47

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?

#!

The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?

$

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.​

(hd0,0)

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character. a. + b. ^ c. ? d. *

*

When there are multiple background process executing in the shell, the jobs command indicates the most recent one with which symbol?

+

Nice values are used to affect process priorities using a range between ______________________.

-20 and 19

Which switch below can be added to the ls command to show a list of files and their type?

-F

A user account can be locked with the usermod command using what option?

-L

What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?

-P

What option for the iptables command can be used to specify the default policy for a certain chain type?

-P

​What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?

-P

What option can be specified with the rpm command to identify any missing files in a package or package dependency?

-V

What option can be used with SSH to enable tunneling of X Windows information?

-X

What option can be used with ssh to enable tunneling of X Windows information?

-X

What option can be used with ssh to enable tunneling of X Windows information?​

-X

​What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?

-Z -z

When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.

-c

When used with the uncompress command, what option displays the contents of the compress file to Standard Output?

-c

To create or edit a user cron table, you can use the ____ option to the crontab command.

-e

To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.

-e

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?

-e

What option, when added to the crontab command, opens the vi editor with a user's cron table?

-e

When used with the compress command, the ____ option can be used to compress symbolic links.

-f

In order to display a list of at job IDs, what option can be specified to the at command?

-l

In order to display a list of at jobs IDs, what option can be specified to the at command?

-l

Select the command below that can be used to provide a long listing for each file in a directory:

-l

Which device file below represents the first primary partition on the second PATA hard disk drive? a. /dev/hdb1 b. /dev/hdc2 c. /dev/hdc1 d. /dev/hda1

/dev/hdb1

What device file below indicates that the first ATAPI IDE tape device (nonrewinding)?

/dev/nht0

What device file below indicates the first ATAPI IDE tape device (nonrewinding)?

/dev/nht0

What two device files below represent the first SCSI tape device, rewinding and non-rewinding?​

/dev/st0 /dev/nst0

What two device files below represent the first SCSI tape device, rewinding and non-rewinding?

/dev/st0 /dev/nst0

What character device file represents the second serial port on a system (COM2)?

/dev/ttyS1

What character device file represents the second serial port on a system (COM2)? a. /dev/ttyS1 b. /dev/tty2 c. /dev/tty1 d. /dev/ttyS0

/dev/ttyS1

In Fedora 20, where are user configured settings for Xorg stored?​

/etc/X11/xorg.conf.d/

A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs?

/etc/cron.deny

In which directory would a system administrator store scripts that should be run monthly by the cron daemon?

/etc/cron.monthly

The location of system cron tables.

/etc/crontab

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length and the range of UIDs and GIDs available for use?

/etc/cups/printers.conf

In Linux, the group database configuration file is ____.

/etc/group

What file in the /proc directory contains information about a computer's CPU?

/proc/cpuinfo

To ensure that Linux has detected the correct amount of RAM in the filesystem after installation, you should view the contents of what file in the proc directory?

/proc/meminfo

To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory? a. /proc/meminfo b. /proc/memoryinfo c. /proc/mem d. /proc/cpuinfo

/proc/meminfo

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?

/root

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory? - /root - /bin - /home/root - /boot

/root

Where are the log files for the Samba daemon located?

/var/log/samba

Where are scheduled commands stored on Ubuntu Linux systems?

/var/spool/cron/atjobs

Where is the default document root directory for the Apache web server?

/var/www/html

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?

0

In NTP, stratum ____ consists of atomic devices or GPS clocks.

0

In NTP, what stratum consists of atomic devices or GPS clocks?

0

On Linux, the root user always has a UID of what number?

0

On Linux, the root user always has a UID of what number?​

0

Process are started with what nice value by default?

0

Processes are started with a nice value of ____ by default.

0

Processes are started with what nice value by default?

0

The file descriptor stdin is represented by the number ____.

0

What number represents the stdin file descriptor?

0

What range of ports is considered to be "well-known"?

0-1023

What range of ports is considered to be "well-known"?​

0-1023

Where is the skeleton directory located on most Linux systems? a. /etc/skel b. /var/skel c. /etc/skeleton d. /var/skeleton

A

Which command should be used to restrict access to printers? a. lpadmin b. lpa c. lpr d. admin

A

Which command should be used to restrict access to printers? a. lpadmin b. lpa c. lpr d. admin

A

​RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as? a. package dependency b. branching package​ c. family package d. recursing package

A

​What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on? ​a. for ​b. while ​c. case ​d. switch

A

What is VNC? How does it transfer graphics across the network?

A Virtual Network Computer (VNC) is a cross-platform technology that allows users to connect to a graphical desktop across a network. It transfers graphics across the network by using the special platform-independent protocol called Remote FrameBuffer (RFB) to transfer graphics, mouse movements, and keystrokes across the network.

RAID-Z

A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:

​What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively? Multiple Answer ​a. PWD ​b. CWD ​c. PATH d. ​SHELL

A and D

character

A device that transfers data in a character-by-character fashion is referred to as what type of device?

4

A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices?

env

A list of all exported environment and user-defined variables in a shell can be viewed with what command below?

Detail shell scripts and explain how they are used and executed.

A shell script is meant to be run by the UNIX shell. These commands can be written in different types of scripting languages. These scripts can be used to start programs, manipulate files, and printing out text. Scripts can be executed from the command-line in UNIX.

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?​ a. psbranch ​b. pstree ​c. psparent ​d. pshead

B

What command below is used to display the lineage of a process by tracking its PPID until the init daemon? a. psbranch b. pstree c. psparent d. pshead

B

What file controls the default runlevel when using Systemd?​ ​a. /etc/inittab ​b. /etc/systemd/system/default.target ​c. /etc/systemd/inittab.target d. ​/etc/systemd.conf

B

What is the subnet mask for a Class B IP address? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

B

What option can be added to the dpkg command to remove specified package from the system, including any configuration files used by the package? a. -d b. -P c. -D d. -r

B

What option can be added to the rpm command in order to query packages? a. -i b. -q c. -v d. -h

B

What option should be used in conjunction with lp command in order to specify destination printer name? a. -n b. -d c. -p d. -l

B

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?​ ​a. alert ​b. panic ​c. crit ​d. error

B

What yum command below can display a list of packagegroup names? a. yum list --groups b. yum grouplist c. yum -- list -g d. yum show groups

B

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol? a.* b. + c. - d. /

B

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol? a. * b. + c. - d. /

B

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? a. SIGINT b. SIGQUIT c. SIGKILL d. SIGTERM

B

The dump/restore utility is limited to a maximum of how many different incremental backups? a. seven b. eight c. nine d. ten

C

When using Systemd, what command can be used to start, stop and configure daemons to start automatically when the system starts? a. chkconfig b. service c. systemctl d. syscontroller

C

When using the compress utility, each file specified for compression is renamed with what extension? a. .cmp b. .c c. .Z d. .cpz

C

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory? a. daemon b. manip-daemon c. service d. daemon-service

C

​What two ps options can be used to display a full list of information about each process, and a long list of information about each process? ​a. -e ​b. -p ​c. -f ​d. -l

C and D

Which of the following commands can be used to create a BASH variable named CREATOR with the value of Torvalds?

CREATOR="Torvalds"

____ are values that are calculated using a MD5 algorithm, a SHA-1 algorithm, or a SHA-256 algorithm. Read Answer Items for Question 13.

Checksum

Which of the following is the default desktop environment used by Linux Mint?

Cinnamon

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?

Ctrl +g

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?​ a. ​Ctrl+k b. ​dd c. ​Ctrl+a d. ​Ctrl+d

Ctrl+k

Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat

D

Select the command that can be used to send a small TCP/IP packet to another IP address and await a response: a. png b. ipquery c. ring d. ping

D

What number indicates the lowest kernel priority (PRI) of a process possible?​ ​a. -20 ​b. 0 ​c. 20 d. ​127

D

What number indicates the lowest priority kernel priority (PRI) of a process possible? a. -20 b. 0 c. 20 d. 127

D

What option can be added to the netstat command in order to display network statistics?​ a. ​-s b. ​-p c. ​-a d. ​-i

D

What option, when added to the crontab command, opens the vi editor with a user's cron table? a. -u b. -c c. -f d. -e

D

What permissions are required to execute a shell script in a manner similar to any other executable program on the system? a. read b. write and read c. execute d. read and execute

D

What well-known TCP port is utilized by the SMTP service?​ a. ​110 b. ​22 c. ​23 d. ​25

D

Which of the following is not one of the three main types of Linux commands?​ ​a. binary programs ​b. shell scripts ​c. shell functions d. ​device calls

D

​What command can be used to search for DPM package information? a. dpkg-search b. dpkg-list c. dpkg-info d. dpkg-query

D

A directory that contains the default Web site that is used on a server.

Document root

target ID

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?

True

Each process can start an unlimited number of other processes.

An alternative to the vi editor that offers an equal set of functionality is the GNU _________________________.

Emacs (Editor MACroS) editor

The LISP artificial intelligence programming language can be used with which text editor below? a. Kedit editor b. Nedit editor c. Joe editor d. Emacs editor

Emacs editor

filesystem corruption

Errors on a filesystem are common on most filesystems. What do these errors indicate?

____________________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.

FHS

Almost all hardware problems are the result of damaged hardware.

False

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. True or False?

False

By default, new users are forced to change their passwords.

False

Each device attached to a system can be represented by multiple device files.

False

On most Linux systems, the logrotate utility is automatically scheduled to run weekly. True or False

False

SLIP is a newer technology than PPP.

False

SLIP is a newer technology that PPP

False

Stand-alone daemons are started on demand using inetd or xinetd.

False

T or F: On most Linux systems, the logrotate utility is automatically scheduled to run weekly.

False

T or F: The killall command uses the PID to kill a process.

False

T or F: The secure log file contains information regarding the last user to log in to a system.​

False

T or F: Zombie processes are also known as defunct processes

False

T/F - A value of 0 for a process priority indicates low priority.

False

T/F - The ps command is the only command that can view process information.

False

T/F - To decompress files that have been compressed with the compress utility, you can use the decompress command followed by the names of the files to be decompressed.

False

T/F - To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.

False

The secure log file contains information regarding the last user to log in to a system.​ True or False

False

To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor. True or False

False

Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy.​

False

When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory.

False

When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.

False

When using the gzip utility, the -l option is also known as best compression and results in a higher compression ratio. True or False?

False

Zombie processes are also known as defunct processes.​ True or False

False

What command is most effective at identifying different types of files?​

File

____ are labels representing command input and output.

File descriptors

Describe how forking works, and how it affects the parent process.

Forking is the creation of a new subshell; it is carried out by the fork function in the BASH shell. It is used to create processes. It takes no arguments and returns a process ID. The purpose of fork is to create a new process which becomes the child process of the caller, after a new child process is created both processes will execute the next instruction following the fork system call.

A DNS name resolution request whereby a FQDN is resolved to an IP address.

Forward lookup

Archiving all data on a filesystem is performing a ____.

Full backup

_______________ represents a text description of the user and is typically left blank.

GECOS

False

Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completes successfully.

Tab

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?

True

If the /etc/at.allow and /etc/at.deny files do not exist the root user is allowed to schedule tasks using the at daemon.

journald

In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?

cd ../..

In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued?

<

In order to redirect a file to the standard input of a command, what meta character should be used?

<

In order to redirect a file to the standard input of a command, what metacharacter should be used?

image=

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?

The process is currently running on the processor.

In the process state column, what does an "R" indicate?

root

In what filesystem are most of the operating system files contained?

command mode

In what mode does the vi editor open by default?

What is the effect of changing the date the password was last changed to zero?

It forces the user to change the password at the next login.???

Which of the following will the split command do on a file when no other options are specified?

It will split a file into new equally sized files that are 1/10th of the original file size.

The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.

Kern

A user account can be locked with the usermod command using what option?

L

Which of the following options is passed to the Linux kernel from the GRUB2 configuration file to set the locale?

LANG

In order to send a print job to a printer using CUPS, what command must be used?

Lp

What DNS resource record type is used to provide the IP address for the e-mail server for a zone?

MX

Hardware Compatibility List (HCL)

Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Tab b. Ctrl c. Alt d. Esc

Tab

Databases store information in the form of ____, each of which contains ____.

Tables; records

Filenames that end with the .tar.gz or .tgz extensions, and represent gzip-compressed tar archives are called ____.

Tarball

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?

Target ID

/boot

The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?

/root

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?

Free Software Foundation (FSF)

The GNU General Public License (GPL) was developed by which organization?

4GB

The GUI components and related software take up how much space on a typical Linux installation?

Linus Torvalds

The Linux kernel was developed and released in 1991 by:

mount -a

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?

False

To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.

A route table is a list of TCP/IP networks that is stored in system memory.

True

A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address.

True

After a process has been started, you can change its priority by using the renice command. True or False

True

After a process has been started, you can change its priority by using the renice command. True or False?

True

By default, the smb.conf file shares all printers and home directories for recognized Windows users.

True

CUPS contains versions of the lpr, lpc, lpq, and lpm commands.

True

CUPS contains versions of the lpr, lpc, lpq, and lprm commands.

True

CUPS contains versions of the lpr, lpc, lpq, and lprm commands. True or False

True

CUPS contains versions of the lpr, lpc, lpq, and lprm commands. True or False?

True

Class D addresses are used for Multicasting

True

Each process can start an unlimited number of other processes. True or False

True

Each process can start an unlimited number of other processes. True or False?

True

Everyone has permission to view the /etc/passwd file's contents.

True

If the / filesystem becomes corrupted, the system is unstable and must be turned off.

True

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False

True

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False

True

Logs from cron daemon (crond) can be view using the command journalctl _COMM=crond

True

T/F - By default, the smb.conf file shares all printers and home directories for recognized Windows users.

True

T/F - The BASH shell assumes stdout in the absence of a numeric file descriptor.

True

T/F - The ENV environment variable represents the location of the BASH run-time configuration file.

True

T/F - The Very Secure FTP daemon is a stand-alone daemon.

True

T/F - The compress utility preserves the original ownership, modification, and access time for each file that it compresses.

True

T/F - The dump/restore utility can only work with files on ext2 and ext3 filesystems.

True

T/F - The tar utility cannot back up device files or files with filenames longer than 255 characters.

True

T/F - The use of NFS is less common than the use of FTP to transfer files on public networks.

True

T/F - While a process is waiting for its parent process to release the PID, the process is said to be in a(n) zombie state.

True

T/F - You can choose to use a window manager only, and not use a desktop manager.

True

The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length

True

The Very Secure FTP daemon is a stand-alone daemon.

True

The compress utility preserves the original ownership, modification, and access time for each file that it compresses.

True

The compress utility preserves the original ownership, modification, and access time fore each file that it compresses. True or False?

True

When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD.

True

When you print to a printer class, the print job is send to the first available printer in the printer class.

True

​Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stop daemons after system initialization.

True

What port is used by the Network Time Protocol (NTP) for communication?

UDP 123

/var

Under the root directory in Linux, which directory contains system commands and utilities?

/boot

Under what directory is the Linux kernel stored?

Assistive technologies are configured using what utility on Fedora 20 in GNOME?

Universal Access

[1-4]

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?

Red Hat

What Linux distribution is the most commonly used distribution within organizations today?

RAID5

What RAID level is commonly referred to as disk striping with parity?

for

What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?

It removes all extra ACL assignments on a given file.

What does the setfacl -b command do?

/etc/profile

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?

/etc/systemd/system/default.target

What file controls the default runlevel when using Systemd?

ioports

What file in the /proc directory contains a list of memory address ranges reserved for device use?

/proc/cpuinfo

What file in the /proc directory contains information about a computer's CPU?

udf

What file system below is used by software programs that write to a CD-RW or DVD-RW drive?

DVD

What installation media source is the most common source for Linux packages?

graphical.target

What is the default target on a system with a GUI installed?

2

What is the minimum number of user accounts that must be created at install time?

ZFS volume

What is the term for a ZFS managed filesystem that is created from ZFS pools?

quiet

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?

2; SIGINT

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl_c combination to kill a running process?

;

What metacharacter can be used to issue tw term-31o commands to be run in consecutive order, without piping or redirecting output?

~

What metacharacter can be used to refer to the current user's home directory?

&

What metacharacter indicates background command execution?

127

What number indicates the lowest kernel priority (PRI) process possible?

2

What number represents the stderr file descriptor?

0

What number represents the stdin file descriptor?

!

What operator below is known as the NOT operator?

-e

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?

write

What permission grants a user the ability to open, read, and edit the contents of a file?

read and execute

What permissions are required to execute a shell script in a manner similar to any other executable program on the system?

device driver

What piece of software tells the operating system how to use a specific hardware device?

init; systemd

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or System init processes?

-l; -f

What two ps options can be used to display a full list of information about each process, and a long list of information about each process?

+

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?

systemctl

When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?

Options

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:

7

When using the chmod command, the mode rwx can be represented by which number?

The process is high priority.

When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?

minor number

When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?

whoami

Which Linux command can be utilized to display your current login name?

What is contained in the DISPLAY variable on a Linux system running the X window system?

Which X server the client is supposed to connect to by default.

{}

Which character(s) below represent extended regular expression metacharacter(s)?

service

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?

df

Which command below provides the easiest method for monitoring free space on mounted filesystems?

wc

Which command can be used to count the number lines, words, and characters in a file?

/dev/hdb1

Which device file below represents the first primary partition on the second PATA hard disk drive?

SIGQUIT

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?

Ctrl+g

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?

--loop

Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?

-F

Which switch below can be added to the ls command to show a list of files and their type?

The ____ option to the ps command displays all processes that do not run on terminals.

X

False

You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.

/var/log/boot.log

You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?

What is the term for a ZFS managed filesystem that is created from ZFS pools?

ZFS volume

What is the term for a ZFS managed filesystem that is created from ZFS pools?​

ZFS volume

What is the term for a ZFS managed filesystem that is created from ZFS pools?​ a. ZFS vault b. ​ZFS volume c. ZFS store d. ZFS lake

ZFS volume

Select the test statement that can be used to determine if A is numerically greater than B:

[ A -gt B ]

The test statement ____ would be used to determine if A is numerically greater than B.

[ A -gt B ]

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?

[1-4]

Select the escape sequence that is used for a form feed:

\f

The ____ escape sequence represents a form feed.

\f

parent process

a process that has started other processes (child processes)

child process

a process that was started by another process (parent process)

Internet Protocol (IP) address

a series of four 8-bit numbers that represent a computer on a network

Protocol

a set of rules of communication used between computers on a network

daemon process

a system process that is not associated with a terminal

The killall command terminates ____________________________.

all instances of a process with the same name

Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded:​

append= ​boot=

A system administrator wants to schedule a task to run at 11 pm, but knows that she will not be in the office at that time. Which of the following commands can she use to schedule this task to run that night while she is at home?

at

Which of the following command can be used to remove a job from the list of pending jobs? (Choose all that apply.)

at -d at -r atrm

The command used to schedule commands and tasks to run at a present time in the future.

at command

Daemon used to schedule a command to execute once in the future.

at daemon

In the process called _____, a user's user name and password are checked against a system database that contains all user account information.

authentication

In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.

authentication

The ____ command can be used to extract, manipulate, and format text using pattern-action statements.

awk

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?

awk

In a file's mode, a permission that is unavailable is represented by what character? - ? - * - "b -" - +

b -

What two window managers is the Compiz Fusion window manager based upon?​

beryl​ ​compiz

Which two problems below are typically seen on large systems that write large amounts of data to a non-ZFS filesystem?​ a. ​snapshotting b. ​bit rot c. ​misdirected writes d. segment faults

bit rot, misdirected

What two commands below can be used to view the contents of a bzip2-compressed file page by page?

bzless bzmore

On a CUPS printing system, to remove a print job that is in the print queue, you can use the _____ command followed by the print job IDs of the jobs to remove.

cancel

Which of the following results would be created by the command sequence: echo 'apple banana carrot dog elephant' | while read a b c; do echo result: $c $b $a; done

carrot dog elephant banana apple

Which of the following commands will display the current CPU(s) detected by a Linux system?

cat /proc/cpuinfo

To display the contents of a text file called data, what command should be used?

cat data

A device that transfers data in a character-by-character fashion is referred to as what type of device? a. text b. binary c. block d. character

character

On Linux systems that use the traditional ​UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?

chkconfig

What two* commands will grant only the execute permission to username bob on file1, assuming bob is the file's owner?

chmod 777 file1

​What two commands below will grant only the execute permission to username bob on file1, assuming that bob is the file's owner?

chmod 777 file1, chmod u=x​ file1

In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?

chmod 7777 filename

Select the command that can be used to change the root filesystem to a different directory, such as when you are in a rescue environment.

chroot

what command can be used to change the root filesystem to a different directory, such as when in a rescue environment?

chroot

Each field in the /etc/passwd file is separated by ____.

colons

In what mode does the vi editor open by default?​ a. ​command mode b. ​overview mode c. ​insert mode d. append mode

command mode

What command can be used to copy files?

cp

What command can be used to copy files? - copy - cp - cpy - mv

cp

​What two commands below will work recursively if specified with the -R option? (Select 2 answers.) - cp - rm - mkdir - mv

cp, rm

What file in the /proc contails info about a computer's CPU?

cpuinfo

Daemon used to schedule a command to execute repeatedly in the future.

cron daemon

What command is used to view and modify user jobs scheduled to run with cron?

crontab

Which of the following commands will show the current user cron jobs that have been created for the currently logged in user?

crontab -l

You have run the top command successfully, but realize that the q key on the keyboard has suddenly stopped working. What is another way that you can exit out of the top program?

ctrl-c

The ____ command can be used in the BASH prompt to obtain a Web page from the Apache server.

curl

Which command below can be used at a BASH command prompt to obtain a web page?

curl

In vi, using command mode, what ​series of key presses below will cause the line on which the cursor is on to be deleted? a. ​yw b. ​dd c. ​d d. ​X

dd

Before a computer can use a router, with what configuration information must it be provided?

default gateway

The IP address of the network interface on the router to which you send packets is called _____________________________.

default gateway

Which command below provides the easiest method for monitoring free space on mounted filesystems? - du - df - fs - fd

df

Which of the following commands will display messages that were displayed during the boot sequence by the kernel?

dmesg

What command can be used to search for DPM package information?

dpkg-query

Select the command below that shows the size of a directory and its contents in kilobytes:​

du

Select the command below that shows the size of a directory and its contents in kilobytes:​ - du - sizeof - df - dir

du

What command shows the size of a directory and its contents in kilobytes?

du

Which of the following commands will display the exit status of the last command used in the BASH shell?

echo $?

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?

echo $PS1

The quotas for certain users can be edited b using which command?

edquota

The quotas for certain users can be edited by using which command? - chquota - usrquota - repquota - edquota

edquota

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?

emerg or panic

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?

etc/cups/printers.conf /etc/cups/cupsd.conf

SLIP is a newer technology than PPP. true or false

false

Select the command that can be used to create partitions that will be stored in an MBR after installation:

fdisk

You have started a job running in the background that you want to now bring to the front so that you can watch it execute. Which of the following commands can be used to display the job's output to the terminal?

fg

Errors on a filesystem are common on most filesystems. What do these errors indicate? a. filesystem corruption b. raid degradation c. hard drive failures d. filesystem breaks

filesystem corruption

A process spawning or initiating another process is referred to as _____________________.

forking

What command can be used to check different kinds of filesystems on Linux for errors?

fsck

Which command can be used to download an updated copy of the master branch from the original Git repository?

git pull origin master

What is the default target on a system with a GUI installed?​

graphical.target

Which of the following will look at the /etc/passwd file for any lines containing the word root and display them out to the screen while simultaneously writing the results to a file?

grep root /etc/passwd | tee ~/root.txt

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​

grub-mkconfig

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?​

grubby

The first line in a shell script, which specifies the pathname to the shell that interprets the contents of the shell script, is ____.

hashpling

An IPv6 IP address consists of 16-bit numbers in what numbering scheme?

hexidecimal

Which of the following statements is true? (choose all that apply)

if /etc/at.allow exists, only users listed in it can use the at command if /etc/cron.allow exists, only users listed in it can use the cron command if /etc/cron.deny exists and /etc/cron.allow does no exist, any user not listed in /etc/cron.deny can use the cron command

What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?

ifconfig

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (choose all that apply)

ifconfig ping netstat -i

Which process will all have PID of 1 and a PID of 0?

init

The first daemon process on a system is called the ____________________ daemon.

initialize

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes?

int systemd

What utility in the sysstat package measures the flow of information to and from disk devices?

iostat

What two commands below can be used to manipulate the routing table?

ip route route

Which command can be used to see processes running in the background?

jobs

Which of the following commands can be used to only show jobs that have been paused.

jobs -s

What two commands below can be used to stop a process, either by PID number or process name?

kill killall

Which of the following commands will send a process's resources to /dev/null to kill the process for process ID 1357?

kill -9 1357

​Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table:

l p

what are two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table

l and p

​Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table: (Select 2 answers) a. l b. a c. p d. v

l, p

What command below can be used to uninstall the LILO bootloader from an active partition?​

lilo -U

In order to create a hard link, what command must be used?

ln

In order to create a hard link, what command must be used? - ln - link - lk - lnk

ln

Select the file in the /proc directory that contains statistics on the performance of the processor:

loadavg

What file in the /proc directory that contains statistics on the performance of the processor?

loadavg

Which of the following commands can be used to display the current locale of a system? (Choose two.)

locale localectl

what two commands can be used to locate files on a filesystem?

locate and find

What two commands can be used to locate files on a filesystem? - locate - grep - read - find

locate, find

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

login.defs

The TCP/IP address of 127.0.0.1 is also referred to as the _________________.

loopback address

In order to send a print job to a printer using CUPS, what command must be used?

lp

Which command should be used to restrict access to printers?

lpadmin

Adding the -t option to what command below will provide a list of all printers on the system and their status?

lpstat

what command added to the -t option to will provide a list of all printers on the system and their status?

lpstat

Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)?

lsof

A government office wants to secure a few of its Linux systems so that they can only use certain USB devices. After plugging in a USB device, which of the following commands could be used to detect certain identifying information that can be used to only allow that type of USB device?

lsusb

The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.

make

What command is used to manage a software RAID configuration after installation?

mdadm

Which of the following commands can be used to create and manage a software RAID configuration after installation?

mdadm

Select the two window managers that have been used in GNOME:​

metacity ​mutter

Leonard wants to find detailed information about the Bluetooth kernel module. Which of the following commands can he use to display this information?

modinfo bluetooth

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?

modules

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?​ a. kmods b. modinfo c. mod_info d. modules

modules

Which command allows you to find out which group has a GID of 100?

more /etc/group | grep 100

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?

mount -a

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used? a. mount -f b. mount -u c. mount -o d. mount -a

mount -a

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used??

mount -a

The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.

mput filename

Which of the following is the default window manager used by the GNOME version 3 desktop environment?

mutter

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database?

newaliases

When working with Sendmail, if you modify the /etc/aliases file, you need to run the ____ command to rebuild the aliases database.

newaliases

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?

newgrp

To change the primary group temporarily to another group that is listed in the output of the groups and id command, you can use which command?

newgrp

The ____________________ can be used to affect the process priority indirectly.

nice value

Users can change their own passwords by typing passwd with ____ to specify the username.

no argument

Which of the following virsh commands will display the total amount of memory as well as the amount of free memory for a node?

nodememstats

What command can be used to see what actual time servers are being used for synchronization?

ntp_query

RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?

package dependancy

RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?

package dependency

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?​

panic

Every process has a process ID and a __________________.

parent process ID

What can be used on a Linux system to trace the lineage of each child process?​

parent process ID

The ____ PostgreSQL command-line utility backs up PostgreSQL database settings.

pg_dump

What PostgreSQL command-line utility backs up PostgreSQL database settings?

pg_dump

What is the command that can be used to send a small TCP/IP packet to another IP address and wait for a response?

ping

A network ________________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.

protocol

​What command below can be used to create a new physical volume? a. lvcreate b. pvdisk c. pvcreate d. new_pv

pvcreate

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?

pwconv

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?

pwconv

A system that uses and /etc/passwd file only can be converted to use /etc/shadow for security by using what command?

pwconv

What command can be issued to confirm what directory you are in at a command line prompt?

pwd

What option can be added to the rpm command in order to query packages?

q

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?​

quiet

If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?​ - read - write - execute - move

read, write

What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove? - rm - del - delete - remove

rm

what two commands will work recursively if specified with the -R option?

rm and cp

Which two commands can be used to modify the route table on a Linux computer? (choose two)

route ip

The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?

rsyslog.conf rsyslog.d

A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.

runlevel

Which of the following commands will show the current runlevel along with the previous runlevel? (Choose all that apply.)

runlevel

The at command is used to ________________.

schedule processes to run at a single instance in the future

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?

secure

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?

secure

Which of the following commands will count down from 10 to 1?

seq 10 -1 1

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?

service

The environment variables that are set by default and their current values can be viewed with what command?

set

To see a list of the environment variables and their current values on a system, you can use the ____ command.

set

Which of the following is a valid method of running a script named myscript.sh? (Choose two)

source myscript.sh ./myscript.sh

Which of the following are graphical remote administration technologies? (choose all that apply)

ssh-x VNC

The ____________ command can be used to start X Windows and the default window manager or desktop environment.​

startx

Any error messages generated by a command is ____.

stderr

The information that is processed by the command during execution is ____.

stdin

____ is the normal output of a command.

stdout

Most commands that are run by the shell are run in a separate ____________________, which is created by the current shell.

subshell

____ is a command that can be used to ensure that a file was received in its entirety after you download it.

sum

What section of a filesystem contains info about the filesystem in general?

superblock

What section of a filesystem contains information about the filesystem in general?

superblock

In the event that you wish to disable a swap partition, what command must be used?

swapoff

Which of the following commands will set the default runlevel of a Linux system?

systemctl set-default runlevel5.target

Which of the following commands will display a list of Systemd units sorted by the time they took to load?

systemd-analyze blame

To display a text file in reverse order, what command should be used?​ a. tee b. ​tac c. ​cat d. ​sed

tac

What command can be used to display the last five lines of a text file?

tail -5

The /etc/login.defs file is a(n) ____ file.

text

background (bg) command

the command used to run a foreground process in the background

Describe the system cron table. How is it organized, and what information may be contained within it?

the cron table includes six fields separated by space or tab characters the first 5 fields specify the times to run the command and the sixth field is the absolute pathname to the command to be executed.

The section of an inode that stores permissions is referred to as what?

the mode of the file

IP version 4 (IPv4)

the most common version of IP used on the Internet, it uses 32-bit addressing scheme organized into different classes

Which command can be used to count the number lines, words, and characters in a file?

wc

Which of the following commands will count the number of lines in a file named data.csv?

wc -l data.csv

​What two commands below can be used to modify the password expiry information and a user's default shell?

​chage, ​chsh

On Linux systems that use the traditional ​UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?

​chkconfig

​What command can be used to search for DPM package information?

​dpkg-query

What is the default target on a system with a GUI installed?​

​graphical.target

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​

​grub-mkconfig

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?​

​grub2-install

Which of the following characters can be entered at the beginning of a line in a shell script to ensure that line is recognized as a comment rather than try to execute it?

#

The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command? - $ - & - # - *

$

The contents of a certain variable in memory can be viewed using which metacharacter in combination with the echo command?

$

The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.

$PS1

When killing a background job with the kill command, the background job ID must be prefixed by what character below?

%

When killing a background job with the kill command, you must prefix the background job IDs by a(n) ____.

%

What character, when appended to a command, causes the command to be run in the background?

&

When you append a(n) ____ to a command, the command is run in a background process.

&

What character, when appended to a command, causes the command to be run in the background?

& (and command) &

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.

+

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?

+

In a file's mode, a permission that is unavailable is represented by what character?

-

Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?​ a. -o loop b. --mode l c. --option l d. --loop

--loop

Select the option that, when used with the sar command, displays swap statistics:

-B

What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?

-F

What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system? ​

-F

Select the iptables option that specifies the destination address of packets for a rule:

-d

What command can be used to change the maximum number of file handles that can be used by a program?

-d

What option should be used in conjunction with the lp command in order to specify the destination printer name?

-d

What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

-d -k

To remove a package from the system, you can use the ____ option to the rpm command.

-e

When used with the compress command, what option below can be used to compress symbolic links?

-f

What two ps options can be used to display a full list of information about each process, and a long list of information about each process?

-f -l

What option can be added to the netstat command in order to display network statistics?

-i

What option can be added to the netstat command in order to display network statistics?​

-i

Select the options to use with the cpio utility to cause the utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation:

-i -u

​What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

-k -d

Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed:

-l

The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.

-l

To display a list of at Job IDs, you can specify the ____ option to the at command.

-l

which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?

-loop

When using the cpio utility, the ____ option causes a new archive to be created.

-o

Select the option that can be used with the lpstat command to display a list of printers that are enabled:

-p

What option can be used with the lpstat command to display a list of printers that are enabled?

-p

When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames.

-p

What option can be added to the rpm command in order to query packages?

-q

Which sar command option is used to display statistics for the processor queue?

-q

What command option, when added to the rm command, is commonly referred to as the -resume option?

-r

What option can be added to the userdel command to remove the home directory of the target user?

-r

What option can be added to the userdel command to remove the home directory of the target user?

-r

What option, when added to the rm command, is commonly referred to as the -resume option?

-r

What option, when added to the rm command, is commonly referred to as the -resume option? - r - d - f - i

-r

The mfks command can be issued with what switch in order to specify a filesystem type?

-t

The mkfs command can be issued with what switch in order to specify a filesystem type? a. -o b. -f c. -c d. -t

-t

Which file is a configuration file containing passwords and password expiration information for all user accounts?

/etc/shadow

Where is the skeleton directory located on most Linux systems?

/etc/skel

The SSHD daemon is configured by editing what configuration file?

/etc/ssh/sshd_config

The sshd daemon is configured by editing what configuration file?

/etc/ssh/sshd_config

The sshd daemon is configured by editing what configuration file?​

/etc/ssh/sshd_config

Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system?

/etc/sysconfig/network-scripts/ifcfg-eth0

What file in the /proc directory contains information about a computer's CPU?​ a. ​/proc/meminfo b. ​/proc/cpuinfo c. /proc/cpu_info d. /proc/proc_info

/proc/cpuinfo

To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?

/proc/meminfo

In addition to /etc/localtime, some Linux distributions also have an /etc/timezone text file that contains a reference to the correct time zone file contained in which directory?

/usr/share/zoneinfo

You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?​ a. /var/log/boot.log b. /var/log/messages c. /var/log/startup.log d. /var/log/wtmp

/var/log/boot.log

Where are the log files for the Samba daemon located?​

/var/log/samba

The ____ zone configuration file contains a PTR record used to identify the loopback adapter.

/var/named/named.local

What zone configuration file contains a PTR record used to identify the loopback adapter?

/var/named/named.local

Directory storing the shell environment and scheduled commands.

/var/spool/at

On a Fedora based system, where are the shell environment and scheduled commands for at stored?

/var/spool/at

On a Fedora based system, where are the shell environment and scheduled commands for at stored?​

/var/spool/at

The location of user cron tables.

/var/spool/cron

Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system?

/var/spool/cron/(the user's login name)

You have a script to run on April 1 each year at 9:00am. Write the cron table entry to make this happen. The script is located in /bin and named aprilfools.

0 9 1 4 * /bin/aprilfools

A Class A network uses how many bits for the network ID, and how many bits for the host ID?

24 bits for network ID 8 bits for host ID

What well-known TCP port is utilized by the SMTP service?

25

What well-known TCP port is utilized by the SMTP service?​

25

What is the subnet mask for a Class B IP address?

255.255.0.0

What is the subnet mask for a Class C IP address?

255.255.255.0

What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?

255.255.255.255 0.0.0.0

What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?

255.255.255.255 0.0.0.0

What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size?

256-bit

What is the Advanced Encryption Standard (AES) encryption algorithm​'s largest key length size?

256-bit

Select the two numbers below that represent the number of bits needed to make an IPv4 or IPv6 IP address:

32 128

The number of bits needed to make an IPv4 and IPv6 IP address?

32 bits for an IPv4 128 bits for an IPv6

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent?

40-50

The compression algorithm used by the compress utility has an average compression ratio of ____%.

40-50

There are ____ different kill signals that the kill command can send to a certain process.

64

In a SCSI chain the highest priority SCSI device is given what SCSI ID?

7

In a SCSI chain the highest priority SCSI device is given what SCSI ID? a. 1 b. 6 c. 7 d. 15

7

When using the chmod command, the mode rwx can be represented by which number?

7

When using the chmod command, the mode rwx can be represented by which number? - 0 - 1 - 7 - 8

7

​A Class A network uses how many bits for the network ID, and how many bits for the host ID?

8 24

Each octet in an IP address represents a binary number consisting of how many bits / bytes?

8-bit

Each octet in an IP address represents a binary number consisting of how many bits/bytes?

8-bit

What hex code is associated with a Linux swap type partition?​

82

What hex code is associated with a Linux swap type partition?​ a. ​96 b. 83 c. 12 d. 82

82

What kill level signal cannot be trapped?

9

What value in the /etc/shadow file's password expiration field means the user's password never expires?

99999

IPv6 IP address are delimited by what character?

:

​At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes? a. ​:q! b. ​:! c. :exit d. :q

:q!

You can redirect a file to the standard input of a command using the ____ metacharacter.

<

Which of the following can be used for comparing values within an if statement? (Choose two.)

= -lt

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?

>

How many different kill signals can be sent by the kill command to a given process? a. 16 b. 32 c. 64 d. 128

C

How many different kill signals can be sent by the kill command to a given process? a. 16 b. 32 c. 64 d. 128

C

If no level of compression is specified, the gzip command assumes what compression level? a. 4 b. 5 c. 6 d. 7

C

If no level of compression is specified, the gzip command assumes what compression level? a. 4 b. 5 c. 6 d. 7

C

In order to download DPM packages, what command should be used below? a. yum b. apt-search c. apt-get d. dpm-grab

C

In order to send a print job to a printer using CUPS, what command must be used? a. print b. pl c. lp d. pr

C

In order to send a print job to a printer using CUPS, what command must be used? a. print b. pl c. lp d. pr

C

Most Linux distributions make use of what package manager? a. PRM b. MPR c. RPM d. RMP

C

Select the escape sequence that starts a new line when used with echo: ​a. \\ ​b. \a ​c. \n ​d. \r

C

Select the option that can be used with the lpstat command to display a list of printers that are enabled: a. -o b. -a c. -p d. -e

C

Select the option that can be used with the lpstat command to display a list of printers that are enabled: a. -o b. -a c. -p d. -e

C

Select the test statement that can be used to determine if A is numerically greater than B: a. [ A -g B ] b. [ A -ge B ] c. [ A -gt B ] d. [ A +eq B ]

C

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?​ a. 827 ​b. 1012 ​c. 514 ​d. 23

C

The System Log Daemon uses what TCP and UPD port to accept incoming requests from another System Log Daemon on a remote system? a. 827 b. 1012 c. 514 d. 23

C

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below? a.sed b. grep c. awk d. nl

C

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable? a. ls $PWD b. echo #PWD c. echo $PS1 d. ls #PS1

C

The dump/restore utility is limited to a maximum of how many different incremental backups? a. seven b. eight c. nine d. ten

C

The environment variables that are set by default and their current values can be viewed with what command? a. env b. get c. set d. setenv

C

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file? a. # b. < c. > d. |

C

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. newgroup b. groupmod c. newgrp d. groupadd

C

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. newgroup b. groupmod c. newgrp d. groupadd

C

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?​ ​a. boot-config ​b. loaderconf ​c. grubby d. ​parted

C

What command can be used to search for DPM package information? a. dpkg-search b. dpkg-info c. dpkg-query d. dpkg-list

C

What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer? a. route b. route add c. traceroute d. ip

C

A user account can be locked with the usermod command using what option? a. -U b. -u c. -l d. -L

D

A user account can be locked with the usermod command using what option? a. -U b. -u c. -l d. -L

D

Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat

D

An IPv6 IP address consists of 16-bit numbers in what numbering scheme? a. decimal b. octal c. binary d. hexadecimal

D

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. first b. second c. fifth d. sixth

D

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. first b. second c. fifth d. sixth

D

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command? a. sys-conf-kb b. system-config-kb c. sys-config-keyboard d. system-config-keyboard

D

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command? a. sys-conf-kb b. system-config-kb c. sys-config-keyboard d. system-config-keyboard

D

In order to create user accounts on a Linux system, what command should be utilized? a. uadd b. usercreate c. adduser d. useradd

D

In order to create user accounts on a Linux system, what command should be utilized? a. uadd b. usercreate c. adduser d. useradd

D

In order to download DPM packages, what command should be used below?​ a. ​apt-search b. ​yum c. ​dpm-grab d. ​apt-get

D

In order to redirect a file to the standard input of a command, what metacharacter should be used? a. > b. # c. | d. <

D

Select below the configuration file that is used to configure the BIND / DNS server:​ a. ​/etc/dns.conf b. ​/etc/bind.conf c. ​/etc/resolv.conf d. ​/etc/named.conf

D

Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed: a. -c b. -f c. -r d. -l

D

The GUI components and related software take up how much space on a typical Linux installation? a. ​1 GB ​b. 2 GB ​c. 3 GB ​d. 4 GB

D

The GUI components and related software take up how much space on a typical Linux installation? a. 1 GB b. 2 GB c. 3 GB d. 4 GB

D

The sshd daemon is configured by editing what configuration file?​ a. ​/etc/sshd.config b. ​/etc/ssh/ssh_config c. ​/etc/ssh.conf d. ​/etc/ssh/sshd_config

D

What command below can be used to uninstall the LILO bootloader from an active partition?​ ​a. lilo --remove ​b. lilo -d ​c. lilo delete ​d. lilo -U

D

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? a. install b. configure c. make install d. make

D

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? a. configure b. install c. make install d. make

D

What device file below indicates that the first ATAPI IDE tape device (nonrewinding)? a. /dev/st0 b. /dev/nst0 c. /dev/ht0 d. /dev/nht0

D

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?​ ​a. silent b. ​noerror c. ​whisper ​d. quiet

D

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd? a. wtmp b. messages c. dmesg d. secure

D

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd? a. wtmp b. messages c. dmesg d. secure

D

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons? a. -f b. -l c. -a d. -e

D

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons? a. -f b. -l c. -a d. -e

D

What option, when added to the crontab command, opens the vi editor with a user's cron table? a. -u b. -c c. -f d. -e

D

What range of ports is considered to be "well-known"?​ a. ​10023-24433 b. ​24434-65535 c. ​1024-10023 d. ​0-1023

D

When killing a background job with the kill command, the background job ID must be prefixed by what character below? a. & b. # c. $ d. %

D

When killing a background job with the kill command, the background job ID must be prefixed by what character below? a. & b. # c. $ d. %

D

When using the compress utility, each file specified for compression is renamed with what extension? a. .c b. .cmp c. .cpz d. .Z

D

Which command can be used to count the number lines, words, and characters in a file? a. pr b. nl c. tr d. wc

D

Which of the following is not one of the three main Linux commands? a. binary programs b. shell scripts c. shell functions d. device calls

D

​What yum command below can display a list of package group names? a. ​yum --list -g b. ​yum show groups c. ​yum list --groups d. ​yum grouplist

D

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?

DNS

____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet.

DNS

What are two means available to resolve a host name to the appropriate TCP/IP address? (choose two answers)

DNS /etc/hosts

A server that contains the IP addresses of DNS servers that hold top-level DNS zones.

DNS cache file

Select the SQL statement below that can be used to delete a database:

DROP DATABASE

The ____ SQL statement is used to delete a database.

DROP DATABASE

A system process that is not associated with a terminal is called a(n) ____ process.

Daemon

tracks

Data is read from physical hard drives in concentric circles known as which of the following?

____ are constructs that alter the flow of a program based on whether a command in the program completed successfully or based on a decision that the user makes given a question posed by the program.

Decision construct

C

Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?

A line within the httpd.conf configuration file.

Directive

The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.

DirectoryIndex index.html

What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document?

DirectoryIndex index.html

____ are shell variables that are typically set by the system and contain information that the system and programs access regularly.

Environment variables

Fedora 20 makes use of the XFree86 implementation of X Windows. True or False?

False

Fedora 20 makes use of the XFree86 ​implementation of X Windows.

False

Fedora 20 makes use of the XFree86 ​implementation of X Windows. True or False

False

Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully. True or False

False

If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.

False

In Linux, you are restricted to using only one type of filesystem on a system.

False

On most Linux systems, the logrotate utility is automatically scheduled to run weekly.

False

On most Linux systems, the logrotate utility is automatically scheduled to run weekly. True or False?

False

Performance problems are caused by hardware, not software.

False

Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.

False

Regular users typically have a UID less than 100.

False

T/F - Can the top command be used to change the priority of processes?

False

T/F - During the DNS lookup process, if the ISP DNS server has recently resolved the FQDN and placed the result in its local DNS cache, you receive the response immediately (called a recursive query).

False

Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.

True

SSH encrypts all traffic that passes across the network, whereas telnet does not.

True

T or F: After a process has been started, you can change its priority by using the renice command.

True

T or F: CUPS contains versions of the lpr, lpc, lpq, and lprm commands.

True

T or F: Each process can start an unlimited number of other processes.

True

T or F: If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.

True

T or F: Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond

True

T or F: When you print to a printer class, the print job is send to the first available printer in the printer class

True

T/F - After a process has been started, you can change its priority by using the renice command.

True

T/F - Aliases are shortcuts to commands stored in special variables that can be created and viewed using the alias command.

True

T/F - All DNS servers contain a DNS cache file.

True

T/F - Any command that can be executed on the command line can also be placed inside any environment file.

True

T/F - Because its primary use is to back up files in case of system failure, cpio uses absolute pathnames by default when archiving.

True

T/F - Each computer that participates in NIS belongs to an NIS domain and uses a(n) NIS map for accessing certain information rather than using the local configuration file.

True

T/F - Each process can start an unlimited number of other processes.

True

T/F - If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.

True

T/F - It is good form to read the Makefile after you run the configure script.

True

T/F - Most commands such as ls, find, and grep are binary programs that exist on the filesystem until executed.

True

T/F - Most daemon scripts accept the arguments start, stop, and restart.

True

T/F - You can use the sed command to remove unwanted lines of text.

True

The cpio command has the ability to handle long filenames and can be used to back up device files.

True

The cpio command has the ability to handle long filenames and can be used to back up device files. True or False?

True

The email command is an example of a Mail User Agent (MUA).

True

The first thing you must do after creating a user is set the password.

True

The line that configures the host name for the computer at boot time can be found in /etc/hostname.

True

The newgrp command opens a new shell even if the command fails.

True

The tar utility cannot back up device files or files with filenames longer than 255 characters.

True

The tar utility cannot back up device files or files with filenames longer than 255 characters. True or False?

True

When you print to a printer class, the print job is send to the first available printer in the printer class. True or False

True

When you print to a printer class, the print job is send to the first available printer in the printer class. True or False?

True

While a process is waiting for its parent process to release the PID, the process is said to be in a(n) zombie state. T/F

True

You can choose to use a window manager only, and not use a desktop manager.

True

You can choose to use a window manager only, and not use a desktop manager. True or False

True

You can use the sed command to remove unwanted lines of text. True or False

True

Zombie processes are also known as defunct process. True or FAlse

True

Zombie processes are also known as defunct processes. True or False?

True

​Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stop daemons after system initialization. True or False

True

Segmentation faults can sometimes be fixed by performing what two tasks?

Turning off CPU cache memory and increasing the number of memory wait states in BIOS

When using the chage command, how do you set the maximum password age?

Type 90 and press Enter.

NTP uses port ____.

UDP 123

Which of the following is responsible for starting tasks and services during boot, stopping them during shutdown, and supervising them while the system is running?

Upstart

SCSI-3 Ultra2 Wide

What SCSI type supports speeds of up to 80 MB/second?

g+r-w

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?

parent process ID

What can be used on a Linux system to trace the lineage of each child process?

#!

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?

/dev/ttyS1

What character device file represents the second serial port on a system (COM2)?

colon

What character is used to delimit most Linux configuration files?

&

What character, when appended to a command, causes the command to be run in the background?

pvcreate

What command below can be used to create a new physical volume?

grub2-install

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?

lilo -U

What command below can be used to uninstall the LILO bootloader from an active partition?

pstree

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?

rm

What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?

pwd

What command can be issued to confirm what directory you are in at a command line prompt?

fsck

What command can be used to check different kinds of filesystems on Linux for errors?

grubby

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?

cp

What command can be used to copy files?

tail -5

What command can be used to display the last five lines of a text file?

tr

What command can be used to replace characters in a file sent via Standard Input?

stat

What command is most effective at identifying different types of files?

mdadm

What command is used to manage a software RAID configuration after installation?

DEC PDP-7

What computer system was the first to run the UNIX operating system?

modules

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?

82

What hex code is associated with a Linux swap type partition?

SIGHUP

What kill signal stops a process, then restarts it with the same PID?

-e

What option, when added to the crontab command, opens the vi editor with a user's cron table?

-r

What option, when added to the rm command, is commonly referred to as the -resume option?

execute

What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?

write

What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?

superblock

What section of a filesystem contains information about the filesystem in general?

9; SIGKILL

What signal name and number function as the absolute kill signal, and when issued, forces the Linux kernel to stop executing the process by sending the process's resources to /dev/null?

Freeware

What software type is software that is distributed free of charge, but the source code is not available?

Stage1

What stage of the GRUB boot loader typically resides on the MBR / GPT?

GNU Public License

What stipulates that the source code of any software published under its license must be freely available.

virtual host

What term describes the physical hardware and the underlying operating system upon which a virtual machine runs?

PWD; SHELL

What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively?

kill; killall

What two commands below can be used to stop a process, either by PID number or process name?

/etc/profile; /etc/bashrc

What two files below are the first two BASH environment files to be executed?

@

When issuing the ls -F command, what special character indicates a linked file?

%

When killing a background job with the kill command, the background job ID must be prefixed by what character below?

device calls

Which of the following is not one of the three main types of Linux commands?

Hiring people to maintain the Linux system

Which of the following is the greatest expense for companies using Linux?

Artistic

Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?

Due to the fact that the * character can be used to match all ​characters in a filename, or all files in a directory, it is referred to as a ____________ metacharacter.

Wildcard

Which of the following is a lightweight desktop environment that uses very few system resources that a system administrator might choose to install on a Linux server instead of one of the two main desktop environments?

XFCE

How do you configure a NIC? What do you do if the NIC is not detected during installation?

You can configure a NIC by using the ifconfig (interface configuration) command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer. If the NIC is not detected during installation then we need to view the appropriate Linux drivers for the NIC that were not included in the installation media.

What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

d k

What is the name given to a process not associated with a terminal?

daemon process

Which command should you run after installing a new kernel module to update the module dependency database?

depmod

Which of the following is not one of the three main types of Linux commands?

device calls

Which of the following is not one of the three main types of Linux commands?​

device calls

What command provides the easiest method for monitoring free space on mounted filesystems?

df

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?

e

A list of all exported environment and user-defined variables in a shell can be viewed with what command below?

env

To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command.

env

A case construct must be ended by ____________________.

esac

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?​

etc/cups/cupsd.conf ​/etc/cups/printers.conf

How often are sar commands scheduled to run on both Fedora 20 and Ubuntu Server 14.04?

every ten minutes

What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?

execute

What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?​ - write - sticky bit - execute - read

execute

On most Linux systems, the logrotate utility is automatically scheduled to run weekly true or false

false

Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy.​ true or false

false

Select the command that can be used to create partitions that will be stored in an MBR after installation: - fdisk - formatdisk - partition - format

fdisk

What command that can be used to create partitions that will be stored in a MBR after installation?

fdisk

After a background process has been started, it can be moved to the foreground by using the ____ command.

fg

After a background process has been started, what command below can be used to move it to the foreground?

fg

When writing shell scripts and using an if statement to determine whether a set of code should be executed, what is the proper syntax to end the if construct? ___________

fi

Errors on a filesystem are common on most file systems. What do these errors indicate?

filesystem corruption

Errors on a filesystem are common on most filesystems. What do these errors indicate?

filesystem corruption

Any command that can take standard input and transform it into standard output is called a(n) ____________________ command.

filter

​What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?

for

In a process referred to as _________________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.

forking

In a process referred to as ____________________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.

forking

What command can be used to check different kinds of filesystems on Linux for errors? - chkdsk. - errorchk - fs_check - fsck

fsck

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?

g+r-w

what two commands can be used to edit a GPT based hard disk's partitions?

gdisk and parted

​What two commands below can be used to edit a GPT based hard disk's partitions? (Select 2 answers) - gdisk - parted - fdisk - gtpedit

gdisk, parted

Which of the following commands should you use to specify that you want to use Git for version tracking on them?

git add

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?​

grub2-install

An IPv6 IP address consists of 16-bit numbers in what numbering scheme?

hexadecimal

You can view or set the host name for a Linux computer using the _________________ command.

hostname

What command can be used to view and modify the date and time within the BIOS?

hwclock

Which of the following can be used to compare the hardware clock to the system clock, writing a new result to a new line every 10 seconds?

hwclock -c

Which of the following is a type of software that allows a piece of hardware to host multiple operating systems?

hypervisor

What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk? (Select two answers.) a. ​iSCSI initiator b. ​iSCSI host c. ​iSCSI slave d. ​iSCSI target

iSCSI initiaitor, iSCSI target

Which of the following commands can be used to convert files between different character encodings?

iconv

Which of the following constructs can be used in a shell script to determine whether two values are equal and if so run another set of commands?

if

Which command would be used to activate the NIC aliased as eth0?

ifup eth0

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?

image=

What two daemons can be used to start and manage connections for smaller network daemons such as telnet and rlogin?

inetd xinetd

What two daemons can be used to start and manage connections for smaller network daemons such as telnet and rlogin?

inetd xinetd

If the chage command is used without options, it is in ____ mode.

interactive?

What file in the /proc directory contains a list of memory address ranges reserved for device use?

ioports

What file in the /proc directory contains a list of memory address ranges reserved for device use? a. ioports b. meminfo c. iomem d. misc

ioports

What two commands below can be used to manipulate the routing table?​

ip route route

What two commands can be used to manipulate the routing table?

ip route route

A runaway process that is faulty and consuming mass amounts of system resources ________________________.

is a rogue process

Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called?

jabbering

In Fedora 20, what journaling database system has replaced the logging system used to record the messages normally stored within the boot.log, messages, and syslog files?

journald

​In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?

journald

​In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called? a. journald b. systemd c. ​logd d. ​messaged

journald

The _____ facility used by the System Log Daemon specifies message from the Linux kernel.

kern

What command can be used to view what shared libraries are required by a certain program?

ldd

In order to create and manage KVM or Qemu virtual machines, a Linux system must have which of the following installed?

libvert

Select the file in the /proc directory that contains statistics on the performance of the processor: a. kcore b. loadavg c. cpuinfo d. modules

loadavg

Which of the following commands will show a number of environment variables that start with LC_?

locale

Select the command below that utilizes a premade database that contains a list of all the files on a system:

locate

Select the command below that utilizes a premade database that contains a list of all the files on a system: - locate - search - find - id

locate

What command utilizes a pre-made database that contains a list of all the files on a system?

locate

What two commands below can be used to locate files on a filesystem?

locate find

Adding the t option to what command below will provide a list of all printers on the system and their status?

lpstat

Which of the following commands can be used to display general hardware information for the entire system?

lshw

what are the commands that can be used to extend a volume group and logical volume respectively.

lvextend and vgextend

​Select the commands that can be used to extend a volume group and logical volume respectively: (Select 2 answers) a. lvextend b. vgextend c. lvm_extend d. pgextend

lvextend, vgextend

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?

make

____ is a command that can be used to copy files to the appropriate location on the filesystem.

make install

What option can be used in the journal configuration file to specify a file size limit to the event log?

maxuse

What command is used to manage a software RAID configuration after installation?​ a. ​mdraid b. ​vgadm c. ​mdadm d. ​pgadm

mdadm

The subdirectory newdir does not currently exist in the current directory that you are in. Which of the following commands will create a new directory named newdir and then change into that directory? (Choose two.)

mkdir newdir && cd newdir mkdir newdir; cd newdir

Select the command that can be used to check an ext2, ext3, or ext4 filesystem:​ a. mke2fs b. ext2fsck c. fdisk d. e2fsck

mke2fs

What command that can be used to check an ext2, ext3, or ext4 filesystem?

mke2fs

Which of the following commands will generate a new initramfs?

mkinitrd dracut

​Select the two commands below that can be used to prepare a swap partition and then enable it for use:

mkswap ​swapon

what are two commands that van be used to prepare a swap partition and then enable it for use?

mkswap and swapon

​Select the two commands below that can be used to prepare a swap partition and then enable it for use: (Select 2 answers) a. swapit b. mkswap c. ​swapon d. mkfs.swap

mkswap, swapon

What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.

mput filename

In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?

net.ipv4.ip_forward

In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?​

net.ipv4.ip_forward

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?

newgrp

The ______________ can be used to affect the process priority indirectly.

nice value

The dump/restore utility is limited to a maximum of how many different incremental backups?

nine

Which of the following commands will display the output of a file while also displaying a line number at the left side of each line for the /etc/passwd file?

nl /etc/passwd

Which command can be used to see what network services are running on your network?

nmap

Running background processes using what command allows you to exit your command-line shell without ending any background processes?

nohup

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (choose all that apply)

nslookup hostname dig hostname resolve hostname

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?

panic

What can be used on a Linux system to trace the lineage of each child process?

parent process ID

Select the command that can be used to send a small TCP/IP packet to another IP address and await a response:

ping

Which of the following commands can be used to terminate a process by the process name?

pkill

The daemons associated with network services listen for network traffic associated with a particular _____________________.

port

When a user creates a file or directory, that user's name and ____________________ becomes the owner and group owner of the file, respectively.

primary group

A set of information that is sent to a printer at the same time is called a(n) _____.

print job

A(n) ____________refers to a program that is running in memory and on the CPU.

process

In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.

process state

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?

process state

Which command when entered without argument is used to display a list of processes running in the current shell?

ps

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?

pstree

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?​

pstree

What command is used to display the lineage of a process by tracing its PPIDs until the init daemon?

pstree

What command below can be used to create a new physical volume?

pvcreate

What command will create a new physical volume?

pvcreate

Which of the following characters, when pressed while the top program is running, will allow you to change the niceness of a process?

r

The ____________________ command takes user input from stdin and places it in a variable specified by an argument.

read

If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?​

read write

Which of the following can be included in a shell script to ask the user to type in a password and then store it in the variable named $password?

read -s -p "Please enter the password: " password

What permissions are required to execute a shell script in a manner similar to any other executable program on the system?

read and execute

To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -r option

recursive

Which of the following commands will most likely increase the chance of a process receiving more time slices?

renice -12

What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?

rm

Processes that have encountered an error during execution and continuously uses up system resources are referred to as ________________ processes.

rogue

Processes that have encountered an error during execution and continuously uses up system resources are referred to as ____________________ processes.

rogue

In what filesystem are most of the operating system files contained?

root

In what filesystem are most of the operating system files contained? a. boot b. data c. root d. mnt

root

What devices are used to transfer information from one network to another?

routers

An RPM package can be converted to a cpio archive using what command?

rpm2cpio

The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?

rsyslog.conf rsyslog.d

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

segmentation fault

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred? a. page fault b. IRQ fault c. segmentation fault d. RAM failure

segmentation fault

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?

sixth

Which of the following commands will display the contents of the /etc/passwd file in alphanumerical order?

sort /etc/passwd

What file contains the DSA public key in the /etc/ssh directory?

ssh_host_dsa_key. pub

In the event that you wish to disable a swap partition, what command must be used?​ a. umount b. ​swapoff c. ​swapdrop d. ​delete_swap

swapoff

To create a(n) ____________________ link, you use the -s option to the ln command.

symbolic

Which of the following is a virtual filesystem that is made up of virtual files that a Linux operating system is able to export information to about kernel sub-systems, hardware devices, and device drivers to make it easy for users to access the information?

sysfs

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?

system-config-keyboard

​When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?

systemctl

Files with what two file extensions are commonly known as tarballs?​

tar.gz ​.tgz

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called? a. SCSI controller b. target ID c. SCSI number d. device ID

target ID

____ is a filter command that takes information from standard input and sends that information to a file, as well as to standard output.

tee

In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?​ a. zfs list​ b. zpool list c. ​zpool get all d. zfs get all

zfs get all

An alias has previously been created named showauth. Which of the following commands can be used to get rid of that alias?

unalias showauth

How many times will the following loop execute as part of a script: #!/bin/bash COUNTER=0 while [ $COUNTER -lt 7 ] do echo "hello world" done

until ctrl-c is used to terminate it

In order to create user account on a Linux system, what command should be utilized?

useradd

In order to create user accounts on a Linux system, what command should be utilized?

useradd

Which command is used to create user accounts and update default information for new users?

useradd

What two commands can be used to show information about physical volumes and logical volumes respectively?

vgdisplay and lvdisplay

What two commands can be used to show information about physical volumes and logical volumes respectively?​ (Select 2 answers) a. showvg b. showlv c. lvdisplay d. vgdisplay

vgdisplay, lvdisplay

In order to quickly create an empty file, what command can be used?

vim file1

In order to quickly create an empty file, what command can be used?​

vim file1

in order to list all configuration parameters that can be modified for a sub-filesystem, what command should be issued?

zfs get all

Which of the following states describe a process that is waiting for a parent process to release its PID?

zombie

On a system using the KVM hypervisor, which of the following modules would you expect to see as part of the output of the lsmod command on a guest Linux virtual machine?

virtio

in the fdisk interactive mode, what letter can be used to save partition table and exit?

w

​In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit? - w - s - q - d

w

Which of the following commands can be used to schedule very frequent recurring tasks, such as running once every minute?

watch

The ____ command counts the number of lines, words, and characters in a file.

wc

FTP

what service provides a method for the efficient transfer of files over the Internet?

The ____________________ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.

which command

What permission grants a user the ability to open, read, and edit the contents of a file?

write

​What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?

write

​What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file? - read - write - sticky bit - execute

write

If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?

write and read

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?​

wtmp ​lastlog

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?

wtmp lastlog

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?

wtmp lastlog

Using the syntax below, what command will create directories named one, two, and three? ​ echo one two three | ___________ mkdir

xargs

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?

xvidtune

If X Windows fails to start, what command can be used to troubleshoot the issue?

xwininfo

How can you bypass the wait function and send a user process to the background?

you can use the Ctrl+z key combination and the bg command

What yum command below can display a list of package group names?

yum grouplist

The ____ command can be used to display the contents of a compressed file.

zcat

What command can be used to display the contents of a file that was compressed with the compress utility?

zcat

The root UID is ____.

zero

In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?​

zfs get all

The following entry is in a cron table. When will the myscript script run? (be very specific)

45 23 * * 6 /bin/myscript

The GUI components and related software take up how much space on a typical Linux installation?

4GB

select the mode below that corresponds to setting r-x

5

​Select the mode below that corresponds to setting r-x:

5

​Select the mode below that corresponds to setting r-x: - 2 - 5 - 1 - 6

5

What is the default print job priority for all print jobs created by the lp command?

50

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?

514

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?

514

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?​

514

If no level of compression is specified, the gzip command assumes the number ____.

6

If no level of compression is specified, the gzip command assumes what compression level?

6

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?

60%-70%

The average compression ratio for gzip is ____%.

60-70

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?

60-70 percent

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?

60-70%

The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below?

631

The CUPS Web administration tool can be accessed via web browser by accessing what TCP port?

631

​The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below?

631

How many different kill signals can be sent by the kill command to a given process?

64

How many different kill signals can be sent by the kill command to give a process?

64

IPv6 IP addresses are delimited by what character below?

:

:q!

At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes

0

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwdconv b. pwconv c. passwd d. pwdcv

B

The ____________________ environment variable contains a list of directories to search for executable programs.

PATH

A process's identifier that allows the kernel to identify it uniquely.

PID

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off? a. 0 b. 1 c. 6 d. 7

A

IPv6 IP addresses are delimited by what character below? a. : b. . c. , d. ;

A

In order to display a list of at job IDs, what option can be specified to the at command? a. -l b. -u c. -a d. -d

A

In order to display a list of at job IDs, what option can be specified to the at command? a. -l b. -u c. -a d. -d

A

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.​ ​a. (hd0,0) ​b. (hd1,1) ​c. (hda,0) ​d. (hda,1)

A

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel? a. image= b. default= c. install= d. root=

A

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel? a. image= b. default= c. install= d. root=

A

What number represents the stdin file descriptor? Correct a. 0 b. 1 c. 2 d. 3

A

Client computers can retrieve e-mail from e-mail servers via ____ or ____.

POP; IMAP

What option can be added to the rpm command in order to query packages?​ a. ​-q b. ​-v c. ​-h d. ​-i

A

What option can be added to the rpm command to update a specified package only if an older version exits on the system? a. -F b. -U c. -z d. -c

A

When a computer first initializes, the system BIOS performs a(n) ____________________.

POST

Identifies the process that started another process.

PPID

What can be used on a Linux system to trace the lineage of each child process?

PPID - Parent Process ID

What option can be added to the userdel command to remove the home directory of the target user? a. -r b. -d c. -R d. -x

A

What option can be added to the userdel command to remove the home directory of the target user? a. -r b. -d c. -R d. -x

A

A set of information that is sent to a printer at the same time is called a(n) ____________________.

Print Job

What SCSI type supports speeds of up to 80 MB/second? a. SCSI-3 Ultra b. SCSI-2 Wide c. SCSI-3 Ultra2 Wide d. SCSI-3 Ultra3 Wide

SCSI-3 Ultra2 Wide

du

Select the command below that shows the size of a directory and its contents in kilobytes:

chroot

Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment

mke2fs

Select the command that can be used to check an ext2, ext3, or ext4 filesystem:

fdisk

Select the command that can be used to create partitions that will be stored in an MBR after installation:

\f

Select the escape sequence that is used for a form feed:

\n

Select the escape sequence that starts a new line when used with echo:

loadavg

Select the file in the /proc directory that contains statistics on the performance of the processor

|

Select the metacharacter that can be used to send the standard output of one command to another command as standard input:

5

Select the mode below that corresponds to setting r-x:

*

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.

The ____ field in a cron table contains the absolute pathname to the command to be executed.

Sixth

live media image

Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?

What stage of the GRUB boot loader typically resides on the MBR / GPT?

Stage 1

What stage of the GRUB boot loader typically resides on the MBR / GPT?

Stage1

Which of the following accessibility features simulates simultaneous key presses when two keys are pressed in sequence?

Sticky Keys

___________________ is the process in which a single large network is subdivided into several smaller network to control traffic flow and improve manageability.

Subnetting

What option can be used in the journald configuration file to specify a file size limit to the event log?​ ​a. SystemMaxUse ​b. Max_file_size ​c. Journal_Limit ​d. SizeLimit

A

What number indicates the lowest kernel priority (PRI) of a process possible?​

127

Most Parallel SCSI controllers are capable of supporting up to how many devices? a. 12 b. 13 c. 14 d. 15

15

NetBIOS names can be up to ____ characters long.

15

What is the maximum number of characters that can be used in a NetBIOS name?

15

In Linux, what runlevel is also known as the multiuser mode?

2

The file descriptor stderr is represented by the number ____.

2

What number represents the stderr file descriptor?

2

Which of the following represents stderr at the command line when used for redirection?

2

Which of the following port numbers is associated with telnet?

23

​A Class A network uses how many bits for the network ID, and how many bits for the host ID?

24 8

____ are back-up copies of files and directories.

Archives

What is the subnet mask for a Class C IP address?

255.255.0.0

_____________________is a mathematical operation that compares two binary digits and gives a result of 1 or 0. If both binary digits being compared have a value of 1, the result is 1. If one digit is 0 and the other is 1, or if both digits are 0, the result is 0.

ANDing

15

Most Parallel SCSI controllers are capable of supporting up to how many devices?

A protocol that allows computers to share files transparently.

Network File System (NFS)

You can perform up to ____ different incremental backups using the dump/restore utility.

Nine

chkconfig

On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?

/var/spool/at

On a Fedora based system, where are the shell environment and scheduled commands for at stored?

A(n) ____________________ refers to a program that is running in memory and on the CPU.

Process

In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.

Process state

An executable file on the hard disk that can be run when you execute it.

Program

Network Address Translation (NAT)

Proxy servers keep track of the information passed to each client by maintaining what type of table?

Which Windows program is often used to connect to a Linux server via SSH?

Putty

The K desktop environment utilizes what window manager and toolkit below?​

Qt toolkit kwin

​What RAID level is commonly referred to as disk striping with parity? a. RAID4 b. RAID0 c. ​RAID5 d. RAID1

RAID 5

set

The environment variables that are set by default and their current values can be viewed with what command?

127

The first software RAID volume on a system will use a multiple disk device file that starts with what number?

Firewall

The iptables software on Linux is an example of what kind of software?

False

The killall command uses the PID to kill a process.

-t

The mkfs command can be issued with what switch in order to specify a filesystem type?

Total cost of ownership (TCO)

The overall cost of using a particular operating system is known as?

In the process state column, what does an "R" indicate?

The process is currently running on the processor.

​In the process state column, what does an "R" indicate?

The process is currently running on the processor.

When viewing the output of the ps ax​ command, what does a < symbol in the STAT column indicate for a process?

The process is high priority.

edquota

The quotas for certain users can be edited by using which command?

the mode of the file

The section of an inode that stores permissions is referred to as what?

>

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?

A programming language used to store and access data in databases.

SQL

In order to redirect a file to the standard input of a command, what metacharacter should be used?

"<"

The ____ ftp utility command runs a shell on the local computer

!

What FTP command runs a shell on the local computer?

!

Which character in the /etc/shadow file's encrypted password field means no password has been set for this user?

!

​What operator below is known as the NOT operator?

!

Select the options to use with the cpio utility to cause the utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation:

-u -i

The ____ option can be used with the tar command to extract a specified archive.

-x

What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?

-z -Z

dd

. In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted?

200 MB

. What is the recommended size for the /home directory?

When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.

.Z

When using the compress utility, each file specified for compression is renamed with what extension?

.Z

The filename extension given to files compressed with bzip2 is ____.

.bz2

Which of the following files can you add filenames to so that the git add * command will not stage them?

.gitignore

Files with what two file extensions are commonly known as tarballs?

.tar.gz .tgz

The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?

/boot

The filesystem Hierarchy Standard specifies what directory as containing the Linux Kernel and the boot loader configuration files?

/boot

Under what directory is the Linux kernel stored?

/boot

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

/etc/cups/printers.conf

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?

/etc/cups/printers.conf ​/etc/cups/cupsd.conf

The _________________ file often contains a single uncommented line that configures the default runlevel for a system.​

/etc/inittab

Which of the following files is where the default runlevel is set on some Linux systems?

/etc/inittab

Which of the following files is a binary file that contains the rules for calculating the time based on your time zone relative to epoch time?

/etc/localtime

Select below the configuration file that is used to configure the BIND / DNS server:

/etc/named.conf

Select below the configuration file that is used to configure the BIND / DNS server:​

/etc/named.conf

The configuration file(s) that is/are used to configure the BIND/DNS server:

/etc/named.conf

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

Which file contains user account information?

/etc/passwd

The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.

/etc/profile

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?

/etc/profile

Match the file with the order in which the BASH shell environment files are read: First Second Third Fourth

/etc/profile /etc/profile.d/* /etc/bashrc ~/.bashrc

Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC?

/etc/resolv.conf

1. A series of four 8-bit numbers that represent a computer on a network 2. The TCP/IP communication destined for a certain group of computers 3. A portion of an IP address that represents eight binary bits. 4. The most common version of IP used on the Internet. It uses a 32-bit addressing scheme organized into different classes 5. A notation that is often used to represent an IP address and its subnet mask 6. A user-friendly name assigned to a computer. 7. A table of information used to indicate which networks are connected to network interfaces. 8. A set of rules of communication used between computers on a network. 9. The portion of an IPv6 address that refers to a unique computer. It is analogous to the host portion of an IPv4 address 10. The TCP/IP communication destined for all computers on a network

1. Internet Protocol (IP) address 2. multicast 3. octet 4. IP version 4 (IPv4) 5. classless interdomain routing (CIDR) notation 6. host name 7. route table 8. protocol 9. link local 10. broadcast

1. A calculated value that is unique to a file's size and contents. 2. The amount of compression that occurred during compression algorithm. 3. A utility that can be used to manage DPM packages using a graphical interface. 4. The process whereby files are copied to an archive. 5. A group of RPM packages that are commonly installed to provide a specific function on the system. 6. A command used to view the contents of an archive created with compress or gzip to Standard Output in a page-by-page fashion. 7. A gzip-compressed tar archive. 8. A command used to decompress files compressed by the gzip command. 9. A command used to extract archives created with the dump command. 10. A command used to decompress files compressed by the bzip2 command

1. checksum 2. compression ratio 3. Aptitude 4. system backup 5. package group 6. zmore command 7. tarball 8. gunzip command 9. restore command 10. bunzip2 command

1. The command used to change the GECOS for a user. 2. The area of the system from which information is gathered when logging system events 3. The command used to remove print jobs from the print queue in the CUPS print system 4. A unique number assigned to each user account 5. A group of CUPS printers that are treated as a single unit for the purposes of printing and management. 6. The command used to modify the name or GID of a group on the system. 7. the process of accepting a print job into a print queue. 8. The daemon responsible for printing in the CUPS printing system. 9. The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user. 10. The act of verifying a user's identity by comparing a user name and password to a system database (/etc/passwd and /etc/shadow)

1. chfn 2. facility 3. cancel 4. User Identifier (UID) 5. printer class 6. groupmod 7. spooling 8. CUPS daemon 9. primary group 10. authentication

1. A Linux system process that provides a system service. ​2. The default window manager for the GNOME Desktop Environment in Fedora 13 3. A UNIX SysV term that defines a certain type and number of daemons on a Linux system.​ ​4. The component of X Windows that draws graphics to windows on the terminal screen. ​5. A UNIX standard that is used to provide the structure of the system initialization process on Linux systems. ​6. A recent version of the UNIX SysV system initialization process used on modern Linux distributions. ​7. A Systemd term that is used to describe the number and type of daemons running on a Linux system. It is functionally equivalent to the UNIX SysV term runlevel . 8. The component of X Windows that requests graphics to be drawn from the X server and displays them on the terminal screen. 9. The partition searched for an operating system after the MBR/GPT.​ ​10. A relatively new software framework used on Linux systems that provides a system initialization process and system management functions.

1. daemon 2. mutter window manager 3. runlevel​?? 4. X server 5. UNIX Sys V​ 6. upstart 7. target unit​ 8. X client 9. active partition 10.Systemd

1. Command option used to remove a specified member from the group account. 2. Command option used to specify the user's default login shell. 3. Command option used to allow assignment of a duplicate GID. 4. Command option used to change the user's login name. 5. Command option used to force the GID to what's entered at the command line. 6. Command option used to unlock specific user accounts. 7. Command option used to add a home directory for a new user. 8. Command option used to display all password expiration information for the specified user account. 9. Command option used to change the number of days the password is valid for the specified user account.

1. groupmod -R 2. useradd -s 3. groupadd -o 4. usermod -l name 5. groupadd -g 6. usermod -U 7. useradd -m 8. chage -l 9. chage -m

By default, the shell on a Linux system limits the number of filehandles a program can have open to what value?

1024

In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?

1024

In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders? a. 256 b. 512 c. 1024 d. 2048

1024

The first software RAID volume on a system will​ use a multiple disk device file that starts with what number? a. 254 b. ​127 c. 128 d. 255

127

You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file.

>

Which of the following will take output from a command and append it to the end of a file?

>>

When issuing the ls -F command, what special character indicates a linked file?

@

How can you specify the intended DNS server to query with the dig command?

@server

A list of all exported environment and user-defined variables in a shell can be viewed with what command below? a. env b. set c. setenv d. getenv

A

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. process state b. process flag c. process priority d. PID

A

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. process state b. process flag c. process priority d. PID

A

Most Linux distributions make use of what package manager? a. RPM b. PRM c. MPR d. RMP

A

On Linux, the root user always has a UID of what number? a. 0 b. q c. 23 d. 500

A

On Linux, the root user always has a UID of what number?​ ​a. 0 ​b. 1 ​c. 23 ​d. 500

A

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate? a. xvidtune b. xvideotune c. xtune d. vidtune

A

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate? a. xvidtune b. xvideotune c. xtune d. vidtune

A

RPM package that require other RPM packages to be installed on a system prior to being installed creates a relationship known as? a. package dependancy b. recursing package c. branching package d. family package

A

What character, when appended to a command, causes the command to be run in the background? a. & b. $ c. # d. %

A

What character, when appended to a command, causes the command to be run in the background? a. & b. $ c. # d. %

A

What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces? a. ifconfig b. ipconf c. ipconfig d. ifconf

A

What command can be used to display the contents of a file that was compressed with the compress utility? a. zcat b. ccat c. cat d. acat

A

What command can be used to replace characters in a file sent via Standard Input? a. tr b. rt c. ts d. st

A

What options can be used in the journald configuration file to specify a file size limit to the event log a. SystemMaxUse b. Max_file_size c. Journal_Limit d. SizeLimit

A

What stage of the GRUB boot loader typically resides on the MBR / GPT? a. Stage1 b. Stage1.5 c. Stage2 d. Stage2.5

A

What stage of the GRUB boot loader typically resides on the MBR/GPT? a. Stage 1 b. Stage 1.5 c. Stage 2 d. Stage 2.5

A

When used with the compress command, what option below can be used to compress symbolic links? a. -f b. -r c. -c d. -v

A

When used with the compress command, what option below can be used to compress symbolic links? a. -f b. -c c. -v d. -r

A

When used with the uncompress command, what option displays the contents of the compress file to Standard Output? a. -c b. -r c. -v d. -f

A

When used with the uncompress command, what option displays the contents of the compress files to Standard Output? a. -c b. -v c. -f d. -r

A

When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process? a. The process is high priority b. The process is exiting c. The process is accepting redirected input from a terminal. d. The process is currently active on the processor.

A

When viewing the output of the ps ax​ command, what does a < symbol in the STAT column indicate for a process? ​a. The process is high priority. ​b. The process is exiting. ​c. The process is accepting redirected input from a terminal. ​d. The process is currently active on the processor.

A

Where are the log files for the Samba daemon located?​ a. ​/var/log/samba b. ​/var/run/samba/log c. ​/var/log/access.log d. ​/var/log/Samba/log

A

Where is the skeleton directory located on most Linux systems? a. /etc/skel b. /var/skel c. /etc/skeleton d. /var/skeleton

A

Select the two escape sequences that represent a horizontal tab and a vertical tab, respectively:​ Multiple Answer ​a. \V ​b. \t ​c. \v ​d. \b

A and B

What two files below are the first two BASH environment files to be executed?​ Multiple Answer ​a. /etc/profile ​b. /etc/bashrc ​c. ˜/.bashrc d. ​˜/.bash_profile

A and B

The K desktop environment utilizes what window manager and toolkit below?​ Multiple Answer ​a. kwin ​b. mutter ​c. Qt toolkit ​d. GTK+ toolkit

A and C

Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded:​ Multiple Answer ​a. append= ​b. map= ​c. initrd= d. ​boot=

A and D

What two window managers is the Compiz Fusion window manager based upon?​ Multiple Answer ​a. compiz ​b. sawfish c. ​fvwm d. beryl​

A and D

cal

A calendar for the current month can be shown on the command line by issuing which command?

Describe what a subnet mask is, and explain why it is used. The, detail how it is used to determine the network ID of an IP address.

A subnet mask is the 8-bit number used to determine the network and host portions of an IP address. It is used to divide an IP address into two parts that identify the host (computer), and the other identifies the (network) to which it belongs to. A subnet mask is a 32-bit number used to differentiate the network component of an IP address by dividing the IP address into a network address and host address. It does so with bit arithmetic whereby a network address is but multiplied by the subnet mask revealing the underlying subnetwork. They are used to design subnetworks, or subnets that connect local networks, by determining both the number and size of subnets where the size of a subnet is the number of hosts that can be addressed.

fg

After a background process has been started, what command below can be used to move it to the foreground?

True

After a process has been started, you can change its priority by using the renice command.

exit

After a shell is no longer needed, what command can be given to exit the shell?

shell

After logging into a terminal, a user will receive an interface known as which option below?

grub-mkconfig

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?

tarball

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:

Which of the following are stand-alone daemons? (choose all that apply)

Apache (httpd) DNS (named)

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwdconv b. pwconv c. passwd d. pwdcv

B

An RPM package can be converted to a cpio archive using what command? a. cpioconv b. rpm2cpio c. rpmconv d. conv_arch

B

Each octet in an IP address represents a binary number consisting of how many bits / bytes? a. 4-bit b. 8-bit c. 4-byte d. 8-byte

B

How many DNS servers can be configured in the /etc/resolv.conf file? a. two b. three c. four d. five

B

In Fedora 20, where are user configured settings for Xorg stored? a. /etc/X11/xorg.conf b. /etc/X11/xorg.conf.d/ c. /etc/inittab d. /etc/X11.conf

B

In Fedora 20, where are user configured settings for Xorg stored?​ ​a. /etc/X11/xorg.conf ​b. /etc/X11/xorg.conf.d/ ​c. /etc/inittab d. ​/etc/X11.conf

B

In Linux, what runlevel is also known as the multiuser mode? a. 1 b. 2 c. 3 d. 4

B

In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?​ a. ​iproute.ipv4 b. ​net.ipv4.ip_forward c. ​ipv4.routing d. net.routing.enable​

B

On Linux systems that use the traditional ​UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in? a. systemctl​ ​b. chkconfig ​c. autoservice ​d. run-daemon

B

On a Fedora based system, where are the shell environment and scheduled commands for at stored? a. /var/spool/cron/atjobs b. /var/spool/at c. /var/run/at d. /var/run/cron/at

B

On a Fedora based system, where are the shell environment and scheduled commands for at stored?​ ​a. /var/spool/cron/atjobs b. ​/var/spool/at ​c. /var/run/at d. /var/run/cron/at​

B

Processes are started with what nice value by default? a. -20 b. 0 c. 1 d. 19

B

Processes are started with what nice value by default? a. -20 b. 0 c. 1 d. 19

B

Select the escape sequence that is used for a form feed: \n b. \f /f /n

B

Select the metacharacter that can be used to send the standard output of one command to another command as standard input: a. < b. | c. > d. #

B

Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed: a. -r b. -l c. -f d. -c

B

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent? a. 30-40 b. 40-50 c. 50-60 d. 60-70

B

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent? a. 30-40 b. 40-50 c. 50-60 d. 60-70

B

The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below? a. 780 b. 631 c. 4586 d. 8080

B

The GUI components and related software take up how much space on a typical Linux installation? a. 1 GB b. 2 GB c. 3 GB d. 4 GB

B

The process state column, what does an "R" indicate? a. The indicate process is being restarted because it received a SIGHUP kill signal. b. The process is currently running on the processor. c. The process is reading from the local hard disk. d. The process is recovering from a fatal error, and may potentially become a zombie.

B

Under what directory is the Linux kernel stored? a. / b. /boot c. /root d. /krnl

B

Under what directory is the Linux kernel stored? a. / b. /boot c. /root d. /krnl

B

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database? a. info b. alert c. debug d. panic

B

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database? a. info b. alert c. debug d. panic

B

What can be used on a Linux system to trace the lineage of each child process? a. process ID b. parent process ID c. execution order ID d. process fork ID

B

What can be used on a Linux system to trace the lineage of each child process?​ ​a. process ID b. ​parent process ID ​c. execution order ID ​d. process fork ID

B

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script? ​a. @! ​b. #! ​c. // ​d. ->

B

What character is used to delimit most Linux configuration files? a. tab b. colon c. space d. semicolon

B

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted? a. grub-install b. grub2-install c. install_grub d. install_grub2

B

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?​ ​a. grub-install ​b. grub2-install ​c. install_grub ​d. install_grub2

B

What command can be used to display the contents of a file that was compressed with the compress utility? a. acat b. zcat c. cat d. ccat

B

What device file below indicates the first ATAPI IDE tape device (nonrewinding)?​ a. ​/dev/st0 b. ​/dev/nht0 c. ​/dev/nst0 d. ​/dev/ht0

B

What file controls the default runlevel using Systemd? a. /etc/inittab b. /etc/systemd/system/default.target c. /etc/systemd/inittab.target d. /etc/systemd.comf

B

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users? a. alert b. panic c. crit d. error

B

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? a. SIGINT b. SIGQUIT c. SIGKILL d. SIGTERM

B

​In the process state column, what does an "R" indicate? ​a. The indicated process is being restarted because it resceived a SIGHUP kill signal. b. ​The process is currently running on the processor. ​c. The process is reading from the local hard disk. ​d. The process is recovering from a fatal error, and may potentially become a zombie.

B

​The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below? a. 780​ ​b. 631 ​c. 4586 ​d. 8080

B

​What operator below is known as the NOT operator? ​a. -o ​b. -a ​c. ! ​d. %

B

In an if construct, what statements are optional?​ Multiple Answer ​a. fi ​b. elif ​c. else ​d. then

B and C

What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?​ Multiple Answers ​a. secure ​b. wtmp ​c. lastlog ​d. xferlog

B and C

The GNOME 3 desktop environment utilizes what window manager and toolkit below? Multiple Answer ​a. kwin ​b. mutter ​c. Qt toolkit ​d. GTK+ toolkit

B and D

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?​ Multiple Answers a. SIGHUP​ ​b. SIGINT ​c. 1 ​d. 2

B and D

​What two commands below can be used to modify the password expiry information and a user's default shell? Multiple Answers ​a. chexp ​b. chage ​c. shellmod ​d. chsh

B and D

____ is burning software that comes with Red Hat Fedora Core 2.

Brasero Disc Burner

After a background has been started, what command below can be used to move it to the foreground? a. b2f b. fgd c. fg d. fgnd

C

After a background process has been started, what command below can be used to move it to the foreground? a. b2f b. fgd c. fg d. fgnd

C

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config file? a. grub2-install b. gruv-config c. grub-mkconfig d. grub-compile

C

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​ ​a. grub2-install ​b. grub-config ​c. grub-mkconfig d. ​grub-compile

C

An RPM package can be converted to a cpio archive using what command? a. ​conv_arch b. ​rpmconv c. ​rpm2cpio d. ​cpioconv

C

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available a. system.conf b. local.setup c. login.defs d. user.defs

C

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH? a. ˜/.bash_profile b. ˜/.bash_login c. /etc/profile d. ˜/.profile

C

What is the Advanced Encryption Standard (AES) encryption algorithm​'s largest key length size? a. ​192-bit b. ​64-bit c. ​256-bit d. ​128-bit

C

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm? a. 40%-50% b. 50%-60% c. 60%-70% d. 70%-80%

C

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm? a. 40%-50% b. 50%-60% c. 60%-70% d. 70%-80%

C

What is the default print job priority for all print jobs created by the lp command? a. -50 b. 0 c. 50 d. 100

C

What is the default print job priority for all print jobs created by the lp command? a. -50 b. 0 c. 50 d. 100

C

What is the default target on a system with a GUI installed? a. multi-user.target b. single-user.target c. graphical.target d. gui.target

C

What is the default target on a system with a GUI installed?​ ​a. multi-user.target ​b. single-user.target ​c. graphical.target d. ​gui.target

C

What is the most commonly used LAN protocol? a. DLC b. UDP/IP c. TCP/IP d. IPX/SPX

C

What is the subnet mask for a Class C IP address? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

C

What kill signal stops a process, then restarts it with the same PID? a. SIGINT b. SIGQUIT c. SIGHUP d. SIGTERM

C

What kill signal stops a process, then restarts it with the same PID? a. SIGINT b. SIGQUIT c. SIGHUP d.SIGTERM

C

What number represents the stderr file descriptor? a. 0 b. 1 c. 2 d. 3

C

What option can be used with ssh to enable tunneling of X Windows information?​ a. ​-L b. ​-f c. ​-X d. ​-x

C

What option should be used in conjunction with the lp command in order to specify the destination printer name? a. -n b. -p c. -d d. -l

C

What tool below was designed as a secure remote access utility that encrypts information that passes across the network? a. Virtual Network Computing (VNC) b. Telnet c. Secure Shell (SSH) d. rlogin

C

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory? a. daemon b. manip-daemon c. service d. daemon-service

C

​What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use? ​a. system.conf ​b. local.setup ​c. login.defs ​d. user.defs

C

​What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package? a. ​-r b. ​-D c. ​-P d. ​-d

C

​What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system? a. ​-c b. ​-U c. ​-F d. ​-z

C

​When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts? ​a. chkconfig ​b. service c. ​systemctl ​d. syscontroller

C

Select the two commands below that will provide the number of lines in a file, and the number of characters in a file, respectively:​ Multiple Answer ​a. count -c b. ​pr -d ​c. wc -l ​d. wc -c

C and D

Select the two window managers that have been used in GNOME:​' Multiple Answer a.​kwin ​b. lxde c. ​metacity d. ​mutter

C and D

The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?​ Multiple Answers ​a. log.conf ​b. rsyslog.conf ​c. rsyslog.d ​d. log.d

C and D

What two commands below can be used to stop a process, either by PID number or process name?​ Multiple Answers ​a. end ​b. stop c. kill​ d. ​killall

C and D

What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?​ Multiple Answers ​a. /etc/prnt.config ​b. /etc/cupsd.conf ​c. /etc/cups/cupsd.conf ​d. /etc/cups/printers.conf

C and D

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes? Multiple Answers a. ​kthreadd ​b. syslogd ​c. init ​d. systemd

C and D

​What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is? Multiple Answers ​a. -s ​b. -h ​c. -d ​d. -k

C and D

Most configuration files on Linux systems are delimited using ____ characters.

Colon

A ____ is a standard set of instructions used to compress a file.

Compression algorithm

The rate of compression is called the ____.

Compression ratio

T/F - Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully.

False

T/F - If a compression utility compresses a file to 52% of its original size, it has a compression ratio of 52%.

False

T/F - In NFS, one computer shares a certain directory in the directory tree by placing the name of that directory in the /etc/imports file.

False

T/F - In a decision construct, you can have an unlimited number of if then statements.

False

T/F - In the DHCP lease process, halfway through the time period specified by its lease the DHCP client will send a DHCPDISCOVER packet to its DHCP server to renew its IP configuration.

False

T/F - The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory.

False

T/F - The SIGINT kill signal is the default kill signal used by the kill command.

False

T/F - The Sendmail daemon on Fedora 13 is configured by default to accept e-mail on TCP port 100 and route it to the appropriate user on the Linux system.

False

T/F - The init daemon has a PID of 0.

False

T/F - The killall command uses the PID to kill a process.

False

T/F - Traditionally, CDs/DVDs were used to back up data.

False

T/F - Users can create their own custom variables, called shell variables.

False

T/F - When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory.

False

T/F - When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.

False

T/F - When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.

False

T/F - You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.

False

The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory.

False

The /etc/rc.d/rc 5 script only executes files that start with S in the /etc/rc.d/rc5.d/ directory. True and False

False

The killall command uses the PID to kill a process. True or False

False

The killall command uses the PID to kill a process. True or False

False

The killall command uses the PID to kill all process. True or False?

False

The ps command is the only command that can view process information. T/F

False

The secure log file contains information regarding the last user to log in to a system.

False

The secure log file contains information regarding the last user to log in to a system. True or False?

False

To kill a process running in the background, you must place a % characters before its process ID. True or False?

False

What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system? T/F

False

_____ represents a text description of the user and is typically left blank.

GECOS

Which of the following is an on-screen keyboard used with Linux?

GOK

The GNOME 3 desktop environment utilizes what window manager and toolkit below?

GTK+ toolkit ​mutter

When working with Sendmail, what command can be used to test SMTP support?

HELO

When working with Sendmail, you can use the ____ command to test SMTP support.

HELO

What is the most common hardware component to fail on a Linux system?

Hard disks

An IPv6 address consists of 16-bit numbers in what numbering scheme?

Hexadecimal or Expanded numbering scheme

Filenames that start with a period, such as .file, are referred to as

Hidden Files

64

How many different kill signals can be sent by the kill command to a given process?

vim file1

I order to quickly create an empty file, what command can be used?

What signal name and number function as the absolute kill signal, and when issued, forces the Linux kernel to stop executing the process by sending the process's resources to /dev/null?

SIGKILL 9

The ____ kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory.

SIGQUIT

segmentation fault

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

tty1

In Fedora 20, what terminal is used for graphical login?

/etc/X11/xorg.conf.d/

In Fedora 20, where are user configured settings for Xorg stored?

X Windows

In Linux, the core component of the GUI is known as:

2

In Linux, what runlevel is also known as the multiuser mode?

7

In a SCSI chain the highest priority SCSI device is given what SCSI ID?

sixth

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?

-

In a file's mode, a permission that is unavailable is represented by what character?

elif; else

In an if construct, what statements are optional?

system-config-keyboard

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?

ln

In order to create a hard link, what command must be used?

-l

In order to display a list of at job IDs, what option can be specified to the at commands?

zfs get all

In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?

chmod 7777 filename

In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?

1024

In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?

(hd0,0)

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.

Ctrl+k

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?

swapoff

In the event that you wish to disable a swap partition, what command must be used?

w

In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit?

process state

In the output of th ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?

Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?

Modems (modulator-demodulator) devices between the digital data of a computer and the analog signal of a telephone line, transmits data at 56KB/s and they are configured by using the Modem Manager utility ISDN modem is otherwise known as an integrated services digital network it is a digital phone connection that can transmit data, voice, and video over a normal telephone line. It is configured to route IP over a Dial-on-Demand Routing (DDR) link, by the use of the switch software and not the MFG or the model. It transfers speeds up to 128KB/s. DSL modem is a digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line which provides the digital subscriber line service for connection to the Internet, which is often called DSL broadband. Typically they are configured via webpage accessing by typing the IP address given in the router's manual into the browser's address bar. Runs on speeds of 100MB/s.

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?

SIGQUIT

xvidtune

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?

Pog O

Pog

Pog U

Pog Off

​What two RAID types below utilize disk striping with parity, providing protection against one or two drive failures respectively? a. RAID6 b. RAID0 c. RAID5 d. ​RAID1

RAID 5 & RAID 6

​A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:

RAID Z

A ZFS volume that uses a variable stripe size and requires a minimum of 3 hard disks to protect against a single disk failure is known as

RAID-Z

​A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as: a. RAID+ b. RAID-Z c. RAID 5 d. ​ZFS Extended RAID

RAID-Z

Most Linux distributions make use of what package manager?

RPM

Most Linux distributions today use ____ as their package manager.

RPM

If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.

Read and execute

A DNS resolution request that was resolved with the use of top-level DNS servers.

Recursive query

Text wildcards used to ease the searching of specific text information are called _________________________.

Regular expressions (regexp)

What does the setfacl -b command do?

Removes all extra ACL assignments on a given file.

A DNS name resolution request whereby an IP address is resolved to a FQDN.

Reverse lookup

After downloading an installing any shared libraries, what should be done to ensure the list of shared library directories and the list of shared libraries are updated?

Run the ldconfig command.

What SCSI type supports speeds of up to 80 MB/second?

SCSI-3 Ultra2 Wide

What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file?

SGID and SUID

​What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file? - SGID - SUID - SQUID - sticky bit

SGID, SUID

What kill signal stops a process, then restarts it with the same PID?

SIGH UP

If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below:

SIGHUP

The ____ kill signal stops a process and then restarts it with the same PID.

SIGHUP

What kill signal stops a process, then restarts it with the same PID?

SIGHUP

What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?

SIGINT 2

Describe the telnet and SSH utilities. What is the difference between them?

SSH is a network protocol used to remotely access and manage a device. The key difference between Telnet and SSH is that SSH uses encryption, which means that all data transmitted over a network is secure from eavesdropping. Like Telnet, a user accessing a remote device must have an SSH client installed.

​What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file? ​

SUID ​SGID

Explain why scheduling commands can be beneficial, and detail some of the methods available for scheduling commands.

Scheduling system maintenance commands to run during nonworking hours is good practice, as it does not disrupt normal business activities. There are two different methods to schedule commands: At daemon (atd) - which can be used to schedule a command to execute once in the future cron daemon (crond) - which is used to schedule a command to execute repeatedly in the future

What tool below was designed as a secure remote access utility that encrypts information that passes across the network?

Secure Shell (SSH)

What tool is designed as a secure remote access utility that encrypts information that passes across the network?

Secure Shell (SSH)

What tool below was designed as a secure remote access utility that encrypts information that passes across the network?

Secure Shell SSH

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

Segmentation fault

ls -l

Select the command below that can be used to provide a long listing for each file in a directory:

[ A -gt B ]

Select the test statement that can be used to determine if A is numerically greater than B

[ A gt B ]

Select the test statement that can be used to determine if A is numerically greater than B

memtest86

Select the utility below that when run will start and perform a thorough check of RAM for hardware errors:

____ are files that are typically used to create custom programs that perform administrative tasks on Linux systems.

Shell scripts

Which of the following does Click Assist do?

Simulates a right click by holding down the left mouse button

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?

Sixth

What option can be used in the journald configuration file to specify a file size limit to the event log?

SystemMaxUse

What option can be used in the journald configuration file to specify a file size limit to the event log?

SystemMaxUse

Which of the following is a valid Linux initialization process?

Systemd SysV

Apache daemon listens for HTTP requests on port ____.

TCP 80

The Apache daemon listens for HTTP requests on what port by default?

TCP 80

If network services that are started by inetd or xinetd are in use, what can be used to provide extra security?

TCP wrapper

What is the most commonly used LAN protocol?

TCP-IP

What is the most commonly used LAN protocol?

TCP/IP

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. T/F --

TRUE

Which of the following system variables can you modify to override the default system timezone within your current shell?

TZ

Emacs editor

The LISP artificial intelligence programming language can be used with which text editor below?

vmlinuz

The Linux kernel exists as a file named:

Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start and stip daemons after system initialization. True or False?

True

How does the NICE value affect process priority? How and why can nice values by altered?

The NICE value (NI) can be used to affect the process priority indirectly, it is measured between -20 (a greater chance of a high priority) and 19 (a greater chance of a lower priority). The lower the number the more priority that task gets, if the nice value is high number like 19 the task will be set to its lowest priority and the CPU will process whenever it gets a chance. You can use the -n command line option to change the or adjust the nice value which adds a set of integer value to the niceness.

KDE

The QT toolkit is utilized by which GUI environment?

PATH

The ______ environment variable contains a list of directories used to search for executable programs.

awk

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?

man -k list

The apropos list command produces the same results as which command below?

$

The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?

echo $PS1

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?

You can execute ____ main types of Linux commands.

Three

tac

To display a text file in reverse order, what command should be used?

cat data

To display the contents of a text file called data, what command should be used?

/proc/meminfo

To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?

Ignoring a kill signal.

Trapping

A route table is a list of TCP/IP networks that is stored in system memory

True

After a process has been started, you can change its priority by using the renice command. True or False.

True

All DNS servers contain a DNS cache file.

True

Any command that can be executed on the command line can also be placed inside any environment file. True or False

True

As daemon process are not associated with terminals, you must use the -e switch with ps command to view them. True or False?

True

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script.

True

Class D addresses are used for multicasting

True

Each process can start an unlimited number of other processes. T/F

True

Each process can start an unlimited number of other processes. True or FAlse

True

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. True or False?

True

Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond

True

Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond True or False

True

Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond àFound in book

True

Logs from the cron daemon (crond) can be viewed using the command journalctl_COMM=crond True or False?

True

Most daemon scripts accept the arguments start, stop, and restart.

True

Most daemon scripts accept the arguments start, stop, and restart. True or False

True

Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets

True

True

Zombie processes are also known as defunct processes.

A portion of the Domain Name Space that is administered by one or more DNS servers.

Zone

Select the escape sequence that starts a new line when used with echo:

\n

Which of the following is the common escape sequence to display a horizontal tab using the echo command?

\t

cron table

a file specifying tasks to be run by the cron daemon; there are user cron tables and system cron tables

(CIDR) notation

a notation that is often used to represent an IP address and its subnet mask

Octet

a port of an IP address that represents eight binary bits

Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to take approximately 20 minutes to run individually. However, he would like to go to lunch 15 minutes from now. He knows that he can type all of the commands on the same line and separate them with a certain character to run them sequentially. Which character can he type after each command to have them run one after the next without requiring further input from him?

a semicolon

Route Table

a table of information used to indicate which networks are connected to network interfaces

process ID (PID)

a unique identifier assigned to every process as it begins

host name

a user-friendly name assigned to a computer

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?

alert

Which command can be used to create a new command that will monitor the contents of auth.log as they get added to the file?

alias showauth='tail -f /var/log/auth.log'

In order to download DPM packages, what command should be used below?

apt-get

Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.)

atq at -l at -q

On a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.

cancel

Which of the following commands will send the output of the cat command to the grep command to be filtered?

cat /etc/passwd | grep jsmith

In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued? a. cd .. b. /home/joe c. cd ./.. d. cd ../..

cd ../..

Which command is used to list and modify password expiration information for user accounts?

chage

​What two commands below can be used to modify the password expiry information and a user's default shell?

chage chsh

A device that transfers data in a character-by-character fashion is referred to as what type of device?

character

In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?

chmod 7777 filenam

​Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment. a. croot b. set_root c. change_root d. ​chroot

chroot

What two commands below can be used to modify the password expiry information and a user's default shell?

chsh chage

What character is used to delimit most Linux configuration files?

colon

What option should be used in conjunction with the lp command in order to specify the destination printer name?

d

Describe the purpose the process state column displayed by the ps -l command. What values may appear in this column, and what do these values indicate?

the -l option to the ps command lists even more information about each process than the -f option. The process state (S) column is the most valuable to systems administrators because it indicates what the process is currently doing. The values that may appear are the (S) value for sleeping, the (R) value is for running, the (T) value is for a process that has stopped or is being traced by another process and the (Z) value indicates a zombie process

Multicast

the TCP/IP communication destined for a certain group of computers

broadcast

the TCP/IP communication destined for all computers on a network

forking

the act of creating a new BASH shell child process from a parent BASH shell process

time slice

the amount of time a process is given on a CPU in a multiprocessing operating system

at command

the command used to schedule commands and tasks to run at a preset time in the future

link local

the portion of an IPv6 address that refers to a unique computer, it is analogous to the host portion of an IPv4 address

In the process state column, what does an "R" indicate?

the process is currently running on the processor

When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?

the process is high priority

Trapping

the process of ignoring a kill signal

When you run the ps command, how are daemon process recognized?

there is a question mark in the TTY column

How many DNS servers can be configured in the /etc/resolv.conf file?

three

How many DNS servers can be configured in the /etc/resolv.conf file?

three (3)

The amount of time a process has to use the CPU is called a(n) ____________________.

time slice

The amount of time a process has to use the CPU is called a(n) __________________________.

time slice

Which of the following commands will list the time zones available on a Linux system?

timedatectl list-timezones

Which command is used to gain real-time information about processes running on the system, with the most processor-intensive processes appearing at the beginning of the list?

top

Which of the following commands will show a list of process names along with their process ID (PID)? (Choose two.)

top ps

The ____ command can be used to replace characters in a file sent via Standard Input.

tr

What command can be used to replace characters in a file sent via Standard Input?

tr

What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?

traceroute

Data is read from physical hard drives in concentric circles known as which of the following?

tracks

Data is read from physical hard drives in concentric circles known as which of the following? a. blocks b. tracks c. sectors d. cylinders

tracks

What is the name of the concentric circles from where data is read from in a physical hard drive?

tracks

A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator. true or false

true

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. true or false

true

Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets. true or false

true

RAID level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance ​and allows up to two simultaneous hard disk drive failures while remaining fault tolerant. true or false

true

The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length.​ true or false

true

The cpio command has the ability to handle long filenames and can be used to back up device files.​ true or false

true

The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations.

true

When you print to a printer class, the print job is send to the first available printer in the printer class. true or false

true

​The database for the locate command can be updated manually by using the updatedb command. true or false

true

In order to change the time zone of a system after installation, what command must be used?

tzselect

Which of the following commands will prompt you to answer a series of questions to help determine which time zone file you should use?

tzselect

What file system below is used by software programs that write to a CD-RW or DVD-RW drive?

udf

What file system below is used by software programs that write to a CD-RW or DVD-RW drive? - udf - ntfs - hpfs - ext2

udf

The ​state and performance of a RAID-Z volume can be viewed using what two commands? (Select two answers.) a. zpool iostat b. ​zpool status c. zfs iostat d. zfs status

zpool iostat, zpool status

Which character(s) below represent extended regular expression metacharacter(s)?

{}

Select the metacharacter that can be used to send the standard output of one command to another command as standard input:

|

You can send the standard output of one command to another command as standard input using the ____ shell metacharacter.

|

What metacharacter can be used to refer to the current user's home directory?

~

If incompatible X Windows settings are configured, where will the errors that are generated be written to?

~/.xsession-errors

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.​

​(hd0,0)

What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

​-d, ​-k

In Fedora 20, where are user configured settings for Xorg stored?​

​/etc/X11/xorg.conf.d/

Select below the configuration file that is used to configure the BIND / DNS server:​

​/etc/named.conf

What file controls the default runlevel when using Systemd?​

​/etc/systemd/system/default.target

What file in the /proc directory contains information about a computer's CPU?​

​/proc/cpuinfo

Where are the log files for the Samba daemon located?​

​/var/log/samba

On a Fedora based system, where are the shell environment and scheduled commands for at stored?

​/var/spool/at

The GUI components and related software take up how much space on a typical Linux installation?

​4 GB

What does the setfacl -b command do?​

​It removes all extra ACL assignments on a given file

What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk?

​iSCSI initiator ​iSCSI target

What command below can be used to uninstall the LILO bootloader from an active partition?​

​lilo -U

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

​login.defs

​What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

​login.defs

Segmentation faults can sometimes be fixed by performing what two tasks below?​

​turn off CPU cache memory increase the number of memory wait states in BIOS

Segmentation faults can sometimes be fixed by performing what two tasks below?​ a. perform a full reinstall of OS b. ​turn off CPU cache memory c. increase the number of memory wait states in BIOS d. update the Linux kernel

​turn off CPU cache memory, and increase the number of memory wait states in BIOS


Set pelajaran terkait

Six Sigma Roles and Responsibilities Practice

View Set

Exam 2 - African American History

View Set

EHAP Scientific Revolution & Enlightenment Study Guide

View Set

RN QBank Missed Questions--> Safe and Effective Care Environment (Management of Care and Safety and Infection Control)

View Set

(Exam 3)Article K: Extinct Tree-climbing Human walked with Swagger

View Set

Module 4: Cyber Incident Response

View Set