47
What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?
#!
The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?
$
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.
(hd0,0)
Select the regular expression metacharacter that matches 0 or more occurrences of the previous character. a. + b. ^ c. ? d. *
*
When there are multiple background process executing in the shell, the jobs command indicates the most recent one with which symbol?
+
Nice values are used to affect process priorities using a range between ______________________.
-20 and 19
Which switch below can be added to the ls command to show a list of files and their type?
-F
A user account can be locked with the usermod command using what option?
-L
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?
-P
What option for the iptables command can be used to specify the default policy for a certain chain type?
-P
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?
-P
What option can be specified with the rpm command to identify any missing files in a package or package dependency?
-V
What option can be used with SSH to enable tunneling of X Windows information?
-X
What option can be used with ssh to enable tunneling of X Windows information?
-X
What option can be used with ssh to enable tunneling of X Windows information?
-X
What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?
-Z -z
When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.
-c
When used with the uncompress command, what option displays the contents of the compress file to Standard Output?
-c
To create or edit a user cron table, you can use the ____ option to the crontab command.
-e
To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.
-e
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?
-e
What option, when added to the crontab command, opens the vi editor with a user's cron table?
-e
When used with the compress command, the ____ option can be used to compress symbolic links.
-f
In order to display a list of at job IDs, what option can be specified to the at command?
-l
In order to display a list of at jobs IDs, what option can be specified to the at command?
-l
Select the command below that can be used to provide a long listing for each file in a directory:
-l
Which device file below represents the first primary partition on the second PATA hard disk drive? a. /dev/hdb1 b. /dev/hdc2 c. /dev/hdc1 d. /dev/hda1
/dev/hdb1
What device file below indicates that the first ATAPI IDE tape device (nonrewinding)?
/dev/nht0
What device file below indicates the first ATAPI IDE tape device (nonrewinding)?
/dev/nht0
What two device files below represent the first SCSI tape device, rewinding and non-rewinding?
/dev/st0 /dev/nst0
What two device files below represent the first SCSI tape device, rewinding and non-rewinding?
/dev/st0 /dev/nst0
What character device file represents the second serial port on a system (COM2)?
/dev/ttyS1
What character device file represents the second serial port on a system (COM2)? a. /dev/ttyS1 b. /dev/tty2 c. /dev/tty1 d. /dev/ttyS0
/dev/ttyS1
In Fedora 20, where are user configured settings for Xorg stored?
/etc/X11/xorg.conf.d/
A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs?
/etc/cron.deny
In which directory would a system administrator store scripts that should be run monthly by the cron daemon?
/etc/cron.monthly
The location of system cron tables.
/etc/crontab
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length and the range of UIDs and GIDs available for use?
/etc/cups/printers.conf
In Linux, the group database configuration file is ____.
/etc/group
What file in the /proc directory contains information about a computer's CPU?
/proc/cpuinfo
To ensure that Linux has detected the correct amount of RAM in the filesystem after installation, you should view the contents of what file in the proc directory?
/proc/meminfo
To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory? a. /proc/meminfo b. /proc/memoryinfo c. /proc/mem d. /proc/cpuinfo
/proc/meminfo
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?
/root
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory? - /root - /bin - /home/root - /boot
/root
Where are the log files for the Samba daemon located?
/var/log/samba
Where are scheduled commands stored on Ubuntu Linux systems?
/var/spool/cron/atjobs
Where is the default document root directory for the Apache web server?
/var/www/html
At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?
0
In NTP, stratum ____ consists of atomic devices or GPS clocks.
0
In NTP, what stratum consists of atomic devices or GPS clocks?
0
On Linux, the root user always has a UID of what number?
0
On Linux, the root user always has a UID of what number?
0
Process are started with what nice value by default?
0
Processes are started with a nice value of ____ by default.
0
Processes are started with what nice value by default?
0
The file descriptor stdin is represented by the number ____.
0
What number represents the stdin file descriptor?
0
What range of ports is considered to be "well-known"?
0-1023
What range of ports is considered to be "well-known"?
0-1023
Where is the skeleton directory located on most Linux systems? a. /etc/skel b. /var/skel c. /etc/skeleton d. /var/skeleton
A
Which command should be used to restrict access to printers? a. lpadmin b. lpa c. lpr d. admin
A
Which command should be used to restrict access to printers? a. lpadmin b. lpa c. lpr d. admin
A
RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as? a. package dependency b. branching package c. family package d. recursing package
A
What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on? a. for b. while c. case d. switch
A
What is VNC? How does it transfer graphics across the network?
A Virtual Network Computer (VNC) is a cross-platform technology that allows users to connect to a graphical desktop across a network. It transfers graphics across the network by using the special platform-independent protocol called Remote FrameBuffer (RFB) to transfer graphics, mouse movements, and keystrokes across the network.
RAID-Z
A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:
What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively? Multiple Answer a. PWD b. CWD c. PATH d. SHELL
A and D
character
A device that transfers data in a character-by-character fashion is referred to as what type of device?
4
A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices?
env
A list of all exported environment and user-defined variables in a shell can be viewed with what command below?
Detail shell scripts and explain how they are used and executed.
A shell script is meant to be run by the UNIX shell. These commands can be written in different types of scripting languages. These scripts can be used to start programs, manipulate files, and printing out text. Scripts can be executed from the command-line in UNIX.
What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon? a. psbranch b. pstree c. psparent d. pshead
B
What command below is used to display the lineage of a process by tracking its PPID until the init daemon? a. psbranch b. pstree c. psparent d. pshead
B
What file controls the default runlevel when using Systemd? a. /etc/inittab b. /etc/systemd/system/default.target c. /etc/systemd/inittab.target d. /etc/systemd.conf
B
What is the subnet mask for a Class B IP address? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255
B
What option can be added to the dpkg command to remove specified package from the system, including any configuration files used by the package? a. -d b. -P c. -D d. -r
B
What option can be added to the rpm command in order to query packages? a. -i b. -q c. -v d. -h
B
What option should be used in conjunction with lp command in order to specify destination printer name? a. -n b. -d c. -p d. -l
B
What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users? a. alert b. panic c. crit d. error
B
What yum command below can display a list of packagegroup names? a. yum list --groups b. yum grouplist c. yum -- list -g d. yum show groups
B
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol? a.* b. + c. - d. /
B
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol? a. * b. + c. - d. /
B
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? a. SIGINT b. SIGQUIT c. SIGKILL d. SIGTERM
B
The dump/restore utility is limited to a maximum of how many different incremental backups? a. seven b. eight c. nine d. ten
C
When using Systemd, what command can be used to start, stop and configure daemons to start automatically when the system starts? a. chkconfig b. service c. systemctl d. syscontroller
C
When using the compress utility, each file specified for compression is renamed with what extension? a. .cmp b. .c c. .Z d. .cpz
C
Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory? a. daemon b. manip-daemon c. service d. daemon-service
C
What two ps options can be used to display a full list of information about each process, and a long list of information about each process? a. -e b. -p c. -f d. -l
C and D
Which of the following commands can be used to create a BASH variable named CREATOR with the value of Torvalds?
CREATOR="Torvalds"
____ are values that are calculated using a MD5 algorithm, a SHA-1 algorithm, or a SHA-256 algorithm. Read Answer Items for Question 13.
Checksum
Which of the following is the default desktop environment used by Linux Mint?
Cinnamon
Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?
Ctrl +g
In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line? a. Ctrl+k b. dd c. Ctrl+a d. Ctrl+d
Ctrl+k
Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat
D
Select the command that can be used to send a small TCP/IP packet to another IP address and await a response: a. png b. ipquery c. ring d. ping
D
What number indicates the lowest kernel priority (PRI) of a process possible? a. -20 b. 0 c. 20 d. 127
D
What number indicates the lowest priority kernel priority (PRI) of a process possible? a. -20 b. 0 c. 20 d. 127
D
What option can be added to the netstat command in order to display network statistics? a. -s b. -p c. -a d. -i
D
What option, when added to the crontab command, opens the vi editor with a user's cron table? a. -u b. -c c. -f d. -e
D
What permissions are required to execute a shell script in a manner similar to any other executable program on the system? a. read b. write and read c. execute d. read and execute
D
What well-known TCP port is utilized by the SMTP service? a. 110 b. 22 c. 23 d. 25
D
Which of the following is not one of the three main types of Linux commands? a. binary programs b. shell scripts c. shell functions d. device calls
D
What command can be used to search for DPM package information? a. dpkg-search b. dpkg-list c. dpkg-info d. dpkg-query
D
A directory that contains the default Web site that is used on a server.
Document root
target ID
Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?
True
Each process can start an unlimited number of other processes.
An alternative to the vi editor that offers an equal set of functionality is the GNU _________________________.
Emacs (Editor MACroS) editor
The LISP artificial intelligence programming language can be used with which text editor below? a. Kedit editor b. Nedit editor c. Joe editor d. Emacs editor
Emacs editor
filesystem corruption
Errors on a filesystem are common on most filesystems. What do these errors indicate?
____________________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.
FHS
Almost all hardware problems are the result of damaged hardware.
False
Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. True or False?
False
By default, new users are forced to change their passwords.
False
Each device attached to a system can be represented by multiple device files.
False
On most Linux systems, the logrotate utility is automatically scheduled to run weekly. True or False
False
SLIP is a newer technology than PPP.
False
SLIP is a newer technology that PPP
False
Stand-alone daemons are started on demand using inetd or xinetd.
False
T or F: On most Linux systems, the logrotate utility is automatically scheduled to run weekly.
False
T or F: The killall command uses the PID to kill a process.
False
T or F: The secure log file contains information regarding the last user to log in to a system.
False
T or F: Zombie processes are also known as defunct processes
False
T/F - A value of 0 for a process priority indicates low priority.
False
T/F - The ps command is the only command that can view process information.
False
T/F - To decompress files that have been compressed with the compress utility, you can use the decompress command followed by the names of the files to be decompressed.
False
T/F - To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.
False
The secure log file contains information regarding the last user to log in to a system. True or False
False
To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor. True or False
False
Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy.
False
When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory.
False
When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.
False
When using the gzip utility, the -l option is also known as best compression and results in a higher compression ratio. True or False?
False
Zombie processes are also known as defunct processes. True or False
False
What command is most effective at identifying different types of files?
File
____ are labels representing command input and output.
File descriptors
Describe how forking works, and how it affects the parent process.
Forking is the creation of a new subshell; it is carried out by the fork function in the BASH shell. It is used to create processes. It takes no arguments and returns a process ID. The purpose of fork is to create a new process which becomes the child process of the caller, after a new child process is created both processes will execute the next instruction following the fork system call.
A DNS name resolution request whereby a FQDN is resolved to an IP address.
Forward lookup
Archiving all data on a filesystem is performing a ____.
Full backup
_______________ represents a text description of the user and is typically left blank.
GECOS
False
Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completes successfully.
Tab
If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?
True
If the /etc/at.allow and /etc/at.deny files do not exist the root user is allowed to schedule tasks using the at daemon.
journald
In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?
cd ../..
In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued?
<
In order to redirect a file to the standard input of a command, what meta character should be used?
<
In order to redirect a file to the standard input of a command, what metacharacter should be used?
image=
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?
The process is currently running on the processor.
In the process state column, what does an "R" indicate?
root
In what filesystem are most of the operating system files contained?
command mode
In what mode does the vi editor open by default?
What is the effect of changing the date the password was last changed to zero?
It forces the user to change the password at the next login.???
Which of the following will the split command do on a file when no other options are specified?
It will split a file into new equally sized files that are 1/10th of the original file size.
The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.
Kern
A user account can be locked with the usermod command using what option?
L
Which of the following options is passed to the Linux kernel from the GRUB2 configuration file to set the locale?
LANG
In order to send a print job to a printer using CUPS, what command must be used?
Lp
What DNS resource record type is used to provide the IP address for the e-mail server for a zone?
MX
Hardware Compatibility List (HCL)
Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?
If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Tab b. Ctrl c. Alt d. Esc
Tab
Databases store information in the form of ____, each of which contains ____.
Tables; records
Filenames that end with the .tar.gz or .tgz extensions, and represent gzip-compressed tar archives are called ____.
Tarball
Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?
Target ID
/boot
The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?
/root
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?
Free Software Foundation (FSF)
The GNU General Public License (GPL) was developed by which organization?
4GB
The GUI components and related software take up how much space on a typical Linux installation?
Linus Torvalds
The Linux kernel was developed and released in 1991 by:
mount -a
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?
False
To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.
A route table is a list of TCP/IP networks that is stored in system memory.
True
A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address.
True
After a process has been started, you can change its priority by using the renice command. True or False
True
After a process has been started, you can change its priority by using the renice command. True or False?
True
By default, the smb.conf file shares all printers and home directories for recognized Windows users.
True
CUPS contains versions of the lpr, lpc, lpq, and lpm commands.
True
CUPS contains versions of the lpr, lpc, lpq, and lprm commands.
True
CUPS contains versions of the lpr, lpc, lpq, and lprm commands. True or False
True
CUPS contains versions of the lpr, lpc, lpq, and lprm commands. True or False?
True
Class D addresses are used for Multicasting
True
Each process can start an unlimited number of other processes. True or False
True
Each process can start an unlimited number of other processes. True or False?
True
Everyone has permission to view the /etc/passwd file's contents.
True
If the / filesystem becomes corrupted, the system is unstable and must be turned off.
True
If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False
True
If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False
True
Logs from cron daemon (crond) can be view using the command journalctl _COMM=crond
True
T/F - By default, the smb.conf file shares all printers and home directories for recognized Windows users.
True
T/F - The BASH shell assumes stdout in the absence of a numeric file descriptor.
True
T/F - The ENV environment variable represents the location of the BASH run-time configuration file.
True
T/F - The Very Secure FTP daemon is a stand-alone daemon.
True
T/F - The compress utility preserves the original ownership, modification, and access time for each file that it compresses.
True
T/F - The dump/restore utility can only work with files on ext2 and ext3 filesystems.
True
T/F - The tar utility cannot back up device files or files with filenames longer than 255 characters.
True
T/F - The use of NFS is less common than the use of FTP to transfer files on public networks.
True
T/F - While a process is waiting for its parent process to release the PID, the process is said to be in a(n) zombie state.
True
T/F - You can choose to use a window manager only, and not use a desktop manager.
True
The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length
True
The Very Secure FTP daemon is a stand-alone daemon.
True
The compress utility preserves the original ownership, modification, and access time for each file that it compresses.
True
The compress utility preserves the original ownership, modification, and access time fore each file that it compresses. True or False?
True
When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD.
True
When you print to a printer class, the print job is send to the first available printer in the printer class.
True
Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stop daemons after system initialization.
True
What port is used by the Network Time Protocol (NTP) for communication?
UDP 123
/var
Under the root directory in Linux, which directory contains system commands and utilities?
/boot
Under what directory is the Linux kernel stored?
Assistive technologies are configured using what utility on Fedora 20 in GNOME?
Universal Access
[1-4]
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?
Red Hat
What Linux distribution is the most commonly used distribution within organizations today?
RAID5
What RAID level is commonly referred to as disk striping with parity?
for
What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?
It removes all extra ACL assignments on a given file.
What does the setfacl -b command do?
/etc/profile
What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?
/etc/systemd/system/default.target
What file controls the default runlevel when using Systemd?
ioports
What file in the /proc directory contains a list of memory address ranges reserved for device use?
/proc/cpuinfo
What file in the /proc directory contains information about a computer's CPU?
udf
What file system below is used by software programs that write to a CD-RW or DVD-RW drive?
DVD
What installation media source is the most common source for Linux packages?
graphical.target
What is the default target on a system with a GUI installed?
2
What is the minimum number of user accounts that must be created at install time?
ZFS volume
What is the term for a ZFS managed filesystem that is created from ZFS pools?
quiet
What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?
2; SIGINT
What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl_c combination to kill a running process?
;
What metacharacter can be used to issue tw term-31o commands to be run in consecutive order, without piping or redirecting output?
~
What metacharacter can be used to refer to the current user's home directory?
&
What metacharacter indicates background command execution?
127
What number indicates the lowest kernel priority (PRI) process possible?
2
What number represents the stderr file descriptor?
0
What number represents the stdin file descriptor?
!
What operator below is known as the NOT operator?
-e
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?
write
What permission grants a user the ability to open, read, and edit the contents of a file?
read and execute
What permissions are required to execute a shell script in a manner similar to any other executable program on the system?
device driver
What piece of software tells the operating system how to use a specific hardware device?
init; systemd
What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or System init processes?
-l; -f
What two ps options can be used to display a full list of information about each process, and a long list of information about each process?
+
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?
systemctl
When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?
Options
When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:
7
When using the chmod command, the mode rwx can be represented by which number?
The process is high priority.
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?
minor number
When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?
whoami
Which Linux command can be utilized to display your current login name?
What is contained in the DISPLAY variable on a Linux system running the X window system?
Which X server the client is supposed to connect to by default.
{}
Which character(s) below represent extended regular expression metacharacter(s)?
service
Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?
df
Which command below provides the easiest method for monitoring free space on mounted filesystems?
wc
Which command can be used to count the number lines, words, and characters in a file?
/dev/hdb1
Which device file below represents the first primary partition on the second PATA hard disk drive?
SIGQUIT
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?
Ctrl+g
Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?
--loop
Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?
-F
Which switch below can be added to the ls command to show a list of files and their type?
The ____ option to the ps command displays all processes that do not run on terminals.
X
False
You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.
/var/log/boot.log
You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?
What is the term for a ZFS managed filesystem that is created from ZFS pools?
ZFS volume
What is the term for a ZFS managed filesystem that is created from ZFS pools?
ZFS volume
What is the term for a ZFS managed filesystem that is created from ZFS pools? a. ZFS vault b. ZFS volume c. ZFS store d. ZFS lake
ZFS volume
Select the test statement that can be used to determine if A is numerically greater than B:
[ A -gt B ]
The test statement ____ would be used to determine if A is numerically greater than B.
[ A -gt B ]
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?
[1-4]
Select the escape sequence that is used for a form feed:
\f
The ____ escape sequence represents a form feed.
\f
parent process
a process that has started other processes (child processes)
child process
a process that was started by another process (parent process)
Internet Protocol (IP) address
a series of four 8-bit numbers that represent a computer on a network
Protocol
a set of rules of communication used between computers on a network
daemon process
a system process that is not associated with a terminal
The killall command terminates ____________________________.
all instances of a process with the same name
Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded:
append= boot=
A system administrator wants to schedule a task to run at 11 pm, but knows that she will not be in the office at that time. Which of the following commands can she use to schedule this task to run that night while she is at home?
at
Which of the following command can be used to remove a job from the list of pending jobs? (Choose all that apply.)
at -d at -r atrm
The command used to schedule commands and tasks to run at a present time in the future.
at command
Daemon used to schedule a command to execute once in the future.
at daemon
In the process called _____, a user's user name and password are checked against a system database that contains all user account information.
authentication
In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.
authentication
The ____ command can be used to extract, manipulate, and format text using pattern-action statements.
awk
The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?
awk
In a file's mode, a permission that is unavailable is represented by what character? - ? - * - "b -" - +
b -
What two window managers is the Compiz Fusion window manager based upon?
beryl compiz
Which two problems below are typically seen on large systems that write large amounts of data to a non-ZFS filesystem? a. snapshotting b. bit rot c. misdirected writes d. segment faults
bit rot, misdirected
What two commands below can be used to view the contents of a bzip2-compressed file page by page?
bzless bzmore
On a CUPS printing system, to remove a print job that is in the print queue, you can use the _____ command followed by the print job IDs of the jobs to remove.
cancel
Which of the following results would be created by the command sequence: echo 'apple banana carrot dog elephant' | while read a b c; do echo result: $c $b $a; done
carrot dog elephant banana apple
Which of the following commands will display the current CPU(s) detected by a Linux system?
cat /proc/cpuinfo
To display the contents of a text file called data, what command should be used?
cat data
A device that transfers data in a character-by-character fashion is referred to as what type of device? a. text b. binary c. block d. character
character
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?
chkconfig
What two* commands will grant only the execute permission to username bob on file1, assuming bob is the file's owner?
chmod 777 file1
What two commands below will grant only the execute permission to username bob on file1, assuming that bob is the file's owner?
chmod 777 file1, chmod u=x file1
In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?
chmod 7777 filename
Select the command that can be used to change the root filesystem to a different directory, such as when you are in a rescue environment.
chroot
what command can be used to change the root filesystem to a different directory, such as when in a rescue environment?
chroot
Each field in the /etc/passwd file is separated by ____.
colons
In what mode does the vi editor open by default? a. command mode b. overview mode c. insert mode d. append mode
command mode
What command can be used to copy files?
cp
What command can be used to copy files? - copy - cp - cpy - mv
cp
What two commands below will work recursively if specified with the -R option? (Select 2 answers.) - cp - rm - mkdir - mv
cp, rm
What file in the /proc contails info about a computer's CPU?
cpuinfo
Daemon used to schedule a command to execute repeatedly in the future.
cron daemon
What command is used to view and modify user jobs scheduled to run with cron?
crontab
Which of the following commands will show the current user cron jobs that have been created for the currently logged in user?
crontab -l
You have run the top command successfully, but realize that the q key on the keyboard has suddenly stopped working. What is another way that you can exit out of the top program?
ctrl-c
The ____ command can be used in the BASH prompt to obtain a Web page from the Apache server.
curl
Which command below can be used at a BASH command prompt to obtain a web page?
curl
In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted? a. yw b. dd c. d d. X
dd
Before a computer can use a router, with what configuration information must it be provided?
default gateway
The IP address of the network interface on the router to which you send packets is called _____________________________.
default gateway
Which command below provides the easiest method for monitoring free space on mounted filesystems? - du - df - fs - fd
df
Which of the following commands will display messages that were displayed during the boot sequence by the kernel?
dmesg
What command can be used to search for DPM package information?
dpkg-query
Select the command below that shows the size of a directory and its contents in kilobytes:
du
Select the command below that shows the size of a directory and its contents in kilobytes: - du - sizeof - df - dir
du
What command shows the size of a directory and its contents in kilobytes?
du
Which of the following commands will display the exit status of the last command used in the BASH shell?
echo $?
The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?
echo $PS1
The quotas for certain users can be edited b using which command?
edquota
The quotas for certain users can be edited by using which command? - chquota - usrquota - repquota - edquota
edquota
What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?
emerg or panic
What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?
etc/cups/printers.conf /etc/cups/cupsd.conf
SLIP is a newer technology than PPP. true or false
false
Select the command that can be used to create partitions that will be stored in an MBR after installation:
fdisk
You have started a job running in the background that you want to now bring to the front so that you can watch it execute. Which of the following commands can be used to display the job's output to the terminal?
fg
Errors on a filesystem are common on most filesystems. What do these errors indicate? a. filesystem corruption b. raid degradation c. hard drive failures d. filesystem breaks
filesystem corruption
A process spawning or initiating another process is referred to as _____________________.
forking
What command can be used to check different kinds of filesystems on Linux for errors?
fsck
Which command can be used to download an updated copy of the master branch from the original Git repository?
git pull origin master
What is the default target on a system with a GUI installed?
graphical.target
Which of the following will look at the /etc/passwd file for any lines containing the word root and display them out to the screen while simultaneously writing the results to a file?
grep root /etc/passwd | tee ~/root.txt
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?
grub-mkconfig
What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?
grubby
The first line in a shell script, which specifies the pathname to the shell that interprets the contents of the shell script, is ____.
hashpling
An IPv6 IP address consists of 16-bit numbers in what numbering scheme?
hexidecimal
Which of the following statements is true? (choose all that apply)
if /etc/at.allow exists, only users listed in it can use the at command if /etc/cron.allow exists, only users listed in it can use the cron command if /etc/cron.deny exists and /etc/cron.allow does no exist, any user not listed in /etc/cron.deny can use the cron command
What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?
ifconfig
Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (choose all that apply)
ifconfig ping netstat -i
Which process will all have PID of 1 and a PID of 0?
init
The first daemon process on a system is called the ____________________ daemon.
initialize
What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes?
int systemd
What utility in the sysstat package measures the flow of information to and from disk devices?
iostat
What two commands below can be used to manipulate the routing table?
ip route route
Which command can be used to see processes running in the background?
jobs
Which of the following commands can be used to only show jobs that have been paused.
jobs -s
What two commands below can be used to stop a process, either by PID number or process name?
kill killall
Which of the following commands will send a process's resources to /dev/null to kill the process for process ID 1357?
kill -9 1357
Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table:
l p
what are two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table
l and p
Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table: (Select 2 answers) a. l b. a c. p d. v
l, p
What command below can be used to uninstall the LILO bootloader from an active partition?
lilo -U
In order to create a hard link, what command must be used?
ln
In order to create a hard link, what command must be used? - ln - link - lk - lnk
ln
Select the file in the /proc directory that contains statistics on the performance of the processor:
loadavg
What file in the /proc directory that contains statistics on the performance of the processor?
loadavg
Which of the following commands can be used to display the current locale of a system? (Choose two.)
locale localectl
what two commands can be used to locate files on a filesystem?
locate and find
What two commands can be used to locate files on a filesystem? - locate - grep - read - find
locate, find
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?
login.defs
The TCP/IP address of 127.0.0.1 is also referred to as the _________________.
loopback address
In order to send a print job to a printer using CUPS, what command must be used?
lp
Which command should be used to restrict access to printers?
lpadmin
Adding the -t option to what command below will provide a list of all printers on the system and their status?
lpstat
what command added to the -t option to will provide a list of all printers on the system and their status?
lpstat
Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)?
lsof
A government office wants to secure a few of its Linux systems so that they can only use certain USB devices. After plugging in a USB device, which of the following commands could be used to detect certain identifying information that can be used to only allow that type of USB device?
lsusb
The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.
make
What command is used to manage a software RAID configuration after installation?
mdadm
Which of the following commands can be used to create and manage a software RAID configuration after installation?
mdadm
Select the two window managers that have been used in GNOME:
metacity mutter
Leonard wants to find detailed information about the Bluetooth kernel module. Which of the following commands can he use to display this information?
modinfo bluetooth
What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?
modules
What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel? a. kmods b. modinfo c. mod_info d. modules
modules
Which command allows you to find out which group has a GID of 100?
more /etc/group | grep 100
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?
mount -a
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used? a. mount -f b. mount -u c. mount -o d. mount -a
mount -a
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used??
mount -a
The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.
mput filename
Which of the following is the default window manager used by the GNOME version 3 desktop environment?
mutter
After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database?
newaliases
When working with Sendmail, if you modify the /etc/aliases file, you need to run the ____ command to rebuild the aliases database.
newaliases
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?
newgrp
To change the primary group temporarily to another group that is listed in the output of the groups and id command, you can use which command?
newgrp
The ____________________ can be used to affect the process priority indirectly.
nice value
Users can change their own passwords by typing passwd with ____ to specify the username.
no argument
Which of the following virsh commands will display the total amount of memory as well as the amount of free memory for a node?
nodememstats
What command can be used to see what actual time servers are being used for synchronization?
ntp_query
RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?
package dependancy
RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?
package dependency
What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?
panic
Every process has a process ID and a __________________.
parent process ID
What can be used on a Linux system to trace the lineage of each child process?
parent process ID
The ____ PostgreSQL command-line utility backs up PostgreSQL database settings.
pg_dump
What PostgreSQL command-line utility backs up PostgreSQL database settings?
pg_dump
What is the command that can be used to send a small TCP/IP packet to another IP address and wait for a response?
ping
A network ________________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.
protocol
What command below can be used to create a new physical volume? a. lvcreate b. pvdisk c. pvcreate d. new_pv
pvcreate
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?
pwconv
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?
pwconv
A system that uses and /etc/passwd file only can be converted to use /etc/shadow for security by using what command?
pwconv
What command can be issued to confirm what directory you are in at a command line prompt?
pwd
What option can be added to the rpm command in order to query packages?
q
What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?
quiet
If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file? - read - write - execute - move
read, write
What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove? - rm - del - delete - remove
rm
what two commands will work recursively if specified with the -R option?
rm and cp
Which two commands can be used to modify the route table on a Linux computer? (choose two)
route ip
The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?
rsyslog.conf rsyslog.d
A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.
runlevel
Which of the following commands will show the current runlevel along with the previous runlevel? (Choose all that apply.)
runlevel
The at command is used to ________________.
schedule processes to run at a single instance in the future
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
secure
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
secure
Which of the following commands will count down from 10 to 1?
seq 10 -1 1
Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?
service
The environment variables that are set by default and their current values can be viewed with what command?
set
To see a list of the environment variables and their current values on a system, you can use the ____ command.
set
Which of the following is a valid method of running a script named myscript.sh? (Choose two)
source myscript.sh ./myscript.sh
Which of the following are graphical remote administration technologies? (choose all that apply)
ssh-x VNC
The ____________ command can be used to start X Windows and the default window manager or desktop environment.
startx
Any error messages generated by a command is ____.
stderr
The information that is processed by the command during execution is ____.
stdin
____ is the normal output of a command.
stdout
Most commands that are run by the shell are run in a separate ____________________, which is created by the current shell.
subshell
____ is a command that can be used to ensure that a file was received in its entirety after you download it.
sum
What section of a filesystem contains info about the filesystem in general?
superblock
What section of a filesystem contains information about the filesystem in general?
superblock
In the event that you wish to disable a swap partition, what command must be used?
swapoff
Which of the following commands will set the default runlevel of a Linux system?
systemctl set-default runlevel5.target
Which of the following commands will display a list of Systemd units sorted by the time they took to load?
systemd-analyze blame
To display a text file in reverse order, what command should be used? a. tee b. tac c. cat d. sed
tac
What command can be used to display the last five lines of a text file?
tail -5
The /etc/login.defs file is a(n) ____ file.
text
background (bg) command
the command used to run a foreground process in the background
Describe the system cron table. How is it organized, and what information may be contained within it?
the cron table includes six fields separated by space or tab characters the first 5 fields specify the times to run the command and the sixth field is the absolute pathname to the command to be executed.
The section of an inode that stores permissions is referred to as what?
the mode of the file
IP version 4 (IPv4)
the most common version of IP used on the Internet, it uses 32-bit addressing scheme organized into different classes
Which command can be used to count the number lines, words, and characters in a file?
wc
Which of the following commands will count the number of lines in a file named data.csv?
wc -l data.csv
What two commands below can be used to modify the password expiry information and a user's default shell?
chage, chsh
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?
chkconfig
What command can be used to search for DPM package information?
dpkg-query
What is the default target on a system with a GUI installed?
graphical.target
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?
grub-mkconfig
What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?
grub2-install
Which of the following characters can be entered at the beginning of a line in a shell script to ensure that line is recognized as a comment rather than try to execute it?
#
The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command? - $ - & - # - *
$
The contents of a certain variable in memory can be viewed using which metacharacter in combination with the echo command?
$
The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.
$PS1
When killing a background job with the kill command, the background job ID must be prefixed by what character below?
%
When killing a background job with the kill command, you must prefix the background job IDs by a(n) ____.
%
What character, when appended to a command, causes the command to be run in the background?
&
When you append a(n) ____ to a command, the command is run in a background process.
&
What character, when appended to a command, causes the command to be run in the background?
& (and command) &
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.
+
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?
+
In a file's mode, a permission that is unavailable is represented by what character?
-
Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory? a. -o loop b. --mode l c. --option l d. --loop
--loop
Select the option that, when used with the sar command, displays swap statistics:
-B
What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?
-F
What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?
-F
Select the iptables option that specifies the destination address of packets for a rule:
-d
What command can be used to change the maximum number of file handles that can be used by a program?
-d
What option should be used in conjunction with the lp command in order to specify the destination printer name?
-d
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?
-d -k
To remove a package from the system, you can use the ____ option to the rpm command.
-e
When used with the compress command, what option below can be used to compress symbolic links?
-f
What two ps options can be used to display a full list of information about each process, and a long list of information about each process?
-f -l
What option can be added to the netstat command in order to display network statistics?
-i
What option can be added to the netstat command in order to display network statistics?
-i
Select the options to use with the cpio utility to cause the utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation:
-i -u
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?
-k -d
Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed:
-l
The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.
-l
To display a list of at Job IDs, you can specify the ____ option to the at command.
-l
which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?
-loop
When using the cpio utility, the ____ option causes a new archive to be created.
-o
Select the option that can be used with the lpstat command to display a list of printers that are enabled:
-p
What option can be used with the lpstat command to display a list of printers that are enabled?
-p
When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames.
-p
What option can be added to the rpm command in order to query packages?
-q
Which sar command option is used to display statistics for the processor queue?
-q
What command option, when added to the rm command, is commonly referred to as the -resume option?
-r
What option can be added to the userdel command to remove the home directory of the target user?
-r
What option can be added to the userdel command to remove the home directory of the target user?
-r
What option, when added to the rm command, is commonly referred to as the -resume option?
-r
What option, when added to the rm command, is commonly referred to as the -resume option? - r - d - f - i
-r
The mfks command can be issued with what switch in order to specify a filesystem type?
-t
The mkfs command can be issued with what switch in order to specify a filesystem type? a. -o b. -f c. -c d. -t
-t
Which file is a configuration file containing passwords and password expiration information for all user accounts?
/etc/shadow
Where is the skeleton directory located on most Linux systems?
/etc/skel
The SSHD daemon is configured by editing what configuration file?
/etc/ssh/sshd_config
The sshd daemon is configured by editing what configuration file?
/etc/ssh/sshd_config
The sshd daemon is configured by editing what configuration file?
/etc/ssh/sshd_config
Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system?
/etc/sysconfig/network-scripts/ifcfg-eth0
What file in the /proc directory contains information about a computer's CPU? a. /proc/meminfo b. /proc/cpuinfo c. /proc/cpu_info d. /proc/proc_info
/proc/cpuinfo
To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?
/proc/meminfo
In addition to /etc/localtime, some Linux distributions also have an /etc/timezone text file that contains a reference to the correct time zone file contained in which directory?
/usr/share/zoneinfo
You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process? a. /var/log/boot.log b. /var/log/messages c. /var/log/startup.log d. /var/log/wtmp
/var/log/boot.log
Where are the log files for the Samba daemon located?
/var/log/samba
The ____ zone configuration file contains a PTR record used to identify the loopback adapter.
/var/named/named.local
What zone configuration file contains a PTR record used to identify the loopback adapter?
/var/named/named.local
Directory storing the shell environment and scheduled commands.
/var/spool/at
On a Fedora based system, where are the shell environment and scheduled commands for at stored?
/var/spool/at
On a Fedora based system, where are the shell environment and scheduled commands for at stored?
/var/spool/at
The location of user cron tables.
/var/spool/cron
Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system?
/var/spool/cron/(the user's login name)
You have a script to run on April 1 each year at 9:00am. Write the cron table entry to make this happen. The script is located in /bin and named aprilfools.
0 9 1 4 * /bin/aprilfools
A Class A network uses how many bits for the network ID, and how many bits for the host ID?
24 bits for network ID 8 bits for host ID
What well-known TCP port is utilized by the SMTP service?
25
What well-known TCP port is utilized by the SMTP service?
25
What is the subnet mask for a Class B IP address?
255.255.0.0
What is the subnet mask for a Class C IP address?
255.255.255.0
What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?
255.255.255.255 0.0.0.0
What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?
255.255.255.255 0.0.0.0
What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size?
256-bit
What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size?
256-bit
Select the two numbers below that represent the number of bits needed to make an IPv4 or IPv6 IP address:
32 128
The number of bits needed to make an IPv4 and IPv6 IP address?
32 bits for an IPv4 128 bits for an IPv6
The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent?
40-50
The compression algorithm used by the compress utility has an average compression ratio of ____%.
40-50
There are ____ different kill signals that the kill command can send to a certain process.
64
In a SCSI chain the highest priority SCSI device is given what SCSI ID?
7
In a SCSI chain the highest priority SCSI device is given what SCSI ID? a. 1 b. 6 c. 7 d. 15
7
When using the chmod command, the mode rwx can be represented by which number?
7
When using the chmod command, the mode rwx can be represented by which number? - 0 - 1 - 7 - 8
7
A Class A network uses how many bits for the network ID, and how many bits for the host ID?
8 24
Each octet in an IP address represents a binary number consisting of how many bits / bytes?
8-bit
Each octet in an IP address represents a binary number consisting of how many bits/bytes?
8-bit
What hex code is associated with a Linux swap type partition?
82
What hex code is associated with a Linux swap type partition? a. 96 b. 83 c. 12 d. 82
82
What kill level signal cannot be trapped?
9
What value in the /etc/shadow file's password expiration field means the user's password never expires?
99999
IPv6 IP address are delimited by what character?
:
At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes? a. :q! b. :! c. :exit d. :q
:q!
You can redirect a file to the standard input of a command using the ____ metacharacter.
<
Which of the following can be used for comparing values within an if statement? (Choose two.)
= -lt
The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?
>
How many different kill signals can be sent by the kill command to a given process? a. 16 b. 32 c. 64 d. 128
C
How many different kill signals can be sent by the kill command to a given process? a. 16 b. 32 c. 64 d. 128
C
If no level of compression is specified, the gzip command assumes what compression level? a. 4 b. 5 c. 6 d. 7
C
If no level of compression is specified, the gzip command assumes what compression level? a. 4 b. 5 c. 6 d. 7
C
In order to download DPM packages, what command should be used below? a. yum b. apt-search c. apt-get d. dpm-grab
C
In order to send a print job to a printer using CUPS, what command must be used? a. print b. pl c. lp d. pr
C
In order to send a print job to a printer using CUPS, what command must be used? a. print b. pl c. lp d. pr
C
Most Linux distributions make use of what package manager? a. PRM b. MPR c. RPM d. RMP
C
Select the escape sequence that starts a new line when used with echo: a. \\ b. \a c. \n d. \r
C
Select the option that can be used with the lpstat command to display a list of printers that are enabled: a. -o b. -a c. -p d. -e
C
Select the option that can be used with the lpstat command to display a list of printers that are enabled: a. -o b. -a c. -p d. -e
C
Select the test statement that can be used to determine if A is numerically greater than B: a. [ A -g B ] b. [ A -ge B ] c. [ A -gt B ] d. [ A +eq B ]
C
The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system? a. 827 b. 1012 c. 514 d. 23
C
The System Log Daemon uses what TCP and UPD port to accept incoming requests from another System Log Daemon on a remote system? a. 827 b. 1012 c. 514 d. 23
C
The ability to extract, manipulate, and format text using pattern action statements belongs to which command below? a.sed b. grep c. awk d. nl
C
The default BASH shell prompt is set by an environment variable. What command can be used to view this variable? a. ls $PWD b. echo #PWD c. echo $PS1 d. ls #PS1
C
The dump/restore utility is limited to a maximum of how many different incremental backups? a. seven b. eight c. nine d. ten
C
The environment variables that are set by default and their current values can be viewed with what command? a. env b. get c. set d. setenv
C
The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file? a. # b. < c. > d. |
C
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. newgroup b. groupmod c. newgrp d. groupadd
C
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. newgroup b. groupmod c. newgrp d. groupadd
C
What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders? a. boot-config b. loaderconf c. grubby d. parted
C
What command can be used to search for DPM package information? a. dpkg-search b. dpkg-info c. dpkg-query d. dpkg-list
C
What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer? a. route b. route add c. traceroute d. ip
C
A user account can be locked with the usermod command using what option? a. -U b. -u c. -l d. -L
D
A user account can be locked with the usermod command using what option? a. -U b. -u c. -l d. -L
D
Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat
D
An IPv6 IP address consists of 16-bit numbers in what numbering scheme? a. decimal b. octal c. binary d. hexadecimal
D
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. first b. second c. fifth d. sixth
D
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. first b. second c. fifth d. sixth
D
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command? a. sys-conf-kb b. system-config-kb c. sys-config-keyboard d. system-config-keyboard
D
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command? a. sys-conf-kb b. system-config-kb c. sys-config-keyboard d. system-config-keyboard
D
In order to create user accounts on a Linux system, what command should be utilized? a. uadd b. usercreate c. adduser d. useradd
D
In order to create user accounts on a Linux system, what command should be utilized? a. uadd b. usercreate c. adduser d. useradd
D
In order to download DPM packages, what command should be used below? a. apt-search b. yum c. dpm-grab d. apt-get
D
In order to redirect a file to the standard input of a command, what metacharacter should be used? a. > b. # c. | d. <
D
Select below the configuration file that is used to configure the BIND / DNS server: a. /etc/dns.conf b. /etc/bind.conf c. /etc/resolv.conf d. /etc/named.conf
D
Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed: a. -c b. -f c. -r d. -l
D
The GUI components and related software take up how much space on a typical Linux installation? a. 1 GB b. 2 GB c. 3 GB d. 4 GB
D
The GUI components and related software take up how much space on a typical Linux installation? a. 1 GB b. 2 GB c. 3 GB d. 4 GB
D
The sshd daemon is configured by editing what configuration file? a. /etc/sshd.config b. /etc/ssh/ssh_config c. /etc/ssh.conf d. /etc/ssh/sshd_config
D
What command below can be used to uninstall the LILO bootloader from an active partition? a. lilo --remove b. lilo -d c. lilo delete d. lilo -U
D
What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? a. install b. configure c. make install d. make
D
What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? a. configure b. install c. make install d. make
D
What device file below indicates that the first ATAPI IDE tape device (nonrewinding)? a. /dev/st0 b. /dev/nst0 c. /dev/ht0 d. /dev/nht0
D
What keyword tells the Linux kernel to avoid printing errors to the screen during system startup? a. silent b. noerror c. whisper d. quiet
D
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd? a. wtmp b. messages c. dmesg d. secure
D
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd? a. wtmp b. messages c. dmesg d. secure
D
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons? a. -f b. -l c. -a d. -e
D
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons? a. -f b. -l c. -a d. -e
D
What option, when added to the crontab command, opens the vi editor with a user's cron table? a. -u b. -c c. -f d. -e
D
What range of ports is considered to be "well-known"? a. 10023-24433 b. 24434-65535 c. 1024-10023 d. 0-1023
D
When killing a background job with the kill command, the background job ID must be prefixed by what character below? a. & b. # c. $ d. %
D
When killing a background job with the kill command, the background job ID must be prefixed by what character below? a. & b. # c. $ d. %
D
When using the compress utility, each file specified for compression is renamed with what extension? a. .c b. .cmp c. .cpz d. .Z
D
Which command can be used to count the number lines, words, and characters in a file? a. pr b. nl c. tr d. wc
D
Which of the following is not one of the three main Linux commands? a. binary programs b. shell scripts c. shell functions d. device calls
D
What yum command below can display a list of package group names? a. yum --list -g b. yum show groups c. yum list --groups d. yum grouplist
D
What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?
DNS
____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet.
DNS
What are two means available to resolve a host name to the appropriate TCP/IP address? (choose two answers)
DNS /etc/hosts
A server that contains the IP addresses of DNS servers that hold top-level DNS zones.
DNS cache file
Select the SQL statement below that can be used to delete a database:
DROP DATABASE
The ____ SQL statement is used to delete a database.
DROP DATABASE
A system process that is not associated with a terminal is called a(n) ____ process.
Daemon
tracks
Data is read from physical hard drives in concentric circles known as which of the following?
____ are constructs that alter the flow of a program based on whether a command in the program completed successfully or based on a decision that the user makes given a question posed by the program.
Decision construct
C
Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?
A line within the httpd.conf configuration file.
Directive
The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.
DirectoryIndex index.html
What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document?
DirectoryIndex index.html
____ are shell variables that are typically set by the system and contain information that the system and programs access regularly.
Environment variables
Fedora 20 makes use of the XFree86 implementation of X Windows. True or False?
False
Fedora 20 makes use of the XFree86 implementation of X Windows.
False
Fedora 20 makes use of the XFree86 implementation of X Windows. True or False
False
Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully. True or False
False
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
False
In Linux, you are restricted to using only one type of filesystem on a system.
False
On most Linux systems, the logrotate utility is automatically scheduled to run weekly.
False
On most Linux systems, the logrotate utility is automatically scheduled to run weekly. True or False?
False
Performance problems are caused by hardware, not software.
False
Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.
False
Regular users typically have a UID less than 100.
False
T/F - Can the top command be used to change the priority of processes?
False
T/F - During the DNS lookup process, if the ISP DNS server has recently resolved the FQDN and placed the result in its local DNS cache, you receive the response immediately (called a recursive query).
False
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.
True
SSH encrypts all traffic that passes across the network, whereas telnet does not.
True
T or F: After a process has been started, you can change its priority by using the renice command.
True
T or F: CUPS contains versions of the lpr, lpc, lpq, and lprm commands.
True
T or F: Each process can start an unlimited number of other processes.
True
T or F: If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.
True
T or F: Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond
True
T or F: When you print to a printer class, the print job is send to the first available printer in the printer class
True
T/F - After a process has been started, you can change its priority by using the renice command.
True
T/F - Aliases are shortcuts to commands stored in special variables that can be created and viewed using the alias command.
True
T/F - All DNS servers contain a DNS cache file.
True
T/F - Any command that can be executed on the command line can also be placed inside any environment file.
True
T/F - Because its primary use is to back up files in case of system failure, cpio uses absolute pathnames by default when archiving.
True
T/F - Each computer that participates in NIS belongs to an NIS domain and uses a(n) NIS map for accessing certain information rather than using the local configuration file.
True
T/F - Each process can start an unlimited number of other processes.
True
T/F - If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.
True
T/F - It is good form to read the Makefile after you run the configure script.
True
T/F - Most commands such as ls, find, and grep are binary programs that exist on the filesystem until executed.
True
T/F - Most daemon scripts accept the arguments start, stop, and restart.
True
T/F - You can use the sed command to remove unwanted lines of text.
True
The cpio command has the ability to handle long filenames and can be used to back up device files.
True
The cpio command has the ability to handle long filenames and can be used to back up device files. True or False?
True
The email command is an example of a Mail User Agent (MUA).
True
The first thing you must do after creating a user is set the password.
True
The line that configures the host name for the computer at boot time can be found in /etc/hostname.
True
The newgrp command opens a new shell even if the command fails.
True
The tar utility cannot back up device files or files with filenames longer than 255 characters.
True
The tar utility cannot back up device files or files with filenames longer than 255 characters. True or False?
True
When you print to a printer class, the print job is send to the first available printer in the printer class. True or False
True
When you print to a printer class, the print job is send to the first available printer in the printer class. True or False?
True
While a process is waiting for its parent process to release the PID, the process is said to be in a(n) zombie state. T/F
True
You can choose to use a window manager only, and not use a desktop manager.
True
You can choose to use a window manager only, and not use a desktop manager. True or False
True
You can use the sed command to remove unwanted lines of text. True or False
True
Zombie processes are also known as defunct process. True or FAlse
True
Zombie processes are also known as defunct processes. True or False?
True
Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stop daemons after system initialization. True or False
True
Segmentation faults can sometimes be fixed by performing what two tasks?
Turning off CPU cache memory and increasing the number of memory wait states in BIOS
When using the chage command, how do you set the maximum password age?
Type 90 and press Enter.
NTP uses port ____.
UDP 123
Which of the following is responsible for starting tasks and services during boot, stopping them during shutdown, and supervising them while the system is running?
Upstart
SCSI-3 Ultra2 Wide
What SCSI type supports speeds of up to 80 MB/second?
g+r-w
What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?
parent process ID
What can be used on a Linux system to trace the lineage of each child process?
#!
What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?
/dev/ttyS1
What character device file represents the second serial port on a system (COM2)?
colon
What character is used to delimit most Linux configuration files?
&
What character, when appended to a command, causes the command to be run in the background?
pvcreate
What command below can be used to create a new physical volume?
grub2-install
What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?
lilo -U
What command below can be used to uninstall the LILO bootloader from an active partition?
pstree
What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?
rm
What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?
pwd
What command can be issued to confirm what directory you are in at a command line prompt?
fsck
What command can be used to check different kinds of filesystems on Linux for errors?
grubby
What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?
cp
What command can be used to copy files?
tail -5
What command can be used to display the last five lines of a text file?
tr
What command can be used to replace characters in a file sent via Standard Input?
stat
What command is most effective at identifying different types of files?
mdadm
What command is used to manage a software RAID configuration after installation?
DEC PDP-7
What computer system was the first to run the UNIX operating system?
modules
What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?
82
What hex code is associated with a Linux swap type partition?
SIGHUP
What kill signal stops a process, then restarts it with the same PID?
-e
What option, when added to the crontab command, opens the vi editor with a user's cron table?
-r
What option, when added to the rm command, is commonly referred to as the -resume option?
execute
What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?
write
What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?
superblock
What section of a filesystem contains information about the filesystem in general?
9; SIGKILL
What signal name and number function as the absolute kill signal, and when issued, forces the Linux kernel to stop executing the process by sending the process's resources to /dev/null?
Freeware
What software type is software that is distributed free of charge, but the source code is not available?
Stage1
What stage of the GRUB boot loader typically resides on the MBR / GPT?
GNU Public License
What stipulates that the source code of any software published under its license must be freely available.
virtual host
What term describes the physical hardware and the underlying operating system upon which a virtual machine runs?
PWD; SHELL
What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively?
kill; killall
What two commands below can be used to stop a process, either by PID number or process name?
/etc/profile; /etc/bashrc
What two files below are the first two BASH environment files to be executed?
@
When issuing the ls -F command, what special character indicates a linked file?
%
When killing a background job with the kill command, the background job ID must be prefixed by what character below?
device calls
Which of the following is not one of the three main types of Linux commands?
Hiring people to maintain the Linux system
Which of the following is the greatest expense for companies using Linux?
Artistic
Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?
Due to the fact that the * character can be used to match all characters in a filename, or all files in a directory, it is referred to as a ____________ metacharacter.
Wildcard
Which of the following is a lightweight desktop environment that uses very few system resources that a system administrator might choose to install on a Linux server instead of one of the two main desktop environments?
XFCE
How do you configure a NIC? What do you do if the NIC is not detected during installation?
You can configure a NIC by using the ifconfig (interface configuration) command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer. If the NIC is not detected during installation then we need to view the appropriate Linux drivers for the NIC that were not included in the installation media.
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?
d k
What is the name given to a process not associated with a terminal?
daemon process
Which command should you run after installing a new kernel module to update the module dependency database?
depmod
Which of the following is not one of the three main types of Linux commands?
device calls
Which of the following is not one of the three main types of Linux commands?
device calls
What command provides the easiest method for monitoring free space on mounted filesystems?
df
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?
e
A list of all exported environment and user-defined variables in a shell can be viewed with what command below?
env
To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command.
env
A case construct must be ended by ____________________.
esac
What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?
etc/cups/cupsd.conf /etc/cups/printers.conf
How often are sar commands scheduled to run on both Fedora 20 and Ubuntu Server 14.04?
every ten minutes
What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?
execute
What permission (when applied to a directory) allows a user to enter the directory and work with directory contents? - write - sticky bit - execute - read
execute
On most Linux systems, the logrotate utility is automatically scheduled to run weekly true or false
false
Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy. true or false
false
Select the command that can be used to create partitions that will be stored in an MBR after installation: - fdisk - formatdisk - partition - format
fdisk
What command that can be used to create partitions that will be stored in a MBR after installation?
fdisk
After a background process has been started, it can be moved to the foreground by using the ____ command.
fg
After a background process has been started, what command below can be used to move it to the foreground?
fg
When writing shell scripts and using an if statement to determine whether a set of code should be executed, what is the proper syntax to end the if construct? ___________
fi
Errors on a filesystem are common on most file systems. What do these errors indicate?
filesystem corruption
Errors on a filesystem are common on most filesystems. What do these errors indicate?
filesystem corruption
Any command that can take standard input and transform it into standard output is called a(n) ____________________ command.
filter
What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?
for
In a process referred to as _________________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.
forking
In a process referred to as ____________________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.
forking
What command can be used to check different kinds of filesystems on Linux for errors? - chkdsk. - errorchk - fs_check - fsck
fsck
What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?
g+r-w
what two commands can be used to edit a GPT based hard disk's partitions?
gdisk and parted
What two commands below can be used to edit a GPT based hard disk's partitions? (Select 2 answers) - gdisk - parted - fdisk - gtpedit
gdisk, parted
Which of the following commands should you use to specify that you want to use Git for version tracking on them?
git add
What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?
grub2-install
An IPv6 IP address consists of 16-bit numbers in what numbering scheme?
hexadecimal
You can view or set the host name for a Linux computer using the _________________ command.
hostname
What command can be used to view and modify the date and time within the BIOS?
hwclock
Which of the following can be used to compare the hardware clock to the system clock, writing a new result to a new line every 10 seconds?
hwclock -c
Which of the following is a type of software that allows a piece of hardware to host multiple operating systems?
hypervisor
What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk? (Select two answers.) a. iSCSI initiator b. iSCSI host c. iSCSI slave d. iSCSI target
iSCSI initiaitor, iSCSI target
Which of the following commands can be used to convert files between different character encodings?
iconv
Which of the following constructs can be used in a shell script to determine whether two values are equal and if so run another set of commands?
if
Which command would be used to activate the NIC aliased as eth0?
ifup eth0
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?
image=
What two daemons can be used to start and manage connections for smaller network daemons such as telnet and rlogin?
inetd xinetd
What two daemons can be used to start and manage connections for smaller network daemons such as telnet and rlogin?
inetd xinetd
If the chage command is used without options, it is in ____ mode.
interactive?
What file in the /proc directory contains a list of memory address ranges reserved for device use?
ioports
What file in the /proc directory contains a list of memory address ranges reserved for device use? a. ioports b. meminfo c. iomem d. misc
ioports
What two commands below can be used to manipulate the routing table?
ip route route
What two commands can be used to manipulate the routing table?
ip route route
A runaway process that is faulty and consuming mass amounts of system resources ________________________.
is a rogue process
Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called?
jabbering
In Fedora 20, what journaling database system has replaced the logging system used to record the messages normally stored within the boot.log, messages, and syslog files?
journald
In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?
journald
In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called? a. journald b. systemd c. logd d. messaged
journald
The _____ facility used by the System Log Daemon specifies message from the Linux kernel.
kern
What command can be used to view what shared libraries are required by a certain program?
ldd
In order to create and manage KVM or Qemu virtual machines, a Linux system must have which of the following installed?
libvert
Select the file in the /proc directory that contains statistics on the performance of the processor: a. kcore b. loadavg c. cpuinfo d. modules
loadavg
Which of the following commands will show a number of environment variables that start with LC_?
locale
Select the command below that utilizes a premade database that contains a list of all the files on a system:
locate
Select the command below that utilizes a premade database that contains a list of all the files on a system: - locate - search - find - id
locate
What command utilizes a pre-made database that contains a list of all the files on a system?
locate
What two commands below can be used to locate files on a filesystem?
locate find
Adding the t option to what command below will provide a list of all printers on the system and their status?
lpstat
Which of the following commands can be used to display general hardware information for the entire system?
lshw
what are the commands that can be used to extend a volume group and logical volume respectively.
lvextend and vgextend
Select the commands that can be used to extend a volume group and logical volume respectively: (Select 2 answers) a. lvextend b. vgextend c. lvm_extend d. pgextend
lvextend, vgextend
What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?
make
____ is a command that can be used to copy files to the appropriate location on the filesystem.
make install
What option can be used in the journal configuration file to specify a file size limit to the event log?
maxuse
What command is used to manage a software RAID configuration after installation? a. mdraid b. vgadm c. mdadm d. pgadm
mdadm
The subdirectory newdir does not currently exist in the current directory that you are in. Which of the following commands will create a new directory named newdir and then change into that directory? (Choose two.)
mkdir newdir && cd newdir mkdir newdir; cd newdir
Select the command that can be used to check an ext2, ext3, or ext4 filesystem: a. mke2fs b. ext2fsck c. fdisk d. e2fsck
mke2fs
What command that can be used to check an ext2, ext3, or ext4 filesystem?
mke2fs
Which of the following commands will generate a new initramfs?
mkinitrd dracut
Select the two commands below that can be used to prepare a swap partition and then enable it for use:
mkswap swapon
what are two commands that van be used to prepare a swap partition and then enable it for use?
mkswap and swapon
Select the two commands below that can be used to prepare a swap partition and then enable it for use: (Select 2 answers) a. swapit b. mkswap c. swapon d. mkfs.swap
mkswap, swapon
What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.
mput filename
In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?
net.ipv4.ip_forward
In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?
net.ipv4.ip_forward
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?
newgrp
The ______________ can be used to affect the process priority indirectly.
nice value
The dump/restore utility is limited to a maximum of how many different incremental backups?
nine
Which of the following commands will display the output of a file while also displaying a line number at the left side of each line for the /etc/passwd file?
nl /etc/passwd
Which command can be used to see what network services are running on your network?
nmap
Running background processes using what command allows you to exit your command-line shell without ending any background processes?
nohup
To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (choose all that apply)
nslookup hostname dig hostname resolve hostname
What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?
panic
What can be used on a Linux system to trace the lineage of each child process?
parent process ID
Select the command that can be used to send a small TCP/IP packet to another IP address and await a response:
ping
Which of the following commands can be used to terminate a process by the process name?
pkill
The daemons associated with network services listen for network traffic associated with a particular _____________________.
port
When a user creates a file or directory, that user's name and ____________________ becomes the owner and group owner of the file, respectively.
primary group
A set of information that is sent to a printer at the same time is called a(n) _____.
print job
A(n) ____________refers to a program that is running in memory and on the CPU.
process
In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.
process state
In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?
process state
Which command when entered without argument is used to display a list of processes running in the current shell?
ps
What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?
pstree
What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?
pstree
What command is used to display the lineage of a process by tracing its PPIDs until the init daemon?
pstree
What command below can be used to create a new physical volume?
pvcreate
What command will create a new physical volume?
pvcreate
Which of the following characters, when pressed while the top program is running, will allow you to change the niceness of a process?
r
The ____________________ command takes user input from stdin and places it in a variable specified by an argument.
read
If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?
read write
Which of the following can be included in a shell script to ask the user to type in a password and then store it in the variable named $password?
read -s -p "Please enter the password: " password
What permissions are required to execute a shell script in a manner similar to any other executable program on the system?
read and execute
To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -r option
recursive
Which of the following commands will most likely increase the chance of a process receiving more time slices?
renice -12
What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?
rm
Processes that have encountered an error during execution and continuously uses up system resources are referred to as ________________ processes.
rogue
Processes that have encountered an error during execution and continuously uses up system resources are referred to as ____________________ processes.
rogue
In what filesystem are most of the operating system files contained?
root
In what filesystem are most of the operating system files contained? a. boot b. data c. root d. mnt
root
What devices are used to transfer information from one network to another?
routers
An RPM package can be converted to a cpio archive using what command?
rpm2cpio
The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?
rsyslog.conf rsyslog.d
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
segmentation fault
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred? a. page fault b. IRQ fault c. segmentation fault d. RAM failure
segmentation fault
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?
sixth
Which of the following commands will display the contents of the /etc/passwd file in alphanumerical order?
sort /etc/passwd
What file contains the DSA public key in the /etc/ssh directory?
ssh_host_dsa_key. pub
In the event that you wish to disable a swap partition, what command must be used? a. umount b. swapoff c. swapdrop d. delete_swap
swapoff
To create a(n) ____________________ link, you use the -s option to the ln command.
symbolic
Which of the following is a virtual filesystem that is made up of virtual files that a Linux operating system is able to export information to about kernel sub-systems, hardware devices, and device drivers to make it easy for users to access the information?
sysfs
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?
system-config-keyboard
When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?
systemctl
Files with what two file extensions are commonly known as tarballs?
tar.gz .tgz
Each SCSI device attached to a system must be assigned an ID number. What is this ID number called? a. SCSI controller b. target ID c. SCSI number d. device ID
target ID
____ is a filter command that takes information from standard input and sends that information to a file, as well as to standard output.
tee
In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued? a. zfs list b. zpool list c. zpool get all d. zfs get all
zfs get all
An alias has previously been created named showauth. Which of the following commands can be used to get rid of that alias?
unalias showauth
How many times will the following loop execute as part of a script: #!/bin/bash COUNTER=0 while [ $COUNTER -lt 7 ] do echo "hello world" done
until ctrl-c is used to terminate it
In order to create user account on a Linux system, what command should be utilized?
useradd
In order to create user accounts on a Linux system, what command should be utilized?
useradd
Which command is used to create user accounts and update default information for new users?
useradd
What two commands can be used to show information about physical volumes and logical volumes respectively?
vgdisplay and lvdisplay
What two commands can be used to show information about physical volumes and logical volumes respectively? (Select 2 answers) a. showvg b. showlv c. lvdisplay d. vgdisplay
vgdisplay, lvdisplay
In order to quickly create an empty file, what command can be used?
vim file1
In order to quickly create an empty file, what command can be used?
vim file1
in order to list all configuration parameters that can be modified for a sub-filesystem, what command should be issued?
zfs get all
Which of the following states describe a process that is waiting for a parent process to release its PID?
zombie
On a system using the KVM hypervisor, which of the following modules would you expect to see as part of the output of the lsmod command on a guest Linux virtual machine?
virtio
in the fdisk interactive mode, what letter can be used to save partition table and exit?
w
In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit? - w - s - q - d
w
Which of the following commands can be used to schedule very frequent recurring tasks, such as running once every minute?
watch
The ____ command counts the number of lines, words, and characters in a file.
wc
FTP
what service provides a method for the efficient transfer of files over the Internet?
The ____________________ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.
which command
What permission grants a user the ability to open, read, and edit the contents of a file?
write
What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?
write
What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file? - read - write - sticky bit - execute
write
If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?
write and read
What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?
wtmp lastlog
What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?
wtmp lastlog
What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?
wtmp lastlog
Using the syntax below, what command will create directories named one, two, and three? echo one two three | ___________ mkdir
xargs
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?
xvidtune
If X Windows fails to start, what command can be used to troubleshoot the issue?
xwininfo
How can you bypass the wait function and send a user process to the background?
you can use the Ctrl+z key combination and the bg command
What yum command below can display a list of package group names?
yum grouplist
The ____ command can be used to display the contents of a compressed file.
zcat
What command can be used to display the contents of a file that was compressed with the compress utility?
zcat
The root UID is ____.
zero
In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?
zfs get all
The following entry is in a cron table. When will the myscript script run? (be very specific)
45 23 * * 6 /bin/myscript
The GUI components and related software take up how much space on a typical Linux installation?
4GB
select the mode below that corresponds to setting r-x
5
Select the mode below that corresponds to setting r-x:
5
Select the mode below that corresponds to setting r-x: - 2 - 5 - 1 - 6
5
What is the default print job priority for all print jobs created by the lp command?
50
The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?
514
The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?
514
The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?
514
If no level of compression is specified, the gzip command assumes the number ____.
6
If no level of compression is specified, the gzip command assumes what compression level?
6
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?
60%-70%
The average compression ratio for gzip is ____%.
60-70
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?
60-70 percent
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?
60-70%
The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below?
631
The CUPS Web administration tool can be accessed via web browser by accessing what TCP port?
631
The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below?
631
How many different kill signals can be sent by the kill command to a given process?
64
How many different kill signals can be sent by the kill command to give a process?
64
IPv6 IP addresses are delimited by what character below?
:
:q!
At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes
0
At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwdconv b. pwconv c. passwd d. pwdcv
B
The ____________________ environment variable contains a list of directories to search for executable programs.
PATH
A process's identifier that allows the kernel to identify it uniquely.
PID
At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off? a. 0 b. 1 c. 6 d. 7
A
IPv6 IP addresses are delimited by what character below? a. : b. . c. , d. ;
A
In order to display a list of at job IDs, what option can be specified to the at command? a. -l b. -u c. -a d. -d
A
In order to display a list of at job IDs, what option can be specified to the at command? a. -l b. -u c. -a d. -d
A
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive. a. (hd0,0) b. (hd1,1) c. (hda,0) d. (hda,1)
A
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel? a. image= b. default= c. install= d. root=
A
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel? a. image= b. default= c. install= d. root=
A
What number represents the stdin file descriptor? Correct a. 0 b. 1 c. 2 d. 3
A
Client computers can retrieve e-mail from e-mail servers via ____ or ____.
POP; IMAP
What option can be added to the rpm command in order to query packages? a. -q b. -v c. -h d. -i
A
What option can be added to the rpm command to update a specified package only if an older version exits on the system? a. -F b. -U c. -z d. -c
A
When a computer first initializes, the system BIOS performs a(n) ____________________.
POST
Identifies the process that started another process.
PPID
What can be used on a Linux system to trace the lineage of each child process?
PPID - Parent Process ID
What option can be added to the userdel command to remove the home directory of the target user? a. -r b. -d c. -R d. -x
A
What option can be added to the userdel command to remove the home directory of the target user? a. -r b. -d c. -R d. -x
A
A set of information that is sent to a printer at the same time is called a(n) ____________________.
Print Job
What SCSI type supports speeds of up to 80 MB/second? a. SCSI-3 Ultra b. SCSI-2 Wide c. SCSI-3 Ultra2 Wide d. SCSI-3 Ultra3 Wide
SCSI-3 Ultra2 Wide
du
Select the command below that shows the size of a directory and its contents in kilobytes:
chroot
Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment
mke2fs
Select the command that can be used to check an ext2, ext3, or ext4 filesystem:
fdisk
Select the command that can be used to create partitions that will be stored in an MBR after installation:
\f
Select the escape sequence that is used for a form feed:
\n
Select the escape sequence that starts a new line when used with echo:
loadavg
Select the file in the /proc directory that contains statistics on the performance of the processor
|
Select the metacharacter that can be used to send the standard output of one command to another command as standard input:
5
Select the mode below that corresponds to setting r-x:
*
Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.
The ____ field in a cron table contains the absolute pathname to the command to be executed.
Sixth
live media image
Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?
What stage of the GRUB boot loader typically resides on the MBR / GPT?
Stage 1
What stage of the GRUB boot loader typically resides on the MBR / GPT?
Stage1
Which of the following accessibility features simulates simultaneous key presses when two keys are pressed in sequence?
Sticky Keys
___________________ is the process in which a single large network is subdivided into several smaller network to control traffic flow and improve manageability.
Subnetting
What option can be used in the journald configuration file to specify a file size limit to the event log? a. SystemMaxUse b. Max_file_size c. Journal_Limit d. SizeLimit
A
What number indicates the lowest kernel priority (PRI) of a process possible?
127
Most Parallel SCSI controllers are capable of supporting up to how many devices? a. 12 b. 13 c. 14 d. 15
15
NetBIOS names can be up to ____ characters long.
15
What is the maximum number of characters that can be used in a NetBIOS name?
15
In Linux, what runlevel is also known as the multiuser mode?
2
The file descriptor stderr is represented by the number ____.
2
What number represents the stderr file descriptor?
2
Which of the following represents stderr at the command line when used for redirection?
2
Which of the following port numbers is associated with telnet?
23
A Class A network uses how many bits for the network ID, and how many bits for the host ID?
24 8
____ are back-up copies of files and directories.
Archives
What is the subnet mask for a Class C IP address?
255.255.0.0
_____________________is a mathematical operation that compares two binary digits and gives a result of 1 or 0. If both binary digits being compared have a value of 1, the result is 1. If one digit is 0 and the other is 1, or if both digits are 0, the result is 0.
ANDing
15
Most Parallel SCSI controllers are capable of supporting up to how many devices?
A protocol that allows computers to share files transparently.
Network File System (NFS)
You can perform up to ____ different incremental backups using the dump/restore utility.
Nine
chkconfig
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?
/var/spool/at
On a Fedora based system, where are the shell environment and scheduled commands for at stored?
A(n) ____________________ refers to a program that is running in memory and on the CPU.
Process
In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.
Process state
An executable file on the hard disk that can be run when you execute it.
Program
Network Address Translation (NAT)
Proxy servers keep track of the information passed to each client by maintaining what type of table?
Which Windows program is often used to connect to a Linux server via SSH?
Putty
The K desktop environment utilizes what window manager and toolkit below?
Qt toolkit kwin
What RAID level is commonly referred to as disk striping with parity? a. RAID4 b. RAID0 c. RAID5 d. RAID1
RAID 5
set
The environment variables that are set by default and their current values can be viewed with what command?
127
The first software RAID volume on a system will use a multiple disk device file that starts with what number?
Firewall
The iptables software on Linux is an example of what kind of software?
False
The killall command uses the PID to kill a process.
-t
The mkfs command can be issued with what switch in order to specify a filesystem type?
Total cost of ownership (TCO)
The overall cost of using a particular operating system is known as?
In the process state column, what does an "R" indicate?
The process is currently running on the processor.
In the process state column, what does an "R" indicate?
The process is currently running on the processor.
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?
The process is high priority.
edquota
The quotas for certain users can be edited by using which command?
the mode of the file
The section of an inode that stores permissions is referred to as what?
>
The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?
A programming language used to store and access data in databases.
SQL
In order to redirect a file to the standard input of a command, what metacharacter should be used?
"<"
The ____ ftp utility command runs a shell on the local computer
!
What FTP command runs a shell on the local computer?
!
Which character in the /etc/shadow file's encrypted password field means no password has been set for this user?
!
What operator below is known as the NOT operator?
!
Select the options to use with the cpio utility to cause the utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation:
-u -i
The ____ option can be used with the tar command to extract a specified archive.
-x
What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?
-z -Z
dd
. In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted?
200 MB
. What is the recommended size for the /home directory?
When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.
.Z
When using the compress utility, each file specified for compression is renamed with what extension?
.Z
The filename extension given to files compressed with bzip2 is ____.
.bz2
Which of the following files can you add filenames to so that the git add * command will not stage them?
.gitignore
Files with what two file extensions are commonly known as tarballs?
.tar.gz .tgz
The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?
/boot
The filesystem Hierarchy Standard specifies what directory as containing the Linux Kernel and the boot loader configuration files?
/boot
Under what directory is the Linux kernel stored?
/boot
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?
/etc/cups/printers.conf
What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?
/etc/cups/printers.conf /etc/cups/cupsd.conf
The _________________ file often contains a single uncommented line that configures the default runlevel for a system.
/etc/inittab
Which of the following files is where the default runlevel is set on some Linux systems?
/etc/inittab
Which of the following files is a binary file that contains the rules for calculating the time based on your time zone relative to epoch time?
/etc/localtime
Select below the configuration file that is used to configure the BIND / DNS server:
/etc/named.conf
Select below the configuration file that is used to configure the BIND / DNS server:
/etc/named.conf
The configuration file(s) that is/are used to configure the BIND/DNS server:
/etc/named.conf
Which file holds the methods to be used and the order in which they will be applied for host name resolution?
/etc/nsswitch.conf
Which file contains user account information?
/etc/passwd
The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.
/etc/profile
What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?
/etc/profile
Match the file with the order in which the BASH shell environment files are read: First Second Third Fourth
/etc/profile /etc/profile.d/* /etc/bashrc ~/.bashrc
Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC?
/etc/resolv.conf
1. A series of four 8-bit numbers that represent a computer on a network 2. The TCP/IP communication destined for a certain group of computers 3. A portion of an IP address that represents eight binary bits. 4. The most common version of IP used on the Internet. It uses a 32-bit addressing scheme organized into different classes 5. A notation that is often used to represent an IP address and its subnet mask 6. A user-friendly name assigned to a computer. 7. A table of information used to indicate which networks are connected to network interfaces. 8. A set of rules of communication used between computers on a network. 9. The portion of an IPv6 address that refers to a unique computer. It is analogous to the host portion of an IPv4 address 10. The TCP/IP communication destined for all computers on a network
1. Internet Protocol (IP) address 2. multicast 3. octet 4. IP version 4 (IPv4) 5. classless interdomain routing (CIDR) notation 6. host name 7. route table 8. protocol 9. link local 10. broadcast
1. A calculated value that is unique to a file's size and contents. 2. The amount of compression that occurred during compression algorithm. 3. A utility that can be used to manage DPM packages using a graphical interface. 4. The process whereby files are copied to an archive. 5. A group of RPM packages that are commonly installed to provide a specific function on the system. 6. A command used to view the contents of an archive created with compress or gzip to Standard Output in a page-by-page fashion. 7. A gzip-compressed tar archive. 8. A command used to decompress files compressed by the gzip command. 9. A command used to extract archives created with the dump command. 10. A command used to decompress files compressed by the bzip2 command
1. checksum 2. compression ratio 3. Aptitude 4. system backup 5. package group 6. zmore command 7. tarball 8. gunzip command 9. restore command 10. bunzip2 command
1. The command used to change the GECOS for a user. 2. The area of the system from which information is gathered when logging system events 3. The command used to remove print jobs from the print queue in the CUPS print system 4. A unique number assigned to each user account 5. A group of CUPS printers that are treated as a single unit for the purposes of printing and management. 6. The command used to modify the name or GID of a group on the system. 7. the process of accepting a print job into a print queue. 8. The daemon responsible for printing in the CUPS printing system. 9. The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user. 10. The act of verifying a user's identity by comparing a user name and password to a system database (/etc/passwd and /etc/shadow)
1. chfn 2. facility 3. cancel 4. User Identifier (UID) 5. printer class 6. groupmod 7. spooling 8. CUPS daemon 9. primary group 10. authentication
1. A Linux system process that provides a system service. 2. The default window manager for the GNOME Desktop Environment in Fedora 13 3. A UNIX SysV term that defines a certain type and number of daemons on a Linux system. 4. The component of X Windows that draws graphics to windows on the terminal screen. 5. A UNIX standard that is used to provide the structure of the system initialization process on Linux systems. 6. A recent version of the UNIX SysV system initialization process used on modern Linux distributions. 7. A Systemd term that is used to describe the number and type of daemons running on a Linux system. It is functionally equivalent to the UNIX SysV term runlevel . 8. The component of X Windows that requests graphics to be drawn from the X server and displays them on the terminal screen. 9. The partition searched for an operating system after the MBR/GPT. 10. A relatively new software framework used on Linux systems that provides a system initialization process and system management functions.
1. daemon 2. mutter window manager 3. runlevel?? 4. X server 5. UNIX Sys V 6. upstart 7. target unit 8. X client 9. active partition 10.Systemd
1. Command option used to remove a specified member from the group account. 2. Command option used to specify the user's default login shell. 3. Command option used to allow assignment of a duplicate GID. 4. Command option used to change the user's login name. 5. Command option used to force the GID to what's entered at the command line. 6. Command option used to unlock specific user accounts. 7. Command option used to add a home directory for a new user. 8. Command option used to display all password expiration information for the specified user account. 9. Command option used to change the number of days the password is valid for the specified user account.
1. groupmod -R 2. useradd -s 3. groupadd -o 4. usermod -l name 5. groupadd -g 6. usermod -U 7. useradd -m 8. chage -l 9. chage -m
By default, the shell on a Linux system limits the number of filehandles a program can have open to what value?
1024
In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?
1024
In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders? a. 256 b. 512 c. 1024 d. 2048
1024
The first software RAID volume on a system will use a multiple disk device file that starts with what number? a. 254 b. 127 c. 128 d. 255
127
You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file.
>
Which of the following will take output from a command and append it to the end of a file?
>>
When issuing the ls -F command, what special character indicates a linked file?
@
How can you specify the intended DNS server to query with the dig command?
@server
A list of all exported environment and user-defined variables in a shell can be viewed with what command below? a. env b. set c. setenv d. getenv
A
In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. process state b. process flag c. process priority d. PID
A
In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. process state b. process flag c. process priority d. PID
A
Most Linux distributions make use of what package manager? a. RPM b. PRM c. MPR d. RMP
A
On Linux, the root user always has a UID of what number? a. 0 b. q c. 23 d. 500
A
On Linux, the root user always has a UID of what number? a. 0 b. 1 c. 23 d. 500
A
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate? a. xvidtune b. xvideotune c. xtune d. vidtune
A
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate? a. xvidtune b. xvideotune c. xtune d. vidtune
A
RPM package that require other RPM packages to be installed on a system prior to being installed creates a relationship known as? a. package dependancy b. recursing package c. branching package d. family package
A
What character, when appended to a command, causes the command to be run in the background? a. & b. $ c. # d. %
A
What character, when appended to a command, causes the command to be run in the background? a. & b. $ c. # d. %
A
What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces? a. ifconfig b. ipconf c. ipconfig d. ifconf
A
What command can be used to display the contents of a file that was compressed with the compress utility? a. zcat b. ccat c. cat d. acat
A
What command can be used to replace characters in a file sent via Standard Input? a. tr b. rt c. ts d. st
A
What options can be used in the journald configuration file to specify a file size limit to the event log a. SystemMaxUse b. Max_file_size c. Journal_Limit d. SizeLimit
A
What stage of the GRUB boot loader typically resides on the MBR / GPT? a. Stage1 b. Stage1.5 c. Stage2 d. Stage2.5
A
What stage of the GRUB boot loader typically resides on the MBR/GPT? a. Stage 1 b. Stage 1.5 c. Stage 2 d. Stage 2.5
A
When used with the compress command, what option below can be used to compress symbolic links? a. -f b. -r c. -c d. -v
A
When used with the compress command, what option below can be used to compress symbolic links? a. -f b. -c c. -v d. -r
A
When used with the uncompress command, what option displays the contents of the compress file to Standard Output? a. -c b. -r c. -v d. -f
A
When used with the uncompress command, what option displays the contents of the compress files to Standard Output? a. -c b. -v c. -f d. -r
A
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process? a. The process is high priority b. The process is exiting c. The process is accepting redirected input from a terminal. d. The process is currently active on the processor.
A
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process? a. The process is high priority. b. The process is exiting. c. The process is accepting redirected input from a terminal. d. The process is currently active on the processor.
A
Where are the log files for the Samba daemon located? a. /var/log/samba b. /var/run/samba/log c. /var/log/access.log d. /var/log/Samba/log
A
Where is the skeleton directory located on most Linux systems? a. /etc/skel b. /var/skel c. /etc/skeleton d. /var/skeleton
A
Select the two escape sequences that represent a horizontal tab and a vertical tab, respectively: Multiple Answer a. \V b. \t c. \v d. \b
A and B
What two files below are the first two BASH environment files to be executed? Multiple Answer a. /etc/profile b. /etc/bashrc c. ˜/.bashrc d. ˜/.bash_profile
A and B
The K desktop environment utilizes what window manager and toolkit below? Multiple Answer a. kwin b. mutter c. Qt toolkit d. GTK+ toolkit
A and C
Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded: Multiple Answer a. append= b. map= c. initrd= d. boot=
A and D
What two window managers is the Compiz Fusion window manager based upon? Multiple Answer a. compiz b. sawfish c. fvwm d. beryl
A and D
cal
A calendar for the current month can be shown on the command line by issuing which command?
Describe what a subnet mask is, and explain why it is used. The, detail how it is used to determine the network ID of an IP address.
A subnet mask is the 8-bit number used to determine the network and host portions of an IP address. It is used to divide an IP address into two parts that identify the host (computer), and the other identifies the (network) to which it belongs to. A subnet mask is a 32-bit number used to differentiate the network component of an IP address by dividing the IP address into a network address and host address. It does so with bit arithmetic whereby a network address is but multiplied by the subnet mask revealing the underlying subnetwork. They are used to design subnetworks, or subnets that connect local networks, by determining both the number and size of subnets where the size of a subnet is the number of hosts that can be addressed.
fg
After a background process has been started, what command below can be used to move it to the foreground?
True
After a process has been started, you can change its priority by using the renice command.
exit
After a shell is no longer needed, what command can be given to exit the shell?
shell
After logging into a terminal, a user will receive an interface known as which option below?
grub-mkconfig
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?
tarball
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:
Which of the following are stand-alone daemons? (choose all that apply)
Apache (httpd) DNS (named)
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwdconv b. pwconv c. passwd d. pwdcv
B
An RPM package can be converted to a cpio archive using what command? a. cpioconv b. rpm2cpio c. rpmconv d. conv_arch
B
Each octet in an IP address represents a binary number consisting of how many bits / bytes? a. 4-bit b. 8-bit c. 4-byte d. 8-byte
B
How many DNS servers can be configured in the /etc/resolv.conf file? a. two b. three c. four d. five
B
In Fedora 20, where are user configured settings for Xorg stored? a. /etc/X11/xorg.conf b. /etc/X11/xorg.conf.d/ c. /etc/inittab d. /etc/X11.conf
B
In Fedora 20, where are user configured settings for Xorg stored? a. /etc/X11/xorg.conf b. /etc/X11/xorg.conf.d/ c. /etc/inittab d. /etc/X11.conf
B
In Linux, what runlevel is also known as the multiuser mode? a. 1 b. 2 c. 3 d. 4
B
In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf? a. iproute.ipv4 b. net.ipv4.ip_forward c. ipv4.routing d. net.routing.enable
B
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in? a. systemctl b. chkconfig c. autoservice d. run-daemon
B
On a Fedora based system, where are the shell environment and scheduled commands for at stored? a. /var/spool/cron/atjobs b. /var/spool/at c. /var/run/at d. /var/run/cron/at
B
On a Fedora based system, where are the shell environment and scheduled commands for at stored? a. /var/spool/cron/atjobs b. /var/spool/at c. /var/run/at d. /var/run/cron/at
B
Processes are started with what nice value by default? a. -20 b. 0 c. 1 d. 19
B
Processes are started with what nice value by default? a. -20 b. 0 c. 1 d. 19
B
Select the escape sequence that is used for a form feed: \n b. \f /f /n
B
Select the metacharacter that can be used to send the standard output of one command to another command as standard input: a. < b. | c. > d. #
B
Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed: a. -r b. -l c. -f d. -c
B
The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent? a. 30-40 b. 40-50 c. 50-60 d. 60-70
B
The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent? a. 30-40 b. 40-50 c. 50-60 d. 60-70
B
The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below? a. 780 b. 631 c. 4586 d. 8080
B
The GUI components and related software take up how much space on a typical Linux installation? a. 1 GB b. 2 GB c. 3 GB d. 4 GB
B
The process state column, what does an "R" indicate? a. The indicate process is being restarted because it received a SIGHUP kill signal. b. The process is currently running on the processor. c. The process is reading from the local hard disk. d. The process is recovering from a fatal error, and may potentially become a zombie.
B
Under what directory is the Linux kernel stored? a. / b. /boot c. /root d. /krnl
B
Under what directory is the Linux kernel stored? a. / b. /boot c. /root d. /krnl
B
What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database? a. info b. alert c. debug d. panic
B
What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database? a. info b. alert c. debug d. panic
B
What can be used on a Linux system to trace the lineage of each child process? a. process ID b. parent process ID c. execution order ID d. process fork ID
B
What can be used on a Linux system to trace the lineage of each child process? a. process ID b. parent process ID c. execution order ID d. process fork ID
B
What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script? a. @! b. #! c. // d. ->
B
What character is used to delimit most Linux configuration files? a. tab b. colon c. space d. semicolon
B
What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted? a. grub-install b. grub2-install c. install_grub d. install_grub2
B
What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted? a. grub-install b. grub2-install c. install_grub d. install_grub2
B
What command can be used to display the contents of a file that was compressed with the compress utility? a. acat b. zcat c. cat d. ccat
B
What device file below indicates the first ATAPI IDE tape device (nonrewinding)? a. /dev/st0 b. /dev/nht0 c. /dev/nst0 d. /dev/ht0
B
What file controls the default runlevel using Systemd? a. /etc/inittab b. /etc/systemd/system/default.target c. /etc/systemd/inittab.target d. /etc/systemd.comf
B
What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users? a. alert b. panic c. crit d. error
B
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? a. SIGINT b. SIGQUIT c. SIGKILL d. SIGTERM
B
In the process state column, what does an "R" indicate? a. The indicated process is being restarted because it resceived a SIGHUP kill signal. b. The process is currently running on the processor. c. The process is reading from the local hard disk. d. The process is recovering from a fatal error, and may potentially become a zombie.
B
The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below? a. 780 b. 631 c. 4586 d. 8080
B
What operator below is known as the NOT operator? a. -o b. -a c. ! d. %
B
In an if construct, what statements are optional? Multiple Answer a. fi b. elif c. else d. then
B and C
What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed? Multiple Answers a. secure b. wtmp c. lastlog d. xferlog
B and C
The GNOME 3 desktop environment utilizes what window manager and toolkit below? Multiple Answer a. kwin b. mutter c. Qt toolkit d. GTK+ toolkit
B and D
What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process? Multiple Answers a. SIGHUP b. SIGINT c. 1 d. 2
B and D
What two commands below can be used to modify the password expiry information and a user's default shell? Multiple Answers a. chexp b. chage c. shellmod d. chsh
B and D
____ is burning software that comes with Red Hat Fedora Core 2.
Brasero Disc Burner
After a background has been started, what command below can be used to move it to the foreground? a. b2f b. fgd c. fg d. fgnd
C
After a background process has been started, what command below can be used to move it to the foreground? a. b2f b. fgd c. fg d. fgnd
C
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config file? a. grub2-install b. gruv-config c. grub-mkconfig d. grub-compile
C
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files? a. grub2-install b. grub-config c. grub-mkconfig d. grub-compile
C
An RPM package can be converted to a cpio archive using what command? a. conv_arch b. rpmconv c. rpm2cpio d. cpioconv
C
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available a. system.conf b. local.setup c. login.defs d. user.defs
C
What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH? a. ˜/.bash_profile b. ˜/.bash_login c. /etc/profile d. ˜/.profile
C
What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size? a. 192-bit b. 64-bit c. 256-bit d. 128-bit
C
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm? a. 40%-50% b. 50%-60% c. 60%-70% d. 70%-80%
C
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm? a. 40%-50% b. 50%-60% c. 60%-70% d. 70%-80%
C
What is the default print job priority for all print jobs created by the lp command? a. -50 b. 0 c. 50 d. 100
C
What is the default print job priority for all print jobs created by the lp command? a. -50 b. 0 c. 50 d. 100
C
What is the default target on a system with a GUI installed? a. multi-user.target b. single-user.target c. graphical.target d. gui.target
C
What is the default target on a system with a GUI installed? a. multi-user.target b. single-user.target c. graphical.target d. gui.target
C
What is the most commonly used LAN protocol? a. DLC b. UDP/IP c. TCP/IP d. IPX/SPX
C
What is the subnet mask for a Class C IP address? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255
C
What kill signal stops a process, then restarts it with the same PID? a. SIGINT b. SIGQUIT c. SIGHUP d. SIGTERM
C
What kill signal stops a process, then restarts it with the same PID? a. SIGINT b. SIGQUIT c. SIGHUP d.SIGTERM
C
What number represents the stderr file descriptor? a. 0 b. 1 c. 2 d. 3
C
What option can be used with ssh to enable tunneling of X Windows information? a. -L b. -f c. -X d. -x
C
What option should be used in conjunction with the lp command in order to specify the destination printer name? a. -n b. -p c. -d d. -l
C
What tool below was designed as a secure remote access utility that encrypts information that passes across the network? a. Virtual Network Computing (VNC) b. Telnet c. Secure Shell (SSH) d. rlogin
C
Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory? a. daemon b. manip-daemon c. service d. daemon-service
C
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use? a. system.conf b. local.setup c. login.defs d. user.defs
C
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package? a. -r b. -D c. -P d. -d
C
What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system? a. -c b. -U c. -F d. -z
C
When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts? a. chkconfig b. service c. systemctl d. syscontroller
C
Select the two commands below that will provide the number of lines in a file, and the number of characters in a file, respectively: Multiple Answer a. count -c b. pr -d c. wc -l d. wc -c
C and D
Select the two window managers that have been used in GNOME:' Multiple Answer a.kwin b. lxde c. metacity d. mutter
C and D
The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc? Multiple Answers a. log.conf b. rsyslog.conf c. rsyslog.d d. log.d
C and D
What two commands below can be used to stop a process, either by PID number or process name? Multiple Answers a. end b. stop c. kill d. killall
C and D
What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively? Multiple Answers a. /etc/prnt.config b. /etc/cupsd.conf c. /etc/cups/cupsd.conf d. /etc/cups/printers.conf
C and D
What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes? Multiple Answers a. kthreadd b. syslogd c. init d. systemd
C and D
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is? Multiple Answers a. -s b. -h c. -d d. -k
C and D
Most configuration files on Linux systems are delimited using ____ characters.
Colon
A ____ is a standard set of instructions used to compress a file.
Compression algorithm
The rate of compression is called the ____.
Compression ratio
T/F - Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully.
False
T/F - If a compression utility compresses a file to 52% of its original size, it has a compression ratio of 52%.
False
T/F - In NFS, one computer shares a certain directory in the directory tree by placing the name of that directory in the /etc/imports file.
False
T/F - In a decision construct, you can have an unlimited number of if then statements.
False
T/F - In the DHCP lease process, halfway through the time period specified by its lease the DHCP client will send a DHCPDISCOVER packet to its DHCP server to renew its IP configuration.
False
T/F - The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory.
False
T/F - The SIGINT kill signal is the default kill signal used by the kill command.
False
T/F - The Sendmail daemon on Fedora 13 is configured by default to accept e-mail on TCP port 100 and route it to the appropriate user on the Linux system.
False
T/F - The init daemon has a PID of 0.
False
T/F - The killall command uses the PID to kill a process.
False
T/F - Traditionally, CDs/DVDs were used to back up data.
False
T/F - Users can create their own custom variables, called shell variables.
False
T/F - When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory.
False
T/F - When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.
False
T/F - When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.
False
T/F - You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.
False
The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory.
False
The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory. True and False
False
The killall command uses the PID to kill a process. True or False
False
The killall command uses the PID to kill a process. True or False
False
The killall command uses the PID to kill all process. True or False?
False
The ps command is the only command that can view process information. T/F
False
The secure log file contains information regarding the last user to log in to a system.
False
The secure log file contains information regarding the last user to log in to a system. True or False?
False
To kill a process running in the background, you must place a % characters before its process ID. True or False?
False
What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system? T/F
False
_____ represents a text description of the user and is typically left blank.
GECOS
Which of the following is an on-screen keyboard used with Linux?
GOK
The GNOME 3 desktop environment utilizes what window manager and toolkit below?
GTK+ toolkit mutter
When working with Sendmail, what command can be used to test SMTP support?
HELO
When working with Sendmail, you can use the ____ command to test SMTP support.
HELO
What is the most common hardware component to fail on a Linux system?
Hard disks
An IPv6 address consists of 16-bit numbers in what numbering scheme?
Hexadecimal or Expanded numbering scheme
Filenames that start with a period, such as .file, are referred to as
Hidden Files
64
How many different kill signals can be sent by the kill command to a given process?
vim file1
I order to quickly create an empty file, what command can be used?
What signal name and number function as the absolute kill signal, and when issued, forces the Linux kernel to stop executing the process by sending the process's resources to /dev/null?
SIGKILL 9
The ____ kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory.
SIGQUIT
segmentation fault
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
tty1
In Fedora 20, what terminal is used for graphical login?
/etc/X11/xorg.conf.d/
In Fedora 20, where are user configured settings for Xorg stored?
X Windows
In Linux, the core component of the GUI is known as:
2
In Linux, what runlevel is also known as the multiuser mode?
7
In a SCSI chain the highest priority SCSI device is given what SCSI ID?
sixth
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?
-
In a file's mode, a permission that is unavailable is represented by what character?
elif; else
In an if construct, what statements are optional?
system-config-keyboard
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?
ln
In order to create a hard link, what command must be used?
-l
In order to display a list of at job IDs, what option can be specified to the at commands?
zfs get all
In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?
chmod 7777 filename
In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?
1024
In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?
(hd0,0)
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.
Ctrl+k
In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?
swapoff
In the event that you wish to disable a swap partition, what command must be used?
w
In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit?
process state
In the output of th ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?
Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?
Modems (modulator-demodulator) devices between the digital data of a computer and the analog signal of a telephone line, transmits data at 56KB/s and they are configured by using the Modem Manager utility ISDN modem is otherwise known as an integrated services digital network it is a digital phone connection that can transmit data, voice, and video over a normal telephone line. It is configured to route IP over a Dial-on-Demand Routing (DDR) link, by the use of the switch software and not the MFG or the model. It transfers speeds up to 128KB/s. DSL modem is a digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line which provides the digital subscriber line service for connection to the Internet, which is often called DSL broadband. Typically they are configured via webpage accessing by typing the IP address given in the router's manual into the browser's address bar. Runs on speeds of 100MB/s.
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?
SIGQUIT
xvidtune
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?
Pog O
Pog
Pog U
Pog Off
What two RAID types below utilize disk striping with parity, providing protection against one or two drive failures respectively? a. RAID6 b. RAID0 c. RAID5 d. RAID1
RAID 5 & RAID 6
A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:
RAID Z
A ZFS volume that uses a variable stripe size and requires a minimum of 3 hard disks to protect against a single disk failure is known as
RAID-Z
A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as: a. RAID+ b. RAID-Z c. RAID 5 d. ZFS Extended RAID
RAID-Z
Most Linux distributions make use of what package manager?
RPM
Most Linux distributions today use ____ as their package manager.
RPM
If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.
Read and execute
A DNS resolution request that was resolved with the use of top-level DNS servers.
Recursive query
Text wildcards used to ease the searching of specific text information are called _________________________.
Regular expressions (regexp)
What does the setfacl -b command do?
Removes all extra ACL assignments on a given file.
A DNS name resolution request whereby an IP address is resolved to a FQDN.
Reverse lookup
After downloading an installing any shared libraries, what should be done to ensure the list of shared library directories and the list of shared libraries are updated?
Run the ldconfig command.
What SCSI type supports speeds of up to 80 MB/second?
SCSI-3 Ultra2 Wide
What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file?
SGID and SUID
What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file? - SGID - SUID - SQUID - sticky bit
SGID, SUID
What kill signal stops a process, then restarts it with the same PID?
SIGH UP
If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below:
SIGHUP
The ____ kill signal stops a process and then restarts it with the same PID.
SIGHUP
What kill signal stops a process, then restarts it with the same PID?
SIGHUP
What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?
SIGINT 2
Describe the telnet and SSH utilities. What is the difference between them?
SSH is a network protocol used to remotely access and manage a device. The key difference between Telnet and SSH is that SSH uses encryption, which means that all data transmitted over a network is secure from eavesdropping. Like Telnet, a user accessing a remote device must have an SSH client installed.
What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file?
SUID SGID
Explain why scheduling commands can be beneficial, and detail some of the methods available for scheduling commands.
Scheduling system maintenance commands to run during nonworking hours is good practice, as it does not disrupt normal business activities. There are two different methods to schedule commands: At daemon (atd) - which can be used to schedule a command to execute once in the future cron daemon (crond) - which is used to schedule a command to execute repeatedly in the future
What tool below was designed as a secure remote access utility that encrypts information that passes across the network?
Secure Shell (SSH)
What tool is designed as a secure remote access utility that encrypts information that passes across the network?
Secure Shell (SSH)
What tool below was designed as a secure remote access utility that encrypts information that passes across the network?
Secure Shell SSH
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
Segmentation fault
ls -l
Select the command below that can be used to provide a long listing for each file in a directory:
[ A -gt B ]
Select the test statement that can be used to determine if A is numerically greater than B
[ A gt B ]
Select the test statement that can be used to determine if A is numerically greater than B
memtest86
Select the utility below that when run will start and perform a thorough check of RAM for hardware errors:
____ are files that are typically used to create custom programs that perform administrative tasks on Linux systems.
Shell scripts
Which of the following does Click Assist do?
Simulates a right click by holding down the left mouse button
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?
Sixth
What option can be used in the journald configuration file to specify a file size limit to the event log?
SystemMaxUse
What option can be used in the journald configuration file to specify a file size limit to the event log?
SystemMaxUse
Which of the following is a valid Linux initialization process?
Systemd SysV
Apache daemon listens for HTTP requests on port ____.
TCP 80
The Apache daemon listens for HTTP requests on what port by default?
TCP 80
If network services that are started by inetd or xinetd are in use, what can be used to provide extra security?
TCP wrapper
What is the most commonly used LAN protocol?
TCP-IP
What is the most commonly used LAN protocol?
TCP/IP
Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. T/F --
TRUE
Which of the following system variables can you modify to override the default system timezone within your current shell?
TZ
Emacs editor
The LISP artificial intelligence programming language can be used with which text editor below?
vmlinuz
The Linux kernel exists as a file named:
Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stip daemons after system initialization. True or False?
True
How does the NICE value affect process priority? How and why can nice values by altered?
The NICE value (NI) can be used to affect the process priority indirectly, it is measured between -20 (a greater chance of a high priority) and 19 (a greater chance of a lower priority). The lower the number the more priority that task gets, if the nice value is high number like 19 the task will be set to its lowest priority and the CPU will process whenever it gets a chance. You can use the -n command line option to change the or adjust the nice value which adds a set of integer value to the niceness.
KDE
The QT toolkit is utilized by which GUI environment?
PATH
The ______ environment variable contains a list of directories used to search for executable programs.
awk
The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?
man -k list
The apropos list command produces the same results as which command below?
$
The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?
echo $PS1
The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?
You can execute ____ main types of Linux commands.
Three
tac
To display a text file in reverse order, what command should be used?
cat data
To display the contents of a text file called data, what command should be used?
/proc/meminfo
To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?
Ignoring a kill signal.
Trapping
A route table is a list of TCP/IP networks that is stored in system memory
True
After a process has been started, you can change its priority by using the renice command. True or False.
True
All DNS servers contain a DNS cache file.
True
Any command that can be executed on the command line can also be placed inside any environment file. True or False
True
As daemon process are not associated with terminals, you must use the -e switch with ps command to view them. True or False?
True
Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script.
True
Class D addresses are used for multicasting
True
Each process can start an unlimited number of other processes. T/F
True
Each process can start an unlimited number of other processes. True or FAlse
True
If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False?
True
Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond
True
Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond True or False
True
Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond àFound in book
True
Logs from the cron daemon (crond) can be viewed using the command journalctl_COMM=crond True or False?
True
Most daemon scripts accept the arguments start, stop, and restart.
True
Most daemon scripts accept the arguments start, stop, and restart. True or False
True
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets
True
True
Zombie processes are also known as defunct processes.
A portion of the Domain Name Space that is administered by one or more DNS servers.
Zone
Select the escape sequence that starts a new line when used with echo:
\n
Which of the following is the common escape sequence to display a horizontal tab using the echo command?
\t
cron table
a file specifying tasks to be run by the cron daemon; there are user cron tables and system cron tables
(CIDR) notation
a notation that is often used to represent an IP address and its subnet mask
Octet
a port of an IP address that represents eight binary bits
Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to take approximately 20 minutes to run individually. However, he would like to go to lunch 15 minutes from now. He knows that he can type all of the commands on the same line and separate them with a certain character to run them sequentially. Which character can he type after each command to have them run one after the next without requiring further input from him?
a semicolon
Route Table
a table of information used to indicate which networks are connected to network interfaces
process ID (PID)
a unique identifier assigned to every process as it begins
host name
a user-friendly name assigned to a computer
What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?
alert
Which command can be used to create a new command that will monitor the contents of auth.log as they get added to the file?
alias showauth='tail -f /var/log/auth.log'
In order to download DPM packages, what command should be used below?
apt-get
Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.)
atq at -l at -q
On a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.
cancel
Which of the following commands will send the output of the cat command to the grep command to be filtered?
cat /etc/passwd | grep jsmith
In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued? a. cd .. b. /home/joe c. cd ./.. d. cd ../..
cd ../..
Which command is used to list and modify password expiration information for user accounts?
chage
What two commands below can be used to modify the password expiry information and a user's default shell?
chage chsh
A device that transfers data in a character-by-character fashion is referred to as what type of device?
character
In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?
chmod 7777 filenam
Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment. a. croot b. set_root c. change_root d. chroot
chroot
What two commands below can be used to modify the password expiry information and a user's default shell?
chsh chage
What character is used to delimit most Linux configuration files?
colon
What option should be used in conjunction with the lp command in order to specify the destination printer name?
d
Describe the purpose the process state column displayed by the ps -l command. What values may appear in this column, and what do these values indicate?
the -l option to the ps command lists even more information about each process than the -f option. The process state (S) column is the most valuable to systems administrators because it indicates what the process is currently doing. The values that may appear are the (S) value for sleeping, the (R) value is for running, the (T) value is for a process that has stopped or is being traced by another process and the (Z) value indicates a zombie process
Multicast
the TCP/IP communication destined for a certain group of computers
broadcast
the TCP/IP communication destined for all computers on a network
forking
the act of creating a new BASH shell child process from a parent BASH shell process
time slice
the amount of time a process is given on a CPU in a multiprocessing operating system
at command
the command used to schedule commands and tasks to run at a preset time in the future
link local
the portion of an IPv6 address that refers to a unique computer, it is analogous to the host portion of an IPv4 address
In the process state column, what does an "R" indicate?
the process is currently running on the processor
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?
the process is high priority
Trapping
the process of ignoring a kill signal
When you run the ps command, how are daemon process recognized?
there is a question mark in the TTY column
How many DNS servers can be configured in the /etc/resolv.conf file?
three
How many DNS servers can be configured in the /etc/resolv.conf file?
three (3)
The amount of time a process has to use the CPU is called a(n) ____________________.
time slice
The amount of time a process has to use the CPU is called a(n) __________________________.
time slice
Which of the following commands will list the time zones available on a Linux system?
timedatectl list-timezones
Which command is used to gain real-time information about processes running on the system, with the most processor-intensive processes appearing at the beginning of the list?
top
Which of the following commands will show a list of process names along with their process ID (PID)? (Choose two.)
top ps
The ____ command can be used to replace characters in a file sent via Standard Input.
tr
What command can be used to replace characters in a file sent via Standard Input?
tr
What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?
traceroute
Data is read from physical hard drives in concentric circles known as which of the following?
tracks
Data is read from physical hard drives in concentric circles known as which of the following? a. blocks b. tracks c. sectors d. cylinders
tracks
What is the name of the concentric circles from where data is read from in a physical hard drive?
tracks
A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator. true or false
true
Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. true or false
true
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets. true or false
true
RAID level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance and allows up to two simultaneous hard disk drive failures while remaining fault tolerant. true or false
true
The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length. true or false
true
The cpio command has the ability to handle long filenames and can be used to back up device files. true or false
true
The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations.
true
When you print to a printer class, the print job is send to the first available printer in the printer class. true or false
true
The database for the locate command can be updated manually by using the updatedb command. true or false
true
In order to change the time zone of a system after installation, what command must be used?
tzselect
Which of the following commands will prompt you to answer a series of questions to help determine which time zone file you should use?
tzselect
What file system below is used by software programs that write to a CD-RW or DVD-RW drive?
udf
What file system below is used by software programs that write to a CD-RW or DVD-RW drive? - udf - ntfs - hpfs - ext2
udf
The state and performance of a RAID-Z volume can be viewed using what two commands? (Select two answers.) a. zpool iostat b. zpool status c. zfs iostat d. zfs status
zpool iostat, zpool status
Which character(s) below represent extended regular expression metacharacter(s)?
{}
Select the metacharacter that can be used to send the standard output of one command to another command as standard input:
|
You can send the standard output of one command to another command as standard input using the ____ shell metacharacter.
|
What metacharacter can be used to refer to the current user's home directory?
~
If incompatible X Windows settings are configured, where will the errors that are generated be written to?
~/.xsession-errors
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.
(hd0,0)
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?
-d, -k
In Fedora 20, where are user configured settings for Xorg stored?
/etc/X11/xorg.conf.d/
Select below the configuration file that is used to configure the BIND / DNS server:
/etc/named.conf
What file controls the default runlevel when using Systemd?
/etc/systemd/system/default.target
What file in the /proc directory contains information about a computer's CPU?
/proc/cpuinfo
Where are the log files for the Samba daemon located?
/var/log/samba
On a Fedora based system, where are the shell environment and scheduled commands for at stored?
/var/spool/at
The GUI components and related software take up how much space on a typical Linux installation?
4 GB
What does the setfacl -b command do?
It removes all extra ACL assignments on a given file
What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk?
iSCSI initiator iSCSI target
What command below can be used to uninstall the LILO bootloader from an active partition?
lilo -U
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?
login.defs
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?
login.defs
Segmentation faults can sometimes be fixed by performing what two tasks below?
turn off CPU cache memory increase the number of memory wait states in BIOS
Segmentation faults can sometimes be fixed by performing what two tasks below? a. perform a full reinstall of OS b. turn off CPU cache memory c. increase the number of memory wait states in BIOS d. update the Linux kernel
turn off CPU cache memory, and increase the number of memory wait states in BIOS