Linux final exam
Linux directory defined by the FHS that contains the binary commands for use by all users.
/bin
directory contains the Linux kernel and boot files
/boot
Linux directory defined by the FHS that contains device files
/dev
Linux directory defined by the FHS that contains system-specific configuration files
/etc
file is used to mount devices at boot time and it is also consulted when users do not specify enough arguments with the mount command
/etc/fstab (filesystem table)
What is the name of the file that contains a listing of all users on the system and their home directories? a. /etc/passwd b. /etc/users c. /etc/shadow d. /etc/password
/etc/passwd
file contains the encrypted password and expiration information
/etc/shadow
directory is the default location for user home directories
/home
Linux directory defined by the FHS that contains process and kernel information
/proc
Linux directory defined by the FHS that contains most system commands and utilities
/usr
Linux directory defined by the FHS that contains log files and spools
/var
1. The bzip2 and gzip utilities use similar compression algorithms. True or False?
False
After a partition on a hard disk drive is formatted with a filesystem, all partitions on that hard disk drive must use the same filesystem. True or False?
False
Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry. True or False?
False
After typing the ls -F command, you notice that there is a file whose filename begins with an * (asterisk). What does this mean? a. It is a hidden file. b. It is a linked file. c. It is a special device file. d. It is an executable file.
It is an executable file
Linux was developed by __________ to resemble the _________ operating system. a. Linus Torvalds, MINIX b. Linux Torvalds, GNU c. Richard Stallman, GNU d. Richard Stallman, MINIX
Linus Torvalds, MINIX
a Linux system involves examining log files and running performance utilities periodically to identify problems and their causes
Monitoring
refers to all of the other users on the Linux system
Other (everyone else on the Linux System) permissions
command displays the current directory in the directory tree
PWD (Print Working Directory)
Who formed the Free Software Foundation to promote open development? a. Dennie Ritchie b. Richard Stallman c. Linus Torvalds d. Ken Thompson
Richard Stallman
set on a file, the user who executes the file temporarily becomes the owner of the file during execution. It has no functionality when it is set on a directory. It is only applicable to binary compiled programs. Any user can test network connectivity with the ping command
SUID (Set User ID)
Which of the following can be used on Linux to provide file and print services? a. Samba b. Apache c. Quid d. Pine
Samba
is a file descriptor that refers to any error messages generated by the command
Standard error (stderr)
is a file descriptor that refers to the information processed by the command during execution, and is often takes the form of user input typed on the keyboard
Standard input (stdin)
is a file descriptor that refers to the normal output of a command
Standard output (stdout)
1. Most source code is available on the Internet in tarball format. True or False?
True
The -9 option to the gzip utility results in a higher compression ratio. True or False?
True
1. Which two implementations of X Windows are commonly used in Linux? (Choose two answers.) a. X.org b. XFce c. Xconfigurator d. XFree86
a. X.org d. XFree86
When applied to a directory, the SGID special permission____________________. a. causes all new files created in the directory to have the same group membership as the directory and not the entity that created them b. cannot be done as it is only applied to files c. allows users the ability to use more than two groups for files that they create within the directory d. causes users to have their permissions checked before they are allowed to access files in the directory
a. causes all new files created in the directory to have the same group membership as the directory and not the entity that created them
1. On which part of the maintenance cycle do Linux administrators spend the most time? a. monitoring b. proactive maintenance c. reactive maintenance d. documentation
a. monitoring
daemon is a system daemon that executes tasks once at a future time.
at
filter command searches for patterns of text and perform some action on the text found
awk
1. Which utility can be used to configure the video card and monitor used by X Windows in Red Hat Fedora Core 2? a. X.config b. system-config-display c. xconfig d. xvidtune
b. system-config-display
As a result, each process has a _______________________, which identifies the process that started it.
parent process ID (PPID)
a physical division of a hard drive
partition
command merges data from one file to another
paste
command is used to paginate text. This is good for printing text because it is often desirable to separate the pages of the output with several lines of white space to provide a top and bottom margin for each page
pr
Every process has a unique ___________________ that allows the kernel to identify it uniquely
process ID (PID)
command simply displays a list of processes that are running in the current shell
ps
Which command would a user type on the command line to find out what directory in the directory tree he is currently located in? a. pd b. cd c. where d. pwd
pwd
command displays the current runlevel of the system and the previous runlevel
runlevel
The default permissions given by the system prior to analyzing the umask are ___________for directories, and __________ for files. a. rw-rw-rw- and rw-rw-rw- b. rw-rw-rw- and r--r--r-- c. rw-rw-rw- and rwxrwxrwx d. rwxrwxrwx and rw-rw-rw- e. rwxrw-rw- and rwx-rw-rw-
rwxrw-rw- and rwx-rw-rw-
filter command searches for a certain string of text and replaces that text string with another text string
sed
previously used on files in the past to lock them in memory. However, they are currently applicable to directories. This ensures that a user can only delete his/her own files in a directory
sticky bit
This command updates the Linux distribution
sudo apt-get dist-upgrade
This command installs the basic word processing program called gedit on the raspberry pi. It is a great program similar to NotePad
sudo apt-get install gedit
This command updates the repositories (libraries) on the raspberry pi
sudo apt-get update
This command updates the software on the raspberry pi
sudo apt-get upgrade
This commands shuts down the computer in 15 minutes?
sudo shutdown -h +15
This commands restarts the computer right now?
sudo shutdown -r now
link is where one file is simply a pointer or shortcut to another file
symbolic
command displays the last 10 lines by defaultcommand displays the last 10 lines by default
tail
utility is one of the oldest and most widely used backup utilities. It can create an archive in a file on a filesystem or directly on a device.
tape archive (tar)
command is a filter command that takes information from Standard Input and sends that information to a file, as well as to Standard Output
tee
State the two required partitions (at a minimum) for a Linux system
the root partition the swap partition for virtual memory
command displays an interactive screen listing processes organized by processor time. Processes that use the most processor time are listed at the top of the screen
top
command can be used to replace characters in a file sent via Standard Input
tr
As daemon processes are not associated with terminals, you must use the -e switch with the ps command to view them. True or False?
true
If these default permissions are too permissive, a special variable on the system named ________________ takes away permissions on new files and directories immediately after they are created. This command is meant to be used for newly created files and directories.
umask(user mask)
command is used to find duplicate lines from a sorted file. (sorted first then you need words)
uniq
refers to the owner of a file or directory
user (owner) permissions
a partition with its own filesystem
volume
command only searches for executable files in directories that are listed in a special variable called the PATH variable in the current BASH shell
which
command is used to display the contents of a compressed file using the gzip utility
zcat
While a process is waiting for its parent process to release the PID, the process is said to be in a ________________ state, because it has finished but retains a PID.
zombie
What are the three standard Linux permissions?
execute, read, write
command creates partitions after installation. The user needs to specify the hard disk partition as an argument
fdisk
command does not use a premade index of files, but instead searches the directory tree recursively starting from a certain directory for files that meet a certain criterion
find
command checks a filesystem for errors
fsck (filesystem check)
is the protocol most commonly used to transfer files on public networks
ftp
A __________________________ backup archives all of the data on the filesystem.
full
command is used to display lines in a text file that match a certain common regular expression
grep (global regular expression print)
refers to the users with the ability to change permissions on a file or directory
group owner permissions
uses the .gz filename extension by default and can control the level of compression via a numeric option (based on time needed to compress the file).
gzip utility
link is where two files share the same data
hard
command views the first ten lines of a file. (gives you the first ten lines)
head
files that are not normally displayed to the user and ls -a command displays all files them
hidden files
shuts down your raspberry pi
init 0
reboots your raspberry pi
init 6
command lists all background processes running in the current shell
jobs
command is the most common command used to terminate a process. It sends a kill signal to the process.
kill
command kills all instances of a process by the command name. It uses the process name instead of its PID
killall
command is the fastest method to search for files in the Linux directory tree
locate
command lists the files in a directory
ls
command is used to format a disk device with a filesystem
mkfs (make filesystem)
command displays the text files page-by-page. You can use the space bar to go to the next page or you can use the enter key to go to the next line
more
Each line of the /etc/shadow file has the following colon-delimited format:
name:password:lastchange:min:max:warn:disable1:disable2
command scans the ports on network computers
nmap (network mapper)
command prevents the background processes from being killed when parent shell is killed or exited
nohup
What is the most common open source Web server available for Linux? a. Samba b. Apache c. Quid d. Pine
Apache
1. What is the default shell in Linux called? a. SH b. BSH c. CSH d. BASH
BASH
1. After typing the ls -F command, you see the following line in the output: -rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1 What does this mean? a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file. b. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file. c. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. d. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file.
User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.
is a core component of the Linux GUI. It provides the ability to draw graphical images in windows that are displayed on the terminal screen
X Windows
The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need to have support in Linux for new hardware b. when you need another user interface c. when you need to increase the stability of Linux d. when you need to use kernel modules
a,c
1. Which filename extension indicates a tarball? a. .tar.gz b. .cpio c. .dump d. .tar
a. .tar.gz
1. You have created a full backup and four incremental backups. In which order must you restore these backups? a. 0, 1, 2, 3, 4 b. 0, 4, 3, 2, 1 c. 4, 3, 2, 1, 0 d. 1, 2, 3, 4, 0
a. 0, 1, 2, 3, 4
command is used to compress files using the Burrows-Wheeler Block Sorting Huffman Coding compression algorithm
bzip2
4. Which runlevel halts the system? a. 1 b. 6 c. 0 d. 5
c. 0
1. You want to see the filesystems that are presently in use on the system. What command could you use? a. cat /etc/fstab b. ls -l /etc/fstab c. cat /etc/mtab d. ls -l /etc/fstab
c. cat /etc/mtab
12. The first daemon loaded on a Linux system is ___________. a. initstate b. inittab c. init d. linux
c. init
Which process will always have a PID of 1 and a PPID of 0? a. the kernel itself b. ps c. init d. top
c. init
command displays the contents of a text file to the screen
cat
command is used to change the current directory in the directory tree
cd (change directory)
command changes the mode (permissions) of files or directories. (change permissions)
chmod (change mode)
daemon is a system daemon that executes tasks repetitively in the future
cron
The killall command terminates _________. a. all instances of a process with the same PPID b. all instances of a process with the same PID c. all instances of a process with the same priority d. all instances of a process with the same name
d. all instances of a process with the same name
A runaway process that is faulty and consuming mass amounts of system resources ________. a. is a zombie process b. is an orphaned process c. has a PPID of Z d. is a rogue process
d. is a rogue process
Which command entered without arguments is used to display a list of processes running in the current shell? a. ppid b. list c. pid d. ps
d. ps
is a system process that is not associated with a terminal
daemon process
command is used to detect the differences between files
diff
1. The tac command _________. a. is not a valid Linux command b. displays the contents of hidden files c. displays the contents of a file in reverse order last word on the line first and first word on the line last d. displays the contents of a file in reverse order last line first and first line last
displays the contents of a file in reverse order last line first and first line last