Domain 4 C220

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which command should you use to change the quota settings for the gshant user? (Tip: Enter the command as if at the command prompt.)

edquota -u gshant

You need to create an ext4 file system on the first partition on the second hard disk drive. What command should you use? (Tip: Enter the command as if at the command prompt.)

mkfs.ext4 /dev/sdb1

You need to mount the CD-ROM device to the /media/cdrom directory. What command should you use? (Tip: Enter the command as if at the command prompt)

mount /dev/cdrom /media/cdrom

Which command should you use to display the current user's quota limits and disk usage? (Tip: Enter the command as if at the command prompt.)

quota

Under the Filesystem Hierarchy Standard (FHS), which directory contains the device files for a Linux system? (Tip: Enter the full path of the directory.)

/dev

Where is the file system table located on a Linux system? (Tip: Enter the full path to the file.)

/etc/fstab

You need to implement disk quotas on your Linux system. You need the quotas on the / directory. Which file must be edited to implement quotas for users and groups? (Tip: Enter the full path to the file.)

/etc/fstab

You need to configure a few changes to how the locatedb index file is created. Which file should you edit? (Tip: Enter the full path of the file.)

/etc/updatedb.conf

Which directory holds the man files on the system? (Tip: Enter the full path of the directory.)

/usr/share/man

What is the typical default umask value?

022

Drag the permission string on the left to the category on the right. (Tip: Some permission strings will not be used.) lrwxrwxrwx drwxr-xr-x -rwxr-xr-x srwxr-xr-x prwxr-xr-x -Symbolic Link -Hard Link

-Symbolic Link lrwxrwxrwx -Hard Link -rwxr-xr-x

Which of the following is not a characteristic of symbolic links? A. Lower-case L (l) as the first character in the permission string. B. Valid inode for the file data even if the original file is deleted. C. Work across volumes and file systems. D. Distinct inode.

B. Valid inode for the file data even if the original file is deleted.

You need to set the SUID permission on a file named rider. Which of the following commands will accomplish this? A. chmod rider 1777 B. chmod 4777 rider C. chmod 2777 rider D. chmod 1777 rider

B. chmod 4777 rider

Which of the following commands make sales the group owner of the /sales/report file? (Select two. Each answer is an independent solution.) A. chgroup sales /sales/report B. chown .sales /sales/report C. chown :sales /sales/report D. chmod .sales /sales/report

B. chown .sales /sales/report C. chown :sales /sales/report

You have an application whose owner is root but you want all users to execute the application with root user permissions. Which of the following examples shows correct usage of the SUID flag? A. -rwsr--r-- 3 root sys 73748 Nov 2 2005 /usr/bin/applicationx B. -rwxr-sr-- 3 root sys 73748 Nov 2 2005 /usr/bin/applicationx C. -rwxr-sr-s 3 root sys 73748 Nov 2 2005 /usr/bin/applicationx D. -rwxr--r-s 3 root sys 73748 Nov 2 2005 /usr/bin/applicationx

A. -rwsr--r-- 3 root sys 73748 Nov 2 2005 /usr/bin/applicationx

Which of the following directories is specified by Filesystem Hierarchy Standard (FHS) as a mount point for removable media, such as USB storage media, DVDs, CD-ROMs, and Zip disks? A. /media B. /mnt C. /mount D. /

A. /media

You are asked to help a user who is complaining that file system errors are being reported during boot up. When you reboot the user's system you see errors on sda2. You want to check the filesystem on sda2 and fix the errors. What can you do? A. Change to single user mode and run fsck /dev/sda2. B. Run fsck /dev/sda2. C. Change to single user mode and run scandsk /dev/sda2. D. Run chkdsk /dev/sda2. E. Change to single user mode and run fdisk /dev/sda2.

A. Change to single user mode and run fsck /dev/sda2.

Which of the following is not a characteristic of hard links? A. Distinct inode B. Valid inode for the file data even if the original file is deleted C. Dash (-) as the first character in the permission string. D. Indistinguishable from the original files

A. Distinct inode

Which of these Linux filesystems support journaling? (Choose four.) A. Ext4 B. HPFS C. XFS D. VFAT E. Ext3 F. Ext2 G. reiserFS

A. Ext4 C. XFS E. Ext3 G. reiserFS

You are trying to umount /dev/sdd3 but are receiving a device is busy error message. What can you do to try to unmount the file system? (Choose all that apply.) A. Find and close any open files on the file system, and try to unmount again. B. Reboot the system because the file system is locked. C. Make sure your current working directory is not on the file system and try to unmount again. D. Use the fscls command to close any open files on the filesystem.Try to unmount again. E. Edit /etc/fstab and remove the mount. Try unmount again.

A. Find and close any open files on the file system, and try to unmount again. C. Make sure your current working directory is not on the file system and try to unmount again.

You are assembling a workstation. The system requirements show that this system will be used primarily to store documents of small size. What is the best Linux filesystem to install? A. ReiserFS B. Ext3 C. HPFS D. Ext2

A. ReiserFS

You want to view partition information for your sda device. Which commands could you use to view the partitions defined on sda? (Select two.) A. cat /proc/part B. fdisk /dev/sda, then press p C. cat /etc/part D. fdisk -l

B. fdisk /dev/sda, then press p D. fdisk -l

Which of the following utilities would you use to search the path for files matching a given name? A. type B. locate C. cat D. tail

B. locate

Setting the SUID flag is a powerful and useful feature. It can have weaknesses associated with its use.Which of the following statements identifies a weakness? A. Setting the SUID flag for an application or process owned by the root user is a potential security hole. B. Setting the SUID flag is a one-time event that reverts after execution, forcing the root user to reset the flag every time. C. There are no weaknesses to using the SUID flag. D. Only twelve applications or processes may be run at the same time by setting the SUID flag for root user permissions.

A. Setting the SUID flag for an application or process owned by the root user is a potential security hole.

There is a directory called projects owned by the user cmarcela and the group rd cmarcela has left the company, so you need to give ownership of the projects directory, its files,and subdirectories to the user ebates, who is a member of the mgmt group . Which command should you use to change the user ownership? A. chown -R ebates projects B. chown -R ebates.mgmt projects C. chown ebates projects D. chown .ebates projects E. chgrp -R mgmt projects

A. chown -R ebates projects

You are requested to help a user who reports that he has no more local storage space. You go to his system and log in as root user. Which command will display the available disk space on all partitions? (Choose two.) A. df B. du -h C. df -h D. dskuse -free E. du -a F. fdisk -free

A. df C. df -h

You have created a separate partition for the sales team and mounted it to the /sales directory. The team is about to begin a new project, and they want to make sure there is enough disk space to hold upcoming files. Which command will show you the amount of free space? A. df /sales B. diff /sales C. free /sales D. part /sales

A. df /sales

You have a system with a single hard disk. You add a new hard drive to your system. Which of the following commands would you use to partition the new drive? A. fdisk /dev/sdb B. fdisk /dev/sda C. fdisk /dev/sd0 D. fdisk /dev/sd1 E. fdisk /dev/sd2

A. fdisk /dev/sdb

You need to find a specific file on your Linux system. Which of the following commands should you use? (Select two. Each answer represents an independent solution.) A. find B. locate C. which D. whereis

A. find B. locate

A number of new filesystems have been added to the server and you want them to be active now. You also do not want to bring the server down. Which command makes the changes active? A. mount -a B. mount -t C. mount -r D. init q

A. mount -a

After using the ls command in the current working directory, you notice the following files: lrwxrwxrwx 1 root root 4 2010-11-05 myfile -> shantsgems -rwxr-xr-x 1 root root 382 2010-10-05 shantsgems What is true about the files? A. myfile is a symbolic link to shantsgems. B myfile is a hard link to shantsgems. C. myfile is a backup file to shantsgems. D. myfile is a piped link to shantsgems.

A. myfile is a symbolic link to shantsgems.

Which command will display the disk usage and quota limits for the development group? A. quota -g development B. quotacheck -g development C. repquota development D. edquota -g development

A. quota -g development

Partition /dev/sdb2 is mounted to /mnt/temp. You need to unmount /dev/sdb2. Which commands would you use? (Choose two.) A. umount /mnt/temp B. unmount /dev/sdb2 C. dismount /dev/sdb2 D. umount /dev/sdb2 E. dismount /mnt/temp

A. umount /mnt/temp D. umount /dev/sdb2

Which set of permissions represent the minimal permissions required to allow a user to list the contents of a directory? A. rw- B. r-x C. r-- D. rwx

B. r-x

You have a Linux system with two activated swap partitions: sda3 and sdb2. Which of the following commands can you use to deactivate the sda3 swap partition? A. swapoff sda3 B. swapoff /dev/sda3 C. fdisk d /dev/sda3 D. swapoff -a

B. swapoff /dev/sda3

Which single command should you use to find the path and manual pages for the mycustomapp program? A. whereis -m mycustomapp B. whereis mycustomapp C. whereis -s mycustomapp D. whereis -b mycustomapp

B. whereis mycustomapp

Which of the following files would not be found by the locate -i LibraryFines.csv command? A. LibraryFines.csv B. Libraryfines.csv C. libraryfines.csv1 D. 1libraryFines.csv E. libraryfines.csv

C. libraryfines.csv1

You have an application whose group is sys but you want all users, whether or not they are members of the sysadmin group, to execute the application with sysadmin group permissions. Which of the following examples shows correct usage of the SGID flag? A. -rwxr--r-s 3 root sysadmin 73748 Nov 2 2005 /usr/bin/applicationx B. -rwxr-sr-- 3 root sysadmin 73748 Nov 2 2005 /usr/bin/applicationx C. -rwxr-sr-s 3 root sysadmin 73748 Nov 2 2005 /usr/bin/applicationx D. -rwsr--r-- 3 root sysadmin 73748 Nov 2 2005 /usr/bin/applicationx

B. -rwxr-sr-- 3 root sysadmin 73748 Nov 2 2005 /usr/bin/applicationx

You want to mount a number of filesystems each time the system is brought up. Which configuration file should hold the configuration information for the filesystems to be mounted? A. /etc/profile B. /etc/fstab C. /etc/inittab D. /etc/mount

B. /etc/fstab

Which of the following statements best describes the function of the repquota /home -vu command? A. The aquota.user and aquota.group files in /home are created. B. A summary of disc usage and quotas is displayed for those users who have files within /home. C. The /home quota file is opened in vi for editing. D. The current user's quota limits and usage for /home are displayed.

B. A summary of disc usage and quotas is displayed for those users who have files within /home.

During the Linux installation process you are asked to choose the filesystem type for your partitions. Which is the most common Linux filesystem to choose? A. XFS B. Ext3 C. JFS D. ReiserFS E. HPFS

B. Ext3

Which of the following statements best describe the purpose of the Filesystem Hierarchy Standard (FHS)? (Select two.) A. During installation,software can determine the permissions of specific directories. B. Individual users can predict where to find system configuration files. C. As users create files, they are forced to place the files in specific directories. D. During installation, software can predict where to place configuration files.

B. Individual users can predict where to find system configuration files. D. During installation, software can predict where to place configuration files.

You have just installed a new program that will be used by all users on the computer.After installation,you log in as a regular user and you try to run the program. The program stops and displays the following error: Error : not running as root What should you do so that all users can run this program? A. Have users run the program using the su -c command. B. Set the SUID on the program. C. Add users to the sudoers file.Tell them to run the program using the sudo command. D. Make all users members of the root group.

B. Set the SUID on the program.

While reading about file system permissions in Linux you discover that the default permissions assigned to new files when they are created are rw-rw-rw- (666 octal) and new directories are rwxrwxrwx (777 octal). However, when you create a new file in a directory called /data the permissions assigned are rw-r--r--. Why is this? A. There are more restrictive permissions assigned to the /data directory and any new files created inside that directory will inherit the more restrictive permissions. B. The umask must be set to 0022 and therefore block the write permission for the group owner and everyone else. C. Because you are logged in as a normal user and not the root user all files that you create will be created with a more restrictive set of permissions. D. You are logged in as the root user and all files created by the root user are assigned these permissions. Only normal users get rwxrwxrwx (777 octal) permissions on newly created files.

B. The umask must be set to 0022 and therefore block the write permission for the group owner and everyone else.

Which of the following utilities displays the category of a command? A. which B. whereis C. type D. find

C. type

You have an xfs file system in your Linux computer. You need to display the XFS file system parameters, such as the block size and inode data structures. Which of the following commands should you use? (Select two. Each answer is an independent solution.) A. mkfs.xfs B. xfs_growfs -n C. xts_info D. xfs_metadump

B. xfs_growfs -n C. xts_info

Which repquota option will give quota limits and disk usage for all file systems listed in /etc/mtab? A. -n B. -v C. -a D. -u

C. -a

You are inspecting the superblocks and block information on your file system. You need dumpe2fs to display only the blocks that are reserved as bad in the file system. Which option should you use? A. -h B. -x C. -b D. -f

C. -b

Which directory contains the configuration file for GRUB? A. /usr B. /root C. /boot D. /proc

C. /boot

You need to configure your Linux system to allow only the root user account to mount the CD-ROM device. Which of the following options should you add to the /etc/fstab file? A. /dev/cdrom /media/cdrom -t iso9660 ro,users,noauto B. /dev/cdrom /media/cdrom -t iso9660 ro C. /dev/cdrom /media/cdrom -t iso9660 ro,nouser,noauto D. /dev/cdrom /media/cdrom -t iso9660 ro,user,noauto

C. /dev/cdrom /media/cdrom -t iso9660 ro,nouser,noauto

You have added several new hard disks to your system. After partitioning and formatting you have modified a configuration file to mount these new filesystems automatically. You want to document the change you made. What file would you document? A. /etc/ modules.cont B. /etc/inittab C. /etc/fstab D. /etc/crontab

C. /etc/fstab

Under the Filesystem Hierarchy Standard (FHS), which directory contains information about the system state and processes? A. /tmp B. /bin C. /proc D. /root

C. /proc

Which directory is the home directory for the root user account? A. /home/root B. / C. /root D. /home

C. /root

Which of the following would be the result of the command ln -b ~/file1 /data/file1? A. The ln command would test to see if the source file was a binary file or text file before creating the link. B. A link called /data/file1 would be created and would always be treated by the operating system as a binary file despite the type of file it points to. C. A copy of the file ~/file1 would be placed in /data. D. The -b option would only work if the file being linked to is a binary file not a text file.

C. A copy of the file ~/file1 would be placed in /data.

What is the effect of the tune2fs -j /dev/sdb1 command? A. Changes how many times the /dev/sdb1 device is mounted before running fsck. B. Remounts the /dev/sdb1 device as read-only. C. Converts the /dev/sdb1 device to ext3. D. Displays the superblock on the /dev/sdb1 device.

C. Converts the /dev/sdb1 device to ext3.

Yesterday you created a new swap area for your system. Today, after rebooting the system, you find the swap area is not mounted. What should you do to ensure the swap area is mounted each time the system boots? A. Run the mount --auto command and identify the swap area partition. B. Remount the swap area. Then run export mount to make the change persistent. C. Edit /etc/fstab and add the swap partition. D. Edit /etc/mtab and add the swap partition. E. Edit /etc/inittab and add the swap area.

C. Edit /etc/fstab and add the swap partition.

You need to create a large number of files and would like to ensure that you, the user owner, are the only one that has read and write permissions to the files. The files will be located in a number of different directories that already contain files that you don't want their permissions modified. How could you create these files with the correct permissions using the least amount of effort? A. Make a list of all the files you created and run umask 0066 on each of them to change their permissions. B. Run chmod -R 600 on all of the directories in which you created the new files. C. Type umask 0066 to change your umask. D. Type umask 6600 to change your umask.

C. Type umask 0066 to change your umask.

You suspect some corruption of files in the /bin directory. What is the most proper course to determine if any of the files in /bin are corrupt? A. Check the /var/log files for any indication of unexpected accesses to the files in /bin. B. Acquire another copy of the suspect files and run a diff on them. C. Use an integrity checking program to check the files in /bin. D. Make a secondary install of your distribution, patch it to the same level and then compare file sizes and dates.

C. Use an integrity checking program to check the files in /bin.

You are the team lead for a marketing project. Only the members of the team3 group should have read/write permissions to a document called project_data.doc however you want to ensure that no one on the team will delete the document by accident. Your user name is bsmith. A long listing of the file is as follows : -rwxr-xr-x 1 bsmith team3 7260 June 22 2004 project_data .doc Which of the following commands would accomplish this? A. chmod 744 project_data .doc B. chown :bsmith project_data.doc C. chmod 1664 project_data.doc D. chgrp bsmith project_data.doc

C. chmod 1664 project_data.doc

A file named acctg needs to have the SGID permission set on it while keeping all other permissions at their present value. Which of the following commands will accomplish this? A. chmod 1777 acctg B. chmod s+g acctg C. chmod g+s acctg D. chmod +g acctg

C. chmod g+s acctg

Which of the following commands will open the quota file for a specific user? A. quota -u B. quotaon -u C. edquota -u D. repquota -u

C. edquota -u

Which of the following commands would you use to find all of the files on the system that have either blue or gold in their names? A. find ..-print0 '**blue***' -o '***gold***' B. find .-name '***blue***' -o -name '***gold***' C. find / -name '***blue***' -o -name '***gold***' D. find ..-name '***blue***' -o '***gold**'

C. find / -name '**blue***' -o -name '***gold**'

A user calls the help desk. Each time he creates a new text file, permissions of 640 are applied to the file and he must use chmod to set them to 644. What command should you enter in the user's profile to set the default permission for newly created files to 644? A. umask 640 B. umask -640 C. umask 0022 D. umask 0027

C. umask 0022

Your ext3 filesystem has experienced a significant amount of corruption. To examine the filesystem, you want to use the debugfs utility. Which debugfs option should you use to examine the filesystem? A. -f B. -V C. -w D. -c

D. -c

You suspect your /dev/sda3 partition is in need of repair. Which of the following e2fsck options will repair the errors without any interaction from you? A. -f B. -b C. -n D. -p

D. -p

You have a critical file called yearend.xls. You want to set file permissions so that only the owner of the file can modify it and only group owners can read it. Which permission listed below will accomplish that? A. -rwxrwxr-- 1 george acctg 26256 June 1 04 :16 yearend .xls B. -r--r--r-- 1 george acctg 26256 June 1 04 :16 yearend.xls C. -r-xr-x--- 1 george acctg 26256 June 1 04 :16 yearend .xls D. -rw-r----- 1 george acctg 26256 June 1 04 :16 yearend .xls

D. -rw-r----- 1 george acctg 26256 June 1 04 :16 yearend .xls

You are preparing to mount a device local to your system.Which directory holds the device files? A. /local/dev B. /devices C. /opt/dev D. /dev

D. /dev

Which file shows the currently mounted volumes? A. /etc/mount B. /etc/fstab C. /etc/ mount.conf D. /etc/mtab

D. /etc/mtab

Which of the following sets of octal permissions would allow everyone to execute the following file as if they were the root user? -rwxr-xr-x 1 root root 8045 July 24 2004 myscript A. 1655 B. 0755 C. 4744 D. 4755

D. 4755

You are called into the office of a newly hired manager. He has copied a file from his old place of work onto his new workstation, but is now receiving an error message that access is denied each time he tries to access the file. He is not the owner of the file, and not a member of the group the file is associated with. Which of the following represents the least set of file permissions needed for him to be able to read and write to the file? A. 111 B. 222 C. 444 D. 666

D. 666

Which hexadecimal code represents an extended partition? A. Ox82 B. Ox83 C. Ox88 D. Ox85

D. Ox85

Which of the following special permissions will prevent a file's deletion by anyone except the file owner? A. Umask B. SUID C. SGID D. Sticky bit

D. Sticky bit

You previously created symbolic links in your home directory to a set of files in the /data directory using the ln -s command. The system administrator has just deleted those files.What happens to the links that you created? A. The files would not be deleted because you created duplicate entries in the file system when you created the links. B. You would still be able to access the files until the system is rebooted even though they are deleted because the links keep a cached copy of the files in memory. C. The links in your home directory would disappear because the files that they were linked to are now gone. D. The symbolic links would still exist in your home directory but they would now be broken.

D. The symbolic links would still exist in your home directory but they would now be broken.

You have put a new hard disk in your system and created two primary partitions (sdb1 and sdb2) and one extended partition (sdb3). You have just formatted sdb1 with ext3 and sdb2 as a swap area. When you try to format sdb3 as a swap area,you are unable to. What is the problem? A. The swap area must be on the first partition on a drive. B. You cannot format an extended partition as a swap area (you must use a primary partition). C. You can only have one swap area on a single drive. D. You cannot format an extended partition.

D. You cannot format an extended partition.

You must change ownership of a script called myscript so that only the user owner has read/write access to it and only the user owner and group owner have execute permissions. Which of the following commands would accomplish this? A. chmod 771 myscript B. chmod 755 myscript C. chmod 611 myscript D. chmod 750 myscript

D. chmod 750 myscript

A user is trying to access a file system mounted at /mnt/sdb1 but receives an error No such file or directory. Which commands can you use to see the current mount points? (Choose two.) A. mounts B. mntfs C. fsck D. df E. mount F. mntchk

D. df E. mount

Which command allows you to use an alternative superblock when the primary superblock has been corrupted? A. fsck /dev/sd1 B. mke2fs -n /dev/sda1 C. mkfs -t ext2 /dev/sda1 D. e2fsck -b 16385 /dev/sda1

D. e2fsck -b 16385 /dev/sda1

You have added a second hard disk to your Linux system. Which of the following commands will allow you to partition the new drive? A. format /dev/sdb1 B. fdisk /sd0-1 C. fdisk /dev/sdc D. fdisk /dev/sdb

D. fdisk /dev/sdb

You have successfully partitioned the forth hard drive into 2 primary partitions.You need to format the second partition with the ext3 filesystem. Which command will work? A. fdisk -e3 /dev/sdb2 B. mke2fs -e3 /dev/sdd2 C. format -e3 sdb2 D. mke2fs -j /dev/sdd2

D. mke2fs -j /dev/sdd2

You have an XFS filesystem in your Linux system represented by /dev/sdb1. You need to copy all the filenames on the drive to the /reviewxfs file. You must be able to read the filenames in the /reviewxfs file. Which of the following commands should you use? A. xfs_growfs -n /dev/sdb1 /reviewxfs B. xfs_metadump -e /dev/sdb1/reviewxfs C. xfs_info /dev/sdb1 /reviewxfs D. xfs_metadump -o /dev/sdb1 /reviewxfs

D. xfs_metadump -o /dev/sdb1 /reviewxfs

Which of the following commands will create an ext2 filesystem on the first primary partition of the third hard drive? (Choose 2.) A. format -ext2 /dev/sdc1 B. mkfs -t e2 /dev/sdc1 C. mkext2fs /dev/sdc1 D. mke2fs -t e2 /dev/sdc1 E. mkfs -t ext2 /dev/sdc1 F. mke2fs /dev/sdc1

E. mkfs -t ext2 /dev/sdc1 F. mke2fs /dev/sdc1

You have partitioned and formatted a new hard drive, sdc. You want to mount the first partition on sdc to directory /mnt/newdisk. Which command will perform the mount correctly? A. mount /dev/sdc /mnt/newdisk B. mount /sdc1 /mnt/newdisk C. mount /dsk/sdc_first /mnt/newdisk D. mount /mnt/newdisk /dev/sdc1 E. mount /dev/sdc1 /mnt/newdisk

E. mount /dev/sdc1 /mnt/newdisk

Which file system is a FAT32 filesystem for Linux?

VFAT

Which command will change the group ownership for the devstyle.txt file to rand in the present working directory? (Tip: Enter the command as if at the command prompt.)

chgrp rand devstyle.txt

Which command will list all files and directories in the badams home directory along with a file size and a total amount of space taken up by the directory? (Tip: Enter the command as if at the command prompt.)

du /home/badams

You need to enable quotas for the file system mounted as the /home directory? (Tip: Assume the aquota.user and aquota.group tiles exist in /home, and enter the command as if at the command prompt.)

quotaon /home

You created a swap area on sda3, but it is not activated. Which command should you use to activate the swap partition? (Tip: Enter the command as if at the command prompt.)

swapon /dev/sda3

You need to convert the filesystem of /dev/sdb3 from ext2 to ext3 without affecting the data on the drive. What command and option should you use? (Tip: Enter the command as if at the command prompt.)

tune2fs -j /dev/sdb3

After using the locate command, you discover some of your files are not being listed in the search results. Which command should you use to update the /var/log/locatedb file? (Tip: Enter the command as if at the command prompt.)

updatedb

You use a program on your Linux system named photorec. Which command will display the path to the photorec binary file? (Tip: Enter the command as if at the command prompt.)

which photorec


Set pelajaran terkait

Operating Systems Ch. 7 Deadlock

View Set

8.10.4 Documenting Sources: In-Text Citations

View Set

Mobility (ATI Engage Fundamentals) Funds 100

View Set