Advanced Linux pt 2
Which protocol is used to remotely access the whole desktop of another computer? a. Telnet b. Secure Shell c. Virtual Network Computing (VNC) d. HyperText Transfer Protocol (HTTP)
c. Virtual Network Computing (VNC)
A(n) ____ is a system process that is not associated with a terminal or a graphical environment. a. program b. user process c. daemon process d. Linux process
c. daemon process
How many fields of a crontab file define when the cron job should be run? a. three b. four c. five d. six
c. five
The ____ lists the USB devices on the system. a. hwinfo b. lspci c. lsusb d. sysfs
c. lsusb
The cron daemon checks to see if it has any jobs defined for the current time once every ____. a. second b. 30 seconds c. minute d. hour
c. minute
Which of the chmod command options is used to change the permissions for other users? a. a b. g c. o d. u
c. o
Which fdisk command is used to end the fdisk program without saving changes? a. d b. m c. q d. w
c. q
A(n) ____ is a local or remote directory containing packages and additional information about these packages. a. Package group b. Pattern c. repository d. installation summary
c. repository
In the /etc/fstab file, the fourth field in each line represents ____. a. the mount point b. the file system type c. the mount options d. the sequence of file system checks
c. the mount options
____ is a command line tool that guides you through the different aspects of the X11 configuration. a. YaST b. SaX2 c. xorgconfig d. yastconfig
c. xorgconfig
The ____ command is the front end to RPM and takes care of such things as dependencies when installing a package. a. rpm b. yast c. yum d. yumdownloader
c. yum
The ____ character indicates that a process is running in the background. a. * b. ^ c. % d. &
d. &
Which option is used with the crontab command to delete all jobs? a. -e b. file c. -l d. -r
d. -r
Which of the following is a valid GID for a normal group? a. 0 b. 15 c. 248 d. 1056
d. 1056
The highest permissible GID value is ____. a. 10000 b. 30000 c. 50000 d. 60000
d. 60000
Which of the following information is available to the system administrator only for installed packages? a. Summary and description b. Technical data c. Dependencies on other packages d. File list
d. File list
Which syslog element defines which messages are logged where, depending upon the source, filter, and destination? a. Facility b. Priority c. Destination d. Log path
d. Log path
The ____ signal continues a process that was stopped with the STOP signal. a. SIGKILL b. SIGHUP c. SIGINT d. SIGCONT
d. SIGCONT
In ncurses YaST, you selected highlighted menu items by pressing the ____. a.Tab key b. Shift key c. Arrow keys d. Spacebar
d. Spacebar
Which of the following is a disadvantage of installing a GUI? a. Ease of use b. Functionality c. Familiarity d. Stability
d. Stability
The ____ command can be used to set additional attributes on ext2/ext3 file systems. a. chmod b. chown c. lasttr d. chattr
d. chattr
Which syslog priority warns you that the system is no longer usable? a. debug b. warning c. crit d. emerg
d. emerg
The ____ command displays information about the hard drive and lets you manage certain hard drive parameters. a. hwinfo b. lspci c. fdisk d. hdparm
d. hdparm
The ____ command is used to change the effective group of the executing user. a. groupadd b. groupmod c. gpasswd d. newgrp
d. newgrp
Which logrotate setting is used to make sure that empty files are not rotated? a. size b. compress c. maxage d. notifempty
d. notifempty
____ is a tool used to download RPMs from yum repositories. a. rpm b. yast c. yum d. yumdownloader
d. yumdownloader
A process is a structured set of commands stored in an executable file.
False
Each file can belong to multiple users, but only to one group.
False
If the useradd command is called with no options specified, it creates a user with a random username and random password.
False
QT is YaST's text mode.
False
The size and age of log files are monitored automatically by the syslog program.
False
To access the whole desktop of a remote computer,, use Telnet or Secure Shell.
False
In a Linux environment, most programs share some code through the use of shared libraries.
True
RPM package files use the software_name-software_version-release_number.architecture.rpm naming format.
True
Runlevels define the state of the system.
True
The BIOS is a series of small programs and drivers that allow the CPU to communicate with basic system devices.
True
The Linux operating system has the ability to handle several users at the same time and to allow these users to perform several tasks on the same computer simultaneously.
True
The YaST software management module serves as the default software management interface for SUSE Linux Enterprise Server 11.
True
The cron daemon can run any command or shell script.
True
The fdisk program is used for partitioning hard disks from the command line.
True
X Window provides a GUI for computer networks for both client and server machines.
True
Which options is used with the useradd command to enter text for the comment field? a. -c b. -e c. -g d. -m
a. -c
What is the software library configuration file? a. /etc/ld.so.conf b. /etc/ld.conf c. /etc/ldd.so.conf d. /etc/ldconfig.conf
a. /etc/ld.so.conf
What is the UID for the root user? a. 0 b. 1 c. 100 d. 1000
a. 0
Which is the default setting for managing package dependencies in SLES 11? a. Resolve package dependencies automatically (Dependencies > Autocheck) b. Check for dependencies at specified time (Dependencies > Check Now) c. Reset ignored dependency conflicts (Extras > Reset Ignored Dependency Conflicts) d. Generate a dependency resolver test case (Extras > Generate Dependency Resolver Test Case)
a. Resolve package dependencies automatically (Dependencies > Autocheck)
A(n) ____ is a physical piece of hardware. a. device b. interface c. kernel module d. user space driver
a. device
If the file system type is not specified, the mkfs command automatically creates a(n) ____ filesystem. a. ext2 b. ext3 c. Reiser d. ISO9660
a. ext2
Which command do you use to find out what partition contains the kernel? a. find b. grub c. kernel d. lilo
a. find
The ____ command gives a comprehensive view of the hardware built into the system. a. hwinfo c. lsusb b. lspci d. sysfs
a. hwinfo
The ____ command is used to view shared libraries required by a specific program or shared library. a. ldd b. cat c. ls d. sash
a. ldd
The ____ filter lists groups created on the local server to provide permissions for members assigned to the group. a. local groups b. system groups c. custom d. permissions
a. local groups
The LILO ____ global option describes the colors used in the LILO boot menu. a. menu-scheme b. lba32 c. default d. image
a. menu-scheme
How frequently can a job scheduled using the at daemon be run? a. once b. monthly c. weekly d. daily
a. once
When testing a configuration, newer tests produce a black screen which makes it somewhat difficult to diagnose whether X11 is working properly. a. retro b. old c. older d. previous
a. retro
Which backup medium is typically used by Linux administrators because of their price to capacity ratio? a. tape drive b. writable DVDs c. removable hard drives d. magneto-optical drives
a. tape drive
In ncurses YaST, you press the ____ to move from one box to another or to the text buttons. a.Tab key b.Shift key c.Arrow keys d.Spacebar
a.Tab key
When the init process starts, it runs the ____ script. a. /etc/init.d/start b. /etc/init.d/boot c. /etc/init.d/load d. /etc/init.d/rc
b. /etc/init.d/boot
Which log file stores information about which user was logged in, where the user was logged in, and how long the user was logged in. a. /var/log/mail b. /var/log/wtmp c. /var/log/lastlog d. /var/log/users
b. /var/log/wtmp
The execute permission is represented by the value ____. a. 0 b. 1 c. 2 d. 4
b. 1
The minimum password length allowed by Blowfish is ____ characters. a. 6 b. 8 c. 10 d. 12
b. 8
When you first power on the system, the ____ takes charge of the boot process. a. motherboard b. BIOS c. MBR d. CPU
b. BIOS
Which YaST group includes modules for configuring keyboard settings? a. Network Devices b. Hardware c. System d. Software
b. Hardware
Which RPM component works in the background of the package manager and contains a list of all information on all installed RPM packages? a. RPM package manager b. RPM database c. RPM package d. Package label
b. RPM database
The ____ command is used to control whether or not the display manager is loaded when the system boots. a. displayconfig b. chkconfig c. displaymanager d. systemboot
b. chkconfig
The ____ daemon manages printers and print queues. a. cron b. cupsd c. httpd d. sshd
b. cupsd
A(n) ____ is a background process that makes your installed set of fonts available to XFree86 and other machines running X. a. font system b. font server c. fontX display d. bitmap font
b. font server
In a(n) ____ backup, only the files that have been modified since the last backup of any type, are backed up. a. full b. incremental c. partial d. differential
b. incremental
The ____ command is used to update the library cache. a. ldd b. ldconfig c. sash d. ldcache
b. ldconfig
Which command can be used to lock a user's account? a. useradd b. passwd c. usermod d. userlock
b. passwd
A(n) ____ is an installable list of packages. a. package group b. pattern c. repository d. installation summary
b. pattern
The ____ command displays a list of processes in the form of a tree structure. a. ps b. pstree c. nice d. top
b. pstree
The ____ filter lists user accounts created by the system for use with services and applications. a. local users b. system users c. custom d. services and applications
b. system users
The ____ command is used to fine tune the X server's video modes. a. startx b. xvidtune c. SuperProbe d. vncserver
b. xvidtune
The ____ option is used with the tar command to display a detailed output of the backup process. a. -c b. -f c. -v d. -z
c. -v
Which file should be edited to customize the behavior of the GRUB boot manager? a. /boot/grub.conf b. /boot/grub/menu.conf c. /boot/grub/menu.lst d. /boot/grub.lst
c. /boot/grub/menu.lst
Which runlevel represents multiuser mode without network server services? a. 0 b. 1 c. 2 d. 5
c. 2
Which boot loader location option is used to install the boot loader in the MBR of the first disk? a. Boot from boot partition b. Boot from extended partition c. Boot from Master Boot Record d. Boot from root partition
c. Boot from Master Boot Record
Which YaST groups includes modules for managing disk partitions? a. Network Devices b. Hardware c. System d. Software
c. System