Linux - Final Exam study set
protocol
A network _______________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.
True
Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. a. True b. False
1024
By default, the shell on a Linux system limits the number of file handles a program can have open to what value? a. 256 b. 512 c. 1024 d. 2048
True
By default, the smb.conf file shares all printers and home directories for recognized Windows users. a. True b. False
True
Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses. A) True B) False
False
Each device attached to a system can be represented by multiple device files. A) True B) False
True
Each process can start an unlimited number of other processes. a. True b. False
False
Fedora 20 makes use of the XFree86 implementation of X Windows. a. True b. False
True
If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. a. True b. False
False
In Linux, you are restricted to using only one type of filesystem on a system. A) True B) False
\l
In the PostgreSQL utility, the __________________ built-in command is used to list available databases.
False
In the past, SATA hard disks were referred to as Integrated Drive Electronics (IDE) a. True b. False
authentication
In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.
True
Linux uses a logical directory tree to organize files into different folders. A) True B) False
True
Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond a. True b. False
True
Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project. A) True B) False
True
The cpio command has the ability to handle long filenames and can be used to back up device files. a. True b. False
True
The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length. True False
/root
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory? A) /bin B) /home/root C) /boot D) /root
True
The Very Secure FTP daemon is a stand-alone daemon. a. True b. False
nice value
The __________________ can be used to affect the process priority indirectly.
kern
The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.
awk
The ability to extract, manipulate, and format text using pattern action statements belongs to which command below? A) sed B) grep C) awk D) nl
True
The tar utility cannot back up device files or files with filenames longer than 255 characters. a. True b. False
False
To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor. A) True B) False
False
Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy. A) True B) False
ulimit
What command can be used to change the maximum number of file handles that can be used by a program? a. fhlimit b. pgmod c. fhch d. ulimit
/var
What directory under / contains the log files and spools for a Linux system? A) /boot B) /usr C) /opt D) /var
ssh_host_dsa_key. pub
What file contains the DSA public key in the /etc/ssh directory? a. ssh_host_dsa_key b. ssh_host_dsa_key. pub c. ssh_target_dsa_key d. ssh_target_dsa_key.pub
2
What number represents the stderr file descriptor? A) 0 B) 1 C) 2 D) 3
0
What number represents the stdin file descriptor? A) 0 B) 1 C) 2 D) 3
-V
What option can be specified with the rpm command to identify any missing files in a package or package dependency? a. -v b. -m c. -V d. -M
-P
What option for the iptables command can be used to specify the default policy for a certain chain type? a. -P b. -C c. -p d. -c
False
When a user interacts with his computer, he interacts directly with the kernel of the computer's operating system. a. True b. False
False
When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory. a. True b. False
@
When issuing the ls -F command, what special character indicates a linked file
baseline
When performance issues arise, you can compare the output of performance utilities to the ______ values found in the system log book.
wc
Which command can be used to count the number lines, words, and characters in a file? A) pr B) nl C) tr D) wc
-q
Which sar command option is used to display statistics for the processor queue? a. -r b. -c c. -q d. -v
True
You can choose to use a window manager only, and not use a desktop manager. a. True b. False
True
You can use a small bootable Linux kernel (such as on a LiveCD) to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers. A) True B) False
True
You can use the sed command to remove unwanted lines of text. A) True B) False
smbclient
You can use the______________________ command to connect to both Samba and Windows servers.
True
Zombie processes are also known as defunct processes. a. True b. False
GECOS
_______________ represents a text description of the user and is typically left blank.
subnetting
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
file handles
The connections that a program makes to files on a filesystem. a. baseline b. buffer overrun c. file handles d. firewall daemon (firewalld)
True
At minimum, Linux typically requires only two partitions to be created: a partition that is mounted to the root directory, and a partition for virtual memory. A) True B) False
.rpm
Packages in the Red Hat Package Manager format have filenames that indicate the hardware architecture for which the software was compiled, and end with the ___________________ extension.
True
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets. True False
False
Performance problems are caused by hardware, not software. a. True b. False
False
Pressing the Esc key at the prompt while using the more command displays a help screen. A) True B) False
False
SLIP is a newer technology than PPP. True False
-B
Select the option that, when used with the sar command, displays swap statistics: a. -B b. -b c. -s d. -q
memtest86
Select the utility below that when run will start and perform a thorough check of RAM for hardware errors: A) memcheck68 B) memtest86 C) fixram D) fsck
False
Shell scripts do not require the execute permission in order to be run the same way binary programs are run. A) True B) False
bus mastering
Some peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ______________.
ssh_host_dsa_key.pub contains the DSA public key
System-wide RSA and DSA public/private key pairs are generated the first time the SSH daemon is started. These key pairs are stored in the /etc/ssh directory for all future sessions: • ssh_host_dsa_key contains the DSA private key • ssh_host_rsa_key contains the RSA private key • ssh_host_dsa_key.pub contains the DSA public key • ssh_host_rsa_key.pub contains the RSA public key
False
A swap partition contains a filesystem A) True B) False
runlevel
A(n) ____________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.
incremental
A(n) ___________________ backup backs up only the data that has been changed since the last backup.
process
A(n) ____________________ refers to a program that is running in memory and on the CPU.
True
After a process has been started, you can change its priority by using the renice command. a. True b. False
Run the ldconfig command.
After downloading an installing any shared libraries, what should be done to ensure the list of shared library directories and the list of shared libraries are updated? a. Check the /lib, /lib64, /usr/lib, or /usr/lib64 directories for the library. b. Run the ldconfig command. c. Run a program that uses the shared libraries. d. Perform a system restart.
True
All DNS servers contain a DNS cache file. a. True b. False
False
Almost all hardware problems are the result of damaged hardware. a. True b. False
True
Any command that can be executed on the command line can also be placed inside any environment file. A) True B) False
jabbering
Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called? a. flooding b. hiccuping c. jabbering d. dumping
False
On closed-source operating systems, hot fixes for software bugs are deployed very quickly. A) True B) False
True
Open Source Software (OSS) is freely developed and continuously improved by a large community of software developers A) True B) False
file handles
Processes can initiate numerous connections, called _____, to files on the filesystem in addition to standard input, standard output, and standard error.
rogue
Processes that have encountered an error during execution and continuously uses up system resources are referred to as ____________________ processes.
B) tty1
Question 1 In Fedora 20, what terminal is used for graphical login? A) tty0 B) tty1 C) tty2 D) tty4
memtest86
Question 2 Select the utility below that when run will start and perform a thorough check of RAM for hardware errors: A) memcheck68 B) memtest86 C) fixram D) fsck
exit
Question 3 After a shell is no longer needed, what command can be given to exit the shell? A) exit B) stop C) reset D) quit
Set
The environment variables that are set by default and their current values can be viewed with what command? A) env B) get C) Set D) setenv
master or primary
The first DNS server in a zone is called the ___________________ DNS.
False
The killall command uses the PID to kill a process. a. True b. False
False you need to use the recursive option (-R) "rmdir -R" to remove directory and all its subdirectories
The rmdir command automatically removes a directory and all of its subdirectories and files. A) True B) False
False
The rmdir command automatically removes a directory and all of its subdirectories and files. A) True B) False
False
The secure log file contains information regarding the last user to log into a system. a. True b. False
segmentation fault
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred? A) page fault B) IRQ fault C) segmentation fault D) RAM failure
SIGHUP
If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below: a. SIGINT b. SIGQUIT c. SIGTERM d. SIGHUP
default gateway
The IP address of the network interface on the router to which you send packets is called the _______________.
startx
The ________ command can be used to start X Windows and the default window manager or desktop environment.
kern
The ________________ facility used by the System Log Daemon specifies messages from the Linux kernel.
bzcat
To view the contents of a file that was compressed with the bzip2 utility, you must use the ______ command.