or .tgz extensions, and represent gzip-compressed tar archives are called ____.
Tarball
Linus Torvalds
The Linux kernel was developed and released in 1991 by:
KDE
The QT toolkit is utilized by which GUI environment?
echo $PS1
The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?
set
The environment variables that are set by default and their current values can be viewed with what command?
127
The first software RAID volume on a system will use a multiple disk device file that starts with what number?
Firewall
The iptables software on Linux is an example of what kind of software?
Which of the following commands will prompt you to answer a series of questions to help determine which time zone file you should use?
tzselect
What file system below is used by software programs that write to a CD-RW or DVD-RW drive?
udf
What file system below is used by software programs that write to a CD-RW or DVD-RW drive? - udf - ntfs - hpfs - ext2
udf
In order to create user accounts on a Linux system, what command should be utilized?
useradd
What two commands can be used to show information about physical volumes and logical volumes respectively?
vgdisplay and lvdisplay
What two commands can be used to show information about physical volumes and logical volumes respectively? (Select 2 answers) a. showvg b. showlv c. lvdisplay d. vgdisplay
vgdisplay, lvdisplay
In order to quickly create an empty file, what command can be used?
vim file1
In order to quickly create an empty file, what command can be used?
vim file1
You can execute ____ main types of Linux commands.
Three
tac
To display a text file in reverse order, what command should be used?
cat data
To display the contents of a text file called data, what command should be used?
/proc/meminfo
To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?
mount -a
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?
False
To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.
A route table is a list of TCP/IP networks that is stored in system memory
True
A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address.
True
After a process has been started, you can change its priority by using the renice command. True or False
True
After a process has been started, you can change its priority by using the renice command. True or False?
True
After a process has been started, you can change its priority by using the renice command. True or False.
True
CUPS contains versions of the lpr, lpc, lpq, and lprm commands.
True
Class D addresses are used for Multicasting
True
Each process can start an unlimited number of other processes. True or False
True
Each process can start an unlimited number of other processes. True or False?
True
Each process can start an unlimited number of other processes. T/F
True
Each process can start an unlimited number of other processes. True or FAlse
True
Everyone has permission to view the /etc/passwd file's contents.
True
If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False
True
If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False?
True
Most daemon scripts accept the arguments start, stop, and restart. True or False
True
Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stip daemons after system initialization. True or False?
True
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets
True
SSH encrypts all traffic that passes across the network, whereas telnet does not.
True
T/F - You can choose to use a window manager only, and not use a desktop manager.
True
T/F - You can use the sed command to remove unwanted lines of text.
True
The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length
True
The compress utility preserves the original ownership, modification, and access time for each file that it compresses.
True
The compress utility preserves the original ownership, modification, and access time fore each file that it compresses. True or False?
True
The cpio command has the ability to handle long filenames and can be used to back up device files.
True
The cpio command has the ability to handle long filenames and can be used to back up device files. True or False?
True
The first thing you must do after creating a user is set the password.
True
The line that configures the host name for the computer at boot time can be found in /etc/hostname.
True
The newgrp command opens a new shell even if the command fails.
True
The tar utility cannot back up device files or files with filenames longer than 255 characters.
True
The tar utility cannot back up device files or files with filenames longer than 255 characters. True or False?
True
When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD.
True
When you print to a printer class, the print job is send to the first available printer in the printer class.
True
When you print to a printer class, the print job is send to the first available printer in the printer class. True or False
True
When you print to a printer class, the print job is send to the first available printer in the printer class. True or False?
True
While a process is waiting for its parent process to release the PID, the process is said to be in a(n) zombie state. T/F
True
You can choose to use a window manager only, and not use a desktop manager.
True
You can choose to use a window manager only, and not use a desktop manager. True or False
True
You can use the sed command to remove unwanted lines of text. True or False
True
Zombie processes are also known as defunct process. True or FAlse
True
Zombie processes are also known as defunct processes. True or False?
True
Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stop daemons after system initialization.
True
Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stop daemons after system initialization. True or False
True
Segmentation faults can sometimes be fixed by performing what two tasks?
Turning off CPU cache memory and increasing the number of memory wait states in BIOS
/var
Under the root directory in Linux, which directory contains system commands and utilities?
/boot
Under what directory is the Linux kernel stored?
Which of the following is responsible for starting tasks and services during boot, stopping them during shutdown, and supervising them while the system is running?
Upstart
[1-4]
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?
Red Hat
What Linux distribution is the most commonly used distribution within organizations today?
RAID5
What RAID level is commonly referred to as disk striping with parity?
SCSI-3 Ultra2 Wide
What SCSI type supports speeds of up to 80 MB/second?
g+r-w
What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?
parent process ID
What can be used on a Linux system to trace the lineage of each child process?
#!
What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?
/dev/ttyS1
What character device file represents the second serial port on a system (COM2)?
colon
What character is used to delimit most Linux configuration files?
cp
What command can be used to copy files?
ioports
What file in the /proc directory contains a list of memory address ranges reserved for device use?
/proc/cpuinfo
What file in the /proc directory contains information about a computer's CPU?
init; systemd
What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or System init processes?
-l; -f
What two ps options can be used to display a full list of information about each process, and a long list of information about each process?
@
When issuing the ls -F command, what special character indicates a linked file?
%
When killing a background job with the kill command, the background job ID must be prefixed by what character below?
+
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?
systemctl
When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?
Options
When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:
7
When using the chmod command, the mode rwx can be represented by which number?
The process is high priority.
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?
Which command can be used to count the number lines, words, and characters in a file?
wc
Which of the following commands will count the number of lines in a file named data.csv?
wc -l data.csv
FTP
what service provides a method for the efficient transfer of files over the Internet?
The ____________________ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.
which command
What permission grants a user the ability to open, read, and edit the contents of a file?
write
What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?
write
What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file? - read - write - sticky bit - execute
write
If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?
write and read
What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?
wtmp lastlog
What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?
wtmp lastlog
What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?
wtmp lastlog
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.
(hd0,0)
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?
-d, -k
Segmentation faults can sometimes be fixed by performing what two tasks below? a. perform a full reinstall of OS b. turn off CPU cache memory c. increase the number of memory wait states in BIOS d. update the Linux kernel
turn off CPU cache memory, and increase the number of memory wait states in BIOS
/dev/hdb1
Which device file below represents the first primary partition on the second PATA hard disk drive?
SIGQUIT
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?
Select the escape sequence that is used for a form feed:
\f
Which of the following command can be used to remove a job from the list of pending jobs? (Choose all that apply.)
at -d at -r atrm
In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.
authentication
The ____ command can be used to extract, manipulate, and format text using pattern-action statements.
awk
The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?
awk
In a file's mode, a permission that is unavailable is represented by what character? - ? - * - "b -" - +
b -
In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued? a. cd .. b. /home/joe c. cd ./.. d. cd ../..
cd ../..
Which command is used to list and modify password expiration information for user accounts?
chage
What two commands below can be used to modify the password expiry information and a user's default shell?
chage chsh
A device that transfers data in a character-by-character fashion is referred to as what type of device?
character
A device that transfers data in a character-by-character fashion is referred to as what type of device? a. text b. binary c. block d. character
character
In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?
chmod 7777 filename
Select the command that can be used to change the root filesystem to a different directory, such as when you are in a rescue environment.
chroot
what command can be used to change the root filesystem to a different directory, such as when in a rescue environment?
chroot
Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment. a. croot b. set_root c. change_root d. chroot
chroot
What two commands below can be used to modify the password expiry information and a user's default shell?
chsh chage
You have run the top command successfully, but realize that the q key on the keyboard has suddenly stopped working. What is another way that you can exit out of the top program?
ctrl-c
What option should be used in conjunction with the lp command in order to specify the destination printer name?
d
What command can be used to search for DPM package information?
dpkg-query
Select the command below that shows the size of a directory and its contents in kilobytes:
du
Select the command below that shows the size of a directory and its contents in kilobytes: - du - sizeof - df - dir
du
What command shows the size of a directory and its contents in kilobytes?
du
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?
e
Which of the following commands will display the exit status of the last command used in the BASH shell?
echo $?
The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?
echo $PS1
What command that can be used to create partitions that will be stored in a MBR after installation?
fdisk
After a background process has been started, it can be moved to the foreground by using the ____ command.
fg
After a background process has been started, what command below can be used to move it to the foreground?
fg
You have started a job running in the background that you want to now bring to the front so that you can watch it execute. Which of the following commands can be used to display the job's output to the terminal?
fg
When writing shell scripts and using an if statement to determine whether a set of code should be executed, what is the proper syntax to end the if construct? ___________
fi
Errors on a filesystem are common on most filesystems. What do these errors indicate? a. filesystem corruption b. raid degradation c. hard drive failures d. filesystem breaks
filesystem corruption
Any command that can take standard input and transform it into standard output is called a(n) ____________________ command.
filter
Which of the following will look at the /etc/passwd file for any lines containing the word root and display them out to the screen while simultaneously writing the results to a file?
grep root /etc/passwd | tee ~/root.txt
What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?
grubby
The first line in a shell script, which specifies the pathname to the shell that interprets the contents of the shell script, is ____.
hashpling
An IPv6 IP address consists of 16-bit numbers in what numbering scheme?
hexadecimal
An IPv6 IP address consists of 16-bit numbers in what numbering scheme?
hexidecimal
You can view or set the host name for a Linux computer using the _________________ command.
hostname
Which of the following can be used to compare the hardware clock to the system clock, writing a new result to a new line every 10 seconds?
hwclock -c
Which process will all have PID of 1 and a PID of 0?
init
What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes?
int systemd
If the chage command is used without options, it is in ____ mode.
interactive?
What file in the /proc directory contains a list of memory address ranges reserved for device use?
ioports
What file in the /proc directory contains a list of memory address ranges reserved for device use? a. ioports b. meminfo c. iomem d. misc
ioports
Which of the following commands can be used to only show jobs that have been paused.
jobs -s
In Fedora 20, what journaling database system has replaced the logging system used to record the messages normally stored within the boot.log, messages, and syslog files?
journald
In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?
journald
In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called? a. journald b. systemd c. logd d. messaged
journald
What command below can be used to uninstall the LILO bootloader from an active partition?
lilo -U
What file in the /proc directory that contains statistics on the performance of the processor?
loadavg
Which of the following commands will show a number of environment variables that start with LC_?
locale
Which of the following commands can be used to display the current locale of a system? (Choose two.)
locale localectl
Select the command below that utilizes a premade database that contains a list of all the files on a system:
locate
Select the command below that utilizes a premade database that contains a list of all the files on a system: - locate - search - find - id
locate
What command utilizes a pre-made database that contains a list of all the files on a system?
locate
What two commands can be used to locate files on a filesystem? - locate - grep - read - find
locate, find
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?
login.defs
The TCP/IP address of 127.0.0.1 is also referred to as the _________________.
loopback address
The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.
make
____ is a command that can be used to copy files to the appropriate location on the filesystem.
make install
What command is used to manage a software RAID configuration after installation?
mdadm
What command is used to manage a software RAID configuration after installation? a. mdraid b. vgadm c. mdadm d. pgadm
mdadm
What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel? a. kmods b. modinfo c. mod_info d. modules
modules
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used??
mount -a
Which of the following is the default window manager used by the GNOME version 3 desktop environment?
mutter
To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (choose all that apply)
nslookup hostname dig hostname resolve hostname
RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?
package dependancy
Which of the following commands can be used to terminate a process by the process name?
pkill
The daemons associated with network services listen for network traffic associated with a particular _____________________.
port
When a user creates a file or directory, that user's name and ____________________ becomes the owner and group owner of the file, respectively.
primary group
Which command when entered without argument is used to display a list of processes running in the current shell?
ps
What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?
pstree
What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?
pstree
What command is used to display the lineage of a process by tracing its PPIDs until the init daemon?
pstree
What command below can be used to create a new physical volume?
pvcreate
What command will create a new physical volume?
pvcreate
What option can be added to the rpm command in order to query packages?
q
If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file? - read - write - execute - move
read, write
what two commands will work recursively if specified with the -R option?
rm and cp
Processes that have encountered an error during execution and continuously uses up system resources are referred to as ________________ processes.
rogue
An RPM package can be converted to a cpio archive using what command?
rpm2cpio
The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?
rsyslog.conf rsyslog.d
The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?
rsyslog.conf rsyslog.d
A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.
runlevel
Which of the following commands will show the current runlevel along with the previous runlevel? (Choose all that apply.)
runlevel
The at command is used to ________________.
schedule processes to run at a single instance in the future
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
secure
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
secure
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
segmentation fault
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred? a. page fault b. IRQ fault c. segmentation fault d. RAM failure
segmentation fault
Which of the following commands will count down from 10 to 1?
seq 10 -1 1
Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?
service
The environment variables that are set by default and their current values can be viewed with what command?
set
To see a list of the environment variables and their current values on a system, you can use the ____ command.
set
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?
sixth
Which of the following commands will display the contents of the /etc/passwd file in alphanumerical order?
sort /etc/passwd
Which of the following is a valid method of running a script named myscript.sh? (Choose two)
source myscript.sh ./myscript.sh
Which of the following are graphical remote administration technologies? (choose all that apply)
ssh-x VNC
The ____________ command can be used to start X Windows and the default window manager or desktop environment.
startx
Any error messages generated by a command is ____.
stderr
The information that is processed by the command during execution is ____.
stdin
____ is the normal output of a command.
stdout
Most commands that are run by the shell are run in a separate ____________________, which is created by the current shell.
subshell
____ is a command that can be used to ensure that a file was received in its entirety after you download it.
sum
What section of a filesystem contains info about the filesystem in general?
superblock
What section of a filesystem contains information about the filesystem in general?
superblock
In the event that you wish to disable a swap partition, what command must be used? a. umount b. swapoff c. swapdrop d. delete_swap
swapoff
To create a(n) ____________________ link, you use the -s option to the ln command.
symbolic
Which of the following is a virtual filesystem that is made up of virtual files that a Linux operating system is able to export information to about kernel sub-systems, hardware devices, and device drivers to make it easy for users to access the information?
sysfs
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?
system-config-keyboard
Which of the following commands will display a list of Systemd units sorted by the time they took to load?
systemd-analyze blame
To display a text file in reverse order, what command should be used? a. tee b. tac c. cat d. sed
tac
What command can be used to display the last five lines of a text file?
tail -5
Files with what two file extensions are commonly known as tarballs?
tar.gz .tgz
Each SCSI device attached to a system must be assigned an ID number. What is this ID number called? a. SCSI controller b. target ID c. SCSI number d. device ID
target ID
The /etc/login.defs file is a(n) ____ file.
text
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?
-k -d
The mfks command can be issued with what switch in order to specify a filesystem type?
-t
In order to redirect a file to the standard input of a command, what metacharacter should be used?
"<"
Which of the following characters can be entered at the beginning of a line in a shell script to ensure that line is recognized as a comment rather than try to execute it?
#
What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?
#!
The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?
$
The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command? - $ - & - # - *
$
The contents of a certain variable in memory can be viewed using which metacharacter in combination with the echo command?
$
The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.
$PS1
When killing a background job with the kill command, the background job ID must be prefixed by what character below?
%
When killing a background job with the kill command, you must prefix the background job IDs by a(n) ____.
%
When you append a(n) ____ to a command, the command is run in a background process.
&
What character, when appended to a command, causes the command to be run in the background?
& (and command) &
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.
(hd0,0)
Select the regular expression metacharacter that matches 0 or more occurrences of the previous character. a. + b. ^ c. ? d. *
*
Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory? a. -o loop b. --mode l c. --option l d. --loop
--loop
Nice values are used to affect process priorities using a range between ______________________.
-20 and 19
What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?
-F
Which switch below can be added to the ls command to show a list of files and their type?
-F
A user account can be locked with the usermod command using what option?
-L
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?
-P
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?
-P
What option can be used with SSH to enable tunneling of X Windows information?
-X
What option can be used with ssh to enable tunneling of X Windows information?
-X
What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?
-Z -z
When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.
-c
What option should be used in conjunction with the lp command in order to specify the destination printer name?
-d
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?
-d -k
To create or edit a user cron table, you can use the ____ option to the crontab command.
-e
To remove a package from the system, you can use the ____ option to the rpm command.
-e
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?
-e
What option, when added to the crontab command, opens the vi editor with a user's cron table?
-e
What two ps options can be used to display a full list of information about each process, and a long list of information about each process?
-f -l
What option can be added to the netstat command in order to display network statistics?
-i
What option can be added to the netstat command in order to display network statistics?
-i
Select the options to use with the cpio utility to cause the utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation:
-i -u
In order to display a list of at job IDs, what option can be specified to the at command?
-l
In order to display a list of at jobs IDs, what option can be specified to the at command?
-l
Select the command below that can be used to provide a long listing for each file in a directory:
-l
Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed:
-l
The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.
-l
To display a list of at Job IDs, you can specify the ____ option to the at command.
-l
which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?
-loop
When using the cpio utility, the ____ option causes a new archive to be created.
-o
Select the option that can be used with the lpstat command to display a list of printers that are enabled:
-p
When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames.
-p
What option can be added to the rpm command in order to query packages?
-q
What command option, when added to the rm command, is commonly referred to as the -resume option?
-r
What option can be added to the userdel command to remove the home directory of the target user?
-r
What option can be added to the userdel command to remove the home directory of the target user?
-r
What option, when added to the rm command, is commonly referred to as the -resume option?
-r
What option, when added to the rm command, is commonly referred to as the -resume option? - r - d - f - i
-r
Select the options to use with the cpio utility to cause the utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation:
-u -i
When using the compress utility, each file specified for compression is renamed with what extension?
.Z
What device file below indicates that the first ATAPI IDE tape device (nonrewinding)?
/dev/nht0
What device file below indicates the first ATAPI IDE tape device (nonrewinding)?
/dev/nht0
What two device files below represent the first SCSI tape device, rewinding and non-rewinding?
/dev/st0 /dev/nst0
What two device files below represent the first SCSI tape device, rewinding and non-rewinding?
/dev/st0 /dev/nst0
What character device file represents the second serial port on a system (COM2)?
/dev/ttyS1
What character device file represents the second serial port on a system (COM2)? a. /dev/ttyS1 b. /dev/tty2 c. /dev/tty1 d. /dev/ttyS0
/dev/ttyS1
In which directory would a system administrator store scripts that should be run monthly by the cron daemon?
/etc/cron.monthly
The location of system cron tables.
/etc/crontab
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?
/etc/cups/printers.conf
What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?
/etc/cups/printers.conf /etc/cups/cupsd.conf
In Linux, the group database configuration file is ____.
/etc/group
Which of the following files is a binary file that contains the rules for calculating the time based on your time zone relative to epoch time?
/etc/localtime
Select below the configuration file that is used to configure the BIND / DNS server:
/etc/named.conf
Which file is a configuration file containing passwords and password expiration information for all user accounts?
/etc/shadow
Where is the skeleton directory located on most Linux systems?
/etc/skel
The SSHD daemon is configured by editing what configuration file?
/etc/ssh/sshd_config
To ensure that Linux has detected the correct amount of RAM in the filesystem after installation, you should view the contents of what file in the proc directory?
/proc/meminfo
To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?
/proc/meminfo
To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory? a. /proc/meminfo b. /proc/memoryinfo c. /proc/mem d. /proc/cpuinfo
/proc/meminfo
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?
/root
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory? - /root - /bin - /home/root - /boot
/root
On a Fedora based system, where are the shell environment and scheduled commands for at stored?
/var/spool/at
The location of user cron tables.
/var/spool/cron
Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system?
/var/spool/cron/(the user's login name)
Where are scheduled commands stored on Ubuntu Linux systems?
/var/spool/cron/atjobs
At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?
0
On Linux, the root user always has a UID of what number?
0
You have a script to run on April 1 each year at 9:00am. Write the cron table entry to make this happen. The script is located in /bin and named aprilfools.
0 9 1 4 * /bin/aprilfools
What range of ports is considered to be "well-known"?
0-1023
What range of ports is considered to be "well-known"?
0-1023
1. A calculated value that is unique to a file's size and contents. 2. The amount of compression that occurred during compression algorithm. 3. A utility that can be used to manage DPM packages using a graphical interface. 4. The process whereby files are copied to an archive. 5. A group of RPM packages that are commonly installed to provide a specific function on the system. 6. A command used to view the contents of an archive created with compress or gzip to Standard Output in a page-by-page fashion. 7. A gzip-compressed tar archive. 8. A command used to decompress files compressed by the gzip command. 9. A command used to extract archives created with the dump command. 10. A command used to decompress files compressed by the bzip2 command
1. checksum 2. compression ratio 3. Aptitude 4. system backup 5. package group 6. zmore command 7. tarball 8. gunzip command 9. restore command 10. bunzip2 command
1. The command used to change the GECOS for a user. 2. The area of the system from which information is gathered when logging system events 3. The command used to remove print jobs from the print queue in the CUPS print system 4. A unique number assigned to each user account 5. A group of CUPS printers that are treated as a single unit for the purposes of printing and management. 6. The command used to modify the name or GID of a group on the system. 7. the process of accepting a print job into a print queue. 8. The daemon responsible for printing in the CUPS printing system. 9. The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user. 10. The act of verifying a user's identity by comparing a user name and password to a system database (/etc/passwd and /etc/shadow)
1. chfn 2. facility 3. cancel 4. User Identifier (UID) 5. printer class 6. groupmod 7. spooling 8. CUPS daemon 9. primary group 10. authentication
What is VNC? How does it transfer graphics across the network?
A Virtual Network Computer (VNC) is a cross-platform technology that allows users to connect to a graphical desktop across a network. It transfers graphics across the network by using the special platform-independent protocol called Remote FrameBuffer (RFB) to transfer graphics, mouse movements, and keystrokes across the network.
Select the two escape sequences that represent a horizontal tab and a vertical tab, respectively: Multiple Answer a. \V b. \t c. \v d. \b
A and B
What two files below are the first two BASH environment files to be executed? Multiple Answer a. /etc/profile b. /etc/bashrc c. ˜/.bashrc d. ˜/.bash_profile
A and B
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?
60-70 percent
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?
60-70%
The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below?
631
The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below?
631
How many different kill signals can be sent by the kill command to a given process?
64
How many different kill signals can be sent by the kill command to give a process?
64
There are ____ different kill signals that the kill command can send to a certain process.
64
In a SCSI chain the highest priority SCSI device is given what SCSI ID?
7
In a SCSI chain the highest priority SCSI device is given what SCSI ID? a. 1 b. 6 c. 7 d. 15
7
When using the chmod command, the mode rwx can be represented by which number?
7
When using the chmod command, the mode rwx can be represented by which number? - 0 - 1 - 7 - 8
7
A Class A network uses how many bits for the network ID, and how many bits for the host ID?
8 24
Each octet in an IP address represents a binary number consisting of how many bits / bytes?
8-bit
Each octet in an IP address represents a binary number consisting of how many bits/bytes?
8-bit
What hex code is associated with a Linux swap type partition?
82
What hex code is associated with a Linux swap type partition? a. 96 b. 83 c. 12 d. 82
82
What kill level signal cannot be trapped?
9
IPv6 IP addresses are delimited by what character below?
:
At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes? a. :q! b. :! c. :exit d. :q
:q!
You can redirect a file to the standard input of a command using the ____ metacharacter.
<
Which of the following can be used for comparing values within an if statement? (Choose two.)
= -lt
The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?
>
You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file.
>
Which of the following will take output from a command and append it to the end of a file?
>>
When issuing the ls -F command, what special character indicates a linked file?
@
A list of all exported environment and user-defined variables in a shell can be viewed with what command below? a. env b. set c. setenv d. getenv
A
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive. a. (hd0,0) b. (hd1,1) c. (hda,0) d. (hda,1)
A
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel? a. image= b. default= c. install= d. root=
A
Most Linux distributions make use of what package manager? a. RPM b. PRM c. MPR d. RMP
A
On Linux, the root user always has a UID of what number? a. 0 b. 1 c. 23 d. 500
A
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate? a. xvidtune b. xvideotune c. xtune d. vidtune
A
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate? a. xvidtune b. xvideotune c. xtune d. vidtune
A
The K desktop environment utilizes what window manager and toolkit below? Multiple Answer a. kwin b. mutter c. Qt toolkit d. GTK+ toolkit
A and C
RPM package that require other RPM packages to be installed on a system prior to being installed creates a relationship known as? a. package dependancy b. recursing package c. branching package d. family package
A
What character, when appended to a command, causes the command to be run in the background? a. & b. $ c. # d. %
A
What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces? a. ifconfig b. ipconf c. ipconfig d. ifconf
A
What command can be used to display the contents of a file that was compressed with the compress utility? a. zcat b. ccat c. cat d. acat
A
What command can be used to replace characters in a file sent via Standard Input? a. tr b. rt c. ts d. st
A
What number represents the stdin file descriptor? Correct a. 0 b. 1 c. 2 d. 3
A
What option can be added to the rpm command in order to query packages? a. -q b. -v c. -h d. -i
A
What option can be added to the rpm command to update a specified package only if an older version exits on the system? a. -F b. -U c. -z d. -c
A
What option can be added to the userdel command to remove the home directory of the target user? a. -r b. -d c. -R d. -x
A
What option can be added to the userdel command to remove the home directory of the target user? a. -r b. -d c. -R d. -x
A
What option can be used in the journald configuration file to specify a file size limit to the event log? a. SystemMaxUse b. Max_file_size c. Journal_Limit d. SizeLimit
A
What options can be used in the journald configuration file to specify a file size limit to the event log a. SystemMaxUse b. Max_file_size c. Journal_Limit d. SizeLimit
A
What stage of the GRUB boot loader typically resides on the MBR / GPT? a. Stage1 b. Stage1.5 c. Stage2 d. Stage2.5
A
What stage of the GRUB boot loader typically resides on the MBR/GPT? a. Stage 1 b. Stage 1.5 c. Stage 2 d. Stage 2.5
A
When used with the compress command, what option below can be used to compress symbolic links? a. -f b. -r c. -c d. -v
A
When used with the compress command, what option below can be used to compress symbolic links? a. -f b. -c c. -v d. -r
A
When used with the uncompress command, what option displays the contents of the compress file to Standard Output? a. -c b. -r c. -v d. -f
A
When used with the uncompress command, what option displays the contents of the compress files to Standard Output? a. -c b. -v c. -f d. -r
A
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process? a. The process is high priority b. The process is exiting c. The process is accepting redirected input from a terminal. d. The process is currently active on the processor.
A
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process? a. The process is high priority. b. The process is exiting. c. The process is accepting redirected input from a terminal. d. The process is currently active on the processor.
A
Where are the log files for the Samba daemon located? a. /var/log/samba b. /var/run/samba/log c. /var/log/access.log d. /var/log/Samba/log
A
Where is the skeleton directory located on most Linux systems? a. /etc/skel b. /var/skel c. /etc/skeleton d. /var/skeleton
A
Where is the skeleton directory located on most Linux systems? a. /etc/skel b. /var/skel c. /etc/skeleton d. /var/skeleton
A
RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as? a. package dependency b. branching package c. family package d. recursing package
A
What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on? a. for b. while c. case d. switch
A
Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded: Multiple Answer a. append= b. map= c. initrd= d. boot=
A and D
What two window managers is the Compiz Fusion window manager based upon? Multiple Answer a. compiz b. sawfish c. fvwm d. beryl
A and D
env
A list of all exported environment and user-defined variables in a shell can be viewed with what command below?
Detail shell scripts and explain how they are used and executed.
A shell script is meant to be run by the UNIX shell. These commands can be written in different types of scripting languages. These scripts can be used to start programs, manipulate files, and printing out text. Scripts can be executed from the command-line in UNIX.
The process state column, what does an "R" indicate? a. The indicate process is being restarted because it received a SIGHUP kill signal. b. The process is currently running on the processor. c. The process is reading from the local hard disk. d. The process is recovering from a fatal error, and may potentially become a zombie.
B
Under what directory is the Linux kernel stored? a. / b. /boot c. /root d. /krnl
B
What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database? a. info b. alert c. debug d. panic
B
What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database? a. info b. alert c. debug d. panic
B
What can be used on a Linux system to trace the lineage of each child process? a. process ID b. parent process ID c. execution order ID d. process fork ID
B
What can be used on a Linux system to trace the lineage of each child process? a. process ID b. parent process ID c. execution order ID d. process fork ID
B
What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script? a. @! b. #! c. // d. ->
B
The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent? a. 30-40 b. 40-50 c. 50-60 d. 60-70
B
The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below? a. 780 b. 631 c. 4586 d. 8080
B
The GUI components and related software take up how much space on a typical Linux installation? a. 1 GB b. 2 GB c. 3 GB d. 4 GB
B
What operator below is known as the NOT operator? a. -o b. -a c. ! d. %
B
In an if construct, what statements are optional? Multiple Answer a. fi b. elif c. else d. then
B and C
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config file? a. grub2-install b. gruv-config c. grub-mkconfig d. grub-compile
C
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files? a. grub2-install b. grub-config c. grub-mkconfig d. grub-compile
C
An RPM package can be converted to a cpio archive using what command? a. conv_arch b. rpmconv c. rpm2cpio d. cpioconv
C
How many different kill signals can be sent by the kill command to a given process? a. 16 b. 32 c. 64 d. 128
C
If no level of compression is specified, the gzip command assumes what compression level? a. 4 b. 5 c. 6 d. 7
C
Select the option that can be used with the lpstat command to display a list of printers that are enabled: a. -o b. -a c. -p d. -e
C
The System Log Daemon uses what TCP and UPD port to accept incoming requests from another System Log Daemon on a remote system? a. 827 b. 1012 c. 514 d. 23
C
The ability to extract, manipulate, and format text using pattern action statements belongs to which command below? a.sed b. grep c. awk d. nl
C
The default BASH shell prompt is set by an environment variable. What command can be used to view this variable? a. ls $PWD b. echo #PWD c. echo $PS1 d. ls #PS1
C
The dump/restore utility is limited to a maximum of how many different incremental backups? a. seven b. eight c. nine d. ten
C
The dump/restore utility is limited to a maximum of how many different incremental backups? a. seven b. eight c. nine d. ten
C
What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer? a. route b. route add c. traceroute d. ip
C
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available a. system.conf b. local.setup c. login.defs d. user.defs
C
What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH? a. ˜/.bash_profile b. ˜/.bash_login c. /etc/profile d. ˜/.profile
C
What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size? a. 192-bit b. 64-bit c. 256-bit d. 128-bit
C
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm? a. 40%-50% b. 50%-60% c. 60%-70% d. 70%-80%
C
What kill signal stops a process, then restarts it with the same PID? a. SIGINT b. SIGQUIT c. SIGHUP d.SIGTERM
C
What number represents the stderr file descriptor? a. 0 b. 1 c. 2 d. 3
C
What option can be used with ssh to enable tunneling of X Windows information? a. -L b. -f c. -X d. -x
C
What tool below was designed as a secure remote access utility that encrypts information that passes across the network? a. Virtual Network Computing (VNC) b. Telnet c. Secure Shell (SSH) d. rlogin
C
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. first b. second c. fifth d. sixth
D
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command? a. sys-conf-kb b. system-config-kb c. sys-config-keyboard d. system-config-keyboard
D
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command? a. sys-conf-kb b. system-config-kb c. sys-config-keyboard d. system-config-keyboard
D
In order to create user accounts on a Linux system, what command should be utilized? a. uadd b. usercreate c. adduser d. useradd
D
In order to create user accounts on a Linux system, what command should be utilized? a. uadd b. usercreate c. adduser d. useradd
D
In order to download DPM packages, what command should be used below? a. apt-search b. yum c. dpm-grab d. apt-get
D
In order to redirect a file to the standard input of a command, what metacharacter should be used? a. > b. # c. | d. <
D
Select below the configuration file that is used to configure the BIND / DNS server: a. /etc/dns.conf b. /etc/bind.conf c. /etc/resolv.conf d. /etc/named.conf
D
Select the command that can be used to send a small TCP/IP packet to another IP address and await a response: a. png b. ipquery c. ring d. ping
D
Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed: a. -c b. -f c. -r d. -l
D
The GUI components and related software take up how much space on a typical Linux installation? a. 1 GB b. 2 GB c. 3 GB d. 4 GB
D
The GUI components and related software take up how much space on a typical Linux installation? a. 1 GB b. 2 GB c. 3 GB d. 4 GB
D
The sshd daemon is configured by editing what configuration file? a. /etc/sshd.config b. /etc/ssh/ssh_config c. /etc/ssh.conf d. /etc/ssh/sshd_config
D
What command below can be used to uninstall the LILO bootloader from an active partition? a. lilo --remove b. lilo -d c. lilo delete d. lilo -U
D
What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? a. install b. configure c. make install d. make
D
What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? a. configure b. install c. make install d. make
D
What number indicates the lowest priority kernel priority (PRI) of a process possible? a. -20 b. 0 c. 20 d. 127
D
What option can be added to the netstat command in order to display network statistics? a. -s b. -p c. -a d. -i
D
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons? a. -f b. -l c. -a d. -e
D
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons? a. -f b. -l c. -a d. -e
D
What option, when added to the crontab command, opens the vi editor with a user's cron table? a. -u b. -c c. -f d. -e
D
What range of ports is considered to be "well-known"? a. 10023-24433 b. 24434-65535 c. 1024-10023 d. 0-1023
D
What well-known TCP port is utilized by the SMTP service? a. 110 b. 22 c. 23 d. 25
D
When killing a background job with the kill command, the background job ID must be prefixed by what character below? a. & b. # c. $ d. %
D
When killing a background job with the kill command, the background job ID must be prefixed by what character below? a. & b. # c. $ d. %
D
When using the compress utility, each file specified for compression is renamed with what extension? a. .c b. .cmp c. .cpz d. .Z
D
What yum command below can display a list of package group names? a. yum --list -g b. yum show groups c. yum list --groups d. yum grouplist
D
____ are constructs that alter the flow of a program based on whether a command in the program completed successfully or based on a decision that the user makes given a question posed by the program.
Decision construct
C
Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?
target ID
Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?
____ are shell variables that are typically set by the system and contain information that the system and programs access regularly.
Environment variables
filesystem corruption
Errors on a filesystem are common on most filesystems. What do these errors indicate?
By default, new users are forced to change their passwords.
False
Each device attached to a system can be represented by multiple device files.
False
Fedora 20 makes use of the XFree86 implementation of X Windows. True or False?
False
Fedora 20 makes use of the XFree86 implementation of X Windows.
False
Fedora 20 makes use of the XFree86 implementation of X Windows. True or False
False
Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully. True or False
False
In Linux, you are restricted to using only one type of filesystem on a system.
False
On most Linux systems, the logrotate utility is automatically scheduled to run weekly.
False
On most Linux systems, the logrotate utility is automatically scheduled to run weekly. True or False
False
On most Linux systems, the logrotate utility is automatically scheduled to run weekly. True or False?
False
Regular users typically have a UID less than 100.
False
SLIP is a newer technology that PPP
False
Stand-alone daemons are started on demand using inetd or xinetd.
False
T or F: On most Linux systems, the logrotate utility is automatically scheduled to run weekly.
False
T or F: The killall command uses the PID to kill a process.
False
T or F: The secure log file contains information regarding the last user to log in to a system.
False
T or F: Zombie processes are also known as defunct processes
False
T/F - A value of 0 for a process priority indicates low priority.
False
T/F - Can the top command be used to change the priority of processes?
False
T/F - Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully.
False
T/F - If a compression utility compresses a file to 52% of its original size, it has a compression ratio of 52%.
False
T/F - In a decision construct, you can have an unlimited number of if then statements.
False
T/F - The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory.
False
T/F - The SIGINT kill signal is the default kill signal used by the kill command.
False
T/F - The init daemon has a PID of 0.
False
T/F - The ps command is the only command that can view process information.
False
T/F - To decompress files that have been compressed with the compress utility, you can use the decompress command followed by the names of the files to be decompressed.
False
T/F - To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.
False
T/F - Traditionally, CDs/DVDs were used to back up data.
False
T/F - Users can create their own custom variables, called shell variables.
False
T/F - When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.
False
T/F - When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.
False
T/F - You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.
False
The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory.
False
The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory. True and False
False
The killall command uses the PID to kill a process. True or False
False
The killall command uses the PID to kill a process. True or False
False
The killall command uses the PID to kill all process. True or False?
False
The ps command is the only command that can view process information. T/F
False
The secure log file contains information regarding the last user to log in to a system.
False
The secure log file contains information regarding the last user to log in to a system. True or False?
False
The secure log file contains information regarding the last user to log in to a system. True or False
False
To kill a process running in the background, you must place a % characters before its process ID. True or False?
False
To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor. True or False
False
When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.
False
Which Windows program is often used to connect to a Linux server via SSH?
Putty
The K desktop environment utilizes what window manager and toolkit below?
Qt toolkit kwin
What RAID level is commonly referred to as disk striping with parity? a. RAID4 b. RAID0 c. RAID5 d. RAID1
RAID 5
Most Linux distributions make use of what package manager?
RPM
Most Linux distributions today use ____ as their package manager.
RPM
If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.
Read and execute
Text wildcards used to ease the searching of specific text information are called _________________________.
Regular expressions (regexp)
What does the setfacl -b command do?
Removes all extra ACL assignments on a given file.
What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file?
SGID and SUID
What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file? - SGID - SUID - SQUID - sticky bit
SGID, SUID
What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?
SIGINT 2
What signal name and number function as the absolute kill signal, and when issued, forces the Linux kernel to stop executing the process by sending the process's resources to /dev/null?
SIGKILL 9
The ____ kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory.
SIGQUIT
Describe the telnet and SSH utilities. What is the difference between them?
SSH is a network protocol used to remotely access and manage a device. The key difference between Telnet and SSH is that SSH uses encryption, which means that all data transmitted over a network is secure from eavesdropping. Like Telnet, a user accessing a remote device must have an SSH client installed.
du
Select the command below that shows the size of a directory and its contents in kilobytes:
|
Select the metacharacter that can be used to send the standard output of one command to another command as standard input:
What stage of the GRUB boot loader typically resides on the MBR / GPT?
Stage1
Which of the following accessibility features simulates simultaneous key presses when two keys are pressed in sequence?
Sticky Keys
What option can be used in the journald configuration file to specify a file size limit to the event log?
SystemMaxUse
Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?
Target ID
/boot
The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?
/root
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?
Free Software Foundation (FSF)
The GNU General Public License (GPL) was developed by which organization?
4GB
The GUI components and related software take up how much space on a typical Linux installation?
Emacs editor
The LISP artificial intelligence programming language can be used with which text editor below?
vmlinuz
The Linux kernel exists as a file named:
How does the NICE value affect process priority? How and why can nice values by altered?
The NICE value (NI) can be used to affect the process priority indirectly, it is measured between -20 (a greater chance of a high priority) and 19 (a greater chance of a lower priority). The lower the number the more priority that task gets, if the nice value is high number like 19 the task will be set to its lowest priority and the CPU will process whenever it gets a chance. You can use the -n command line option to change the or adjust the nice value which adds a set of integer value to the niceness.
PATH
The ______ environment variable contains a list of directories used to search for executable programs.
awk
The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?
man -k list
The apropos list command produces the same results as which command below?
$
The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?
False
The killall command uses the PID to kill a process.
-t
The mkfs command can be issued with what switch in order to specify a filesystem type?
Total cost of ownership (TCO)
The overall cost of using a particular operating system is known as?
In the process state column, what does an "R" indicate?
The process is currently running on the processor.
In the process state column, what does an "R" indicate?
The process is currently running on the processor.
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?
The process is high priority.
edquota
The quotas for certain users can be edited by using which command?
the mode of the file
The section of an inode that stores permissions is referred to as what?
>
The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?
Ignoring a kill signal.
Trapping
Any command that can be executed on the command line can also be placed inside any environment file. True or False
True
As daemon process are not associated with terminals, you must use the -e switch with ps command to view them. True or False?
True
Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script.
True
CUPS contains versions of the lpr, lpc, lpq, and lprm commands. True or False
True
CUPS contains versions of the lpr, lpc, lpq, and lprm commands. True or False?
True
If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False
True
Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond
True
Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond True or False
True
Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond àFound in book
True
Logs from the cron daemon (crond) can be viewed using the command journalctl_COMM=crond True or False?
True
Most daemon scripts accept the arguments start, stop, and restart.
True
T or F: After a process has been started, you can change its priority by using the renice command.
True
T or F: CUPS contains versions of the lpr, lpc, lpq, and lprm commands.
True
T or F: Each process can start an unlimited number of other processes.
True
T or F: If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.
True
T or F: Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond
True
T or F: When you print to a printer class, the print job is send to the first available printer in the printer class
True
T/F - After a process has been started, you can change its priority by using the renice command.
True
T/F - Aliases are shortcuts to commands stored in special variables that can be created and viewed using the alias command.
True
T/F - Any command that can be executed on the command line can also be placed inside any environment file.
True
T/F - Because its primary use is to back up files in case of system failure, cpio uses absolute pathnames by default when archiving.
True
T/F - Each process can start an unlimited number of other processes.
True
T/F - If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.
True
T/F - It is good form to read the Makefile after you run the configure script.
True
T/F - Most commands such as ls, find, and grep are binary programs that exist on the filesystem until executed.
True
T/F - Most daemon scripts accept the arguments start, stop, and restart.
True
T/F - The BASH shell assumes stdout in the absence of a numeric file descriptor.
True
T/F - The ENV environment variable represents the location of the BASH run-time configuration file.
True
T/F - The compress utility preserves the original ownership, modification, and access time for each file that it compresses.
True
T/F - The dump/restore utility can only work with files on ext2 and ext3 filesystems.
True
T/F - The tar utility cannot back up device files or files with filenames longer than 255 characters.
True
T/F - While a process is waiting for its parent process to release the PID, the process is said to be in a(n) zombie state.
True
When using the chage command, how do you set the maximum password age?
Type 90 and press Enter.
&
What character, when appended to a command, causes the command to be run in the background?
pvcreate
What command below can be used to create a new physical volume?
grub2-install
What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?
lilo -U
What command below can be used to uninstall the LILO bootloader from an active partition?
pstree
What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?
rm
What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?
pwd
What command can be issued to confirm what directory you are in at a command line prompt?
fsck
What command can be used to check different kinds of filesystems on Linux for errors?
grubby
What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?
tail -5
What command can be used to display the last five lines of a text file?
tr
What command can be used to replace characters in a file sent via Standard Input?
stat
What command is most effective at identifying different types of files?
mdadm
What command is used to manage a software RAID configuration after installation?
DEC PDP-7
What computer system was the first to run the UNIX operating system?
for
What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?
It removes all extra ACL assignments on a given file.
What does the setfacl -b command do?
/etc/profile
What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?
/etc/systemd/system/default.target
What file controls the default runlevel when using Systemd?
udf
What file system below is used by software programs that write to a CD-RW or DVD-RW drive?
modules
What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?
82
What hex code is associated with a Linux swap type partition?
DVD
What installation media source is the most common source for Linux packages?
graphical.target
What is the default target on a system with a GUI installed?
2
What is the minimum number of user accounts that must be created at install time?
ZFS volume
What is the term for a ZFS managed filesystem that is created from ZFS pools?
quiet
What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?
2; SIGINT
What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl_c combination to kill a running process?
SIGHUP
What kill signal stops a process, then restarts it with the same PID?
;
What metacharacter can be used to issue tw term-31o commands to be run in consecutive order, without piping or redirecting output?
~
What metacharacter can be used to refer to the current user's home directory?
&
What metacharacter indicates background command execution?
127
What number indicates the lowest kernel priority (PRI) process possible?
2
What number represents the stderr file descriptor?
0
What number represents the stdin file descriptor?
!
What operator below is known as the NOT operator?
-e
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?
-e
What option, when added to the crontab command, opens the vi editor with a user's cron table?
-r
What option, when added to the rm command, is commonly referred to as the -resume option?
execute
What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?
write
What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?
write
What permission grants a user the ability to open, read, and edit the contents of a file?
read and execute
What permissions are required to execute a shell script in a manner similar to any other executable program on the system?
device driver
What piece of software tells the operating system how to use a specific hardware device?
superblock
What section of a filesystem contains information about the filesystem in general?
9; SIGKILL
What signal name and number function as the absolute kill signal, and when issued, forces the Linux kernel to stop executing the process by sending the process's resources to /dev/null?
Freeware
What software type is software that is distributed free of charge, but the source code is not available?
Stage1
What stage of the GRUB boot loader typically resides on the MBR / GPT?
GNU Public License
What stipulates that the source code of any software published under its license must be freely available.
virtual host
What term describes the physical hardware and the underlying operating system upon which a virtual machine runs?
PWD; SHELL
What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively?
kill; killall
What two commands below can be used to stop a process, either by PID number or process name?
/etc/profile; /etc/bashrc
What two files below are the first two BASH environment files to be executed?
minor number
When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?
whoami
Which Linux command can be utilized to display your current login name?
What is contained in the DISPLAY variable on a Linux system running the X window system?
Which X server the client is supposed to connect to by default.
{}
Which character(s) below represent extended regular expression metacharacter(s)?
service
Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?
df
Which command below provides the easiest method for monitoring free space on mounted filesystems?
wc
Which command can be used to count the number lines, words, and characters in a file?
device calls
Which of the following is not one of the three main types of Linux commands?
Hiring people to maintain the Linux system
Which of the following is the greatest expense for companies using Linux?
Ctrl+g
Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?
--loop
Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?
-F
Which switch below can be added to the ls command to show a list of files and their type?
Artistic
Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?
Due to the fact that the * character can be used to match all characters in a filename, or all files in a directory, it is referred to as a ____________ metacharacter.
Wildcard
The ____ option to the ps command displays all processes that do not run on terminals.
X
Which of the following is a lightweight desktop environment that uses very few system resources that a system administrator might choose to install on a Linux server instead of one of the two main desktop environments?
XFCE
False
You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.
/var/log/boot.log
You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?
How do you configure a NIC? What do you do if the NIC is not detected during installation?
You can configure a NIC by using the ifconfig (interface configuration) command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer. If the NIC is not detected during installation then we need to view the appropriate Linux drivers for the NIC that were not included in the installation media.
In order to download DPM packages, what command should be used below?
apt-get
A system administrator wants to schedule a task to run at 11 pm, but knows that she will not be in the office at that time. Which of the following commands can she use to schedule this task to run that night while she is at home?
at
The command used to schedule commands and tasks to run at a present time in the future.
at command
Daemon used to schedule a command to execute once in the future.
at daemon
Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.)
atq at -l at -q
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use? a. system.conf b. local.setup c. login.defs d. user.defs
C
Select the two commands below that will provide the number of lines in a file, and the number of characters in a file, respectively: Multiple Answer a. count -c b. pr -d c. wc -l d. wc -c
C and D
What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes? Multiple Answers a. kthreadd b. syslogd c. init d. systemd
C and D
What two ps options can be used to display a full list of information about each process, and a long list of information about each process? a. -e b. -p c. -f d. -l
C and D
Which of the following is the default desktop environment used by Linux Mint?
Cinnamon
Most configuration files on Linux systems are delimited using ____ characters.
Colon
A ____ is a standard set of instructions used to compress a file.
Compression algorithm
The rate of compression is called the ____.
Compression ratio
Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?
Ctrl +g
In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line? a. Ctrl+k b. dd c. Ctrl+a d. Ctrl+d
Ctrl+k
A user account can be locked with the usermod command using what option? a. -U b. -u c. -l d. -L
D
A user account can be locked with the usermod command using what option? a. -U b. -u c. -l d. -L
D
Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat
D
Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat
D
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. first b. second c. fifth d. sixth
D
What two window managers is the Compiz Fusion window manager based upon?
beryl compiz
Which two problems below are typically seen on large systems that write large amounts of data to a non-ZFS filesystem? a. snapshotting b. bit rot c. misdirected writes d. segment faults
bit rot, misdirected
What two commands below can be used to view the contents of a bzip2-compressed file page by page?
bzless bzmore
On a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.
cancel
Which of the following results would be created by the command sequence: echo 'apple banana carrot dog elephant' | while read a b c; do echo result: $c $b $a; done
carrot dog elephant banana apple
Which of the following commands will send the output of the cat command to the grep command to be filtered?
cat /etc/passwd | grep jsmith
Which of the following commands will display the current CPU(s) detected by a Linux system?
cat /proc/cpuinfo
To display the contents of a text file called data, what command should be used?
cat data
Which of the following statements is true? (choose all that apply)
if /etc/at.allow exists, only users listed in it can use the at command if /etc/cron.allow exists, only users listed in it can use the cron command if /etc/cron.deny exists and /etc/cron.allow does no exist, any user not listed in /etc/cron.deny can use the cron command
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?
d k
What is the name given to a process not associated with a terminal?
daemon process
In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted? a. yw b. dd c. d d. X
dd
Before a computer can use a router, with what configuration information must it be provided?
default gateway
The IP address of the network interface on the router to which you send packets is called _____________________________.
default gateway
Which command should you run after installing a new kernel module to update the module dependency database?
depmod
Which of the following is not one of the three main types of Linux commands?
device calls
Which of the following is not one of the three main types of Linux commands?
device calls
What command provides the easiest method for monitoring free space on mounted filesystems?
df
Which command below provides the easiest method for monitoring free space on mounted filesystems? - du - df - fs - fd
df
Which of the following commands will display messages that were displayed during the boot sequence by the kernel?
dmesg
The quotas for certain users can be edited b using which command?
edquota
The quotas for certain users can be edited by using which command? - chquota - usrquota - repquota - edquota
edquota
A list of all exported environment and user-defined variables in a shell can be viewed with what command below?
env
To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command.
env
A case construct must be ended by ____________________.
esac
What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?
etc/cups/cupsd.conf /etc/cups/printers.conf
What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?
etc/cups/printers.conf /etc/cups/cupsd.conf
What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?
execute
What permission (when applied to a directory) allows a user to enter the directory and work with directory contents? - write - sticky bit - execute - read
execute
On most Linux systems, the logrotate utility is automatically scheduled to run weekly true or false
false
SLIP is a newer technology than PPP. true or false
false
Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy. true or false
false
Select the command that can be used to create partitions that will be stored in an MBR after installation:
fdisk
Select the command that can be used to create partitions that will be stored in an MBR after installation: - fdisk - formatdisk - partition - format
fdisk
Errors on a filesystem are common on most file systems. What do these errors indicate?
filesystem corruption
Errors on a filesystem are common on most filesystems. What do these errors indicate?
filesystem corruption
What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?
for
A process spawning or initiating another process is referred to as _____________________.
forking
In a process referred to as _________________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.
forking
In a process referred to as ____________________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.
forking
What command can be used to check different kinds of filesystems on Linux for errors?
fsck
What command can be used to check different kinds of filesystems on Linux for errors? - chkdsk. - errorchk - fs_check - fsck
fsck
What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?
g+r-w
what two commands can be used to edit a GPT based hard disk's partitions?
gdisk and parted
What two commands below can be used to edit a GPT based hard disk's partitions? (Select 2 answers) - gdisk - parted - fdisk - gtpedit
gdisk, parted
Which of the following commands should you use to specify that you want to use Git for version tracking on them?
git add
Which command can be used to download an updated copy of the master branch from the original Git repository?
git pull origin master
What is the default target on a system with a GUI installed?
graphical.target
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?
grub-mkconfig
What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?
grub2-install
Which of the following is a type of software that allows a piece of hardware to host multiple operating systems?
hypervisor
What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk? (Select two answers.) a. iSCSI initiator b. iSCSI host c. iSCSI slave d. iSCSI target
iSCSI initiaitor, iSCSI target
Which of the following commands can be used to convert files between different character encodings?
iconv
Which of the following constructs can be used in a shell script to determine whether two values are equal and if so run another set of commands?
if
What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?
ifconfig
Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (choose all that apply)
ifconfig ping netstat -i
Which command would be used to activate the NIC aliased as eth0?
ifup eth0
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?
image=
What two daemons can be used to start and manage connections for smaller network daemons such as telnet and rlogin?
inetd xinetd
The first daemon process on a system is called the ____________________ daemon.
initialize
What two commands below can be used to manipulate the routing table?
ip route route
What two commands can be used to manipulate the routing table?
ip route route
A runaway process that is faulty and consuming mass amounts of system resources ________________________.
is a rogue process
Which command can be used to see processes running in the background?
jobs
What two commands below can be used to stop a process, either by PID number or process name?
kill killall
Which of the following commands will send a process's resources to /dev/null to kill the process for process ID 1357?
kill -9 1357
Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table:
l p
what are two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table
l and p
Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table: (Select 2 answers) a. l b. a c. p d. v
l, p
In order to create and manage KVM or Qemu virtual machines, a Linux system must have which of the following installed?
libvert
In order to create a hard link, what command must be used?
ln
In order to create a hard link, what command must be used? - ln - link - lk - lnk
ln
Select the file in the /proc directory that contains statistics on the performance of the processor:
loadavg
Select the file in the /proc directory that contains statistics on the performance of the processor: a. kcore b. loadavg c. cpuinfo d. modules
loadavg
What two commands below can be used to locate files on a filesystem?
locate find
what two commands can be used to locate files on a filesystem?
locate and find
In order to send a print job to a printer using CUPS, what command must be used?
lp
Which command should be used to restrict access to printers?
lpadmin
Adding the -t option to what command below will provide a list of all printers on the system and their status?
lpstat
Adding the t option to what command below will provide a list of all printers on the system and their status?
lpstat
Which of the following commands can be used to display general hardware information for the entire system?
lshw
Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)?
lsof
A government office wants to secure a few of its Linux systems so that they can only use certain USB devices. After plugging in a USB device, which of the following commands could be used to detect certain identifying information that can be used to only allow that type of USB device?
lsusb
what are the commands that can be used to extend a volume group and logical volume respectively.
lvextend and vgextend
Select the commands that can be used to extend a volume group and logical volume respectively: (Select 2 answers) a. lvextend b. vgextend c. lvm_extend d. pgextend
lvextend, vgextend
What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?
make
Which of the following commands can be used to create and manage a software RAID configuration after installation?
mdadm
Select the two window managers that have been used in GNOME:
metacity mutter
The subdirectory newdir does not currently exist in the current directory that you are in. Which of the following commands will create a new directory named newdir and then change into that directory? (Choose two.)
mkdir newdir && cd newdir mkdir newdir; cd newdir
Select the command that can be used to check an ext2, ext3, or ext4 filesystem: a. mke2fs b. ext2fsck c. fdisk d. e2fsck
mke2fs
What command that can be used to check an ext2, ext3, or ext4 filesystem?
mke2fs
Which of the following commands will generate a new initramfs?
mkinitrd dracut
Select the two commands below that can be used to prepare a swap partition and then enable it for use:
mkswap swapon
what are two commands that van be used to prepare a swap partition and then enable it for use?
mkswap and swapon
Select the two commands below that can be used to prepare a swap partition and then enable it for use: (Select 2 answers) a. swapit b. mkswap c. swapon d. mkfs.swap
mkswap, swapon
Leonard wants to find detailed information about the Bluetooth kernel module. Which of the following commands can he use to display this information?
modinfo bluetooth
What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?
modules
Which command allows you to find out which group has a GID of 100?
more /etc/group | grep 100
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?
mount -a
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used? a. mount -f b. mount -u c. mount -o d. mount -a
mount -a
In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?
net.ipv4.ip_forward
In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?
net.ipv4.ip_forward
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?
newgrp
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?
newgrp
The ______________ can be used to affect the process priority indirectly.
nice value
The ____________________ can be used to affect the process priority indirectly.
nice value
The dump/restore utility is limited to a maximum of how many different incremental backups?
nine
Which of the following commands will display the output of a file while also displaying a line number at the left side of each line for the /etc/passwd file?
nl /etc/passwd
Users can change their own passwords by typing passwd with ____ to specify the username.
no argument
Which of the following virsh commands will display the total amount of memory as well as the amount of free memory for a node?
nodememstats
RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?
package dependency
What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?
panic
What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?
panic
Every process has a process ID and a __________________.
parent process ID
What can be used on a Linux system to trace the lineage of each child process?
parent process ID
What can be used on a Linux system to trace the lineage of each child process?
parent process ID
Select the command that can be used to send a small TCP/IP packet to another IP address and await a response:
ping
What is the command that can be used to send a small TCP/IP packet to another IP address and wait for a response?
ping
A(n) ____________refers to a program that is running in memory and on the CPU.
process
In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.
process state
In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?
process state
A network ________________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.
protocol
What command below can be used to create a new physical volume? a. lvcreate b. pvdisk c. pvcreate d. new_pv
pvcreate
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?
pwconv
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?
pwconv
What command can be issued to confirm what directory you are in at a command line prompt?
pwd
What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?
quiet
Which of the following characters, when pressed while the top program is running, will allow you to change the niceness of a process?
r
The ____________________ command takes user input from stdin and places it in a variable specified by an argument.
read
If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?
read write
Which of the following can be included in a shell script to ask the user to type in a password and then store it in the variable named $password?
read -s -p "Please enter the password: " password
What permissions are required to execute a shell script in a manner similar to any other executable program on the system?
read and execute
To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -r option
recursive
Which of the following commands will most likely increase the chance of a process receiving more time slices?
renice -12
What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?
rm
What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove? - rm - del - delete - remove
rm
Processes that have encountered an error during execution and continuously uses up system resources are referred to as ____________________ processes.
rogue
In what filesystem are most of the operating system files contained?
root
In what filesystem are most of the operating system files contained? a. boot b. data c. root d. mnt
root
Which two commands can be used to modify the route table on a Linux computer? (choose two)
route ip
What devices are used to transfer information from one network to another?
routers
In the event that you wish to disable a swap partition, what command must be used?
swapoff
When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?
systemctl
Which of the following commands will set the default runlevel of a Linux system?
systemctl set-default runlevel5.target
____ is a filter command that takes information from standard input and sends that information to a file, as well as to standard output.
tee
Describe the system cron table. How is it organized, and what information may be contained within it?
the cron table includes six fields separated by space or tab characters the first 5 fields specify the times to run the command and the sixth field is the absolute pathname to the command to be executed.
The section of an inode that stores permissions is referred to as what?
the mode of the file
IP version 4 (IPv4)
the most common version of IP used on the Internet, it uses 32-bit addressing scheme organized into different classes
In the process state column, what does an "R" indicate?
the process is currently running on the processor
How many DNS servers can be configured in the /etc/resolv.conf file?
three (3)
What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?
traceroute
Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. true or false
true
RAID level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance and allows up to two simultaneous hard disk drive failures while remaining fault tolerant. true or false
true
The cpio command has the ability to handle long filenames and can be used to back up device files. true or false
true
The database for the locate command can be updated manually by using the updatedb command. true or false
true
An alias has previously been created named showauth. Which of the following commands can be used to get rid of that alias?
unalias showauth
How many times will the following loop execute as part of a script: #!/bin/bash COUNTER=0 while [ $COUNTER -lt 7 ] do echo "hello world" done
until ctrl-c is used to terminate it
Which command is used to create user accounts and update default information for new users?
useradd
On a system using the KVM hypervisor, which of the following modules would you expect to see as part of the output of the lsmod command on a guest Linux virtual machine?
virtio
in the fdisk interactive mode, what letter can be used to save partition table and exit?
w
In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit? - w - s - q - d
w
Which of the following commands can be used to schedule very frequent recurring tasks, such as running once every minute?
watch
The ____ command counts the number of lines, words, and characters in a file.
wc
Using the syntax below, what command will create directories named one, two, and three? echo one two three | ___________ mkdir
xargs
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?
xvidtune
How can you bypass the wait function and send a user process to the background?
you can use the Ctrl+z key combination and the bg command
What yum command below can display a list of package group names?
yum grouplist
The ____ command can be used to display the contents of a compressed file.
zcat
What command can be used to display the contents of a file that was compressed with the compress utility?
zcat
The root UID is ____.
zero
In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?
zfs get all
In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued? a. zfs list b. zpool list c. zpool get all d. zfs get all
zfs get all
in order to list all configuration parameters that can be modified for a sub-filesystem, what command should be issued?
zfs get all
Which of the following states describe a process that is waiting for a parent process to release its PID?
zombie
The state and performance of a RAID-Z volume can be viewed using what two commands? (Select two answers.) a. zpool iostat b. zpool status c. zfs iostat d. zfs status
zpool iostat, zpool status
Which character(s) below represent extended regular expression metacharacter(s)?
{}
Select the metacharacter that can be used to send the standard output of one command to another command as standard input:
|
You can send the standard output of one command to another command as standard input using the ____ shell metacharacter.
|
What metacharacter can be used to refer to the current user's home directory?
~
If incompatible X Windows settings are configured, where will the errors that are generated be written to?
~/.xsession-errors
In Fedora 20, where are user configured settings for Xorg stored?
/etc/X11/xorg.conf.d/
Select below the configuration file that is used to configure the BIND / DNS server:
/etc/named.conf
What file controls the default runlevel when using Systemd?
/etc/systemd/system/default.target
What file in the /proc directory contains information about a computer's CPU?
/proc/cpuinfo
Where are the log files for the Samba daemon located?
/var/log/samba
On a Fedora based system, where are the shell environment and scheduled commands for at stored?
/var/spool/at
The GUI components and related software take up how much space on a typical Linux installation?
4 GB
What does the setfacl -b command do?
It removes all extra ACL assignments on a given file
What two commands below can be used to modify the password expiry information and a user's default shell?
chage, chsh
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?
chkconfig
What command can be used to search for DPM package information?
dpkg-query
What is the default target on a system with a GUI installed?
graphical.target
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?
grub-mkconfig
What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?
grub2-install
What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk?
iSCSI initiator iSCSI target
What command below can be used to uninstall the LILO bootloader from an active partition?
lilo -U
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?
login.defs
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?
login.defs
Segmentation faults can sometimes be fixed by performing what two tasks below?
turn off CPU cache memory increase the number of memory wait states in BIOS
Identifies the process that started another process.
PPID
The average compression ratio for gzip is ____%.
60-70
1. A Linux system process that provides a system service. 2. The default window manager for the GNOME Desktop Environment in Fedora 13 3. A UNIX SysV term that defines a certain type and number of daemons on a Linux system. 4. The component of X Windows that draws graphics to windows on the terminal screen. 5. A UNIX standard that is used to provide the structure of the system initialization process on Linux systems. 6. A recent version of the UNIX SysV system initialization process used on modern Linux distributions. 7. A Systemd term that is used to describe the number and type of daemons running on a Linux system. It is functionally equivalent to the UNIX SysV term runlevel . 8. The component of X Windows that requests graphics to be drawn from the X server and displays them on the terminal screen. 9. The partition searched for an operating system after the MBR/GPT. 10. A relatively new software framework used on Linux systems that provides a system initialization process and system management functions.
1. daemon 2. mutter window manager 3. runlevel?? 4. X server 5. UNIX Sys V 6. upstart 7. target unit 8. X client 9. active partition 10.Systemd
1. Command option used to remove a specified member from the group account. 2. Command option used to specify the user's default login shell. 3. Command option used to allow assignment of a duplicate GID. 4. Command option used to change the user's login name. 5. Command option used to force the GID to what's entered at the command line. 6. Command option used to unlock specific user accounts. 7. Command option used to add a home directory for a new user. 8. Command option used to display all password expiration information for the specified user account. 9. Command option used to change the number of days the password is valid for the specified user account.
1. groupmod -R 2. useradd -s 3. groupadd -o 4. usermod -l name 5. groupadd -g 6. usermod -U 7. useradd -m 8. chage -l 9. chage -m
In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?
1024
In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders? a. 256 b. 512 c. 1024 d. 2048
1024
The first software RAID volume on a system will use a multiple disk device file that starts with what number? a. 254 b. 127 c. 128 d. 255
127
What number indicates the lowest kernel priority (PRI) of a process possible?
127
Most Parallel SCSI controllers are capable of supporting up to how many devices? a. 12 b. 13 c. 14 d. 15
15
In Linux, what runlevel is also known as the multiuser mode?
2
The file descriptor stderr is represented by the number ____.
2
What number represents the stderr file descriptor?
2
The number of bits needed to make an IPv4 and IPv6 IP address?
32 bits for an IPv4 128 bits for an IPv6
The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent?
40-50
The compression algorithm used by the compress utility has an average compression ratio of ____%.
40-50
The following entry is in a cron table. When will the myscript script run? (be very specific)
45 23 * * 6 /bin/myscript
The GUI components and related software take up how much space on a typical Linux installation?
4GB
select the mode below that corresponds to setting r-x
5
Select the mode below that corresponds to setting r-x: - 2 - 5 - 1 - 6
5
What is the default print job priority for all print jobs created by the lp command?
50
The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?
514
If no level of compression is specified, the gzip command assumes the number ____.
6
If no level of compression is specified, the gzip command assumes what compression level?
6
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?
60%-70%
Describe what a subnet mask is, and explain why it is used. The, detail how it is used to determine the network ID of an IP address.
A subnet mask is the 8-bit number used to determine the network and host portions of an IP address. It is used to divide an IP address into two parts that identify the host (computer), and the other identifies the (network) to which it belongs to. A subnet mask is a 32-bit number used to differentiate the network component of an IP address by dividing the IP address into a network address and host address. It does so with bit arithmetic whereby a network address is but multiplied by the subnet mask revealing the underlying subnetwork. They are used to design subnetworks, or subnets that connect local networks, by determining both the number and size of subnets where the size of a subnet is the number of hosts that can be addressed.
_____________________is a mathematical operation that compares two binary digits and gives a result of 1 or 0. If both binary digits being compared have a value of 1, the result is 1. If one digit is 0 and the other is 1, or if both digits are 0, the result is 0.
ANDing
fg
After a background process has been started, what command below can be used to move it to the foreground?
True
After a process has been started, you can change its priority by using the renice command.
exit
After a shell is no longer needed, what command can be given to exit the shell?
shell
After logging into a terminal, a user will receive an interface known as which option below?
grub-mkconfig
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?
tarball
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:
Which of the following are stand-alone daemons? (choose all that apply)
Apache (httpd) DNS (named)
____ are back-up copies of files and directories.
Archives
:q!
At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes
0
At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwdconv b. pwconv c. passwd d. pwdcv
B
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwdconv b. pwconv c. passwd d. pwdcv
B
An RPM package can be converted to a cpio archive using what command? a. cpioconv b. rpm2cpio c. rpmconv d. conv_arch
B
Each octet in an IP address represents a binary number consisting of how many bits / bytes? a. 4-bit b. 8-bit c. 4-byte d. 8-byte
B
How many DNS servers can be configured in the /etc/resolv.conf file? a. two b. three c. four d. five
B
In Fedora 20, where are user configured settings for Xorg stored? a. /etc/X11/xorg.conf b. /etc/X11/xorg.conf.d/ c. /etc/inittab d. /etc/X11.conf
B
In Fedora 20, where are user configured settings for Xorg stored? a. /etc/X11/xorg.conf b. /etc/X11/xorg.conf.d/ c. /etc/inittab d. /etc/X11.conf
B
In Linux, what runlevel is also known as the multiuser mode? a. 1 b. 2 c. 3 d. 4
B
In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf? a. iproute.ipv4 b. net.ipv4.ip_forward c. ipv4.routing d. net.routing.enable
B
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in? a. systemctl b. chkconfig c. autoservice d. run-daemon
B
On a Fedora based system, where are the shell environment and scheduled commands for at stored? a. /var/spool/cron/atjobs b. /var/spool/at c. /var/run/at d. /var/run/cron/at
B
On a Fedora based system, where are the shell environment and scheduled commands for at stored? a. /var/spool/cron/atjobs b. /var/spool/at c. /var/run/at d. /var/run/cron/at
B
Processes are started with what nice value by default? a. -20 b. 0 c. 1 d. 19
B
Processes are started with what nice value by default? a. -20 b. 0 c. 1 d. 19
B
Select the escape sequence that is used for a form feed: \n b. \f /f /n
B
Select the metacharacter that can be used to send the standard output of one command to another command as standard input: a. < b. | c. > d. #
B
Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed: a. -r b. -l c. -f d. -c
B
The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent? a. 30-40 b. 40-50 c. 50-60 d. 60-70
B
Describe how forking works, and how it affects the parent process.
Forking is the creation of a new subshell; it is carried out by the fork function in the BASH shell. It is used to create processes. It takes no arguments and returns a process ID. The purpose of fork is to create a new process which becomes the child process of the caller, after a new child process is created both processes will execute the next instruction following the fork system call.
_______________ represents a text description of the user and is typically left blank.
GECOS
Which of the following is an on-screen keyboard used with Linux?
GOK
The GNOME 3 desktop environment utilizes what window manager and toolkit below?
GTK+ toolkit mutter
False
Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completes successfully.
64
How many different kill signals can be sent by the kill command to a given process?
vim file1
I order to quickly create an empty file, what command can be used?
segmentation fault
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
Tab
If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?
True
If the /etc/at.allow and /etc/at.deny files do not exist the root user is allowed to schedule tasks using the at daemon.
journald
In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?
tty1
In Fedora 20, what terminal is used for graphical login?
/etc/X11/xorg.conf.d/
In Fedora 20, where are user configured settings for Xorg stored?
X Windows
In Linux, the core component of the GUI is known as:
2
In Linux, what runlevel is also known as the multiuser mode?
7
In a SCSI chain the highest priority SCSI device is given what SCSI ID?
sixth
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?
-
In a file's mode, a permission that is unavailable is represented by what character?
elif; else
In an if construct, what statements are optional?
system-config-keyboard
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?
ln
In order to create a hard link, what command must be used?
-l
In order to display a list of at job IDs, what option can be specified to the at commands?
zfs get all
In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?
cd ../..
In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued?
<
In order to redirect a file to the standard input of a command, what meta character should be used?
<
In order to redirect a file to the standard input of a command, what metacharacter should be used?
1024
In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?
(hd0,0)
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.
image=
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?
Ctrl+k
In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?
w
In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit?
What is the effect of changing the date the password was last changed to zero?
It forces the user to change the password at the next login.???
Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?
Modems (modulator-demodulator) devices between the digital data of a computer and the analog signal of a telephone line, transmits data at 56KB/s and they are configured by using the Modem Manager utility ISDN modem is otherwise known as an integrated services digital network it is a digital phone connection that can transmit data, voice, and video over a normal telephone line. It is configured to route IP over a Dial-on-Demand Routing (DDR) link, by the use of the switch software and not the MFG or the model. It transfers speeds up to 128KB/s. DSL modem is a digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line which provides the digital subscriber line service for connection to the Internet, which is often called DSL broadband. Typically they are configured via webpage accessing by typing the IP address given in the router's manual into the browser's address bar. Runs on speeds of 100MB/s.
15
Most Parallel SCSI controllers are capable of supporting up to how many devices?
You can perform up to ____ different incremental backups using the dump/restore utility.
Nine
chkconfig
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?
/var/spool/at
On a Fedora based system, where are the shell environment and scheduled commands for at stored?
xvidtune
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?
The ____________________ environment variable contains a list of directories to search for executable programs.
PATH
A process's identifier that allows the kernel to identify it uniquely.
PID
When a computer first initializes, the system BIOS performs a(n) ____________________.
POST
What can be used on a Linux system to trace the lineage of each child process?
PPID - Parent Process ID
Pog O
Pog
Pog U
Pog Off
A set of information that is sent to a printer at the same time is called a(n) ____________________.
Print Job
Hardware Compatibility List (HCL)
Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?
A(n) ____________________ refers to a program that is running in memory and on the CPU.
Process
In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.
Process state
An executable file on the hard disk that can be run when you execute it.
Program
Network Address Translation (NAT)
Proxy servers keep track of the information passed to each client by maintaining what type of table?
What is the term for a ZFS managed filesystem that is created from ZFS pools?
ZFS volume
What is the term for a ZFS managed filesystem that is created from ZFS pools?
ZFS volume
What is the term for a ZFS managed filesystem that is created from ZFS pools? a. ZFS vault b. ZFS volume c. ZFS store d. ZFS lake
ZFS volume
True
Zombie processes are also known as defunct processes.
Select the test statement that can be used to determine if A is numerically greater than B:
[ A -gt B ]
The test statement ____ would be used to determine if A is numerically greater than B.
[ A -gt B ]
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?
[1-4]
The ____ escape sequence represents a form feed.
\f
Select the escape sequence that starts a new line when used with echo:
\n
Which of the following is the common escape sequence to display a horizontal tab using the echo command?
\t
cron table
a file specifying tasks to be run by the cron daemon; there are user cron tables and system cron tables
(CIDR) notation
a notation that is often used to represent an IP address and its subnet mask
Octet
a port of an IP address that represents eight binary bits
parent process
a process that has started other processes (child processes)
child process
a process that was started by another process (parent process)
Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to take approximately 20 minutes to run individually. However, he would like to go to lunch 15 minutes from now. He knows that he can type all of the commands on the same line and separate them with a certain character to run them sequentially. Which character can he type after each command to have them run one after the next without requiring further input from him?
a semicolon
Internet Protocol (IP) address
a series of four 8-bit numbers that represent a computer on a network
Protocol
a set of rules of communication used between computers on a network
daemon process
a system process that is not associated with a terminal
Route Table
a table of information used to indicate which networks are connected to network interfaces
process ID (PID)
a unique identifier assigned to every process as it begins
host name
a user-friendly name assigned to a computer
What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?
alert
Which command can be used to create a new command that will monitor the contents of auth.log as they get added to the file?
alias showauth='tail -f /var/log/auth.log'
The killall command terminates ____________________________.
all instances of a process with the same name
Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded:
append= boot=
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?
chkconfig
What two* commands will grant only the execute permission to username bob on file1, assuming bob is the file's owner?
chmod 777 file1
What two commands below will grant only the execute permission to username bob on file1, assuming that bob is the file's owner?
chmod 777 file1, chmod u=x file1
In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?
chmod 7777 filenam
What character is used to delimit most Linux configuration files?
colon
Each field in the /etc/passwd file is separated by ____.
colons
In what mode does the vi editor open by default? a. command mode b. overview mode c. insert mode d. append mode
command mode
What command can be used to copy files?
cp
What command can be used to copy files? - copy - cp - cpy - mv
cp
What two commands below will work recursively if specified with the -R option? (Select 2 answers.) - cp - rm - mkdir - mv
cp, rm
What file in the /proc contails info about a computer's CPU?
cpuinfo
Daemon used to schedule a command to execute repeatedly in the future.
cron daemon
What command is used to view and modify user jobs scheduled to run with cron?
crontab
Which of the following commands will show the current user cron jobs that have been created for the currently logged in user?
crontab -l