Linux, Chapter 7-13 Final Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Ch7- True/False: Because Standard Error and Standard Ouput represent the results of a command and Standard Input represents the input required for a command, only Standard Error and Standard Ouput can be redirected to/from a file.

False

Ch13- Which SQL statement key word can be used to delete a record within a table? Select one: a. REMOVE b. CLEAR c. DELETE d. DROP

DELETE

CH8- Which of the following statements is true? Select one: a. The boot loader points to the active partition. b. Either the MBR/GPT or the active partition can contain the boot loader. c. The boot loader points to the MBR/GPT. d. Both the MBR/GPT and the active partition point to the boot loader.

Either the MBR/GPT or the active partition can contain the boot loader.

Ch7- Before a user-defined variable can be used by processes that run in subshells, that variable must be __________. Select one: a. exported b. validated by running the env command c. redirected to the BASH shell d. imported

Exported

Ch10- True/False: Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry.

False

Ch11- True/False: The bzip2and gziputilities use similar compression algorithms.

False

Ch11- True/False: To install a new program from RPM software repositories on the Internet, you can use the yum update programname command.

False

Ch12- True/False: Standalone daemons are started on demand using inetd or xinetd.

False

Ch13- True/False: NFS can be used to share files natively with computers running the Microsoft Windows operating system.

False

Ch10- What is the name used to describe a user providing a user name and password to log in to a system? Select one: a. authorization b. validation c. authentication d. login

authentication

Ch7- Which of the following will display the message welcome home if the cd /home/user1 command is successfully executed? Select one: a. echo "welcome home" && cd /home/user1 b. cd /home/user1 && echo "welcome home" c. cd /home/user1 || cat "welcome home" d. cat "welcome home" || cd /home/user1

cd /home/user1 && echo "welcome home"

Ch8- Which of the following commands can be used to start a UNIX SysV daemon called lala in runlevels 1, 2 and 3? Select one: a. update-rc.d lala defaults b. systemctl enable lala 123 c. service enable lala 123 d. chkconfig --level 123 lala on

chkconfig --level 123 lala on

Ch9- What command is used to view and modify user jobs scheduled to run with cron? Select one: a. sched b. cron c. crontab d. ps

crontab

Ch9- What is the name given to a process not associated with a terminal? Select one: a. daemon process b. child process c. user process d. parent process

daemon process

Ch12- Before a computer can use a router, what configuration information must it be provided? Select one: a. routing table b. subnet mask c. default gateway d. default router

default gateway

Ch11- Which option to the rpm command can be used to remove a package from the system? Select one: a. U b. u c. r d. e

e

Ch7- The current value for the HOME variable is displayed by which of the following commands? (Choose all that apply.) Select one or more: a. echo $HOME b. echo HOME= c. echo ~ d. echo ls HOME

echo $HOME echo ~

Ch10- When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information. Select one: a. facility, priority b. process, degree c. service, precedents d. section, priority

facility, priority

Ch7- Every if construct begins with if and must be terminated with? Select one: a. endif b. stop c. end d. fi

fi

Ch9- The term used to describe a process spawning or initiating another process is referred to as_____. Select one: a. branching b. forking c. a child process d. parenting

forking

Ch8- The first daemon loaded on a Linux system is _____. Select one: a. initstate b. inittab c. init d. linux

init

Ch12- Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.) Select one or more: a. traceroute b. ip c. ipconfig d. route

ip route

Ch9- A runaway process that is faulty and consuming mass amounts of system resources ________. Select one: a. has a PPID of Z b. is a rogue process c. is a zombie process d. is an orphaned process

is a rogue process

Ch9- Which command can be used to see processes running in the background? Select one: a. jobs b. fg c. bg d. ps -%

jobs

Ch13- Which command within the command-line FTP utility can be used to change the current directory on the local computer? Select one: a. cd b. get c. lcd d. dir

lcd

Ch12- The TCP/IP address of 127.0.0.1 is also referred to as the _____. Select one: a. loopback address b. local host c. lookup address d. local address

loopback address

Ch10- Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.) Select one or more: a. lp -d Printer1 file b. lp Printer1 file c. lp file d. lp -m Printer1 file

lp -d Printer1 file lp file

Ch7- Which of the following operators reverses the meaning of a test statement? Select one: a. -a b. #! c. ! d. -o

!

Ch8- Which of the following indicates the second partition on the third hard disk drive to GRUB? Select one: a. (hd2,3) b. (hd2,1) c. (hd3,2) d. (hd4,3)

(hd2,1)

Ch9- Nice values are used to affect process priorities using a range between _____________. Select one: a. 0 and -19 b. -19 and 20 c. 0 and 20 d. -20 and 19

-20 and 19

Ch11- When compiling source code into a binary program, which command performs a system check and creates the Makefile? Select one: a. make install b. ./configure c. tar d. make

./configure

Ch11- Which filename extension indicates a tarball? Select one: a. .dump b. .tar.gz c. .gz d. .tar

.tar.gz

Ch11- Which file contains full and incremental back-up information for use with the dump/restore utility? Select one: a. /etc/dumpfile b. /etc/dumpdates c. /etc/dumps d. /etc/dump.conf

/etc/dumpdates

Ch12- What are two means available to resolve a host name to the appropriate TCP/IP address? (Choose two answers.) Select one or more: a. /etc/resolve.conf b. /etc/hosts c. DHCP d. DNS

/etc/hosts DNS

Ch13- Which file stores the Apache configuration in Fedora? Select one: a. /etc/httpd.conf b. /etc/apache2/httpd.conf c. /etc/apache2.conf d. /etc/httpd/conf/httpd.conf

/etc/httpd/conf/httpd.conf

Ch10- What is the name of the file that contains a listing of all users on the system and their home directories? Select one: a. /etc/passwd b. /etc/password c. /etc/shadow d. /etc/users

/etc/passwd

Ch7- Which of the following files is always executed immediately after any user logs in to a Linux system and receives a BASH shell? Select one: a. ~/.profile b. ~/.bash_login c. ~/.bash_profile d. /etc/profile

/etc/profile

Ch12- Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC? Select one: a. /etc/resolv.conf b. /etc/host.conf c. /etc/resolve d. /etc/hosts

/etc/resolv.conf

Ch12- Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system? Select one: a. /etc/sysconfig/network-scripts/ipcfg-eth1 b. /etc/sysconfig/network-scripts/ifcfg-eth1 c. /etc/sysconfig/network-scripts/ifcfg-eth0 d. /etc/sysconfig/network-scripts/ipcfg-eth0

/etc/sysconfig/network-scripts/ifcfg-eth0

Ch10- Most log files on the system are found in which directory? Select one: a. /etc/logfiles b. /dev/log c. /var/log d. /etc/log

/var/log

Ch11- Which dump level indicates a full backup? Select one: a. 0 b. 9 c. 1 d. f

0

Ch8- Which runlevel halts the system? Select one: a. 6 b. 0 c. 1 d. 5

0

Ch11- You have created a full backup and four incremental backups. In which order must you restore these backups? Select one: a. 1,2,3,4,0 b. 0.4.3.2.1 c. 0,1,2,3,4 d. 4,3,2,1,0

0,1,2,3,4

Ch7- Which of the following file descriptor numbers represents stdout? Select one: a. 2 b. 3 c. 1 d. 0

1

Ch7- How do you indicate a comment line in a shell script? Select one: a. Begin the line with #!. b. There are no comment lines in a shell script. c. Begin the line with ! d. Begin the line with #

Begin the line with #

Ch13- Which DNS resource record is an alias to other records? Select one: a. NS b. CNAME c. AAAA d. A

CNAME

Ch13- What must you do in order to become a DNS server? (Choose all that apply.) Select one or more: a. Create zone files. b. Run the name daemon (named). c. Create NIS maps. d. Create resource records for DNS lookups.

Create zone files. Run the name daemon (named).

Ch13- You have opened a telnet session on port 25 on your email server. What command can you type within your telnet session to start an email session? (Choose all that apply.) Select one or more: a. HELO b. EHLO c. START d. WAZUP

HELO EHLO

Ch9- Which of the following statements is true? (Choose all that apply.) Select one or more: a. If /etc/cron.allow exists, only users listed in it can use the cron command. b. If /etc/at.allow exists, only users listed in it can use the at command. c. If a user is listed in both /etc/cron.allow and /etc/cron.deny, then /etc/cron.deny takes precedence and the user cannot access the crontab command. d. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command.

If /etc/cron.allow exists, only users listed in it can use the cron command. If /etc/at.allow exists, only users listed in it can use the at command. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command.

Ch7- What does >> accomplish when entered on the command line after a command? Select one: a. It does not accomplish anything b. It redirects Standard Error and Standard Input to the same location c. It appends Standard Ouput to a file d. It redirects both Standard Error and Standard Ouput to the same location

It appends Standard Ouput to a file

Ch8- Which of the following statements is true? Select one: a. The GRUB2 boot loader is often used on legacy Linux systems. b. The GRUB boot loader is stored in the /usr/grub directory. c. LILO needs to be reinstalled after it has been modified. d. GRUB needs to be reinstalled after it has been modified.

LILO needs to be reinstalled after it has been modified.

Ch7- What is wrong with the following command string ls /etc/hosts >listofhostfile? Select one: a. The ls command is one of the commands that cannot be used with redirection; you must use | to pipe instead b. Nothing is wrong with the command c. The file descriptor was not declared; unless 1 for Standard Ouput or 2 for Standard Error is indicated, the command will fail d. The file listofhostfile will always only contain Standard Error as a file descriptor was not declared

Nothing is wrong with the command

Ch12- Which Windows program is often used to connect to a Linux server via SSH? Select one: a. Putty b. Rdesktop c. SSHD d. mstsc

Putty

Ch13- Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do? Select one: a. Run the dhcpconf command to edit the configuration file. b. Log in as the root user and reedit the configuration file. c. Restart the DHCP daemon. d. Restart the xinetd daemon.

Restart the DHCP daemon.

Ch13- You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it can not be delivered. What should you do? Select one: a. Restart the Postfix daemon. b. Add the line to the /etc/aliases.db file instead. c. Run the newaliases command. d. Log out of the system and then log back into the system and resend the email.

Run the newaliases command.

Ch10- True/False: You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd.

True

Ch10- True/false: You can clear a log file simply by redirecting nothing in to it.

True

Ch11- True/False: Most source code is available on the Internet in tarball format.

True

Ch11- True/False: The -9 option to the gziputility results in a higher compression ratio.

True

Ch12- SSH encrypts all traffic that passes across the network, whereas telnet does not.

True

Ch12- True/False: A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address.

True

Ch13- True/False: Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon.

True

Ch13- True/False: DHCP clients send a DHCPREQUEST packet when they require a new IP configuration.

True

Ch7- True/False: The alias command can be used to make a shortcut to a single command.

True

Ch7- What would be the effect of using the alias command to make an alias for the date command named cat in honor of your favorite pet? Select one: a. It cannot be done as there already is an environment variable cat associated with the cat command. b. It cannot be done as there already is a command cat on the system. c. There is no effect until the alias is imported as it is a user-declared variable. d. When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead.

When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead.

Ch-8 Which two implementations of X Windows are commonly used in Linux? (Choose two answers.) Select one or more: a. XFce b. X.org c. Xconfigurator d. XFree86

X.org XFree86

Ch7- You have redirected Standard Error to a file called Errors. You view the contents of this file afterward and notice that there are six error messages. After repeating the procedure, you notice that there are only two error messages in this file. Why? Select one: a. After you open the file and view the contents, the contents are lost b. You did not append the Standard Error to the Errorfile and as a result, it was overwritten when the command was run a second time c. The system generated different Standard Ouput d. You must specify a new file each and every time you redirect as the system creates the specified file by default

You did not append the Standard Error to the Errorfile and as a result, it was overwritten when the command was run a second time

Ch9- The killall command terminates _________. Select one: a. all instances of a process with the same PPID b. all instances of a process with the same PID c. all instances of a process with the same name d. all instances of a process with the same priority

all instances of a process with the same name

Ch12- To test DNS configuration by resolving a host name to IP address, which command or commands can you use? (Choose all that apply.) Select one or more: a. nslookup hostname b. dig hostname c. host hostname d. resolve hostname

nslookup hostname dig hostname host hostname

Ch9- Every process has a process ID and a_______. Select one: a. daemon b. fork process c. parent process ID d. child process

parent process ID

Ch12- The daemons associated with network services listen for network traffic associated with a particular _____. Select one: a. station b. TCP/IP address c. allocation number d. port

port

Ch10- The process of sending print jobs from the print queue to the printer is called? Select one: a. redirecting b. printing c. spooling d. queueing

printing

Ch9- Which command entered without arguments is used to display a list of processes running in the current shell? Select one: a. ps b. list c. pid d. ppid

ps

Ch7- Which construct can be used in a shell script to read Standard Input and place it in a variable Select one: a. sum b. verify c. test d. read

read

Ch9- Which of the following commands will most likely increase the chance of a process receiving more time slices? Select one: a. renice 19 b. renice 15 c. renice -12 d. renice 0

renice -12

Ch12- What devices are used to transfer information from one network to another? Select one: a. DNS servers b. routers c. DHCP servers d. LANs

routers

Ch9- The at command is used to _______________. Select one: a. schedule processes to run at a single instance in the future b. schedule processes to run periodically on a recurring basis in the future c. schedule processes to run periodically in the background d. schedule processes to run in the foreground

schedule processes to run at a single instance in the future

Ch8- What keyword can be specified within a boot loader to force the system to boot to Single User Mode? Select one: a. init b. single c. rescue d. telinit

single

Ch13- Which command can be used to connect to a remote Windows share called data on the server called fileserver? Select one: a. smbclient -L //fileserver/data b. smbclient -L fileserver:data c. smbclient \\fileserver\data d. smbclient //fileserver/data

smbclient //fileserver/data

Ch8- Which command can be used to start X Windows, the window manager, and the default desktop environment? Select one: a. stargui b. startgdm c. startx d. gstart

startx

Ch8- Which of the following Systemd commands can be used to stop a daemon called lala? Select one: a. service stop lala b. systemctl stop lala.service c. chkconfig stop lala d. stop lala

systemctl stop lala.service

Ch11- Which of the following commands creates an archive? Select one: a. tar -tvf /dev/st0 b. tar -cvf /dev/st0 c. tar -xvf /dev/st0 d. tar -zcvf /dev/st0

tar -zcvf /dev/st0

Ch10- When a printer is disabled, ________. Select one: a. the print queue redirects all print jobs sent to it to /dev/null b. the printer appears as off-line when a lp request is sent c. the print queue does accept jobs into the print queue and holds them there until the printer is enabled again d. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

the print queue does accept jobs into the print queue and holds them there until the printer is enabled again

Ch9- Which command is used to gain real-time information about processes running on the system with the most processor-intensive processes listed at the beginning of the list? Select one: a. top -l b. ps -elf c. top d. ps

top

Ch9- True/False: As daemon processes are not associated with terminals, you must use the -e switch with the ps command to view them.

true

Ch10- Which command is used to delete a user account? Select one: a. usermod -d username b. rm username c. userdel username d. del username

userdel username

Ch10- Which command can you use to lock a user account? Select one: a. useradd -L username b. lock username c. usermod -L username d. secure username

usermod -L username

Ch8- Which command can be used to fine-tune the vsync and hsync of a video card for use in X Windows? Select one: a. vhtune b. vidtune c. synctune d. xvidtune

xvidtune

Ch11- Which of the following commands can be used to search for packages that contain the word oobla on RPM software repositories? Select one: a. rpm -qS oobla b. yum search oobla c. rpm -ql oobla d. yum list oobla

yum search oobla


Set pelajaran terkait

Fundamentals- Exam 2 Practice Questions

View Set

Introduction to Computer Science Post-Test

View Set

Alterations in Sensory and Integument

View Set

Psychology of personality weeks 1-6

View Set

Cognitive Psychology Goldstein 4th Ed. Chapter 12

View Set

NUR316 prepu Ch. 21 antidepressant agents

View Set