Exam 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The ____ ftp utility command runs a shell on the local computer.

!

The ____ option for the sar command is used to display swap statistics.

-B

The ____ option to the iptables command can be used to specify the default policy for a certain chain type.

-P

To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.

-V

When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.

-c

The ____ option to the iptables command can be used to specify the destination address of packets for a rule.

-d

To remove a package from the system, you can use the ____ option to the rpm command.

-e

When used with the compress command, the ____ option can be used to compress symbolic links.

-f

The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.

-l

When using the cpio utility, the ____ option causes a new archive to be created.

-o

The ____ option for the sar command is used to displays statistics for the processor queue.

-q

The ____ option can be used with the tar command to extract a specified archive.

-x

When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.

.Z

The filename extension given to files compressed with bzip2 is ____.

.bz2

One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

/etc/hosts.equiv

The file that contains a list of directories that contain shared libraries.

/etc/ld.so.conf

The directory that contains most system log files.

/var/log

The ____ zone configuration file contains a PTR record used to identify the loopback adapter.

/var/named/named.local

In NTP, stratum ____ consists of atomic devices or GPS clocks.

0

The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

0.0.0.0 & 255.255.255.255

A notation that is often used to represent an IP address and its subnet mask

CIDR

A hierarchical namespace used for host names

DNS

____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet.

DNS

A server that contains the IP addresses of DNS servers that hold top-level DNS zones.

DNS cache file

The ____ SQL statement is used to delete a database.

DROP DATABASE

The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.

DirectoryIndex index.html

A host name that follows DNS convention

FQDN

Almost all hardware problems are the result of damaged hardware.

False

If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.

False

Performance problems are caused by hardware, not software.

False

Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.

False

When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory.

False

When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.

False

When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.

False

When working with Sendmail, you can use the ____ command to test SMTP support.

HELO

____ are the most common hardware component to fail on Linux systems.

Hard Disks

A company that provides internet access

ISP

The networks in which the computers are all close in proximity

LANs

A room where you lock important computers, such as Linux servers, and to which only Linux administrators or trusted users have key access is commonly called a(n) server closet.

True

All DNS servers contain a DNS cache file.

True

By default, the smb.conf file shares all printers and home directories for recognized Windows users.

True

If the / filesystem becomes corrupted, the system is unstable and must be turned off.

True

It is good form to read the Makefile after you run the configure script.

True

The Very Secure FTP daemon is a stand-alone daemon.

True

The compress utility preserves the original ownership, modification, and access time for each file that it compresses.

True

The tar utility cannot back up device files or files with filenames longer than 255 characters.

True

The use of NFS is less common than the use of FTP to transfer files on public networks.

True

NTP uses port ____.

UDP 123

The networks in which computers are separated geographically by large distances.

WLAN

A utility that can be used to obtain graphical utilities from a remote Linux computer in order to perform system administration

X Windows

Can symbolic links be compressed by the gzip utility?

Yes

Can the contents of a compressed file be viewed page-by-page?

Yes

Should system documentation be printed?

Yes

A portion of the Domain Name Space that is administered by one or more DNS servers.

Zone

The ____ command can be used in the BASH prompt to obtain a Web page from the Apache server.

curl

A line within the httpd.conf configuration file.

directive

A directory that contains the default Web site that is used on a server.

document root

A DNS name resolution request whereby a FQDN is resolved to an IP address.

forward lookup

IPv6 IP addresses are written using eight 16-bit ____ numbers.

hexadecimal

Computer names are called ____.

host names

The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

ifconfig

The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.

make

The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.

mput filename

When working with Sendmail, if you modify the /etc/aliases file, you need to run the ____ command to rebuild the aliases database

newaliases

To see what network services are running on your network, you can run the ____ command.

nmap

Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.

nohup

The ____ PostgreSQL command-line utility backs up PostgreSQL database settings.

pg_dump

The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

ping

The measures taken to reduce future system problems.

proactive maintenance

Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.

public; private

The measures taken when system problems arise.

reactive maintenance

A DNS resolution request that was resolved with the use of top-level DNS servers.

recursive query

A DNS name resolution request whereby an IP address is resolved to a FQDN.

reverse lookup

The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

rlogin

In SSH, the /etc/ssh directory stores the DSA public key in the ____ file.

ssh_host_dsa_key. pub

The ____ command can be used to obtain root access when you need to perform an administrative task.

su

A command that gives users the ability to run certain commands as the root user.

sudo

Databases store information in the form of ____, each of which contains ____.

tables; records

A utility that can be used to run remote applications on a Linux computer

telnet

By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.

ten

All Linux problems can be divided into ____ categories.

three

The /etc/resolv.conf file can contain up to ____ DNS servers.

three

A common utility used to troubleshoot routing is the ____ command.

traceroute

A command that can be used to increase the number of processes that users can start in the shell.

ulimit

A utility that can be used to indicate whether more physical memory is required.

vmstat

Remote computers can connect to a configured VNC server using the ____ command.

vncviewer

The ____ command can be used to display the contents of a compressed file.

zcat

The compression algorithm used by the compress utility has an average compression ratio of ____%.

40-50

If no level of compression is specified, the gzip command assumes the number ____.

6

The average compression ratio for gzip is ____%.

60-70

Each octet in an IP address represents a(n) ____ binary number.

8-bit

IPv6 IP addresses are delimited by the ____ character.

:

Open source program for Braille translation

Orca

Client computers can retrieve e-mail from e-mail servers via ____ or ____.

POP; IMAP

A tool used by network applications that authenticate users.

Pluggable Authentication Modules (PAM)

When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.

SIGHUP

A programming language used to store and access data in databases.

SQL

A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic

SSH

____ is a remote administration tool that encrypts information that passes across the network.

Secure Shell (SSH)

Apache daemon listens for HTTP requests on port ____.

TCP 80

A(n) ____ is a program that can start a network daemon.

TCP Wrapper

The most common LAN protocol used today is ____.

TCP/IP

NetBIOS names can be up to ____ characters long.

15

The subnet mask for a Class B IP address is ____.

255.255.0.0

The subnet mask for a Class C IP address is ____.

255.255.255.0

The shell restricts the number of file handles that programs can open to ____ by default.

1024

A protocol that allows computers to share files transparently.

Network File System (NFS)

You can perform up to ____ different incremental backups using the dump/restore utility.

Nine

Are hardware-related problems typically more difficult to identify and resolve than software-related problems?

No

Can the bzip2 utility be used to compress a directory full of files?

No

Does the tar utility compress files inside an archive?

No

When implementing possible solutions to a problem, should you apply all of the changes simultaneously?

No

Most Linux distributions today use ____ as their package manager.

RPM


Set pelajaran terkait

chapter 30 - drug therapy to decrease histamine effects

View Set

Customer Relationship Management

View Set

intl studies 1 - quiz 2 questions

View Set

MGMT 365 Chapter 4 Connect Test Questions

View Set

Chapter 4: Analyzing the Market Environment

View Set

Chapter 2: Collecting Subjective Data: The Interview and Health History

View Set

EMR Test #1 (Chapters 1-7) Practice Questions

View Set