Linux+ Full Dump
What is the simplest method to connect a Win98 host to a Linux Server? Choose all that apply. A. Velcro B. Samba C. NFS D. DNS E. WINS
A. Velcro B. Samba
Which two services resolve Netbios names to IP addresses? A. WINS B. NetbiosSVC C. smbd D. nmbd E. DNS
A. WINS D. nmbd
Modprobe can be used to load (choose all that apply): A. a single module B. a stack of dependent modules C. all modules that are marked with a specified tag D. None of the choices
A. a single module B. a stack of dependent modules C. all modules that are marked with a specified tag
What command prints available functions? A. declare -f B. set C. typeset D. function()
A. declare -f
Which of the following lines would you find in the file /etc/host.conf? A. order hosts,bind B. 192.168.168.4 dns-server C. hosts: files,dns D. domain mycompany.com
A. order hosts,bind
What argument to the -name flag of find will match files or directories beginning with a '.' (period)?
Answer.\*
The very first line of a shell script should always contain what two characters at the beginning of the line?
Answer: #!
A user was not given permission to use the CRON scheduling system. What file needs to be modified to provide that access? (Please specify the full path to the file)
Answer: /etc/cron.allow
You want to make sure all Bash users, when they login, get access to a new program in /opt/bin (not currently in their PATH). To ensure this you would put the command: PATH=$PATH:/opt/bin; export PATH in what file?
Answer: /etc/profile
In which directory must definition files be placed to add additional repositories to yum?
Answer: /etc/yum.repos.d
You are building a server that will have many hardware and operating system upgrades. The server is the file server for all users on your 100 user network. Which directory should have its own mountpoint and/or hard drive?
Answer: /home
What Internet based organization is primarily responsible for hosting and distributing the various Linux HOWTOs? (NOT the URL)
Answer: The Linux Documentation Project
With the web site, www.tldp.org, what does "tldp" stand for?
Answer: The Linux Documentation Project
Which IP protocol is connectionless and unreliable?
Answer: UDP
What word is missing from the following SQL statement? insert into tablename ________(909, 'text'); (Please specify the missing word using lower-case letters only.)
Answer: VALUES, values
You wish to list the contents of your crontab. Type in the simplest command to do this
Answer: crontab -l
Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?
Answer: files
Which process has a PID of 1. Type in the process name?
Answer: init
You want to display a list of all last logged in users. The file /var/log/wtmp exists. Which command would you use?
Answer: last
Assume that on your system, there are man pages for both the command crontab and the configuration file for crontab. What command would you use to access the man page for the crontab configuration file?
Answer: man 5 crontab
What is the name of the main configuration file for GRUB? (Please specify the file name with no path information)
Answer: menu.lst
What command would help you test if your ppp connection was functional? Type just the command name.
Answer: minicom
On a Debian-based system, what command will create a boot disk on the first floppy if your kernel image is named "vmlinux-2.4.18-4"? Type the full command string to accomplish this.
Answer: mkboot vmlinux-2.4.18-4 Answer: mkboot /boot/vmlinux-2.4.18-4
What command will load groups of modules into the kernel as needed?
Answer: modprobe
You want to display all currently mounted file systems. Which command would you use? (Please enter only the command without arguments or options)
Answer: mount
The _______ command is used to modify a user's account information.
Answer: usermod
When attempting to send a file to another user securely with GPG, which of the following actions must be done? A. Encrypt the file using your public key. B. Encrypt the file using their public key. C. Encrypt the file using your private key. D. Encrypt the file using their private key. E. Sign the file with your public key.
B. Encrypt the file using their public key.
Which key do you press to switch to normal mode in vi? A. Alt B. Esc C. Ctrl D. Shift
B. Esc
Choose THREE websites that provide Linux-related news and documentation. A. Linux Scoop B. LWN.net C. Tux Facts D. Linux Today E. NewsForge
B. LWN.net D. Linux Today E. NewsForge
Which of the following fields are available in both the global /etc/crontab file as well as in user- specific crontab files? (Select TWO correct answers) A. Year B. Minute C. Username D. Command
B. Minute D. Command
The files /etc/hosts.allow, /etc/hosts.deny and /etc/nologin all exist on your computer and the sshd daemon is running. What will happen when users try to connect with ssh? A. Only connections from computers specified in /etc/hosts.allow will be allowed to log in. B. Only root will be allowed to log in. C. All users not specified in /etc/hosts.deny will be allowed to log in. D. No user will be allowed to log in.
B. Only root will be allowed to log in.
What output will the command seq 10 produce? A. A continuous stream of numbers increasing in increments of 10 until stopped. B. The numbers 1 through 10 with one number per line. C. The numbers 0 through 9 with one number per line. D. The number 10 to standard output.
B. The numbers 1 through 10 with one number per line.
What is the purpose of the Bash built-in export command? A. To allow disks to be mounted remotely. B. To automate the export of variables for subsequently executed commands. C. To make the command history available to sub-shells. D. To run a command as a process in a sub-shell. E. To save variable settings for future shell invocations.
B. To automate the export of variables for subsequently executed commands.
Which of the following would do the same as the command cat < file1.txt > file2.txt? A. cat < file1.txt file2.txt B. cat file1.txt >file2.txt C. cat <file1.txt | file2.txt D. cat file1.txt | file2.txt E. cp file1.txt>file2.txt
B. cat file1.txt >file2.txt
Which of the following commands will print the inode usage on each mounted filesystem? A. du -i B. df -i C. lsfs -i D. printfs -i
B. df -i
What command will allow you to see all of your environment variables? A. echo $* B. env C. which D. export
B. env
Which command will convert all tab characters in a file to spaces and print that to standard out? A. convert B. expand C. retab D. untab
B. expand
Which command makes the shell variable named VARIABLE visible to subshells? A. export $VARIABLE B. export VARIABLE C. set $VARIABLE D. set VARIABLE E. env VARIABLE
B. export VARIABLE
Which of the following lines is an example of a correct setting for the DISPLAY environment variable? A. hostname:displayname B. hostname:displaynumber C. hostname/displayname D. hostname/displaynumber E. hostname
B. hostname:displaynumber
Your server logfile shows repeated connections to TCP port 143. What service is being accessed? A. smtp B. imap C. pop3 D. pop2 E. nmbd
B. imap
The X program _________ is often used to make minor keyboard adjustments, like proper Back space/Delete mapping. A. xkbdmap B. kbdmap C. xmodmap D. modmap
B. kbdmap
Which Apache Directive specifies the location of the HTTP documents? A. RootDocument B. ServerRoot C. DocumentRoot D. RootServer E. DocPath
C. DocumentRoot
While using the vi editor, you wish to move ahead one page. You should press the control key and: A. A B. D C. F D. U
C. F
For accessibility assistance, which of the following programs is an on-screen keyboard? A. xkb B. atkb C. GOK D. xOSK
C. GOK
Instead of supplying an explicit device in /etc/fstab for mounting, what other options may be used to identify the intended partition? (Select TWO correct answers) A. FIND B. ID C. LABEL D. NAME E. UUID
C. LABEL E. UUID
What configuration file and directive will alter your apache server IP and or port that it listens to? A. Port B. IPAddress C. Listen D. MinSpareServers
C. Listen
What are the addresses falling into the range of 240.0.0.0 through 255.0.0.0? A. Class C network B. Class B network C. This is an experimental address range. D. This is a broadcast range.
C. This is an experimental address range.
You wish to kill a process with a PID of 123. Select the command which will allow the process to "clean up" before exiting. A. kill -1 123 B. kill -9 123 C. kill -15 123 D. kill -17 123
C. kill -15 123
Which of the following commands can be used to display the local routing table? (Choose TWO correct answers.) A. ifconfig B. dig C. netstat D. route E. trackroute
C. netstat D. route
What is the command to map a Windows user ID to a Linux user ID for use with the Samba Server? A. smbuser B. smbpasswd C. smbadduser D. useraddsmb E. useradd
C. smbadduser
Which two files in a user's home directory are used to customize the bash environment? A. bash and .bashrc B. bashrc and-bash_conf C. bashrc and bashprofile D. .bashrc and .bash_profile E. bash.conf and .bash_profile
D. .bashrc and .bash_profile
In GRUB's configuration file you find the line Root (hd1,4) What is corresponding device name on a Linux system? A. /dev/hda4 B. /dev/hda5 C. /dev/hdb4 D. /dev/hdb5
D. /dev/hdb5
What file determines the DNS servers used by your computer? A. /etc/hosts B. /etc/named.conf C. /etc/nsswitch.conf D. /etc/resolv.conf
D. /etc/resolv.conf
What is the output when the following shell script executes? Cat <<foobar Hello foobar foobar A. The contents of the file foobar B. Hello C. No output but a file named foobar is created D. Hello foobar E. Hello foobar
D. Hello foobar
You want to add an alias for an existing DNS record. What type of DNS record could you use? A. CNAME B. MX C. SOA D. NS
D. NS
Which signal is sent by the kill command by default? A. HUP(1) B. QUIT(3) C. KILL(9) D. TERM(15)
D. TERM(15)
Which of the following provides a non-graphical, text based interface for users who are visually impaired that can be used as a screen reader? A. easyspeech B. textconvert C. xscreen D. emacspeak
D. emacspeak
Which of the following services is NOT usually protected via TCP wrappers? A. ftp B. finger C. auth D. http
D. http
The legacy program for listing files in the printer queues from the command line is: A. lpd B. lpr C. lpstat D. lpq
D. lpq
Each entry in a crontab must end with what character? A. tab B. space C. backslash D. newline
D. newline
You enter the command date +%M. Wat does the output show you? A. the current year B. the current month C. the current hour D. the current minute E. the current second
D. the current minute
Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves? A. /etc/alias B. /etc/mail/forwarders C. ~/.alias D. ~/.forward
D. ~/.forward
User Sheets has been exiled to the marketing department who has a group name mktg. You now wish to change the primary group for the user Sheets to the mktg group. Type in the simplest command to do this?
usermod -g mktg Sheets
What command with options and arguments will display the mail servers for lpi.org?
Answer: dig lpi.org mx
In your DNS configuration, MX records are used to point to the _____ server(s) for your domain.
Answer: email
Which command allows to run a command in a modified environment, without changing the environment variables of the current shell? (Please provide the command name only, not the path.)
Answer: env
After modifying /etc/exports, what must be done to make the modifications available to users? Type the command with any options and arguments.
Answer: exportfs -a
What is a filesystem type the dump utility can work with?
Answer: ext2
What command with options will find all files on your system that have either the SUID or GUID bits set? Type the exact command with options to accomplish this.
Answer: find / -perm +6000
You can run the ________ command to see active network and UNIX domain socket connections as well as other open files. (Please specify the command with no path information, options or parameters)
Answer: lsof, /usr/bin/lsof
What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)
Answer: l
You have made changes to your /etc/lilo.conf file. Type in the simplest command that will reload the configuration to the MBR
Answer: lilo
What command can be used to generate log entries of any facility and priority? (supply just the command name without a path)
Answer: logger
Which program updates the database that is used by the locate command?
Answer: updatedb
You wish to add the user Sheets to the system including his home directory. Type in the simplest command to do this including switches
Answer: useradd -m Sheets
Type in the simplest command to do this including switches:
Answer: useradd -m king
You wish to remove the user stef from the system, including his home directories. Type in the simplest command to do this?
Answer: userdel -r stef
In the vi editor, which of the following commands will delete the current line at the cursor and the 16 lines following it (17 lines total)? A. 17d B. 17dd C. 17x D. d17d E. 16d
B. 17dd
Which of the following lines would you find in the file /etc/hosts? A. order hosts,bind B. 192.168.168.4 dns-server C. hosts: files dns D. domain mycompany.com
B. 192.168.168.4 dns-server
In what file are the mail aliases kept for Sendmail? (Provide the complete path) A. /etc/aliases B. /etc/mailaliases C. /etc/sendmail.aliases D. /etc/sendmail/aliases E. /var/spool/mail/aliases
A. /etc/aliases
In what file do you change default shell variables for all users? A. /etc/bashrc B. /etc/profile C. ~/.bash_profile D. /etc/skel/.bashrc E. /etc/skel/.bash_profile
A. /etc/bashrc
Where are the default settings for the useradd command kept? A. /etc/default/useradd B. /etc/sysconfig/useradd.cfg C. /etc/.useradd D. /etc/defaults/useradd E. /etc/login.defs
A. /etc/default/useradd
Shares can be configured for export via the NFS service by editing what file? A. /etc/exports B. /etc/export C. /etc/exportfs D. /etc/nfs/exports
A. /etc/exports
Which file is responsible for configuring the inet daemon? A. /etc/inetd.conf B. /etc/xinetd.conf C. /etc/tcpd.conf D. /etc/inet.conf
A. /etc/inetd.conf
What file allow admin to adjust number of mounts after which file system will be checked by e2fsck?
Answer: tune2fs
What file is displayed BEFORE users log in for users who log in to the machine locally? A. /etc/issue B. /etc/issue.net C. /etc/motd D. /etc/local.banner
A. /etc/issue
Which of the following commands loads the module file into the kernel and changes any symbols that are defined on the command line? A. insmod B. depmod C. modprobe D. setmod
A. insmod
Which port is the default server port for the HTTPS protocol? (Specify the port number using digits.)
Answer: 443
What section of the Man pages are system files mentioned in? Type the numeral of the section.
Answer: 5
Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this? A. /etc/X11/xdm/Xsetup B. /etc/X11/xdm.conf C. /etc/X11/xdm/Defaults D. /etc/X11/defaults.conf
A. /etc/X11/xdm/Xsetup
The ______ command is used to setup, view, and modify packet filtering, network and port translation, and other packet mangling rules within 2.4 and later kernel.
Answer: iptables
You can find out how much memory the kernel is using by taking the total amount of memory in your machine and subtracting from it the amount of: A. "total mem" in /proc/meminfo B. "total mem" in /proc/memused C. "total mem" in /proc/memcurrent D. None of the choices
A. "total mem" in /proc/meminfo
What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12? A. *.* /dev/tty12 B. /var/log/messages | /dev/tty12 C. | /dev/tty12 D. syslog tty12 E. mail.* /dev/tty12
A. *.* /dev/tty12
What entry can you add to syslog.conf file to have all syslog messages generated by your system go to virtual console 12? A. *.* /dev/tty12 B. /var/log/messages | /dev/tty12 C. | /dev/tty12 D. syslog tty12 E. mail.* /dev/tty12
A. *.* /dev/tty12
What Apache directive must you change when using inetd to control your Apache server? A. ServerType B. ServerInetd C. InetServer D. StartServer E. ServerMethod
A. ServerType
You wish to execute two commands, one after the other. However, you only want the second command to execute if the first is successful. Which character(s) do you put between the commands on the command line to accomplish this?
Answer: &&
The correct crontab entry in the minutes column to create a command in cron that runs every two minutes would be _____.
Answer: */2
A user wishes to modify his Environment variable PATH. What file should you tell him to edit in his home directory. Give filename only, no path.
Answer: .bash_profile
Where are command line aliases defined for a user? Type the full path and name of the file for the currently logged in user.
Answer: /.bashrc
What file would you edit to make the current user's vi session options always take effect? Type the full path and filename.
Answer: /.exrc
For the last command to work, what file must exist? Answer:
Answer: /VAR/LOG/WTMP
You've downloaded an image file of a boot floppy disk to your hard drive. What is the best utility to create a boot floppy from the disk image? (Specify a single command without options.)
Answer: /bin/dd
You wish to notify all users that you have to take down a service on which they rely. What command will allow you to send a message to all currently logged on users? Enter only the command, not the path.
Answer: wall
Which program finds only files that are in your PATH?
Answer: which
What directive in smb.conf specifies the domain or workgroup to join? Please enter only the directive below.
Answer: workgroup
You need to find the latest HOWTOs on using SATA devices. What web site hosts the latest HOWTOs?
Answer: www.serialata.org
What application can be used in place of xhost? Please enter only the name without path
Answer: xauth
What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Provide only the name of the program without any path information)
Answer: xdm
What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)
Answer: xdm
In a networked environment, what command will grant anybody permission to display their X applications on a desktop? (Include both the command and argument(s).)
Answer: xhost +
You are running X in networked environment. You want to allow anyone on your network to display their X applications on your desktop. What command can you use to disable all access control for X?
Answer: xhost +
When you are looking for brief information about a program in your PATH with its associated man pages, you would use? A. which B. whereis C. locate D. where
B. whereis
Which TWO commands will find the path for the binary vim? A. man vim B. whereis vim C. apropos vim D. which vim
B. whereis vim D. which vim
Which command will create an ext3 filesystem on /dev/hda2? A. /sbin/mke2fs -d /dev/hda2 B. /sbin/mke2fs -j /dev/hda2 C. /sbin/mke2fs -m 3 /dev/hda2 D. /sbin/mke2fs -c ext3 /dev/hda2
B. /sbin/mke2fs -j /dev/hda2
The sticky bit is usually set on A. /var/log B. /tmp C. /home D. log liles
B. /tmp
The command mkfs -t ext3 /dev/hdb1 -T largefile creates what size of inode? A. 4 kilobyte B. 1 megabyte C. 2 megabyte D. 4 megabyte
B. 1 megabyte
What is the default process priority when a process is started using the nice command? A. -10 B. 10 C. 20 D. 0
B. 10
Your IP address is 170.35.13.28 and your network mask is 255.255.255.192. What host IP address is NOT a part of your local subnet? A. 170.35.13.33 B. 170.35.13.88 C. 170.35.13.62 D. 170.35.13.55
B. 170.35.13.88
Select the line that best represents what permissions the /etc/passwd file should have A. -rw------- 1 root root 531 Apr 3 12:36 /etc/passwd B. -rw-r--r-- 1 root root 531 Apr 3 12:36 /etc/passwd C. -rw-r--r-- 1 1 1 531 Apr 3 12:36 /etc/passwd D. all answers listed are not correct E. all answers listed are correct
B. -rw-r--r-- 1 root root 531 Apr 3 12:36 /etc/passwd
The message "Hard Disk Error" is displayed on the screen during Stage 1 of the GRUB boot process. What does this indicate? A. The kernel was unable to execute/bin/init B. The next Stage cannot be read from the hard disk because GRUB was unable to determine the size and geometry of the disk C. One or more of the filesystems on the hard disk has errors and a filesystem check should be run D. The BIOS was unable to read the necessary data from the Master Boot Record to begin the boot process
B. The next Stage cannot be read from the hard disk because GRUB was unable to determine the size and geometry of the disk
Which command allows you to make a shell variable visible to subshells? A. export $VARIABLE B. export VARIABLE C. set $VARIABLE D. set VARIABLE E. env variable
B. export VARIABLE
Which option in the /etc/fstab file causes all users IDs to be mapped to the system's anonymous ID when mounting a NFS mounted file system? A. no-root-squash B. all-squash C. all-id-squash D. root-squash
B. all-squash
What command will display all of the background tasks running in the current shell? A. history B. jobs C. kill -l D. list
B. jobs
What command will convert your shadow password file to md5 compatible passwords? A. passconv B. pwconv C. mdconv D. mdsum E. passwd --convert
B. pwconv
Which of the following commands can be used to locate programs and their corresponding man pages and configuration files? A. locate B. which C. find D. query E. whereis
E. whereis
To what environment variable will you assign or append a value if you need to tell the dynamic linker to look in a build directory for some of a program's shared libraries? A. LD_LOAD_PATH B. LD_LIB_PATH C. LD_LIBRARY_PATH D. LD_SHARE_PATH E. LD_RUN_PATH
C. LD_LIBRARY_PATH
To prevent a specific user from scheduling tasks with at, what should the administrator do? A. Add the specific user to /etc/at.allow file. B. Add the specific user to [deny] section in the /etc/atd.conf file. C. Add the specific user to /etc/at.deny file. D. Add the specific user to nojobs group. E. Run the following: atd -deny [user].
C. Add the specific user to /etc/at.deny file.
Which of the following statements is valid in the file /etc/nsswitch.conf? A. multi on B. 192.168.168.4 dns-server C. hosts: files dns D. include /etc/nsswitch.d/
C. hosts: files dns
What is true about the ntpdate command? A. It is the primary management command for the NTP time server. B. It updates the local system's date (i.e. day, month and year) but not the time (i.e. hours, minutes, seconds). C. It queries one or more NTP time servers and adjusts the system time accordingly. D. It sends the local system time to one or many remote NTP time servers for redistribution. E. It can be used by any user to set the user clock independently of the system clock.
C. It queries one or more NTP time servers and adjusts the system time accordingly.
Which of the following commands can deconfigure a network interface? A. ipdown B. net C. ifconfig D. netdown
C. ifconfig
Visit our reseller at www.company.com for lastest version and special price! A cronjob must run at least every 11 minutes. The job may take up to 7 minutes to complete, and there mustn't be two jobs at the same time. Which crontab line solves the problem? A. */8 * * * * myjob B. */9 * * * * myjob C. */10 * * * * myjob D. */11 * * * * myjob E. */12 * * * * myjob
C. */10 * * * * myjob
An installed package is broken. In order to go back to the previous version of the same package which RPM option should be used? A. --replacefiles B. --replacepkgs C. --oldpackage D. --nodeps
C. --oldpackage
Which command line option would you use to restrict the GNU find command to searching a particular number of subdirectories? A. --max-dirs B. -dirmax C. -maxdepth D. -s E. -n
C. -maxdepth
Which command will allow you to find a specific installed package? A. rpm -- list rpmname B. rpm -qvl rpmname C. rpm rpmname D. rpm -qv rpmname E. rpm -f rpmname
D. rpm -qv rpmname
Which of the following files has the correct permissions? A. rw--w--w- 1 root root 369 Dec 22 22:38 /etc/shadow B. rwxrw-rw- 1 root root 369 Dec 22 22:38 /etc/shadow C. rw-r--r-- 1 root root 369 Dec 22 22:38 /etc/shadow D. rw------- 1 root root 369 Dec 22 22:38 /ect/shadow
D. rw------- 1 root root 369 Dec 22 22:38 /ect/shadow
Which of the following sed commands will replace all instances of the string foo with the string foobar changing the file file1.txt in place? A. sed 's/foo/foobar/g' file1.txt B. sed 's/foo/foobar/g' file1.txt > file1.txt C. sed 's/foo/foobar/g' file1.txt | file1.txt D. sed -i 's/foo/foobar/g' file1.txt E. sed -i 's/foo/foobar/g' file1.txt > file1.txt
D. sed -i 's/foo/foobar/g' file1.txt
In order to append the output of ls to a file called bazz, which of the following command lines would you use? A. ls > bazz B. ls >& bazz C. ls &> bazz D. ls >> bazz
D. ls >> bazz
While installing from source code you don't see the configuration script. What command can you run to compile the code? A. make configure B. install C. install makefile D. make
D. make
Your department decided to change the Gnome Display Manager's greeting. What configuration file should you edit? A. /etc/gnome/greeting B. /opt/gnome/share/greeting C. /etc/X11/gmd.conf D. /etc/X11/gdm/Init/Default
D. /etc/X11/gdm/Init/Default
You want the default permissions for your files to be -rw-r----- . HOW must you set umask? A. 037 B. 640 C. 038 D. 027
D. 027
Where can lilo place boot code? A. The boot ROM B. The boot RAM C. The /boot partition D. The MBR on a hard drive
D. The MBR on a hard drive
Given the following routing table: Kernel IP routing table Destination Gateway Genmask Flags Metric 0.0.0.0 192.168.178.1 0.0.0.0 US 0 192.168.1.0 0.0.0.0 255.255.255.0 U 0 172.168.2.0 192.168.1.1 255.255.255.0 U 0 192.168.172.0 0.0.0.0 255.255.255.0 U 9 How would an outgoing packet to the destination 192.168.2.150 be handled? A. It would be passed to the default router 192.168.178.1 on wlan0. B. It would be directly transmitted on the device eth0. C. It would be passed to the default router 255.255.255.0 on eth0. D. It would be directly transmitted on the device wlan0. E. It would be passed to the router 192.168.1.1 on eth0.
E. It would be passed to the router 192.168.1.1 on eth0.
Users may create and edit a configuration file in their home directory that can tell the X window system what window manager they wish it to start when they log in. What file is that? A. $HOME/.wmrc B. $HOME/.startx C. $HOME/.Xdefaults D. $HOME/.xserverrc E. $HOME/.xinitrc
E. $HOME/.xinitrc
What directory be default contains the delivered mail for each user? A. ~/mail/ B. /usr/mail/ C. /var/mail/ D. /var/mail/spool/ E. /var/spool/mail/
E. /var/spool/mail/
Which port is used for DNS? A. 110 B. 21 C. 23 D. 52 E. 53
E. 53
You are formatting a single hard disk for a Linux install. What is the maximum number of primary partitions you can create? A. 0 B. 1 C. 2 D. 3 E. 4 F. 5
F. 5
What is the difference between the --remove and the--purge action with the dpkg command? A. --remove removes the program, --purge also removes the config files B. --remove only removes the program, --purge only removes the config files C. --remove removes a package, --purge also removes all packages dependent on it D. --remove removes only the package file itself, --purge removes all files related to the package
A. --remove removes the program, --purge also removes the config files
The user bob complains that he cannot access his email. In witch directory would you look to see if there is any deliverable email for him? A. /var/spool/mail B. /var/mail/mqueue C. /var/spool/mqueue D. /home/bob/.mail
A. /var/spool/mail
Which TWO runlevels should never be declared as the default runlevel? A. 0 B. 3 C. 5 D. 6
A. 0 D. 6
What output will the following command produce? seq 1 5 20 A. 1 6 11 16 B. 1 5 10 15 C. 1 2 3 4 D. 2 3 4 5 E. 5 10 15 20
A. 1 6 1 1 1 6
What output will the following command produce? seq 1 5 20 A. 1 6 11 16 B. 1 5 10 15 C. 1 234 D. 2 345 E. 5 10 15 20
A. 1 6 11 16
Where can the lilo command install the boot menu and information? Choose all that apply. A. Master Boot Record B. BIOS C. First Sector of a Partition D. BootBlk E. Boot Prom
A. Master Boot Record C. First Sector of a Partition
What is true about the root user and NFS? A. NFS shares don't allow root access by default B. NFS automatically masks out share permissions C. NFS automatically maps all root UID's to the local user "rootsquash" D. NFS ignores all users with a UID of 0 and a GID of 0 E. NFS pays no attention whatsoever to security
A. NFS shares don't allow root access by default
Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Choose THREE correct answers.) A. Postfix B. Procmail C. Sendmail D. Exim E. SMTPd
A. Postfix C. Sendmail D. Exim
What would the following command do? cat hosts | lpr -#2 A. Print the file hosts on the default printer two times. B. Categorize hosts and print the categorization as job #2. C. Output the file hosts to the line printer and assign it to the second printer queue. D. Print the hosts file to STDOUT and assign the current print job to printer tray number 2.
A. Print the file hosts on the default printer two times.
When you use DNS to find a hostname using a particular IP address, which kind of DNS entry is involved? A. Reverse DNS entries B. IP DNS entries C. Address DNS entries D. Network DNS entries
A. Reverse DNS entries
Which of the following details is NOT provided in any output from the netstat utility? A. broadcast services B. interface statistics C. masquerading connections D. network connections E. routing tables
A. broadcast services
Which of the following commands shows ONLY the user id of Bob? (Select TWO) A. cat /etc/passwd | grep Bob | cut -d: -f3 B. cat /etc/passwd | grep Bob | cut -f: -d3 C. grep Bob /etc/passwd | awk -F: '\'7b print $3 }' D. grep Bob /etc/passwd | awk -f: '\'7b print $3 }' E. grep Bob /etc/passwd | cut -F: -d3
A. cat /etc/passwd | grep Bob | cut -d: -f3 C. grep Bob /etc/passwd | awk -F: '\'7b print $3 }'
Identify the proper device for the third partition on the only SCSI drive on the system. A. /dev/hda3 B. /dev/sd0a3 C. /dev/sda3 D. /dev/sd1p3
C. /dev/sda3
Which directory tree is ordinarily the least likely to be backup or restore? A. /tmp B. /var C. /proc D. /usr E. /usr
C. /proc
What is the highest numbered TCP/IP port? A. 2047 B. 32767 C. 65535 D. 131071
C. 65535
Which of the following commands is used on the command line to send messages to the syslog systems. A. lastlog B. klog C. logger D. slog E. syslog
C. logger
What program do you use to suspend a printer queue? A. lpr B. lpq C. lpc D. lpd E. lprm
C. lpc
What command should be entered to print and then delete the file, foobar.txt? A. lpr -o delete foobar.txt B. lpr -d foobar.txt C. lpr -r foobar.txt D. lpr -o remove foobar.txt
C. lpr -r foobar.txt
If you want to print a listing of your computer's mail queues, what command would you use? A. sendmail -l B. lpq C. mailq D. mlq
C. mailq
Which directory in a user's home contains configuration files and key rings for GPG? A. ~/gpg.d/ B. ~/.gpg/ C. ~/.gnupg/ D. ~/gnupg/ E. ~/.gpg.d/
C. ~/.gnupg/
Which of the following commands will find the string foo in the file filel.txt, regardless of foo being in upper or lowercase letters? A. cat file1.txt | grep -i foo B. cat file1.txt > grep -n foo C. grep -i foo | file1.txt D. grep -n file1.txt < foo E. grep -n foo file1.txt
A. cat file1.txt | grep -i foo
Type in the full path and name of the global environment and startup program configuration file This file typically contains the PATH, umask and ulimit system wide settings.
Answer: /etc/profile
Undelivered mail for local system users is stored in what directory? Type the full path of the directory.
Answer: /var/spool/mail/username
In what directory does undelivered remote mail get stored in? Type the full path and name of the file.
Answer: /var/spool/mqueue
What is considered the normal exit value of a process?
Answer: 0 (or Zero)
What umask value will result in the default access permissions of 600 (rw-------) for files and (rwx ------) for directories? (Provide only the numerical umask value)
Answer: 077
What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)
Answer: 1024
How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)
Answer: 14
With IPv6, how many bits have been used for the interface identifier of an unicast address? (Specify the number using digits only.)
Answer: 64
You wish to list out in text all the daemons running and stopped on your system for all run levels. Type in the simplest command
Answer: chkconfig --list
NTP is used to synchronize the system ____ with a central system resource.
Answer: clock
Which file the /proc filesystem lists parameters passed from the bootloader to the kernel?
Answer: cmdline
What is the name of the Kernel configuration file? Type just the filename
Answer: config
What file or utility is used by normal users to configure the cron daemon? Type in the name of the tool only
Answer: crontab
You wish to make changes to your crontab entry. Type in the simplest command to make this change?
Answer: crontab -e
What is the exact, case-sensitive option that governs flow-control for the ppp daemon?
Answer: crtscts
An administrator has added the following line to /etc/inittab in order to disable the ability to reboot a Debian system by pressing the Control + Alt + Delete keys simultaneously: ca:12345:_________:/bin/echo "Rebooting disabled"
Answer: ctrlaltdel
The ______ command is used to print out the current date and time on the system.
Answer: date
Which command will display messages from the kernel that were output during the normal bootup sequence?
Answer: dmesg
Within a script you need to create a loop. Following the for variable in list, the statements to be looped are found between the keywords ____ and done.
Answer: do
What is the file that contains the settings and conversion parameters for the ftp server? Type in the ame of the file only
Answer: ftpconversions
What file is used to define a list of users that may NOT login to via the ftp daemon? Type just the name of the file.
Answer: ftpusers
What commmand can you use to determine the users connected to a Linux ftp server? Type just the command to accomplish this.
Answer: ftpwho
What command would be used to check the gpgp signature on a downloaded source file? Type just the name of the command.
Answer: gpg
You need to find all references in system document to the word "backup". What command would you type? (Do not provide full path).
Answer: grep
You need to find all references in system documentation to the word backup. What command would you type? (Do not provide full path)
Answer: grep
You are logged in as root. What command do you run to find out what groups user bruno belongs to?
Answer: groupsbruno
What command returns the first few lines of a given file?
Answer: head
What command is used to display a file in octal format?
Answer: hexdump
Which command is used to set the hostname of the local system? (Specify ONLY the command without any path or parameters.)
Answer: hostname
In the /etc/nsswitch.conf file, which directive specifies what "databases" are queried and in what order for host name lookups?
Answer: hosts
You need to access the site for HOWTO's, Guides and mini HOWTO's. Type in the full URL as it would appear in any browser, including the protocol.
Answer: http://www.tldp.org
You need to sync your hardware clock, which is on GMT, with your system clock, which you just updated with NTP. To do this, complete the following command: _________ -u --systohc
Answer: hwclock
Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)
Answer: hwclock, /sbin/hwclock, /usr/sbin/hwclock
An administrator needs to sync the hardware clock with their system clock. In order to accomplish this, complete the following command: ________ -u --systohc
Answer: hwclock, /usr/sbin/hwclock, /sbin/hwclock
What command will display the group names and GIDs to which a user belongs? (Provide only the command name with or without path information)
Answer: id, /usr/bin/id
Which user-level program, when manually executed by the root user, is used to change the runlevel of the system? (Provide only the command with no additional options or parameters)
Answer: init
You are in run level 5 and wish to change to run level 1. Type in the simplest command to do this?
Answer: init 1
You wish to install the module fat.o into the kernel. Type in the simplest command to do this. Assume there are no dependancies for this module.
Answer: insmod fat
In an xinetd config file, which attribute specifies which interface will be used to offer the service?
Answer: interface
You suspect that a new ethernet card might be conflicting with another device. Which file should you check within the /proc tree to learn which IRQs are being used by which kernel drives?
Answer: interrupts
What command with all options and/or parameter will send the signal USR1 to any executing process of program apache2?
Answer: killall -s SIGUSR1 apache2
Type in the simplest command to list all loaded modules?
Answer: lsmod
What command would create the following output without using any arguments or options? Module Size Used by nls_iso8859-1 2880 0 (autoclean) nls_cp437 4384 0 (autoclean) ....
Answer: lsmod
The _______ command prints a list of email that is currently in the queue waiting for delivery.
Answer: mailq
What command is used to print a listing of e-mail that is currently being managed by the MTA but has not yet been delivered? (Please specify the command with or without path)
Answer: mailq, /usr/bin/mailq, sendmail -bp, /usr/sbin/sendmail -bp, /usr/lib/sendmail -bp
Which command, available with all MTAs, is used to list the contents of the MTA's mail queue? (Specify ONLY the command without any path or parameters.)
Answer: mailq, /usr/bin/mailq, sendmail -bp, /usr/sbin/sendmail -bp, /usr/lib/sendmail -bp, sendmail, /usr/sbin/sendmail, /usr/lib/sendmail
You are compiling some software from source. After running ./configure with the appropriate arguments and no errors, what is the next command to run?
Answer: make
Type in the command to compile a kernel image with normal compression
Answer: make bzImage
You are working on a non graphical shell. What command would you use to configure the kernel using a menu system. Type the command and its argument(s).
Answer: make menuconfig
You are using X and wish to build a new kernel. What X tool would you use to build the .config file. Type in just the command, not switches
Answer: make xconfig
Which of the following files assigns a user to its primary group? A. /etc/pgroup B. /etc/shadow C. /etc/group D. /etc/passwd E. /etc/gshadow
D. /etc/passwd
What configuration files on a Linux Server can be configured to share file systems with clients? Choose Two. A. /etc/nmbd B. /etc/smbd C. /etc/smb/samba.conf D. /etc/smb.conf E. /etc/samba/smb.conf
D. /etc/smb.conf E. /etc/samba/smb.conf
The/etc/ ________ file lists currently mounted devices.
Answer: mtab
What commands with any options, will cause sendmail to recognize newly added aliases while it's running?
Answer: sendmail -bi
To slave the NTP daemon to an external source, an administrator needs to modify the ______ variable in the /etc/ntp.conf file.
Answer: server
What is the command to check the syntax of your /etc/inetd.conf?
Answer: tcpdchk
Which configuration file would be edited to change the default options for outbound SSH sessions? A. /etc/ssh/sshd_config B. /etc/ssh/ssh C. /etc/ssh/client D. /etc/ssh/ssh_config E. /etc/ssh/ssh_client
D. /etc/ssh/ssh_config
Which configuration file would you edit to change default options for outbound ssh sessions? A. /etc/ssh/sshd_config B. /etc/ssh/ssh C. /etc/ssh/client D. /etc/ssh/ssh_config E. /etc/ssh/ssh_client
D. /etc/ssh/ssh_config
You are installing Linux on a workstation for a new employee. Which partition should be largest? A. / B. /boot C. /lib D. /usr
D. /usr
Which of the following lines would you find in the file /etc/resolv.conf? A. order hosts,bind B. 192.168.168.4 dns-server C. hosts: files,= dns D. domain mycompany.com
D. domain mycompany.com
The legacy program for sending files to the printer queues from the command line is: A. lpd B. lpr C. lpq D. lpp
B. lpr
Which of the following commands will send output from the program myapp to both standard output (stdout) and the file file1.1og? A. cat < myapp | cat > file1.1og B. myapp 0>&1 | cat > file1.1og C. myapp | cat > file1.1og D. myapp| tee file1.1og E. tee myapp file1.1og
D. myapp| tee file1.1og
You want to examine the changelog for the installed package postfix. Which command will display the changelog? A. rpm -Vc postfix B. rpm -qpil postfix C. rpm --changelog postfix D. rpm -q --changelog postfix E. rpm -qa --changelog postfix
D. rpm -q --changelog postfix
Which of these commands allows you to use shared libraries that are in /usr/local/lib? A. export LD_PRELOAD=/usr/local/lib B. export LD_LIBRARY_PATH=/usr/local/lib C. ldconfig /usr/local/lib D. ldd /usr/local/lib
C. ldconfig /usr/local/lib
What command will remove duplicate lines from a sorted file? A. filter B. trim C. uniq D. wc
C. uniq
What command option of modinfo can display its version number? A. -V B. -i C. -I D. -A
A. -V
What option of modprobe specifies the loading of all matching modules instead of stopping after the first successful loading? A. -a B. -f C. -c D. -e
A. -a
Which option to the tee command will cause the output to be concatenated on the end of the output file instead of overwriting the existing file contents? A. -a B. -c C. -no-clobber D. -continue
A. -a
What command option of depmod allows you to print a list of all unresolved symbols? A. -e B. -l C. -i D. -a
A. -e
What option of the insmod command can you use to force the loading of module even if problems are encountered? A. -f B. -F C. -u D. -r
A. -f
What option of modprobe allows you to set 'autoclean' on the loaded modules? A. -k B. -d C. -c D. -e
A. -k
Which of the following options will speed up traceroute for distant network queries? A. -n B. -p C. -0 D. -t E. -q
A. -n
After a minor security incident you are instructed by your lead sys-admin to verify the RPM's installed on running system. Which command will create a complete report which you can analyze for changes which may be security related? A. .rpm-Va>report B. rpm-Qavy > report C. rpm-Vqt-- nomd5>report D. rpm-checkfiles >report E. rpm-Va-nofiles > report
A. .rpm-Va>report
Identify the proper device for the third partition, on the second hard disk, on the first IDE controller on a C system. A. /dev/hdb3 B. /dev/hdlb3 C. /dev/hdclb3 D. /dev/hdcld2p3
A. /dev/hdb3
Identify the proper device for the third partition, on the second hard disk, on the first IDE controller on a PC system. A. /dev/hdb3 B. /dev/hd1b3 C. /dev/hdc1b3 D. /dev/hdc1d2p3
A. /dev/hdb3
Which file used by XDM specifies the default wallpaper? A. /etc/X11/xdm/Xsetup B. /etc/X11/xdm.conf C. /etc/X11/xdm/Defaults D. /etc/X11/defaults.conf
A. /etc/X11/xdm/Xsetup
You have just set up the X Display Manager as your default display manager. What file should you edit to change the default background for it? A. /etc/X11/xdm/Xsetup B. /etc/X11/prefdm C. /etc/X11/XF86Config D. /etc/X11/xdm.conf
A. /etc/X11/xdm/Xsetup
You have just set up the X Display Manager as your default display manager. What file should you edit to change the default background for it? A. /etc/X11/xdm/Xsetup B. /etc/X11/prefdm C. /etc/X11/xorg.conf D. /etc/X11/xdm.conf
A. /etc/X11/xdm/Xsetup
Which two files are responsible for allowing users to execute cron jobs? A. /etc/cron.allow B. /var/spool/cron.allow C. /var/spool/cron.allow D. /etc/cron.deny
A. /etc/cron.allow D. /etc/cron.deny
What files affect the functioning of TCP Wrappers? Choose Two. A. /etc/hosts.deny B. /etc/nsswitch.conf C. /etc/security/authconfig D. /etc/default/clients E. /etc/hosts.allow
A. /etc/hosts.deny E. /etc/hosts.allow
Which file is used by ld.so to find libraries quickly without actually having to search the directories in its library path? A. /etc/ld.so.cache B. /etc/ld.so.conf C. /etc/ld.so D. /var/ld/cache E. /var/.cache
A. /etc/ld.so.cache
Where can you specify options that affect the booting of the system? A. /etc/lilo.conf B. boot= prompt C. linux: D. init 3 E. init 5
A. /etc/lilo.conf B. boot= prompt
What should the permission settings be for /etc/passwd and /etc/shadow? A. /etc/passwd: -rw-r-r- /etc/shadow: -r- B. /etc/passwd: -r- /etc/shadow: -rw-r-r- C. /etc/passwd: -rw-r-r- /etc/shadow: -rw-r-r- D. /etc/passwd: -r- /etc/shadow: -r-
A. /etc/passwd: -rw-r-r- /etc/shadow: -r-
What two files acting together make up the login environment for a user on a default install of Linux? A. /etc/profile B. /etc/bashrc C. /etc/.login D. ~/.bash_profile E. /etc/.profile
A. /etc/profile D. ~/.bash_profile
What files affect the name resolution functionality of a Linux host? Choose Three. A. /etc/resolv.conf B. /etc/hosts C. /etc/default/names D. /etc/nsswitch.conf E. /etc/inet/hosts
A. /etc/resolv.conf B. /etc/hosts D. /etc/nsswitch.conf
What system file contains definitions of well known ports, their associated services and protocols? A. /etc/services B. /etc/sysconfig/network-scripts C. /etc/services.conf D. /etc/inet/hosts E. None of the choices
A. /etc/services
Which configuration file would be edited to change default options for the OpenSSH server? A. /etc/ssh/sshd_config B. /etc/ssh/ssh C. /etc/ssh/server D. /etc/ssh/ssh_config E. /etc/ssh/ssh_server
A. /etc/ssh/sshd_config
Which file contains information about all loaded modules? A. /proc/modules B. /etc/modules.conf C. /etc/conf.modules D. /lib/modules/kernel-version/modules.dep E. /proc/mod
A. /proc/modules
The information displayed by lsmod is identical to that available from: A. /proc/modules. B. /proc/depmod. C. /proc/ls. D. /proc/lsmod.
A. /proc/modules.
The normal use of depmod is to include which of the following lines in one of the files in /etc/rc.d so the correct module dependencies will be available after booting the system? A. /sbin/depmod -a B. /sbin/depmod -p C. /sbin/depmod -r D. /sbin/depmod -c
A. /sbin/depmod -a
In compliance with the FHS, in which of the following places are man pages typically found? A. /usr/share/man B. /opt/man C. /usr/doc D. /var/pkg/man E. /usr/local/man
A. /usr/share/man
What runlevels should never be declared as the default runlevel in /etc/inittab? A. 1 B. 3 C. 5 D. 6
A. 1 D. 6
Which of the following IP networks does RFC1918 reserve for use on private intranets? (Choose two) A. 10.0.0.0 B. 224.0.0.0 C. 199.14.0.0 D. 172.152.0.0 E. 192.168.0.0
A. 10.0.0.0 E. 192.168.0.0
Which of the following IP address ranges are considered private, according to RFC 1918? Choose all that apply. A. 10.0.0.0 - 10.255.255.255 B. 192.168.0.0 - 192.168.255.255 C. 172.16.0.0 - 172.31.255.255 D. 191.168.16.0 - 192.168.31.255 E. 172.16.0.0 - 172.16.255.255
A. 10.0.0.0 - 10.255.255.255 B. 192.168.0.0 - 192.168.255.255 C. 172.16.0.0 - 172.31.255.255
What is the binary conversion of the IP address 192.168.1.10? A. 11000000.10101000.00000001.00001010 B. 01101010.11000100.10101000.00000001 C. 00000001.00001010.11000000.10101000 D. 10101000.00000001.00001010.11000000 E. None of the choices
A. 11000000.10101000.00000001.00001010
Consider the following command and an abbreviated version of its output: $ netstat nr Kernel IP routing table Destination Gateway Genmask Flags Iface 192.168.165.0 0.0.0.0 255.255.255.0 U eth0 127.0.0.0 0.0.0.0 255.0.0.0 U lo0 0.0.0.0 192.168.165.1 0.0.0.0 UG eth0 What is the default gateway for the network? A. 192.168.165.1 B. 255.0.0.0 C. 255.255.255.0 D. 0.0.0.0 E. 192.168.165.0
A. 192.168.165.1
Which ports are used for FTP data and control? Choose Two. A. 20 B. 23 C. 22 D. 21 E. 25
A. 20 E. 25
Which of the following is a valid IPv6 address? A. 2001:db8:3241::1 B. 2001::db8:4581::1 C. 2001:db8:0g41::1 D. 2001%db8%9990%%1 E. 2001.db8.819f..1
A. 2001:db8:3241::1
Which of the following lines are valid in the file /etc/hosts? (Choose TWO correct answers.) A. 2001:db8::15 www.example.com www B. www.example.com www 203.0.13.15 C. 203.0.113.15 www.example.com www D. www.example.com,www 203.0.13.15,2001:db8::15 E. 2003.0.113.15,2001:db8::15 www.example.com www
A. 2001:db8::15 www.example.com www C. 203.0.113.15 www.example.com www
Which of the following will run a file named myscript every 23 minutes past midnight every two hours? A. 23 0-23/2 * * * /myscript B. 23 */0-23 * * * /myscript C. 23 @2 * * * /myscript D. 11 2/0-23 * * * /myscript
A. 23 0-23/2 * * * /myscript
You want to save vi changes to the file myfile with :w!, but vi complains it can not write to the file. Therefore, you want to check the write permissions on the file. To do this without leaving vi, you type: A. :!ls -l myfile B. :\ls -l myfile C. esc :ls -l myfile D. :?ls -l myfile
A. :!ls -l myfile
What command line redirection characters instruct the shell to read from the current input source until a specific word, on a separate line and without and trailing spaces, is reached? A. << B. <l C. !< D. $<
A. <<
When in Normal mode in vi, which command character can be used to begin a reverse search of the text? A. ? B. / C. F D. r
A. ?
After issuing: function myfunction { echo $1 $2 ; } in Bash, which output does: myfunction A B C Produce? A. A B B. A B C C. A C D. B C E. C B A
A. A B
When an Apache server is configured to provide 10 spare server processes, which kind of website would it typically serve? A. A low-to-moderate volume website B. A website for no more than 10 users C. A high volume web site D. A one-user volume website
A. A low-to-moderate volume website
The directory location /usr/share/doc contains what files? A. All documentation created from application source code. B. All documentation you wish to share with other users. C. Supplemental information about installed packages. D. Programs for reading documentation.
A. All documentation created from application source code.
A French user has installed the French language pack, but currencies are still being displayed with a leading '$' sign in his spreadsheets. What must be done to fix this? A. Alter the locale. B. Set the timezone correctly. C. Edit /etc/currency. D. Reinstall the French language pack.
A. Alter the locale.
Which TWO of the following are used in configuration files to create Apache webserver user authentication? (Please select TWO that apply) A. AuthUserFile /etc/apache2/users B. AuthName C. Authentication = Yes D. +Auth E. Authentication
A. AuthUserFile /etc/apache2/users B. AuthName
Why is the correct configuration of a system's time zone important? A. Because the conversion of Unix timestamps to local time relies on the time zone configuration. B. Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created. C. Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone. D. Because NTP chooses servers nearby based on the configured time zone.
A. Because the conversion of Unix timestamps to local time relies on the time zone configuration.
Which of the following information is NOT provided in any output from the netstat utility? A. Broadcast services B. Interface statistics C. Masquerading connections D. Network connections E. Routing tables
A. Broadcast services
On a default install of a Linux server, regardless of the distribution version, what are the easiest methods to disable telnet, but not uninstall or remove the service? Choose two. A. Comment telnet out of the /etc/inetd.conf file B. Delete the /etc/rc.d/init.d/telnet file C. Rename all SXXtelnet links in the /etc/rc or /etc/rc.d directories D. Run "chmod 554 /etc/xinetd.d/telnet" E. Nothing, it's not enabled by default
A. Comment telnet out of the /etc/inetd.conf file E. Nothing, it's not enabled by default
What key sequence will suspend the current process and return you to a shell prompt? A. Ctrl-z B. Ctrl-c C. Ctrl-x D. Ctrl-d
A. Ctrl-z
You are using an application that you want to appear on the screen of another machine. What environment variable would you have to set or edit to achieve this? A. DISPLAY B. REMOTE C. REMOTE_XWINDOW D. SCREEN
A. DISPLAY
Your DNS server needs to be configured for speed and security. Choose the best answer. A. Disable inetd, run named standalone, only allow tcp on ports 25 and 53 B. Disable inetd, run named standalone, only allow tcp on ports 25 and 110 C. Enable inetd, run named as an inetd service, only allow tcp on ports 25 and 53 D. Disable inetd, run named as a standalone on the apache server.
A. Disable inetd, run named standalone, only allow tcp on ports 25 and 53
Which TWO statements about crontab are true? A. Every user may have their own crontab. B. Changing a crontab requires a reload/restart of the cron daemon. C. The cron daemon reloads crontab files automatically when necessary. D. hourly is the same as "0 * * * *". E. A cron daemon must run for each existing crontab.
A. Every user may have their own crontab. C. The cron daemon reloads crontab files automatically when necessary.
On a default Linux system, what file system type does the dump command act upon? A. Ext2 B. UFS C. JFS D. XFS E. ReiserFS
A. Ext2
You need to install a fax server. Which type of fax/modem should you install to insure Linux compatibility? A. External Serial Fax/modem B. External USB Fax/modem C. Internal ISA Fax/modem D. Internal PCI Fax/modem
A. External Serial Fax/modem
Which backup method will require the minimum tapes to restore? A. Full B. Incremental C. Differential D. Copy E. DirTree
A. Full
Which backup method resets the archive bit? Select all that apply. A. Full B. Incremental C. Differential D. Copy E. DirTree
A. Full B. Incremental
Which bootloader can lie to Windows and make Windows believe that it's installed on the first partition even if it's not? A. GRUB B. XLoad C. LILO D. FILO
A. GRUB
Which protocol is used for the majority of the ping command's actions? A. ICMP B. UDP C. TCP D. NDP E. NCP
A. ICMP
Which of the following is the purpose of the nsswitch.conf file? A. It is used to configure where the C library looks for system information such as host name services and user passwords. B. It is used to configure network protocol port numbers such as for HTTP or SMTP. C. It is used to configure LDAP authentication services for the local system. D. It is used to configure which network services will be turned on during the next system reboot
A. It is used to configure where the C library looks for system information such as host name services and user passwords.
What is the purpose of the nsswitch.conf file? A. It is used to configure where the C library looks for system information such as host names and user passwords. B. It is used to configure network protocol port numbers such as for HTTP or SMTP. C. It is used to configure LDAP authentication services for the local system. D. It is used to configure which network services will be turned on during the next system boot.
A. It is used to configure where the C library looks for system information such as host names and user passwords.
What is the purpose of a screen reader? A. It reads text displayed on the screen to blind or visually impaired people. B. It reads the parameters of the attached monitors and creates an appropriate X11 configuration. C. It displays lines and markers to help people use speed reading techniques. D. It manages and displays files that contain e-books.
A. It reads text displayed on the screen to blind or visually impaired people.
What is the purpose of the xargs command? A. It will read standard input and execute command lines with the read input. B. It will get user input from the graphical environment. C. It will clean up command line arguments and verify syntactic correctness. D. It will pass arguments on the command line to a new graphical application. E. It will allow users to specify long options for commands that normally only accept short options.
A. It will read standard input and execute command lines with the read input.
When generating new authentication keys with SSH for a user, where should the private key be kept? A. On any trusted system from which the user will login. B. On a CD-ROM or USB stick. C. Printed and kept in a secure place. D. Only on the computer where the key was created. E. SSH does not use private keys.
A. On any trusted system from which the user will login.
What is true regarding TCP port 23? A. Port 23 is the well known port for the telnet service which is a plain text protocol that should no longer be used. B. Port 23 is the well known port for the SSH service which provides secure logins. C. Port 23 is the well known port for the rlogin service which is SSL secured by default. D. Port 23 is the well known port for the system login services which are encrypted when the user runs the starttls command in his login shell.
A. Port 23 is the well known port for the telnet service which is a plain text protocol that should no longer be used.
Which of the following is very important when installing from source code (Check TWO that apply)? A. Read all documentation included with the source code. B. Reboot after installing all programs. C. Manually check to see if all dependencies are met. D. Use rpm or dpkg go verify the installation. E. Do not install binaries as the root user.
A. Read all documentation included with the source code. C. Manually check to see if all dependencies are met.
Which of the following steps prevents a user from obtaining an interactive login session? A. Run the command chsh -s /bin/false with the user name. B. Set the UID for the user to 0. C. Remove the user from the group staff. D. Add the user to /etc/noaccess. E. Create a .nologin file in the user's home directory.
A. Run the command chsh -s /bin/false with the user name.
You ran out of space and added a eighth disk to your SCSI-I system. When you try to start, the system no longer boots. What is most likely the cause of this problem? A. SCSI-I supports only 8 devices including the adaptor B. SCSI-I supports only6 disks per adaptor C. There is a SCSI-ID conflict that causes that problem D. You forgot to set the SCSI-ID #8 for the new disk
A. SCSI-I supports only 8 devices including the adaptor
What of the following can be done by the command ifconfig? (Choose TWO correct answers.) A. Set a network interface active or inactive. B. Specify the kernel module to be used with a network interface. C. Allow regular users to change the network configuration of a network interface. D. Change the netmask used on a network interface. E. Specify which network services are available on a network interface.
A. Set a network interface active or inactive. D. Change the netmask used on a network interface.
What does the Filesystem Hierarchy Standard enable? (Select TWO answers) A. Software to predict the location of installed files and directories B. Software to predict the ownership and access rights of installed files and directories C. Users to predict the location of installed files and directories. D. Users to predict how the filesystem should be formatted according to need.
A. Software to predict the location of installed files and directories C. Users to predict the location of installed files and directories.
Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.) A. Start and prepare the desktop environment for the user. B. Configure additional devices like new monitors or projectors when they are attached. C. Handle the login of a user. D. Lock the screen when the user was inactive for a configurable amount of time. E. Create an X11 configuration file for the current graphic devices and monitors.
A. Start and prepare the desktop environment for the user. C. Handle the login of a user.
Man pages cover what topics? Select THREE that apply. A. Superuser commands B. Configuration commands C. System policies D. Programming libraries E. Kernel version history
A. Superuser commands B. Configuration commands D. Programming libraries
When using /etc/ppp/peers/* files, which of the following is true: A. The /etc/ppp/options should be empty. B. Any user can run pppd from the command line. C. The dial-on-demand option cannot be used. D. You must use chap authentication.
A. The /etc/ppp/options should be empty.
During a system boot cycle, what is the program that is run after the BIOS completes its tasks? A. The bootloader B. The inetd program C. The init program D. The kernel
A. The bootloader
Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion? A. The encrypted passwords are still subject to brute force attacks. B. This is just for historical reasons. C. There is other information in the file that needs to be kept secret. D. The passwords can be decrypted by anyone with root access.
A. The encrypted passwords are still subject to brute force attacks.
You have a file /etc/resolv.conf, but the computer does not use the configured DNS servers to look up host names. What is most likely the problem? A. The hosts entry in your /etc/nsswitch.conf does not list dns. B. You do not have a /etc/named.conf file. C. The localhost hostname is not properly configured in /etc/hosts. D. The named daemon is not running on your computer.
A. The hosts entry in your /etc/nsswitch.conf does not list dns.
Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.) A. The list of users that belong to the group. B. The home directory of the group. C. The name of the group. D. The description of the group. E. The password of the group.
A. The list of users that belong to the group. C. The name of the group. E. The password of the group.
You found these lines in the modules.dep file: /lib/modules/2.2.5-15smp/fs/msdos.o: /lib/modules/2.2.5-15smp/fs/fat.o Which of the following is true? A. The msdos module is dependent upon fat. B. The fat and msdos modules cannot be loaded manually. C. The fat and msdos modules are automatically loaded at startup. D. The fat module is a submodule to the msdos module.
A. The msdos module is dependent upon fat.
What is true regarding the command userdel --force --remove bob? (Choose TWO correct answers.) A. The user bob is removed from the system's user database. B. The user bob's home directory is removed. C. The locate database is updated to drop files owned by bob. D. All files owned by bob are remove from all mounted filesystems. E. In case bob was the last member of a group, that group is deleted.
A. The user bob is removed from the system's user database. B. The user bob's home directory is removed.
Which statement is true regarding the following /etc/resolv.conf file? search example.com 127.0.0.1 208.77.188.166 A. There is a syntax error. B. If DNS queries to the localhost fail, the server 208.77.188.166 will be queried. C. example.com will be appended to all host lookups. D. The DNS servers at 127.0.0.1 and 208.77.188.166 will be queried in a round robin fashion. E. The DNS server with the shortest ping time will be queried first. If the lookup fails, the second server will be queried.
A. There is a syntax error.
What is the purpose of the Sticky Keys feature in X? A. To assist users who have difficulty holding down multiple keys at once B. To prevent repeated input of a single character if the key is held down C. To ignore brief keystrokes according to a specified time limit D. To repeat the input of a single character
A. To assist users who have difficulty holding down multiple keys at once
Your investigation of a system turns up a file that contains the line below: find /home -iname .rhosts -exec rm -f {} \; What is the purpose of this script? A. To enhance system security B. To remove all program error dumps C. To remove all temporary files in the user's home directories D. To reset the configuration for the rsh and rexec utilities
A. To enhance system security
Rate this advice: In order to use the latest kernel, it is necessary to first upgrade to the newest utilities and libraries. A. True B. False
A. True
Rate this comment: The "root" account has no security restrictions imposed upon it. A. True B. False
A. True
In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true? A. Without additional configuration, no users may have user specific crontabs. B. Without additional configuration, all users may have user specific crontabs. C. The cron daemon will refuse to start and report missing files in the system's logfile. D. When a user creates a user specific crontab the system administrator must approve it explicitly.
A. Without additional configuration, no users may have user specific crontabs.
You want to install a new software package, but it is only available in RPM format and you are running Debian Linux. Which of the following would help you to install it on your system? A. alien B. apt-conf C. dselect D. cpio
A. alien
Lsmod shows information about: A. all loaded modules. B. all updatable modules. C. all non-updatable modules. D. all unloaded modules.
A. all loaded modules.
The normal way of starting your Apache server would be the command: A. apachectl start B. http -start C. inetd apache D. apachestart -n E. apache start
A. apachectl start
What command will show partial word matches for a search term? A. apropos B. locate C. whereis D. whatis E. find
A. apropos
What command is the functional equivalent of the command "man -k searchterm"? A. apropos searchterm B. whatis searchterm C. locate searchterm D. find / -name searchterm E. None of the selections
A. apropos searchterm
You discover a pending job for the at command. Which of the following do you have to use to remove it? A. atrm B. atq -r C. at -r D. rmat
A. atrm
What modprobe option will cause inactive kernel modules to be unloaded? A. autoclean B. inactive C. remove D. timeout E. holdoff
A. autoclean
You need to print 12 copies of the document foo.txt. Which of the following commands would you use? A. cat foo.txt | lpr -#12 B. cat foo.txt > lpr -#12 C. cat foo.txt | lpr -12 D. cat foo.text > lpr -12
A. cat foo.txt | lpr -#12
Which commands will print two copies of the file to the default printer? Choose all that apply. A. cat hosts | lpr -#2 B. lpr -K2 hosts C. lpr -P -count 2 hosts D. cat hosts > lpr ; cat hosts > lpr E. for 1 in 2 lpr hosts
A. cat hosts | lpr -#2 B. lpr -K2 hosts
Select all of the protocols that are supported by the Linux implementation of ppp. A. chap B. mschap C. pap D. spap E. eap
A. chap B. mschap C. pap
Upgrading a kernel involves which of the following tasks (choose all that apply): A. configuring the desired modules B. compiling the kernel and modules C. installing the kernel image D. conducting a system reboot
A. configuring the desired modules B. compiling the kernel and modules C. installing the kernel image D. conducting a system reboot
Which daemon or service can be configured as a non-root user? A. cron B. ntp C. lpr D. nmbd E. slocate
A. cron
When using the PPP daemon make a connection, what option is set to configure it to use hardware flow control? A. crtscts B. rsync C. nsync D. connect
A. crtscts
What command will print a list of usernames (first column) and their corresponding user id (uid, third column) from /etc/passwd? A. cut -d: -fl,3 /etc/passwd B. chop -c l,3 /etc/passwd C. tac l-3 /etc/passwd D. fmt -u /etc/passwd
A. cut -d: -fl,3 /etc/passwd
Which of the following commands can be used to create a new file that is 100kB in size? A. dd B. file C. mkfile D. touch
A. dd
Which of the following correctly describe the relationship between depmod and modprobe? A. depmod creates a dependency file for use by modprobe B. modprobe creates a dependency file for use by depmod C. they have no relationship D. they can replace each other
A. depmod creates a dependency file for use by modprobe
Which of the following programs is typically used to query installed debian packages? (Please select TWO that apply) A. dpkg B. apt-cache C. apt-conf D. dselect
A. dpkg D. dselect
Which Debian package system command will list all partially installed packages and suggest how to get them correctly installed? A. dpkg -C B. apt-get -u C. dpkg -Dh D. dpkg -l E. apt-get -y
A. dpkg -C
Which command will print the exit value of the previous command to the screen in bash? A. echo $? B. echo $# C. echo $exit D. echo $status E. echo $
A. echo $?
You are writing text in vi. Now you want to save your changes and exit. Which TWO sequence of inputs will accomplish this? A. esc ZZ B. ctrl :w! C. esc zz D. esc :wq! E. ctrl XX
A. esc ZZ D. esc :wq!
You've just finished editing a new entry in the /etc/exports file. Which of the following will cause the changes to take effect without interrupting current connected users or rebooting the machine? Choose all that apply. A. exportfs -a B. /etc/rc.d/init.d/nfs restart C. service nfs restart D. kill -1 HUP nfs E. init 1
A. exportfs -a
Which of the following Linux filesystems pre-allocates a fixed number of inodes at the filesystem's make/ creation time, and does NOT generate them as needed? A. ext3 B. jfs C. reiserfs D. xfs
A. ext3
Which of the following commands will NOT update the Modify timestamp on the file /tmp/myfile.txt? A. file /tmp/myfile.txt B. echo "Hello" >/tmp/myfile.txt C. sed -i "s/1/2/" /tmp/myfile.txt D. echo -n "Hello" >/tmp/myfile.txt E. touch /tmp/myfile.txt
A. file /tmp/myfile.txt
Which of the following find commands will print out a list of files owned by root and with the SUID bit set in /usr? A. find /usr -uid 0 -perm +4000 B. find -user root +mode +s /usr C. find -type suid -username root -d /usr D. find /usr -ls \*s\* -u root E. find /usr -suid -perm +4000
A. find /usr -uid 0 -perm +4000
Which of the following find commands will print out a list of suid root files in /usr? A. find /usr -uid 0 -perm +4000 B. find -user root +mode +s /usr C. find -type suid -username root -d /usr D. find /usr -ls \*s\* -u root E. find /usr -suid -perm +4000
A. find /usr -uid 0 -perm +4000
You want to the command foo to take its input from the file foobar and send its output to the program bar. Which of the following command lines will do this? A. foo < foobar | bar B. foo < foobar > bar C. foo | foobar > bar D. foo | bar < foobar E. foo > bar < foobar
A. foo < foobar | bar
What keyword is missing from this code sample of a shell script? ____ i in *.txt; do echo $i done A. for B. loop C. until D. while
A. for
Which TWO daemons may be used to support various routing protocols under Linux? A. gated B. ripd C. ospfdm D. bgpd E. routed
A. gated E. routed
Which command can be used to delete a group from a Linux system? A. groupdel B. groupmod C. groups D. groupedit
A. groupdel
You are performing an onsite security inspection of division of your company. On an Apache server, you want to determine what files are needed and which can be removed from the /etc/httpd folder. Which of the following are possibly valid Apache confguration files? Choose all that apply. A. httpd.conf B. apached.conf C. srm.conf D. access.conf E. in.http.conf
A. httpd.conf C. srm.conf D. access.conf
Your machine has two working NIC's with proper addresses. You want to split your network into two new subnets. What single command will accomplish this? A. ifconfig B. route C. default D. netstat E. None of the choices
A. ifconfig
Which of the following is the command used to deactivate a network interface? A. ifdown B. ipdown C. net D. netdown
A. ifdown
Your FTP server has been under attack, and the ISP of the attacker has been less than helpful in mitigating the attacks. So you decide that all connections from that ISP (badguy.example.org) to your FTP server will be denied and sent a message. Which line in your /etc/hosts.allow will have the desired effect? A. in.ftpd : .badguy.example.org : twist 450 denied due to numerous attacks from this domain B. ftp : badguy.example.org : DENIED message 450 denied due to numerous attacks from this domain C. in.ftpd : badguy.example.org : spawn echo 450 denied due to numerous attacks from this domain D. ftp : .badguy.example.org : DENIED due to numerous attacks from this domain
A. in.ftpd : .badguy.example.org : twist 450 denied due to numerous attacks from this domain
Which one of the following lines would you expect to see in the file /etc/hosts.allow? A. in.tftpd: LOCAL B. tftp dgram udp wait root /usr/sbin/tcpd in tdtpd C. tftp 69/udp D. udp 17 UDP
A. in.tftpd: LOCAL
Which of the following commands installs a loadable module in the running kernel? A. insmod B. depmod C. modprobe D. setmod
A. insmod
Which of the following correctly describe a Micro-kernel Architecture? A. it has an extremely small core. B. only its small core remains in memory at all times. C. its device drivers are loaded as-needed. D. None of the choices
A. it has an extremely small core. B. only its small core remains in memory at all times. C. its device drivers are loaded as-needed.
Which of the following correctly describe a Monolithic Kernel (choose all that apply): A. it is built into one single binary. B. it is loaded completely into memory at boot time. C. it pre-dates micro-kernel architecture by at least ten years. D. None of the choices
A. it is built into one single binary. B. it is loaded completely into memory at boot time. C. it pre-dates micro-kernel architecture by at least ten years.
Which system administration command you can use to update ld.so.cache after the installation of new shared libraries? A. ldconfig B. ldd C. libpath D. newlibs
A. ldconfig
You are experimenting with a binary in /tmp/foo.d that expects its configuration file at /etc/foo.conf. You don't want to save it there, but use a symbolic link to /tmp/foo.d/foo.conf instead. Which command would accomplish that? A. ln -s /tmp/foo.d/foo.conf /etc/foo.conf B. ln /tmp/foo.d/foo.conf /etc/foo.conf C. ln -s /etc/foo.conf /tmp/foo.d/foo.conf D. ln /etc/foo.conf /tmp/foo.d/foo.conf
A. ln -s /tmp/foo.d/foo.conf /etc/foo.conf
Which of the following are syslog facilities? (Choose TWO correct answers.) A. local7 B. mail C. advanced D. postmaster E. remote
A. local7 B. mail
What command would cause a print job to be printed next regardless of its current position in the queue. A. lpc topq B. lpc -t C. lpq -t D. lpc move E. lpq --next
A. lpc topq
Which of the following are valid commands to affect your system's printing? A. lpq B. lprm C. lpstatus D. lpr E. lpio
A. lpq B. lprm D. lpr
The correct command to view "verbose" line printer queue information is: A. lpq -l B. lpq -all C. lpq -verbose D. lpq -a
A. lpq -l
Which of the following commands will flush all print jobs on all configured queues of the system? A. lprm -a all B. lprm -all C. lprm -a * D. lpflush -all
A. lprm -a all
What command will compile the Linux kernel and leave a file in arch/i386/boot called bzImage? A. make bzImage B. make compile C. make Image D. make bzdisk
A. make bzImage
If your new kernel does not behave normally after a routine kernel upgrade, chances are that you forgot to _______ before compiling the new kernel. A. make clean B. make shot C. make clear D. make remove
A. make clean
You have finished updating and resolving dependencies for some source code. What command should you run before recompiling the code into binary form? A. make clean B. make all C. makedep D. make install
A. make clean
When preparing to compile a new kernel, which of the following commands can be used to create the configuration file? A. make config B. make kernel C. ./configure D. make kernelconfig E. [Kernel Source Path]/Configure
A. make config
Which of the following commands can be used to customize all kernel compilation options? (Select THREE) A. make config B. make menuconfig C. make xconfig D. make kernelconfig E. make configure
A. make config B. make menuconfig C. make xconfig
Which of the following insures that all of the dependencies, such as the include files, are in place? A. make dep B. make clean C. make_dep D. make_install
A. make dep
After rebooting a machine with a recompiled new kernel and its modules a lot of "Can't locate module" errors appear on screen. Which of the following is most likely to be the source of the problem? A. make modules_install wasn't executed. B. make modules install wasn't executed. C. The kernel wasn't configured to use modules. D. This kernel version does not support modules. E. depmod wasn't run before rebooting.
A. make modules_install wasn't executed.
Which of the following commands will attempt to configure the kernel from an old configuration file and run through the make config process for you? A. make oldconfig B. make newconfig C. make clean D. None of the choices
A. make oldconfig
Which of the following brings up a user friendly GUI interface? A. make xconfig B. make menuconfig C. make config D. make compile
A. make xconfig B. make menuconfig
What command could you use to confirm function of a ppp connection before establishing it? A. minicom B. hyperterminal C. setserial D. modemset E. None of the choices
A. minicom
What utility examines the object file module_file associated with a kernel module and displays any information that it can glean? A. modinfo B. modprobe C. insmod D. depmod
A. modinfo
How can you list the parameters that you can use on an specific module? A. modinfo -p B. modinfo -list C. lsmod D. modprobe -p E. cat /etc/modules.conf
A. modinfo -p
Modprobe will automatically load all base modules needed in the module stack as described by its dependency file. What file is this? A. modules.dep B. modprobe.dep C. module.dep D. modep.dep
A. modules.dep
Which of the following commands puts the output of the command date into the shell variable mydate? A. mydate="$(date)" B. mydate="exec date" C. mydate="$((date))" D. mydate="date" E. mydate="${date}"
A. mydate="$(date)"
Lsmod shows information in which of the following formats? A. name, size, use count, list of referring modules B. name, use count, list of referring modules, size C. name, size, list of referring modules, use count D. None of the choices
A. name, size, use count, list of referring modules
You are not using the WINS service on your network, but need to provide NETBIOS resolution to your hosts. What is the name of the daemon that provides these services on a Linux server? A. nmbd B. dns C. winsd D. lmhostsd E. smbd
A. nmbd
In order to allow a Win95 host to resolve the name of and map network drives to your Linux server, what services should be running? Choose Two. A. nmbd B. smbd C. named D. routed E. winsd
A. nmbd B. smbd
You want to make the directory /home/tess available via NFS. Which option do you have to use to grant read permission for the root user on the NFS mounted file system? A. no_root_squash B. root_squash C. root(rw) D. For safety, the NFS protocol does not allow this?
A. no_root_squash
What protocol will allow you to keep accurate time on your hosts? A. ntp B. nntp C. ncftp D. inn E. ntime
A. ntp
To see the current time set by a NTP clock, you use the command: A. ntpd -clock B. ndtime C. hwdate D. ntpdate
A. ntpd -clock
Which command is used to dump files in octal format? A. od B. octdump C. dumpoct D. cat -o
A. od
What command will set a regular users password to force changing it every 60 days? Choose all that apply. A. passwd -x 60 user1 B. chage -M 60 user1 C. passwd +x 60 user1 D. useradd -e 60 user1 E. usermod -f 60 user1
A. passwd -x 60 user1 B. chage -M 60 user1
Incremental upgrades of the kernel are distributed as: A. patches. B. fixes. C. hotfixes. D. service packs.
A. patches.
Which of the following are commonly used Mail Tranfer Agent (MTA) applications? (Please select THREE correct answers) A. postfix B. procmail C. sendmail D. exim E. smtpd
A. postfix C. sendmail D. exim
What program is needed to establish a PPP link to another computer? A. pppd B. wvdial C. papd D. kppp
A. pppd
Your /etc/passwd file appears to have approximately 1/2 shadow passwords and 1/2 standard unix encrypted passwords. What utility would you most likely run again to fix this? A. pwconv B. passconvert C. useradd -conv D. pwhash E. passwd -fix
A. pwconv
What TWO permissions must a user have in order to run a shell script? A. read B. write C. execute D. browse on the directory E. users cannot run shell scripts
A. read C. execute
You are using quota on your system. How can you see disk quota details? A. repquota B. quota -l C. quota D. quotachech E. quota --list
A. repquota
You are using quota on your system. How can you see disk quota details? A. repquota B. quota-l C. quota D. quotacheck E. quota --list
A. repquota
What output will the following command sequence produce? echo '1 2 3 4 5 6' | while read a b c; do echo result: $c $b $a; done A. result: 3 4 5 6 2 1 B. result: 1 2 3 4 5 6 C. result: 6 5 4 D. result: 6 5 4 3 2 1 E. result: 3 2 1
A. result: 3 4 5 6 2 1
What output will the following command sequence produce? echo '1 2 3 4 5 6' | while read a b c; do echo result: $c $b $a; done A. result: 3 4 5 6 2 1 B. result: 1 2 3 4 5 6 C. result: 6 5 4 D. result: 6 5 4 3 2 1 E. result: 3 2 1
A. result: 3 4 5 6 2 1
Which parameters should appear in a valid /etc/printcap file to allow a local printer queue to point to another machine's print queue? Choose two. A. rm B. rp C. remoteip D. netprinter E. netip
A. rm B. rp
What command should you use to unload loadable modules from the running kernel? A. rmmod B. remove -mod C. delmod D. unload module
A. rmmod
What command will unload a kernel module? A. rmmod B. unmod C. delmod D. modprobe E. unloadmod
A. rmmod
You need maximum performance of your machine and therefore you decide to unload all dispensable modules. Which command would you use? A. rmmod B. insmod -r C. unmod D. module -r
A. rmmod
What is the command to delete the default gateway from the system IP routing table? (Choose TWO correct answers.) A. route del default B. ifconfig unset default C. netstat -r default D. ip route del default E. sysctl ipv4.default_gw=0
A. route del default D. ip route del default
After a minor security incident you are instructed by your lead sys-admin to verify the RPM's installed on a running system. Which command will create a complete report which you can analyze for changes which may be security related? A. rpm -Va >report B. rpm -Qavy >report C. rpm -Vqt --nomd5 >report D. rpm --checkfiles >report E. rpm -Va --nofiles >report
A. rpm -Va >report
You need to know where all the configuration files for the installed package named "postfix" are located. Assuming it was installed with rpm, which command will list this information for you? A. rpm -qc postfix B. rpm -Vc postfix C. rpm --config postfix D. rpm -listconfig postfix E. rpm -qa --config postfix
A. rpm -qc postfix
You have an updated RPM called screensaver-1.1.i386. rpm. You have version 1.0 installed. Using RPM, how do you view the changelog of this file to see if you should install the update? A. rpm -qp --changelog screensaver-1.1.i386. rpm B. rpm --changelog screensaver-1.1.i386. rpm C. rpm -qc screensaver-1.1.i386. rpm D. rpm -showchangelog screensaver-1.1.i386. rpm
A. rpm -qp --changelog screensaver-1.1.i386. rpm
Loadable kernel modules can (choose all that apply): A. save memory B. ease configuration C. include filesystems D. include ethernet card drivers
A. save memory B. ease configuration C. include filesystems D. include ethernet card drivers
What command with options will cause the redirection symbol (>) to fail to overwrite the contents of an existing file? A. set -o noclobber B. set +o nooverwrite C. export OVERWRITE=no D. alias >='!>' E. None of the choices
A. set -o noclobber
Which of the following files typically are used to configure Apache? (Choose two) A. srm.conf B. www.conf C. http.boot D. httpd.conf E. apache.conf
A. srm.conf D. httpd.conf
Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services? A. tcpd B. inetd C. fingerd D. mountd E. xinetd
A. tcpd
What command will verify the syntax of a hosts.allow and hosts.deny file combination? A. tcpdchk B. verify --tcp C. ipswitch D. tcpdump E. tcpdmatch
A. tcpdchk
Which of the following commands can be used to instruct the init process to switch runlevels? (Choose TWO correct answers) A. telinit B. initctl C. init D. reinit E. runlevel
A. telinit C. init
You are having some trouble with a disk partition and you need to do maintenance on this partition but your users home directories are on it and several are logged in. Which command would disconnect the users and allow you to safely execute maintenance tasks? A. telinit 1 B. shutdown -r now C. killall -9 inetd D. /bin/netstop --maint E. /etc/rc.d/init.d/network stop
A. telinit 1
You are having some trouble with a disk partition and you need to do maintenance on this partition but your users home directories are on it and several are logged in. Which command would disconnect the users and allow you to safely execute maintenance tasks? A. telinit 1 B. shutdown -r now C. killall -9 inetd D. /bin/netstop maint E. /etc/rc.d/init.d/network stop
A. telinit 1
insmod tries to link a module into the running kernel by resolving all symbols obtained from: A. the kernel's exported symbol table. B. the kernel's internal pointer base. C. the user command argument list. D. None of the choices
A. the kernel's exported symbol table.
The command echo $! will produce what output? A. the process id of last background command B. the exit status of the last command C. the exit status of the last background command D. the process id of the current shell E. the name of the command being executed
A. the process id of last background command
Which of the following GNU commands would be the most likely command you'd use to find the system load average? A. top B. nice C. loadavg D. cpustat E. ps
A. top
GNU Make determines which pieces of a large program need to be recompiled and issues the commands to recompile them when necessary. A. true B. false
A. true
Rate this comment: Linux by and large is monolithic. A. true B. false
A. true
The command "make config" requires bash. A. true B. false
A. true
With insmod, the paths listed in /etc/modules.conf override the paths defined in MODPATH. A. true B. false
A. true
Which commands can be used to change a user's account aging information? (Choose THREE correct answers.) A. usermod B. passwd C. chattr D. chage E. chsh
A. usermod B. passwd D. chage
Which commands can you use to change a user's account aging information? (Choose THREE correct answers.) A. usermod B. passwd C. chattr D. chage E. chsh
A. usermod B. passwd D. chage
Which commands can you use to change a user's password expiry information? (Choose THREE correct answers.) A. usermod B. passwd C. chattr D. chage E. chsh
A. usermod B. passwd D. chage
Which of the following regarding user account configuration is true (choose all that apply): A. username is case-sensitive B. password is case-sensitive C. username is case-insensitive D. password is case-insensitive
A. username is case-sensitive B. password is case-sensitive
What command will show only complete word matches for a search term? A. whatis B. apropos C. locate D. find E. whereis
A. whatis
Which two commands share the same database for retrieving information? A. whatis B. whereis C. apropos D. find E. man
A. whatis C. apropos
What command is the functional equivalent of the command "man -f searchterm"? A. whatis searchterm B. apropos searchterm C. locate searchterm D. find / -name searchterm E. None of the selections
A. whatis searchterm
The system bell sound is annoying you. Which of the following can you use to change this and other user X preferences? A. xset B. xconf C. xbell D. xmag E. xpref
A. xset
You just started X for the first time and noticed that the display does not use the entire screen. What program can you use to fix this? A. xvidtune B. xf86config C. XF86Setup D. tweakscreen
A. xvidtune
An administrator has issued the following command: grub-install --root-directory=/custom-grub /dev/sda In which directory will the new menu.lst file be found? (Provide the full directory path only without the filename)
Answer: /custom-grub/boot/grub
What file is used in recent apache distributions to configure the service? Type the full path and name of the file.
Answer: /etc/apache/httpd.conf Answer: /etc/apache2/httpd.conf
Which file specifies the user accounts can NOT submit jobs via at or batch? (Provide the full path and filename)
Answer: /etc/at.deny
Which file specifies the user accounts that can NOT submit jobs via at or batch? (Provide the full path and filename)
Answer: /etc/at.deny
In which file, if present, must all users be listed that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)
Answer: /etc/cron.allow
Please specify the directory containing the configuration files for the CUPS printing system. (Provide the full path to the directory)
Answer: /etc/cups
Please specify the top directory containing the configuration files for the CUPS printing system. (Provide the full path to the directory)
Answer: /etc/cups, /etc/cups/
Please specify the top directory containing the configuration files for the CUPS printing system. (Specify the full path to the directory.)
Answer: /etc/cups, /etc/cups/
What file contains a list of directories for an NFS daemon to server to other systems? (Provide the complete answer)
Answer: /etc/exports
What file contains a list of shared directories on a Linux/Unix system? Type the full path and name of the file.
Answer: /etc/exports
You are running a machine which exports a list of directories using NFS. Provide the complete path to the file which contains this list.
Answer: /etc/exports
Given the following line from /etc/nsswitch.conf: hosts: files mdns4_minimal [NOTFOUND=return] dns mdns4 By default, which file will be queried first for hostname lookups? (Provide the full path and filename)
Answer: /etc/hosts
Type in the name of the file including path of the static host name to IP address configuration file
Answer: /etc/hosts
Which local system networking file binds a hostname to an IP address? Type the full path and name of the file.
Answer: /etc/hosts
Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.)https:// lh3.googleusercontent.com/-5cd-clmKnbk/AAAAAAAAAAI/AAAAAAAAADM/-SXesH19Ido/s46-c-k-no/photo.jpg
Answer: /etc/hosts.allow
Which file contains a set of services and permitted hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Please enter the full path)
Answer: /etc/hosts.allow
Which file contains a list of services and hosts that will be denied by a TCP Wrapper such as tcpd? (type full path)
Answer: /etc/hosts.deny
What file is used to deny hosts access to a system's printers? Type the filename including full path.
Answer: /etc/hosts.lpd
What file on a remote host should be configured to allow your host to print to its already functioning printers? Type the full path and name of the file.
Answer: /etc/hosts.lpd
The system configuration file named _______ is commonly used to set the default runlevel. (Please provide the fill name with full path information) Answer:
Answer: /etc/inittab
What is the name of the file and location that governs what run level is to be booted to on startup. Give full path and file name
Answer: /etc/inittab
Type in the name of file and full path to the file that holds a message for remote users about possible system outages.
Answer: /etc/issues.net
On your system exists a file that is described as a map file that is used to update the MBR or first sector of the partition with the appropriate booting information. Type the full path and name of the file.
Answer: /etc/lilo.conf
Type in the name of the file including full path that holds contains a daily message viewed by users when they log in?
Answer: /etc/motd
The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.)
Answer: /etc/nologin
In what file can you configure your name server resolution queries to use the localhost first? Type the full path and name of the file.
Answer: /etc/nsswitch.conf
Type in the name and full path to the network configuration file that defines the search order for name resolution
Answer: /etc/nsswitch.conf
The ________ file contains the system default options for the PPP daemon.
Answer: /etc/ppp/options
Type in the name and full path to the config file that contains the IP address of DNS servers for hostname resolution
Answer: /etc/resolv.conf
What file with full path is used to set the location to query for hostname resolution outside of the local system?
Answer: /etc/resolv.conf
To find the port used by a particular known service, you would look in what file? Type the full path and name of the file.
Answer: /etc/services
On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)
Answer: /etc/shadow
By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.)
Answer: /etc/skel
By default, which directories contents will be copied to a new user's home directory when the account is created, passing the -m option to the useradd command?
Answer: /etc/skel
Where should you put the .pinerc file so that all new users get it as part of their initial creation? Type the full path of the directory.
Answer: /etc/skel
You just installed a new system, but before you create any new users you want to ensure they have a subdirectory bin/ in their home directory. To ensure this directory is automatically created each time you add a new user, in what subdirectory should you create the directory?
Answer: /etc/skel
By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Please provide the full path)
Answer: /etc/skel, /etc/skel/
Which directory in /etc is used to keep a sample copy of files and directories for when a new user has a home directory created? (Please provide the full path)
Answer: /etc/skel, /etc/skel/
What file do you configure to make changes to your smbd and nmbd daemons? Type the full path and name of the file.
Answer: /etc/smb.conf
Which file lists which users can execute commands using sudo? (Provide the full path and filename)
Answer: /etc/sudoers
Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)
Answer: /etc/sudoers
You are running a Red Hat machine. You have added a 2nd NIC to your machine and rebooted it. The card is detected in the BIOS but is not configured along with the eth0 interface upon network start. A file must be created to allow this interface to function. Type the full path and name of the file.
Answer: /etc/sysconfig/network-scripts/ifcfg-eth1
For security reasons, the system administrator is setting up a log server. What file does the system administrator have to edit in order to have each machine send log entries to the new log server?
Answer: /etc/syslog.conf
Type in the file and full path to the configuration file for the Sytem logging daemons
Answer: /etc/syslog.conf
What is the full path and file name of the file that contains the configuration files for system logging? Type in full path and file name.
Answer: /etc/syslog.conf
Converting from the inetd to xinetd services requires populating entries in what file, including the full path and name?
Answer: /etc/xinetd.conf
The xinetd service will be used instead of inetd. In order to create a similar configuration as inetd, what main file must be created or edited for xinetd? (Please specify the full path)
Answer: /etc/xinetd.conf
You decide to use xinetd instead of inetd. Now, you need to transfer information from /etc/inetd conf to another file. What file?
Answer: /etc/xinetd.conf
Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)
Answer: /etc/xinetd.d/, /etc/xinetd.d
To prevent users from being able to fill up the / partition, the _______ directory should be on a separate partition if possible because it is world writeable.
Answer: /tmp
An administrator wants to determine the geometry of a particular window in X, so she issues the __________ -metric command and then clicks on the window.
Answer: /usr/bin/xwininfo
Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)
Answer: /usr/bin/xwininfo, xwininfo
You have written a custom tool on your local system. Following the Filesystem Hierarchy Standard (FHS), where should you install the binaries to be available to all users on your system?
Answer: /usr/local/bin
The system's timezone may be set by linking /etc/localtime to an appropriate file in which directory? (Provide the full path to the directory, without any country information)
Answer: /usr/share/zoneinfo/
The system's timezone may be set by linking /etc/localtime to an appropriate file in which directory? (Provide the full path to the directory, without any country information)
Answer: /usr/share/zoneinfo/
Typically, which top level system directory is used for files and data that changes regularly while the system is running and are to be kept between reboots? (Specify only the the top level directory) Answer:
Answer: /var
The dmesg command outputs information from which file, inlcude full path?
Answer: /var/log/dmesg
What file contains kernel level logging information such as output from a network driver module when it is loaded?
Answer: /var/log/kern.log
What file contains kernel level logging information such as output from a network driver module when it is loaded?
Answer: /var/log/messages
The last command functionality needs what log file to be present to operate properly? Type the full path and name of the file.
Answer: /var/log/wtmp
Type the full path and name of the file whose global read bit you would change to deny normal users the ability to get useful information from the who and w commands.
Answer: /var/run/utmp
The normal filesystem location for the LPD queue directory is:
Answer: /var/spool/lpd
Machines with IPs `on the 131.230.55 and 131.230.56 networks need to be allowed to connect to a service protected with TCP wrappers. How would the network and netmask pair be expressed in /etc/hosts.allow?
Answer: 131.230.55.0/255.255.254.0
In the vi editor, what vi command will copy (but not paste) from the current line at the cursor and the following 16 lines (17 lines total)? Enter the correct vi command without spaces
Answer: 17yy
The priority of any process can range from -20 to ________ . (Provide only the numerical value)
Answer: 19
With a Class C address, and a subnet mask of 255.255.255.0, how many host addresses are assignable?
Answer: 254
You are formatting a single hard disk for a Linux install. What is the maximum number of primary partitions you can create?
Answer: 4
An administrator is configuring a secured webserver, however connecting to https://127.0.0.1 is not working. She runs netstat -ntl, which returns the following output: tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN What port should be listening before a successful connection is possible? (Provide only the numerical value of the port)
Answer: 443
What is the default port for HTTPS under Apache?
Answer: 443
Your ISP has given you an IP block for your use. The block is 192.168.112.64/26. If your network administrator uses the first usable IP for the router he's installed on your network, how many usable IPs do you have left?
Answer: 61
With IPv6, how many bits have been used for the host identifier portion of an address? (Please enter the number and not a word)
Answer: 64
What section of the Man pages are system administration commands in? Type the numeral of the section.
Answer: 8
What is the assigned port number for the HTTP service? (Provide the number with digits and not as a word)
Answer: 80
What command is used to view pending jobs for the at command? (Do NOT specify path).
Answer: ATQ,AT-L
With X11 forwarding in ssh, what environment variable is automatically set in the remote host shell that is not set when X11 forwarding is not enabled? (Specify only the environment variable without any additional commands or values.)
Answer: DISPLAY, $DISPLAY
What word will complete an if statement in bash such as the following: if [ -x "$file" ]; then echo $file _____
Answer: FI
What word is missing from the following SQL statement? select count(*) _____ tablename;
Answer: FROM
Which protocol uses two (2) TCP/IP ports one of them being port 20 for data transfer?
Answer: FTP,FTP
Which environment variable you have to setup to use shared libraries that are not in the standard search path?
Answer: LD_LIBRARY_PATH
You just configured a kernel and now you want to check the dependencies. Please enter the command and its argument(s).
Answer: MAKEDEP
What word is missing from the following SQL statement? update tablename ____ fieldname='value' where id=909;
Answer: SET
Which environment variable should be set in order to change the time zone for the commands run from within the environment variable's scope? (Specify the variable name only.)
Answer: TZ
When you execute the "ls" command, you suspect an alias is set for the command, how can you just execute the command? Type the exact string that will accomplish this.
Answer: \ls
You wish to execute the ls command but it appears to be aliased. What is the easiest way of execute the orignal ls command without the alias?
Answer: \ls
USB fax/modems that conform to this subclass of the Communication Device Class (CDC) vendor neutral standard are Linux compatible (answer is a 3 letter acronym)
Answer: acm
What command displays all aliases defined in the current shell? (Specify the command without any path information)
Answer: alias, alias -p
Which utility can be used to convert a . rpm package to .deb package format? (Without arguments)
Answer: alien
The _________ command is the Apache HTTP server control interface.
Answer: apachectl
Type in the command that is equivalent to man -k
Answer: apropos
You started configuring pppd and you used the command man to get help. Now you would like to get more information about pppd related programs. Which command would you use? Please enter only the command without path, arguments or options.
Answer: apropos
What command will show pending jobs that will be executed once on a given date and time? Type just the command to accomplish this.
Answer: atq
You are working an evening shift and want to look a which jobs are pending for the at command. What command would you use?
Answer: atq
You have a job schedueled to run at 16:30 using the AT schedueler. When you type atq it displays the following information [root@localhost root]# atq 2 2003-03-14 16:00 a root [root@localhost root]# Type in the command to remove only this job
Answer: atrm 2
To enable restricted shell mode in BASH, how must bash be called? (Please include the command only without the path.) Answer:
Answer: bash-r
What command can put suspended jobs into the background?
Answer: bg
In an xinetd config file, which attribute specifies the network address that will be used to offer the service?
Answer: bind
In an xinetd configuration file, which attribute specifies the network address that will be used to provide the service?
Answer: bind, interface
The USB device filesystem can be found under /proc/ _______ /usb/. (Please fill in the blank with the single word only)
Answer: bus
A user complains that his laptop shows the wrong time when it is not connected to the network. What command must the superuser run to adjust the laptop's clock without entering in BIOS?
Answer: date
You've downloaded an image file of a boot floppy disk to your hard drive. What is the best utility to create a boot floppy from the disk image? (Specify a single command without options.)
Answer: dd
Which utility is used to create or update the modules.dep file? Type the command only.
Answer: depmod
Type in the simplest command, including any switchs, to rebuild the modules.dep file after you have made changes to the modules.conf file.
Answer: depmod -a
Which command (without options) would you use to display how much space is available on all partitions?
Answer: df
For xinetd service definitions, which config option will disable the service?
Answer: disable=yes
Upon booting one of your Linux boxes, you notice a message scrolling by that does not look right, but it goes so fast, you do not have a chance to read it. What command could you use to view that message after the boot process completes?
Answer: dmesg
When booting your system, you believe you saw an error message go by too quickly to see. Type in the command that will show the last system bootup messages
Answer: dmesg
Which command displays the contents of the Kernel Ring Buffer on the command line? (Provide only the command name without any options or path information) answer:
Answer: dmesg
Which command will display messages from the kernel that were output during the normal bootup sequence? Answer:
Answer: dmesg
If you need to view per-user disk space usage on a filesystem, the ______ command can provide that information if the kernel is built to support it.
Answer: du
Which option, when passed to the gpg command, will enter an interactive menu enabling the user to perform key management related tasks? (Provide only the option)
Answer: edit-key
You have a text file with tab-separated values, but your application needs them space-separated. What command would you use from the Bash shell to achieve this? Please fill in the command only, without any options.
Answer: expand
You added /usr/local/bin to your PATH environment variable. Next you executed the command make, which calls gcc. This failed because gcc couldn't find the executable in /usr/local/bin that it needed. To fix this, you should execute: ______PATH allowable
Answer: export
When a change is made to the file controlling what files are made available by NFS, what command must be run to make the changes effective? (Provide only the command name, not the path or any command switches.)
Answer: exportfs
An administrator has sent their current vi process with a PID of 1423 to the background on the command line. Assuming no other processes are in the background, what single command with no options or parameters will bring the vi process to the foreground?
Answer: fg
Your users report that they are using the program dia to create diagrams. They are having problems with the software and they think there is a bug. What command will give you help with functionality and contact information to report a possible bug? Do not give the path or any options.
Answer: flea
In what section of the man pages would you expect to find the man page that documents / dev/null?
Answer: four
Which protocol uses two (2) TCP/IP ports one of them being port 20 for data transfer?
Answer: ftp
The ________ command is used to add a group to the system.
Answer: groupadd
Which command is used to add an empty group to the system? (Specify ONLY the command without any path or parameters.)
Answer: groupadd, /usr/sbin/groupadd
What command will tell you which groups you belong to?
Answer: groups
You are logged in as root. How to check user brown's group?
Answer: groups brown
You are logged in as root. What command do you run to find out what groups User Company belongs to?
Answer: groups company
The _________ command is used to assign an IP address to a device. (Please specify the command with or without path information)
Answer: ifconfig
What is the command most often used for configuring network interfaces?
Answer: ifconfig
You need to view the hardware address and IP address information for all of your configured and active interfaces. Type the simplest command string that will accomplish this.
Answer: ifconfig
To change your Ethernet interface eth0 to the IP address 10.4.4.100 with a default class C subnet mask, type the full command string to accomplish this.
Answer: ifconfig eth0 10.4.4.100 netmask 255.255.255.0
What is the preferred documentation tool of the FSF? Type in the name of the tool only
Answer: info
You build and configured a bastion host to act as a router between two internal networks. Both eth0 and eth1 can see hosts on their respective networks, but the hosts on each network cannot see any hosts on the other network. After verifying that the hosts have the correct gateway route, you decide the bastion host does not have IP forwarding turned on. To check this cat the file /proc/sys/net/ipv4/ _______ to ensure it has a 1.
Answer: ip_forward
What command will print the shared libraries for the file /usr/lib/libpng12.so? (Provide the full command with library name but without any other options or parameters)
Answer: ldd/usr/lib/libpng12.so
You boot a freshly installed system loaded with all the defaults, xdm loads and crashes, and the system halts. How can you force the system to multi-user text mode with networking from the LILO: or boot: prompt?
Answer: linux 3
After configuring printing on a Linux server, the administrator sends a test file to one of the printers and it fails to print. What command can be used to print the status of the printer's queue? (Provide only the command, without any options or parameters)
Answer: lpq
After configuring printing on a Linux server, the administrator sends a test file to one of the printers and it fails to print. What command can be used to display the status of the printer's queue? (Specify ONLY the command without any path or parameters.)
Answer: lpq, /usr/bin/lpq, lpstat, /usr/bin/lpstat
What command will flush all jobs on all print queues on a Linux system that uses the LPD daemon? Type the command with any options and arguments
Answer: lprm -a all
What command will most effectively send a list of certain files from a directory to the tar or cpio command? Type just the command name.
Answer: ls
The _____ command will list the currently loaded kernel modules.
Answer: lsmod
To produce a compiled kernel with slightly better than standard compression, type the command with and any options and arguments to accomplish just the compilation.
Answer: make bzImage
On a Red Hat system, with a single floppy drive and a returned output from the uname command of 2.4.20-12, what exact command string will create a customized boot disk for this system? Type the full command string to accomplish this.
Answer: mkbootdisk --device /dev/fd0 2.4.20-12
You want to create a boot floppy using a given image file on your hard disk. What utility would you use to do so?
Answer: mkbootdisk --device /dev/fd0 `uname -r`
________ /dev/sda3 will create a swap area on the device/dev/sda3.
Answer: mkswap
You wish to get infomation on a module called msdos.o. Type in the simplest command that would list all information including author and description for the module.
Answer: modinfo msdos
If the module file name is given without directories or extension, insmod will search for the module in some common default directories. What environment variable can be used to override this:
Answer: modpath
You have a module called msdos.o which has a dependancy on fat.o. What single command will load msdos.o and its dependant fat.o module in one command line?
Answer: modprobe msdos
You are using insmod. You do not want to use the default configuration file /etc/modules.conf. What environment variable should you modify:
Answer: moduleconf
In which file you can find these lines? alias eth0 ne2k-pci options ne2k-pci io=0x300 irq=5 Answer:
Answer: modules.conf
In the /etc/resolv.conf file are entries that describe where DNS queries can resolve names to IP addresses. Given a DNS server with an IP address of 192.168.33.254, type the exact entry that should appear in this file
Answer: nameserver 192.168.33.254
You wish to change you network settings permanently using a text/graphical tool. Type in the command to start this tool?
Answer: netconfig
The _____________ command is used to print the network connections, routing tables, and interface statistics.
Answer: netstat
What command will display the active connections and Unix domain sockets for a running Linux machine with networking configured? Type just the command to accomplish this.
Answer: netstat
You can run the ________ command to see active network and UNIX domain socket connection.
Answer: netstat
Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.)
Answer: netstat, /bin/netstat, ss, /usr/bin/ss
You need an additional email address for a user in your department. You decide to add just an alias on your sendmail email server. What command must be executed to make the changes take effect?
Answer: newaliases
After adding a new email alias to the configuration, which command must be run in order to ensure the MTA knows about it? (Specify the command without any path but including all required parameters.)
Answer: newaliases, sendmail -bi
Type in the name of the samba daemon that is responsible for WINS names resolution.
Answer: nmbd
There is any entry like the following in the file /etc/ftpusers: #root Will root be allowed to connect via ftp to this host?
Answer: no
You want to temporarily prevent users from logging in. Please complete the following command: touch /etc/________
Answer: nologin
To exclude all log messages of a given logging facility, you should use a logging priority of:
Answer: none
You use the public NTP server time.nist.gov to make sure your system clock is accurate before using it to adjust your hardware clock. Complete the following command to accomplish this: ______ time.nist.gov
Answer: ntpdate
You wish to change the daemons that start at a run level 3. Type in the command that would give a text menu based application to set the daemons for this runlevel
Answer: ntsysv --level 3
Your user matt has forgotten his passwd and you wish to reset it. Type in the command line to change his password. You are currently logged in as root.
Answer: passwd matt
The _________ command is used to send ICMP ECHO_REQUEST packets to other hosts over the network.
Answer: ping
What program will determine basic connectivity to a remote host? Type just the name of the program.
Answer: ping
The _____________ command displays ISA plug-and-play devices resource information.
Answer: pnpdump
What command was typed in to produce the output shown below. The entries shown are the full output of the command, less the actual command. Type the command and the options to reproduce similar output. USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 394 0.0 0.0 1200 444 tty1 S 01:05 0:00 /sbin/getty 38400 tty1 root 396 0.0 0.0 1200 444 tty3 S 01:05 0:00 /sbin/getty 38400 tty3 root 397 0.0 0.0 1200 444 tty4 S 01:05 0:00 /sbin/getty 38400 tty4 root 398 0.0 0.0 1200 444 tty5 S 01:05 0:00 /sbin/getty 38400 tty5 root 399 0.0 0.0 1200 444 tty6 S 01:05 0:00 /sbin/getty 38400 tty6 root 423 0.0 0.0 1200 444 tty2 S 01:06 0:00 /sbin/getty 38400 tty2 root 426 0.2 0.3 2880 1964 pts/0 S 01:07 0:00 -bash
Answer: ps -aux
Which command is used to enable disk quotas on a particular filesystem? (Provide only the command, with no options or parameters)
Answer: quotaon
The dpkg-____ command will ask configuration questions for a specified package, just as if the package were being installed for the first time.
Answer: reconfigure
To change the priority of a running process, you use the _______ command (Specify command only with no options.)
Answer: renice
What kind of DNS entries are used to get the hostname of a given IP address? Please enter exactly one word.
Answer: reverse
You wish to remove a module from the kernel called fat. Type in the simplest command to do this. Assume this module has no dependancies.
Answer: rmmod fat
To immediately stop a DDOS attack from 10.1.1.128, what can you do? Type the command with the necessary options and arguments.
Answer: route add 10.1.1.128 lo
Your IP address is 1.2.3.3. Which command would add a default gateway using the network 1.2.3.4?
Answer: route add default gw 1.2.3.4
Which command will convert an RPM package file to a cpio archive? (Provide only the command with no options or parameters)
Answer: rpm2cpio
Type in the simplest command to display the previous and current run level?
Answer: runlevel
The local domain name has changed from test.example.org to lpic1.example.org. What directive in /etc/resolv.conf needs to be changed so that you don't have to specify the fully qualified domain name when connecting to hosts?
Answer: search
What word is missing from the following SQL statement? __________ count(*) from tablename; (Please specify the missing word using lower-case letters only.)
Answer: select
To slave your NTP daemon to an external source, you need to modify the ______ variable in your /etc/ntp.conf file.
Answer: server
Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)
Answer: server
You wish to restart the network daemon on a Redhat Server. Type in the command and any arguments that to accomplish this without using any absolutes pathnames
Answer: service network restart
You wish to restart both Samba daemons. Type in the command and any arguments that to accomplish this without using any absolutes pathnames
Answer: service smb restart
The___________command allows you to view or change serial port configuration.
Answer: setserial
Type in the name of the samba daemon that is responsible for printer and file sharing?
Answer: smbd
Type in the command to monitor connections to Samba
Answer: smbstatus
Enter the command/servicename that dynamically assigns ports for Remote Procedure Calls (RPC) services like NIS, NFS and similar.
Answer: startsrc/portmap
The ________ partition is used for virtual memory
Answer: swap
What one filesystem should you never restore (and therefore not backup): _______.
Answer: swap
Which command will disable paging and swapping on a device? (Provide only the command with no additional options or parameters)
Answer: swapoff
You wish to archive and compress all the files in your home directory starting with the word projects into a file called myprojects.tar.gz. You are currently in your home directory. Type in the command that would do this?
Answer: tar -czf myprojects.tar.gz projects*
What command with options will show you the contents with associated pathnames of an archive file named archive.tar.gz? The file must not be unpacked with the command string. Type the full command string to accomplish this.
Answer: tar -tzvf archive.tar.gz
You have a tarball called myprojects.tar.gz and you wish to view the permissions and ownership of its contents without unpacking it. Type in the simplest command to do this.
Answer: tar -tzvf myprojects.tar.gz
You have just downloaded an application called rdesktop from the internet. The file downloaded is named rdesktop.tar.gz. Type in the simplest command to decompress and untar this file into the current directory.
Answer: tar -zxf rdesktop.tar.gz
You have an automated backup via tar to your tape drive /dev/st0 that runs each night. You've decided to manually check last night's tape. The command to list the contents of the tape is __________?
Answer: tartvf /dev/st0
You wish to send the output of a command to standard output (stdout) and save it to a file. The command to use is ______________. (Do not specify arguments)
Answer: tee
You are about to do some administration tasks on a server. Which command would you use to change the runlevel?
Answer: telinit
Type the command to check the syntax and contents of the smb.conf file.
Answer: testparm
What command will most effectively track a network path problem?
Answer: traceroute
When searching for files owned by the root user, which option is required in the following command line: find . ________ 0 -print (Provide only the missing argument)
Answer: uid, -uid
Which command prints or adjusts the current limits on resources available to the shell and to processes started by it, such as the maximum size of a core file or the maximum number of processes running? (Please include the command only, without arguments or path.)
Answer: ulimit
Type in the command to list your current kernel version, including any switches
Answer: uname -a
You issued the command: export CFLAGS="-march-i586". You can remove this environment variable by using the command: ________CFLAGS
Answer: unset
Which parameter must be passed to ifconfig to activate a previously inactive network interface? (Specify the parameter only without any command, path or additional options)
Answer: up
What option, when passed to the yum command, will update the entire system? (Specify ONLY the option name with no additional parameters)
Answer: update
What command with switches allows you to set the defaults for the useradd command? Type the command with any options and arguments.
Answer: useradd -D
What command will insert a single "!" symbol in from of the encrypted password in the system's shadow file? Type the command with any options and arguments.
Answer: usermod -L passwd -l
User rick has been suspended from your company and you wish to lock his account to stop anyone using it. Type in the simplest command to do this
Answer: usermod rick -L
To prevent users from seeing who is logged in with the who command, you must remove the world readable but from the file /var/run ______.
Answer: utmp
Type in the command that is equivalent to man -f
Answer: whatis
What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)
Answer: xorg.conf
Consider the following output: prompt> myapp [1]+ Stopped myapp This output was the result of the user pressing the keyboard combination of the Ctrl key and what letter key? Enter only the single (1) letter as your answer
Answer: z
The ________ command is used to modify or set the password expiration for a user?
Answer:chage
What is the command to delete the default gateway from the system IP routing table? (Please specify the complete command with arguments)
Answer:routedeldefault
Which of the following parameters are used for journalctl to limit the time frame of the output? (Choose TWO correct answers.) A. --from= B. --since= C. --until= D. --upto= E. --date=
B. --since= C. --until=
When piping the output of find to the xargs command, what option to find is useful if the filenames have spaces in them? A. -rep-space B. -print0 C. -nospace D. -ignore-space
B. -print0
What is the name of standard Linux service which provide RIP (Routing Information Protocol)? A. zebra B. -routed C. -ipchains
B. -routed
A user complained that programs started from his shell won't use his favorite editor. Which of the following files should you edit to change this? A. .editor B. .bashrc C. .bash_rc D. ~/bash.conf
B. .bashrc
Which file would be used to configure a user's interactive bash shell? A. ~/.int_bash B. .bashrc C. .profile D. .bash
B. .bashrc
What file must you create in your home directory in order to enable mail forwarding? A. .redirect B. .forward C. .plan D. .mail E. None of the choices
B. .forward
Which command will print to standard out only the lines that do not begin with # (pound symbol) in the file foobar? A. /bin/grep ^# foobar B. /bin/grep -v ^# foobar C. /bin/grep #$ foobar D. /bin/grep -v #$ foobar
B. /bin/grep -v ^# foobar
What configuration file contains the list of directories shared via NFS? A. /etc/share B. /etc/exports C. /etc/dfs/dfstab D. /etc/fstab
B. /etc/exports
Select the files that are associated with TCP Wrappers. Choose all that apply. A. /etc/hosts B. /etc/hosts.allow C. /etc/hosts.deny D. /etc/allow.hosts E. /etc/allow.deny
B. /etc/hosts.allow C. /etc/hosts.deny
What file on a system contains a list of hosts that can't connect to the machine's services? A. /etc/hosts/denial B. /etc/hosts.deny C. /etc/host.notallow D. /etc/inetd.conf E. /etc/hosts.not
B. /etc/hosts.deny
What file is read by the program ldconfig? A. /lib/ld.so B. /etc/ld.so.conf C. /etc/ld.so.cache D. /etc/modules.conf
B. /etc/ld.so.conf
The network connection needs to be started during bootup which requires that the drive module for the network card be loaded properly. Which of the following files is used to map an Ethernet device (eth0, for example) to a specific driver module? A. /etc/module/config B. /etc/modules.conf C. /etc/conf/modules D. /etc/insmod.conf
B. /etc/modules.conf
Which of the following configuration files should be modified to set default shell variables for all users? A. /etc/bashrc B. /etc/profile C. ~default/.bash_profile D. /etc/skel/.bashrc E. /etc/skel/.bash_profile
B. /etc/profile
George is planning a partition scheme for a new Linux installation. Which THREE directories should he consider for separate partitions? (Select three) A. /etc B. /home C. /var D. /lib E. /tmp
B. /home C. /var E. /tmp
You are running an email server configured with the default settings. In which directory will you find the delivered mail for the user foo? A. /var/spool/mail B. /home/foo/mail C. /var/mail/spool D. /var/users/mail
B. /home/foo/mail
What command changes the priority of the process running with process id of 12345 to the highest priority? A. /usr/bin/renice +20 1234 B. /usr/bin/renice -20 12345 C. /bin/setpriority +20 12345 D. /bin/setpriority -20 12345
B. /usr/bin/renice -20 12345
What umask will set the file permissions on a newly created file to -rw-r--r-- (644)? A. 0002 B. 0022 C. 0224 D. 0246
B. 0022
What is the recommended setting for StartServers in a medium sized Apache installation? A. 5 B. 10 C. 15 D. 20
B. 10
Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.) A. 127.0.0.0/8 B. 10.0.0.0/8 C. 169.255.0.0/16 D. 172.16.0.0/12 E. 192.168.0.0/16
B. 10.0.0.0/8 D. 172.16.0.0/12 E. 192.168.0.0/16
Pressing the Ctrl-C combination on the keyboard while a command is executing in the foreground sends which of following signal codes? A. 1 (SIGHUP) B. 2 (SIGINT) C. 3 (SIGQUIT) D. 9 (SIGKILL) E. 15 (SIGTEPM)
B. 2 (SIGINT)
To create a user account, keep in mind that the username is at most ____ characters long. A. 6 B. 8 C. 12 D. 18
B. 8
While editing a file in vi, you realize that you are changing the wrong file. What vi command sequence will allow you to quit without saving your changes? A. :Q! B. :q! C. :w! D. :wq!
B. :q!
How can you enable onscreen (non-printing) numbers in a vi session? A. :set num B. :se nu C. :set -o number D. :set +o num E. None of the choices
B. :se nu
Which of the following shell redirections will write standard output and standard error output to a file named filename? A. 2>&1 >filename B. >filename 2>&1 C. 1>&2>filename D. >>filename E. 1&2>filename
B. >filename 2>&1
All items are required to enable USB support on a Linux system EXCEPT. A. A kernel that has USB driver support B. A USB 2.0 compatible device C. A supported controller chip such as DHCI, UHCI, or EHCI D. A kernel that supports hot-pluggable devices
B. A USB 2.0 compatible device
How is the file format of /etc/crontab different from a normal crontab file? (Select TWO correct answers) A. The /etc/crontab file can specify a year field. B. A normal crontab file must be installed with the crontab command. C. A normal crontab file allows for environment variable substitution. D. The /etc/crontab file has a user field for commands.
B. A normal crontab file must be installed with the crontab command. D. The /etc/crontab file has a user field for commands.
Ghostscript can be used as: A. A Line Printer Daemon B. A print filter to convert PostScript data for non-PostScript printers C. A print filter to allow correct printing on PostScript printers D. A print filter to remove "ghosting" and "staircase" effect problems E. A graphical viewer for PostScript files
B. A print filter to convert PostScript data for non-PostScript printers
Suppose that the command netstat-a hangs for a long time without producing output. You might suspect: A. A problem with NFS B. A problem with DNS. C. A problem with NIS. D. A problem with routing. E. That the netstat daemon has crashed.
B. A problem with DNS.
What is NTP? A. A more secure protocol replacement for FTP. B. A protocol and system for maintaining time on computers. C. A routing aid for finding next hops on a network. D. A simple tunneling protocol for computers behind firewalls.
B. A protocol and system for maintaining time on computers.
After running the command umount /mnt, the following error message is displayed: umount: /mnt: device is busy. What is a common reason for this message? A. The kernel has not finished flushing disk writes to the mounted device. B. A user has a file open in the /mnt directory. C. The previous rm command has not finished. D. The files in /mnt have been scanned and added to the locate database. E. The kernel thinks that a process is about to open a file in /mnt for reading.
B. A user has a file open in the /mnt directory.
What is true regarding the command sendmail? A. With any MTA, the sendmail command must be run periodically by the cron daemon. B. All MTAs, including Postfix and Exim, provide a sendmail command. C. The sendmail command prints the MTAs queue history of which mails have been sent successfully. D. It is only available when the sendmail MTA is installed.
B. All MTAs, including Postfix and Exim, provide a sendmail command.
Where are user specific crontabs stored? A. In the database file /etc/crontab.db which is shared by all users. B. As individual per-user files within /var/spool/cron. C. As individual per-user files in /etc/cron.user.d. D. In the .crontab file in the user's home directory. E. In the file /var/cron/user-crontab which is shared by all users.
B. As individual per-user files within /var/spool/cron.
While checking your security, you discover that you can connect to one of the machines on the network via port 23. What should you do to the network service on this machine? A. Deactivate it, you don't need a SMTP server there. B. Deactivate it, you should not use TELNET. C. Leave active, SSH is safe. D. Deactivate it, you don't need a FTP server there.
B. Deactivate it, you should not use TELNET.
What does the following command do? cat '$TEST' A. Displays a bash syntax error message. B. Displays the contents of the file named $TEST if it exists. C. Waits for the user to enter text and then echos the text back. D. Displays the contents of the file named inside the back quotes. E. Displays the contents of the named by the environment variable TEST.
B. Displays the contents of the file named $TEST if it exists.
Which of the following protocols uses two different network ports? A. NTP B. FTP C. Rsh D. HTTP E. Telnet
B. FTP
What will the following line in the /etc/exports file do? /data snowblower(rw) badhost (ro) A. Give snowblower rw access to the data share, deny badhost any access, and allow ro for all other hosts B. Give snowblower rw access to the data share, give badhost ro access to share and deny all others C. Give snowblower no access to the data share, give badhost rw access and set ro access for all others D. Cause a syntax error
B. Give snowblower rw access to the data share, give badhost ro access to share and deny all others
Keyboards and mice are members of which class of USB devices? A. Communication Device Class B. Human Interface Device Class C. Mass Storage Device Class D. Data Interface Device Class
B. Human Interface Device Class
Which of the following describes the Linux ping packet or datagram? A. IP packet with a packet type B. ICMP packet with a message type C. ICMP packet with a payload D. UDP datagram with a protocol type E. UDP datagram with a payload
B. ICMP packet with a message type
Which of the following is true about IPv6? A. With IPv6, the TCP port numbers of most services have changed. B. IPv6 no longer supports broadcast addresses. C. IPv4 addresses can be used without any change with IPv6. D. IPv6 no longer supports multicast addresses. E. For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.
B. IPv6 no longer supports broadcast addresses.
Why is the xhost program considered dangerous to use? A. It makes it difficult to uniquely identify a computer on the network. B. It allows easy access to your X server by other users. C. It logs sensitive information to syslog. D. It makes your computer share network resources without any authentication. E. It is a graphical DNS tool with known exploits.
B. It allows easy access to your X server by other users.
What is the purpose of the & character at the end of a command line? A. It causes standard error to be unbuffered. B. It causes the command to be run in the background of the current shell. C. It puts the command under the job control facilities of the current shell. D. It causes the command to be run as a child of the initial login shell of the user.
B. It causes the command to be run in the background of the current shell.
The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section? A. It is placed in curly brackets as in Section SectionName { ... }. B. It is placed between a line containing Section "SectionName" and a line containing EndSection. C. It is placed between the tags <Section name="SectionName"> and </Section> D. It is placed after the row [SectionName]. E. It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.
B. It is placed between a line containing Section "SectionName" and a line containing EndSection.
How is a display manager started? A. It is started by a user using the command startx. B. It is started like any other system service by the init system. C. It is started by inetd when a remote hosts connects to the X11 port. D. It is started automatically when a X11 user logs in to the system console.
B. It is started like any other system service by the init system.
When the command echo $$ outputs 12942, what is the meaning of 12942? A. It is the process ID of the echo command. B. It is the process ID of the current shell. C. It is the process ID of the last command executed. D. It is the process ID of the last command which has been placed in the background.
B. It is the process ID of the current shell.
What benefit does an alias provide? A. It provides faster lookups for commands. B. It prevents having to type long commands C. It hides what command you are running from others. D. It creates a local copy of a file from another directory.
B. It prevents having to type long commands
What is a purpose of an SSH host key? A. It must be sent by any SSH client in addition to a user key in order to identify the client's host. B. It provides the server's identity information to connecting SSH clients. C. It is the root key by which all user SSH keys must be signed. D. It authenticates any user that logs into a remote machine from the key's host. E. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
B. It provides the server's identity information to connecting SSH clients.
What is the default action of the split command on an input file? A. It will break the file into new files of 1,024 byte pieces each. B. It will break the file into new files of 1,000 line pieces each. C. It will break the file into new files of 1,024 kilobyte pieces each. D. It will break the file into new files that are no more than 5% of the size of the original file.
B. It will break the file into new files of 1,000 line pieces each.
When installing XWindows the monitor wasn't recognised but now a data sheet with its specification is available. Which xorg.conf section must be edited to specify the correct values for several variables? A. Screen B. Monitor C. Border D. Modeline E. Device
B. Monitor
Which of the following may occur as a consequence of using the command ifconfig? (Choose THREE correct answers.) A. New name servers may be added to the resolver configuration. B. Network interfaces may become active or inactive. C. The routing table may change. D. IP addresses may change. E. The system's host name may change.
B. Network interfaces may become active or inactive. C. The routing table may change. D. IP addresses may change.
Which of the following tasks can be accomplished using the command date? (Choose TWO correct answers.) A. Synchronize the hardware and system clocks. B. Output date and time in different formats. C. Set the system clock. D. Set the hardware clock. E. Update the time via NTP.
B. Output date and time in different formats. C. Set the system clock.
Which of the following statements is a TRUE difference between GRUB Legacy and GRUB 2? A. GRUB 2 no longer requires a configuration file. B. Partition numbers start at 0 in GRUB Legacy and 1 in GRUB 2. C. grub-mkconfig only works with GRUB Legacy if the -version 1 option is used. D. The configuration file menu.lst (and grub.conf) have been replaced with grub.config.
B. Partition numbers start at 0 in GRUB Legacy and 1 in GRUB 2.
The system is having trouble and the engineer wants to bypass the usual /sbin/init startup and run /bin/sh. What is the usual way to pass this change to the kernel from your boot loader? A. Start in runlevel 1 B. Pass init=/bin/sh on the kernel parameter line C. Pass /bin/sh on the kernel parameter line D. Pass start=/bin/sh on the kernel parameter line
B. Pass init=/bin/sh on the kernel parameter line
Which configuration option can you use to prevent the root user from logging directly onto a machine using ssh? A. NoRootLogon B. PermitRootLogon No C. NoRootLogon Yes D. RootLogin = No E. ProhibitRootLogon No
B. PermitRootLogon No
You've been reviewing your security checklist and one of the items calls for reviewing the /etc/passwd file. You cat the file and notice that, while most users have an x in the second column, a few have a 14 character string in the second column. What action, if any, should you take? A. No action. The users with an x have their accounts locked. B. Run pwconv to convert the unix passwords to shadow passwords. C. Use the passwd program to give the users with the hashed passwords new passwords. D. Use the passwd program to give the users with the x new passwords. E. No action. Linux knows how to handle the situation and allow user logins.
B. Run pwconv to convert the unix passwords to shadow passwords.
Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders? A. SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type; B. SELECT order_type,COUNT(*) FROM orders GROUP BY order_type; C. COUNT(SELECT order_type FROM orders); D. SELECT COUNT(*) FROM orders ORDER BY order_type; E. SELECT AUTO_COUNT FROM orders COUNT order_type;
B. SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;
To avoid spammers using your mail server to relay their messages, you need to _______. A. Disable the relay control in /etc/aliases B. Set up a ruleset for this in /etc/sendmail.cf C. Set up relay control in your DNS's MX record. D. Recompile sendmail with the NORELAY flag.
B. Set up a ruleset for this in /etc/sendmail.cf
Which statements are true regarding the following syslog.conf configuration directive? *.err;kern.notice;auth.notice /dev/console (Select THREE correct answers) A. Severity crit messages from all facilities will be directed to /dev/console B. Severity notice messages from the auth facility will be directed to /dev/console C. Severity notice messages from the kern facility will be directed to /dev/console D. Severity err messages from the mail facility will be directed /dev/console E. Severity notice messages from all facilities will be directed to /dev/console
B. Severity notice messages from the auth facility will be directed to /dev/console C. Severity notice messages from the kern facility will be directed to /dev/console D. Severity err messages from the mail facility will be directed /dev/console
In XF86Config which section is concerned with fonts? A. the Fonts section B. The Files section C. The xfsCodes section D. The Graphics section E. The modeline section
B. The Files section
What is the main difference between the batch and at commands? A. The batch command will run multiple times.The at command will only run once. B. The batch command will run when system load is low. The at command runs at a specific time. C. The at command reads commands from standard input. The batch command requires a command line argument. D. The at command e-mails results to the user. The batch command logs results to syslog.
B. The batch command will run when system load is low. The at command runs at a specific time.
Which of the following explanations are valid reasons to run a command in the background of your shell? A. The command does not need to execute immediately. B. The command has to run immediately but the user needs to log out. C. The system is being shut down and the command needs to restart execution immediately after the reboot. D. The command can run at a lower priority than normal commands run on the command line.
B. The command has to run immediately but the user needs to log out.
Which of the following is a limitation of the cut command? A. The cut command can only select output by field position. B. The cut command cannot reorder fields. C. The cut command only works on ASCII text. D. The cut command will always print one line of output for every line of input.
B. The cut command cannot reorder fields.
Which of the following can the chage command <b>NOT</tt> change? A. The number of days since January 1, 1970 on which the users account will no longer be accessible B. The number of days since January 1, 1970 when the password can change C. The number of days since January 1st, 1970 when the password was last changed D. The maximum number of days during which a password is valid E. The number of days of inactivity after a password has expired before the account is locked
B. The number of days since January 1, 1970 when the password can change
What output will the following command seq 10 produce? A. A continuous stream of numbers increasing in increments of 10 until stopped. B. The numbers 1 through 10 with one number per line. C. The numbers 0 though 9 with one number per line. D. The number 10 to standard output.
B. The numbers 1 through 10 with one number per line.
Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.) A. The user issuing the command must be in the group script. B. The script file must be found in the $PATH. C. The script file must have the executable permission bit set. D. The script must begin with a shebang-line (#!) that points to the correct interpreter. E. The file system on which the script resides must be mounted with the option scripts.
B. The script file must be found in the $PATH. C. The script file must have the executable permission bit set. D. The script must begin with a shebang-line (#!) that points to the correct interpreter.
Which of the following is observed and corrected by a NTP client? A. The skew in time between the system clock and the hardware clock. B. The skew in time between the system clock and the reference clock. C. Changes in the time zone of the current computer's location. D. Adjustments needed to support Daylight Saving Time.
B. The skew in time between the system clock and the reference clock.
This is the file /etc/named.boot from the computer named tellus with IP address 128.66.12.10. directory /etc secondary company.com 128.66.12. company.com.hosts secondary 66.128.IN-ADDR.ARPA 128.66.12.5 128.66.rev primary 0.0.127.IN-ADDR.ARPA named.local cache named.ca From this file, you know that: A. tellus is the primary DNS server for domain company.com. B. There is a secondary DNS server for domain company.com at the IP address 128.66.12.5. C. tellus is a secondary DNS server for domain company.com and it downloads the domain data from the server at IP address 128.66.12.5. D. The server at IP address 128.66.12.5 is allowed to download domain and reverse lookup data From tellus.
B. There is a secondary DNS server for domain company.com at the IP address 128.66.12.5.
Of the ways listed, which is the best method to temporarily suspend a user's ability to interactively login? A. Use passwd -d username to give the user an empty password. B. Use chage to expire the user account. C. Change the user's password. D. Add the command exit to the user's .login file.
B. Use chage to expire the user account.
You are looking into a new script you received from your senior administrator. In the very first line you notice a #! followed by a path to a binary. Linux will: A. Ignore the script B. Use that binary to interpret the script. C. Use that binary to compile the script. D. Be replaced by that binary.
B. Use that binary to interpret the script.
On a system running the K Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed? A. When KDM starts B. When a user's X session exists C. When KDM crashes D. When X is restarted E. When X crashes
B. When a user's X session exists
The command cat /proc/dma will show you what? A. Whether DMA is enabled B. Which DMA channels are in use C. Which DMA mode is in use D. General information about DMA on the machine
B. Which DMA channels are in use
You have a USB storage device that you cannot get working. You have enabled all appropriate USB options in the latest 2.2 kernel but still cannot get your device working. What is most likely the source of the problem? A. You have not configured your usb.usermap properly B. You are using the wrong kernel for this type of device C. The USB device is not USB 2.0 compliant D. There is a USB resource conflict
B. You are using the wrong kernel for this type of device
You have just recompiled a new kernel and rebooted your system with the new kernel. Unfortunately you are getting "Can't locate module" error messages. Which of the following is most likely to be the source of the problem? A. You copied the modules to the wrong directory. B. You did not configure modular support into the kernel. C. You did not run depmod after installing the modules. D. You dud not install the modules.
B. You did not configure modular support into the kernel.
You have replaced inetd with xinetd. What must be done after installing to ensure that your machine will work correctly? A. You must add a symbolic link from inetd.conf to xinetd.conf. B. You don't have to do anything because they are compatible. C. You must create a new configuration file for xinetd. D. You must run xinetd-configure first.
B. You don't have to do anything because they are compatible.
You are running Linux 2.0.36 and you need to add a USB mouse to your system. Which of the following statements is true? A. You need to rebuild the kernel B. You need to upgrade the kernel C. You need to load the USB modules for your existing modular kernel D. USB support is not available in Linux
B. You need to upgrade the kernel
You are running Linux 2.0.36 and you need to add a USB mouse to your system. Which of the following statements is true? A. You need to rebuild the kernel. B. You need to upgrade the kernel. C. You need to load the USB modules for your existing modular kernel. D. USB support is no available in Linux.
B. You need to upgrade the kernel.
What command can be used to shut down the Apache server gracefully? A. apacheshut B. apachectl C. apachestop D. apachestart
B. apachectl
Which of the following commands is used to test if the syntax of Apache's configuration files are correct? A. apacheconftest -a B. apachectl configtest C. ab -ct D. httest -c
B. apachectl configtest
Which of the following commands can be used to perform a full text search on all available packages on a Debian system? A. apt B. apt-cache C. apt-get D. apt-search E. dpkg
B. apt-cache
Which of the following commands enables the setuid (suid) permission on the executable called /bin/foo? A. chmod 1755 /bin/foo B. chmod 4755 /bin/foo C. chown u-s /bin/foo D. chmod 755+s /bin/foo
B. chmod 4755 /bin/foo
A Makefile typically contains which targets? A. CFLAGS, CPPFLAGS, LIBS, LDFLAGS B. clean, install, uninstall C. PATHS, DESTDIR, LIBS, LDFLAGS D. prefix, exec_prefix, bindir, mandir
B. clean, install, uninstall
You find you execute a series of commands on a recurring basis. You want this series of commands available from your login to run in the current shell. Choose the best solution: A. create a shell program B. create a function C. use the up arrow in BASH to find the command D. use BASH's built-in ! function to run the last iteration of the command by the same name
B. create a function
Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query? A. dnsq B. dig C. hostname D. dnslookup E. zoneinfo
B. dig
Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.) A. resolv B. dns C. remote D. files E. hosts
B. dns D. files
Your server has two fully functional NIC's with correct IP configuration. The server is not forwarding traffic between the NIC's. Which command string will set the cards to forward properly? A. setparam 1 > /proc/sys/net/ipv4/ip_autoconfig B. echo 1 > /proc/sys/net/ipv4/ip_forward C. set $=1 /proc/sys/net/ipv4/route D. cat $1 > /proc/sys/net/ethernet E. vi +/1 /proc/sys/net/unix/max_dgram_qlen
B. echo 1 > /proc/sys/net/ipv4/ip_forward
You have read/write permission on an ordinary file foo. You have just run ln foo bar. What would happen if you ran rm foo? A. foo and bar would both be removed. B. foo would be removed while bar would remain accessible. C. foo would be removed. bar would still exist but would be unusable. D. Both foo and bar would remain accessible. E. You would be asked whether bar should be removed.
B. foo would be removed while bar would remain accessible.
Which of the following commands would display the lines containing capital letters form the file "turkey.txt"? A. cat turkey.txt|wc -| B. grep -n [A-Z] turkey.txt C. cat turkey.txt|wc -w [A-Z] D. grep -v [A-Z] < turkey.txt E. for [A-Z] in turkey.txt | count
B. grep -n [A-Z] turkey.txt
You want to search the file myfile for all occurances of string containing at least five characters, where character number 2 and 5 are 'a' and character number 3 is NOT 'b'. Which command would you use? A. grep a*^b*a myfile B. grep .a[^b].a myfile C. grep .[a].*.[a] myfile D. grep .a*^b..a myfile
B. grep .a[^b].a myfile
What is the proper option to put in /etc/fstab to enable group quotas for a particular parition? A. groupquota B. grpquota C. groupquoatas D. grpquotas
B. grpquota
What ppp option governs how long an interrupted connection will remain down before it attempts to reconnect? A. holddown B. holdoff C. inactive D. delay E. wait
B. holdoff
The file myfile.txt contains the following data: joe:x:100:100:Joe:/home/joe:/bin/bash mike:x:101:101:Mike:/home/mike:/bin/sh kevin:x:102:102:Kevin:/home/kevin:/bin/sh matt:x:103:103:Matt:/home/matt:/bin/sh What output will be displayed on the screen when the following command is executed: grep -o home myfile.txt A. No output will be displayed on the screen B. home home home home C. /home/joe /home/mike /home/Kevin /home/matt D. joe mike Kevin matt
B. home home home home
On a dual boot system, every time the system is booted back into Linux the time has been set backward by one day. Which of the following commands will correct the problem? A. date -d '+ 1 day' B. hwclock --systohc --localtime C. ntpdate pool.ntp.org D. time hwclock
B. hwclock --systohc --localtime
Runlevels are configured ___________. A. in the kernel B. in /etc/inittab C. in /etc/runlevels D. using the rl command E. in rc.sysinit or rc.local
B. in /etc/inittab
You are having some trouble with a disk partition and you need to do maintenance on this partition but your users home directories are on it and several are logged in. Which command would disconnect the users and allow you to safely execute maintenance tasks? A. halt 1 B. init 1 C. logout -all now D. runlevel 1 E. shutdown -maintenance now
B. init 1
Your gateway to the internet is using iptables and NAT to allow your private network to access the Internet. You've verified that the gateway is not set up to block packets, but you need to verify that it is properly masquerading them. Which of the following commands would you use to look at your NAT tables? A. iptables -L -n B. iptables -t nat -L C. iptables -t mangle -L D. iptables -t filter -L
B. iptables -t nat -L
What command would rebuild the ld.so.cache file? A. ldd B. ldconfig C. ld.so.cache -rebuild D. ld
B. ldconfig
What tool can you use to print shared library dependencies? A. ldconfig B. ldd C. libdep D. libpath E. ldev
B. ldd
Which of the following commands can be used to view kernel messages? A. less dmesg B. less /var/log/boot.log C. cat /proc/kernel |less D. cat /proc/dmesg
B. less /var/log/boot.log
Which command will set the local machine's timezone to UTC? A. cat UTC > /etc/timezone B. ln -s /usr/share/zoneinfo/UTC /etc/localtime C. date -timezone=UTC D. mv /usr/timezone/UTC /etc
B. ln -s /usr/share/zoneinfo/UTC /etc/localtime
You are working in a graphical environment and trying to configure PPP, but are having problems. You know that PPP uses the local2 facility for logging. To better watch what's going on, you decide to open an Xconsole session and sent all local2 messages there. How should you configure /etc/syslog.conf to show you all messages sent from PPP? A. local2.* /dev/console B. local2.* /dev/xconsole C. *.local2 /dev/xconsole D. *.local2 *
B. local2.* /dev/xconsole
Which of the following commands will print the file putty on the printer hplaserj? Choose all that apply. A. lpr -P hplaserj -F putty B. lpr -Phplaserj putty C. lpc printer=hplaserj file=putty D. lpr -p hplaserj putty E. lpr -P hplaserj putty
B. lpr -Phplaserj putty E. lpr -P hplaserj putty
In order to bypass print filters using lpr, which of following switches should be used: A. lpr -o nofilter B. lpr -l C. lpr -o raw D. lpr -r
B. lpr -l
Which command will print out the attributes of the file foobar? A. ls --attr foobar B. lsattr foobar C. printattr foobar D. fileattr foobar
B. lsattr foobar
When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this? A. debug B. lsof C. nessus D. strace E. traceroute
B. lsof
What command should be used to print a listing of email in the system's mail queue? A. lpq B. mailq C. mlq D. sendmail -l
B. mailq
Which of the following removes all of the object files and some other things that an old version leaves behind? A. make dep B. make clean C. make_dep D. make_install
B. make clean
What does "make bzImage" do as opposed to "make zImage"? A. makes a bz encrypted kernel B. makes a kernel with a better compression ratio C. makes a kernel with built in gzip application D. nothing
B. makes a kernel with a better compression ratio
What commands will load a kernel module? (Select TWO answers) A. ldmod B. modprobe C. loadmod D. insmod E. modload
B. modprobe D. insmod
As root you have navigated to directory /B. You wish to move all of the files and directories from directory /A to directory /B. Which of the following options would be the most appropriate command line to execute this task? A. cp /a/* . B. mv -f /A/* . C. mv -Rf /a/* . D. cp -f /a/* .. E. cp -rf /A/* /b/
B. mv -f /A/* .
Which of the following keywords can be used in the file /etc/resolv.conf? (Choose TWO correct answers.) A. substitute B. nameserver C. search D. lookup E. method
B. nameserver C. search
Which command will print line numbers before each line in a file? A. ln B. nl C. cat -n D. numline
B. nl
These lines are taken from /etc//samba/smb.conf: workgroup = group1 guest account = nobody What else is needed for this to work? A. nobody must be a valid group on the server. B. nobody must be a user name listed in /etc/passwd. C. group1 must be a valid group on the server. D. workgroup must be a valid group on the server.
B. nobody must be a user name listed in /etc/passwd.
To ensure that a running process continues to execute after you log out, the process should be started with what command? A. live B. nohup C. saferun D. sh
B. nohup
Which command would you use to apply the changes in a diff file to your existing kernel source? A. up2date B. patch C. rpm D. dpkg E. diff
B. patch
What key combination is used to forcibly halt the X server in the event of the graphical session becoming unusable (e.g., desktop manager or full screen application hanging)? A. press CTRL+ALT+DEL B. press CTRL+ALT+BACK_SPACE C. press CTRL+ALT+DEL twice D. press CTRL+ALT+F1 then run
B. press CTRL+ALT+BACK_SPACE
Which of the following commands will list the quota for the user foobar? A. repquota foobar B. quota foobar C. lsquota foobar D. printquota foobar
B. quota foobar
How can you turn off the group quota in /pub? A. quotaoff /pub B. quotaoff -gv /pub C. quotadown /pub D. rm /pub/quota.group
B. quotaoff -gv /pub
Select from the list below the daemons that are present on a standard Linux server to support routing. Choose all that apply. A. gated B. ripd C. routed D. ospfd E. bgpd
B. ripd C. routed D. ospfd E. bgpd
Which fstab option governs that all root ID are mapped to anonymous ID when mounting a NFS mounted file system? A. no-root-squash B. root-squash C. all-squash D. squash-root
B. root-squash
Which RPM command will output the name of the package which installed the file /etc/exports? A. rpm -F /etc/exports B. rpm -qf /etc/exports C. rpm -Kl /etc/exports D. rpm -qp /etc/exports E. rpm -ql /etc/exports
B. rpm -qf /etc/exports
Which of the following commands will replace every instance of the word list with LIST from the file myfile.txt and print the results on the screen? A. sed --in-place -e "s/list/LIST/" myfile.txt B. sed -e "s/list/LIST/" myfile.txt C. sed --in-place -e "/list/LIST/" myfile.txt D. sed -e "/list/LIST/" myfile.txt
B. sed -e "s/list/LIST/" myfile.txt
Which of the following commands lists all defined variables and functions within Bash? A. env B. set C. env -a D. echo $ENV
B. set
Which of the following is the best way to list all defined shell variables? A. env B. set C. env -a D. echo $ENV
B. set
Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.) A. ssh --port 2222 example.com B. ssh -p 2222 example.com C. ssh -o Port=2222 example.com D. ssh -o GatewayPort=2222 example.com E. ssh example.com:2222
B. ssh -p 2222 example.com C. ssh -o Port=2222 example.com
What command is used to hold keys during a login session to be used for automatic authentication while logging in to other machines using ssh? A. sshd B. ssh-agent C. ssh-keygen D. ssh-add
B. ssh-agent
Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH? A. sshd B. ssh-agent C. ssh-keygen D. ssh-add
B. ssh-agent
You've just rebooted your server. Users complain that the server is refusing secure connections. Which of the following is most likely causing this problem? A. The clients are not resolving the server name properly. B. sshd is not configured to start in the default runlevel. C. sshd is using tcpwrappers for security. D. The public keys have been corrupted on the server. E. The users need to restart their ssh-agent.
B. sshd is not configured to start in the default runlevel.
Which of the following commands can be used to enable a file for paging and swapping? A. mkswap B. swapon C. inswap D. modswap
B. swapon
Which command will show you the contents of a gzip compressed tar archive? A. gzip archive.tgz | tar xvf - B. tar ztf archive.tgz C. gzip -d archive.tgz | tar tvf - D. tar cf archive.tgz
B. tar ztf archive.tgz
In xorg.conf, which section is concerned with fonts? A. the Fonts section B. the Files section C. the xfsCodes section D. the Graphics section E. the modeline section
B. the Files section
In the following command and its output, echo $$ 12942 what is 12942? A. the process ID of the echo command B. the process ID of the current shell C. the process ID of the last command executed D. the process ID of the last backgrounded command
B. the process ID of the current shell
Which of the following commands will print important system information such as the kernel version and machine hardware name? A. sysinfo B. uname C. lspci D. arch E. info
B. uname
Which of the following apt-get commands will install the newest versions of all currently installed packages without removing any packages or installing new packages that are not already installed? A. auto-update B. upgrade C. dist-upgrade D. install E. update
B. upgrade
When starting vi with the file nohup.out, which of the following will enable onscreen numbers? A. vi +/set num nohup.out B. vi +"se nu" nohup.out C. vi /+"set number" nohup.out D. vi +":set num" nohup.out E. echo "set numb" | vi nohup.out
B. vi +"se nu" nohup.out
You are looking for an executable file foo. Select the command that would search for foo within directories set in the shell variable, PATH. A. locate B. which C. find D. query E. whereis
B. which
With xorg 7.0, what is the name of the default font server? A. xfserv B. xfs C. fonts D. xfstt E. fserv
B. xfs
Which of the following files, when existing, affect the behavior of the Bash shell? (Choose TWO correct answers.) A. ~/.bashconf B. ~/.bashrc C. ~/.bashdefaults D. ~/.bash_etc E. ~/.bash_profile
B. ~/.bashrc E. ~/.bash_profile
On a system using shadowed passwords, the correct permissions for /etc/passwd are ____- and the correct permission for /etc/shadow are _______. A. -rw-r-----, -r-------- B. -rw-r--r--, -r--r--r-- C. -rw-r--r--, -r-------- D. -rw-r--rw-, -r-----r-- E. -rw--------, -r-------
C. -rw-r--r--, -r--------
On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___ and the most correct permissions for /etc/shadow are ___. A. -rw-r-----, -r-------- B. -rw-r--r--, -r--r--r-- C. -rw-r--r--, -r-------- D. -rw-r--rw-, -r-----r-- E. -rw-------, -r--------
C. -rw-r--r--, -r--------
What command option of rmmod specifies that all outputs be sent to syslog? A. -a B. -i C. -s D. -d
C. -s
Which of the following is the default XFree86 configuration file? A. /usr/X11R6/etc/XF86Config B. /var/X11/XF86Config C. /etc/X11/XF86Config D. /usr/etc/X11/XF86Config
C. /etc/X11/XF86Config
Which of the following is the default Xorg configuration file? A. /usr/X11R6/etc/xorg.conf B. /var/X11/xorg.conf C. /etc/X11/xorg.conf D. /usr/etc/X11/xorg.conf
C. /etc/X11/xorg.conf
Which configuration file should be modified to disable the ctrl-alt-delete key combination? A. /etc/keys B. /proc/keys C. /etc/inittab D. /proc/inittab E. /etc/reboot
C. /etc/inittab
You need to change the default run-level for the machine. Which file do you need to edit? (Write the full path including the filename) A. /etc/init.d B. /etc/init-table C. /etc/inittab D. /etc/init
C. /etc/inittab
What file should be edited to make the system aware of newly added library files? A. /etc/modules.conf B. /etc/conf.modules C. /etc/ld.so.conf D. /etc/ld.so.cache E. /etc/LD_LIBRARY_PATH.conf
C. /etc/ld.so.conf
Which of the following files is responsible for defining various options and values to control the printing and spooling of print jobs? A. /etc/printers B. /etc/print.conf C. /etc/printcap D. /etc/printd.conf
C. /etc/printcap
Which configuration file does sudo read when determining if a user is permitted to run applications with root privileges? A. /etc/groups B. /etc/passwd C. /etc/sudoers D. /etc/sudo.conf
C. /etc/sudoers
You are building a server that will undergo many hardware and operating system upgrades. The server is the file server for all users on your 100 user network. Which directory should have its own mountpoint and/or hard drive? A. /boot B. /sbin C. /home D. /etc
C. /home
You have a Linux system routing 3 networks through 3 separate NICs and are having trouble with your IP forwarding. What file would you check to ensure that IP forwarding is enabled? A. /etc/defaultrouter B. /proc/net/tcp C. /proc/sys/net/ipv4/ip_forward D. /var/log/messages
C. /proc/sys/net/ipv4/ip_forward
According to the FHS, where are user mailboxes kept? Assume that mail is not being delivered to somewhere in their home directories. A. /var/spool B. /etc/mail C. /var/mail D. /usr/mail
C. /var/mail
To correct crontab entry to execute the script chklog once per hour between 3 p.m. and 5 p.m.on Monday and Thursday each week is: A. 0 3,4,5 * * 2,5 chklog B. 0 3,4,5 * * 1,4 chklog C. 0 15,16;17 * * 1,4 chklog D. 0 15,16,17 1,4 * * chklog E. * 15,16,17 * * 1,4 chklog
C. 0 15,16;17 * * 1,4 chklog
What is the process ID number of the init program? A. -1 B. 0 C. 1 D. It is different with each reboot. E. It is set to the current run level.
C. 1
How many spare server processes are required by Apache for the typical, low-to-moderate volume website? A. 1 B. 50 C. 10 D. 200
C. 10
Which of the following represents a class C netmask? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255
C. 255.255.255.0
A new department's local area network has to be connected to the existing LAN using a router. This new department's LAN uses IP addresses from 192.168.112.64/26 and the first free IP address there was reserved for the router. How many IP addresses were left for other hosts to be connected? A. 63 B. 24 C. 61 D. 42
C. 61
How many SCSI ids for peripherals can SCSI-1 support? A. 5 B. 6 C. 7 D. 8
C. 7
To prevent a command run as root from sending both standard out (stdout) and standard error (stderr) to any terminal or other file or device, which of the following strings should be appended to the command? A. >/dev/null B. >/dev/null 1>&2 C. >/dev/null 2>&1 D. 1>&2 >/dev/null E. 2>&1 >/dev/null
C. >/dev/null 2>&1
What can you do to recover a lost passphrase for a DSA or RSA authentication key? A. Run the ssh-keygen command. B. Run the ssh -recover command. C. A lost passphrase cannot be recovered. D. Decrypt the authentication key with gpg. E. Decrypt the authentication key with ssh -decrypt.
C. A lost passphrase cannot be recovered.
What is pool.ntp.org? A. A deprecated feature for maintaining system time in the Linux kernel B. A website which provides binary and source packages for the OpenNTPD project C. A virtual cluster of various timeservers D. A community website used to discuss the localization of Linux
C. A virtual cluster of various timeservers
To prevent a specific user from scheduling tasks with at, what should the administrator do? A. Add the specific user to /etc/at.allow file. B. Add the specific user to [deny] section in the /etc/atd.conf file. C. Add the specific user to /etc/at.deny file. D. Add the specific user to nojobs group. E. Run the following: atd --deny [user].
C. Add the specific user to /etc/at.deny file.
Which of the following is true when hard-linked files are present? A. The output of stat will report "hard" instead of "regular file" B. The hard-linked files may not be empty C. Both files will share the same inode D. Issuing a long directory listing with ls -1 will indicate the link with "->" E. The file permissions will be prefixed by an "h", eg. hrwxr-x-r-x
C. Both files will share the same inode
What is the difference between the commands test -e path and test -f path? A. They are equivalent options with the same behaviour. B. The -f option tests for a regular file. The -e option tests for an empty file. C. Both options check the existence of the path. The -f option also confirms that it is a regular file. D. The -f option tests for a regular file. The -e option tests for an executable file.
C. Both options check the existence of the path. The -f option also confirms that it is a regular file.
When using pppd which authentication protocol is the most secure? A. clear text B. PAP C. CHAP D. LAP
C. CHAP
Of the ways listed, which is the best way to temporarily suspend a user's ability to interactively login? A. Changing the user's UID. B. Changing the user's password. C. Changing the user's shell to /bin/false. D. Removing the user's entry in /etc/passwd. E. Placing the command logout in the user's profile.
C. Changing the user's shell to /bin/false.
You are having problems with a particular font and you want to see if its directory is included in XF86Config. Which section contains this information? A. Paths B. Fonts C. Files D. Graphics
C. Files
Which ONE of the following lines from /etc/X11/xorg.conf indicates that fonts can be found on a font server? A. FontPath= server B. Fonts "unix/:7100" C. FontPath "unix/:7100" D. Fonts= server E. Fontserver = "servername"
C. FontPath "unix/:7100"
Which of the following lines from /etc/X11/XF86Config indicates what fonts can be found on a font server? A. FontPath= server B. Fonts "unix/:7100" C. FontPath "unix/:7100" D. Fonts= server E. Fontserver = "servername"
C. FontPath "unix/:7100"
What is the purpose of the file /etc/profile? A. It contains the welcome message that is displayed after login. B. It contains security profiles defining which users are allowed to log in. C. It contains environment variables that are set when a user logs in. D. It contains default application profiles for users that run an application for the first time.
C. It contains environment variables that are set when a user logs in.
When the command echo $ outputs 1, which of the following statements is true? A. It is the process ID of the echo command. B. It is the process ID of the current shell. C. It is the exit value of the command executed immediately before echo. D. It is the exit value of the echo command.
C. It is the exit value of the command executed immediately before echo.
What effect does the sticky bit have when set on a directory? A. There is no effect because the sticky bit has been deprecated in Linux. B. It provides a hint to the kernel that files in this directory should be cached in memory, if possible. C. It restricts deletion of files in this directory to only the root user and the file owner regardless of write permissions for other users. D. It instructs the kernel to keep the underlying data for the files in the directory intact to allow for undeletion of important files.
C. It restricts deletion of files in this directory to only the root user and the file owner regardless of write permissions for other users.
Where does lilo store its boot information? A. Boot ROM B. Boot RAM C. Master Boot Record D. /boot partition
C. Master Boot Record
When using PAP with PPP, the /etc/ppp/pap-secrets file must be: A. World-readable. B. Readable only by the ppp user. C. Readable only by root. D. Readable and executable by user root and group ppp.
C. Readable only by root.
What are reverse DNS entries used for? A. Reverse DNS enable diagnostic commands like traceroute to work. B. Reverse DNS gives you information about the owner of the DNS entry. C. Reverse DNS provides the hostname for a particular numeric IP address. D. Reverse DNS provides geographical information about the DNS net location.
C. Reverse DNS provides the hostname for a particular numeric IP address.
Which of the following SQL statements will select the fields name and address from the contacts table? A. SELECT (name, address) FROM contacts; B. SELECT (name address) FROM contacts; C. SELECT name, address FROM contacts; D. SELECT name address FROM contacts;
C. SELECT name, address FROM contacts;
What is a well-known service that binds port 25 and is it required on all hosts? A. SNMP and it should be turned off if not needed. B. SMTP and it is a required service. C. SMTP and it is only required on MX hosts. D. SLPD and it is required if you run LDAP services. E. SSHD and it is required for secure logins.
C. SMTP and it is only required on MX hosts.
Your server was rebooted. Users have complained that the server refuses secured connections. What is the mostly likely cause? A. The public keys have been corrupted on the server. B. The clients are not resolving the server name properly. C. Sshd is not configured to start in the default runlevel. D. The users need to ssh-keygen.
C. Sshd is not configured to start in the default runlevel.
User Joseph has successfully extracted and compiled a program from source code. Installing the binaries produces errors. What is the most likely reason? A. The source code was compiled for a different CPU B. The permissions set in the /usr/bin directory are wrong C. The binaries require root privileges to be installed D. The wrong prefix was used during configuration of the source code
C. The binaries require root privileges to be installed
What is true regarding a default route? A. The default route is always used first. When the default route is not available more specific routes are tried. B. When a default route is set, all other routes are disabled until the default route is deleted. C. The default route is only used if there is not a more specific route to a destination host or network. D. Without a default route, no network communication even in directly attached networks is possible.
C. The default route is only used if there is not a more specific route to a destination host or network.
This is a line from the file /etc/exports: /product company(rw) What does it mean? A. Only user company may access the filesystem /product when it is NFS mounted. B. This computer will mount the filesystem /product on company via NFS. C. The filesystem /product is exported for NFS mount to computer company. D. All NFS access to /product will use suid company.
C. The filesystem /product is exported for NFS mount to computer company.
You need to run a second Apache server on the same IP address. Which of the following is true? A. You cannot run more than one Apache on one IP address. B. You have to add a new entry in /etc/services. C. The second Apache server must listen on another port. D. The second Apache must be a child process of the first.
C. The second Apache server must listen on another port.
What is the conventional purpose of Linux UIDs that are lower than 100? A. They are reserved for super user accounts. B. They are reserved for the system admin accounts. C. They are reserved for system accounts. D. They are unused, aside from 0, because they are targets of exploits. E. They are used to match with GIDs in grouping users.
C. They are reserved for system accounts.
You have run out of disk space on a partition. Which of the following would be an easy way to move data to a new partition without reconfiguring the path to the data in existing applications? A. Run ext2fs ACL. B. Use a hard link. C. Use a symbolic link. D. Use the loopback device. E. Create a block device offset.
C. Use a symbolic link.
You are about to install a new program on an RPM based Linux system. Which of the following would be the best way to accomplish this? A. Get the source code in a tarball and install from that source. B. Get a source RPM and use rpm to install it. C. Use rpm to install the program's binaries from an RPM package. D. Use cpi to extract the binaries from a source RPM and use rpm to install those sources.
C. Use rpm to install the program's binaries from an RPM package.
Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records? A. CASE B. FROM C. WHERE D. IF
C. WHERE
Which of the following words is used to restrict the records that are returned from a SELECT query based on a supplied criteria for the values in the records? A. LIMIT B. FROM C. WHERE D. IF
C. WHERE
When should grep -F or the fgrep command be used to search the content of text files? A. When files need to be searched that contain non-ASCII text. B. When only the presence of the search pattern needs to be reported and not every line that matches the search. C. When the text being searched for does not contain any regular expression patterns. D. When the text files will be searched multiple times. Subsequent calls to fgrep will run faster.
C. When the text being searched for does not contain any regular expression patterns.
You've decided to convert from standard shadow passwords to MD5 passwords. You make the appropriate changes to the /etc/pam.d/ files. What do you do next? A. Nothing, the passwords will be changed as users login and out. B. Nothing, users will be automatically prompted to change their passwords at the next login. C. You need to manually change all the passwords using the passwd program. D. Delete and recreate all the users. E. Change the /etc/pam.d files back because shadow passwords and MD5 passwords are incompatible.
C. You need to manually change all the passwords using the passwd program.
You want to find the man pages for utilities and tools related to PPP, but you don't know the name of the specific commands. How can you get a list of man pages that contain information about PPP? A. whatis ppp B. man ppp C. apropos ppp D. mandb ppp
C. apropos ppp
You have not run apt-get on a system for some time, but it has been run on the system before. What apt-get command would you run to download the latest list of packages, but not the packages themselves? A. apt-get build-dep B. apt-get mirror-select C. apt-get update D. apt-get upgrade E. apt-get dist-upgrade
C. apt-get update
Which chown command will change the ownership to foo and the group to bar on a file named biglist? A. chown foo/bar biglist B. chown -u foo -g bar biglist C. chown foo:bar biglist D. chown --user foo --group bar biglist
C. chown foo:bar biglist
What command would execute cmd1 followed by cmd2, regardless of the exit status of cmd1? A. cmd1 cmd2 B. cmd1 | cmd2 C. cmd1 ; cmd2 D. cmd1 && cmd2 E. cmd1 || cmd2
C. cmd1 ; cmd2
The main collection of Linux usenet newsgroups are found in which usenet hierarchy? A. sys.linux B. comp.linux C. comp.os.linux D. comp.sys.linux E. comp.opsys.linux
C. comp.os.linux
You need to pause the CUPS printer HPLaserjet4, and you want to cancel all print jobs with a message, "hello". Which command will do this? A. cupsreject -c -r hello HPLaserjet4 B. cupsreject -p -m hello HPLaserjet4 C. cupsdisable -c -r hello HPLaserjet4 D. cupsdisable -p -m hello HPLaserjet4
C. cupsdisable -c -r hello HPLaserjet4
You have just added new modules to your system. What command would you execute to rebuild the modules.dep file? A. depmod --rebuild B. update-dependancies C. depmod -a D. insmod -dependancies
C. depmod -a
Your machine's IP address used to function, but it's only got the localhost "lo" entry now. What three clientmode commands could you possibly use to get a new DHCP address? A. dhcpd B. ipconfig C. dhclient D. pump E. dhcpcd
C. dhclient D. pump E. dhcpcd
What is a reasonable command to uninstall a Debian package from your system? A. dpkg -Ra pkgname B. dpkg -R pkgname C. dpkg -r pkgname D. dpkg -ra pkgname
C. dpkg -r pkgname
To test a shell script called myscript, the environment variable FOOBAR must be removed temporarily. How can this be done? A. unset -v FOOBAR B. set -a FOOBAR="" C. env -u FOOBAR myscript D. env -i FOOBAR myscript
C. env -u FOOBAR myscript
How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only? A. unset -v FOOBAR;./myscript B. set -a FOOBAR="";./myscript C. env -u FOOBAR./myscript D. env -i FOOBAR./myscript
C. env -u FOOBAR./myscript
Which command should be added to /etc/bash_profile to change the language of messages from an internationalised program to Portuguese (pt)? (Select TWO correct answers) A. export LANGUAGE="pt" B. export MESSAGE="pt" C. export LANG="pt" D. export LC_MESSAGES="pt" E. export ALL_MESSAGES="pt"
C. export LANG="pt" D. export LC_MESSAGES="pt"
Given the following output: Prompt > myapp [1]+ Stopped myapp prompt> Which of the following commands will resume executing the stopped process while allowing the user to continue to type commands at the command prompt? A . bg myapp A. continue myapp B. exec myapp C. fg myapp D. myapp &
C. fg myapp
The command used to determine a file's type is A. type B. find C. file D. ls
C. file
inetd.conf was changed. How to reinit changes? A. restart inetd B. find inetd's PID and send signal 15 to it C. find inetd's PID and send signal SIGHUP to it
C. find inetd's PID and send signal SIGHUP to it
You have two shell scripts, foo and bar. You wish to have bar execute if foo returns an exit status of 0 Select the correct command: A. foo; bar B. foo || bar C. foo && bar D. foo % bar
C. foo && bar
What configuration file is used for settings and conversion parameters for the ftp daemon? A. ftpusers B. ftpconvert C. ftpconversions D. in.ftpd E. ftpdefaults
C. ftpconversions
We have bash script ~/myscript shown below: Shift echo $2 We call this script: ~/myscript alpha beta gamma delta. What will we see? A. alpha B. beta C. gamma D. delta
C. gamma
Which of the following commands will print the first few lines of a text file to the shell? A. cat -n 10 filename B. dump -n 10 filename C. head -n 10 filename D. print -n 10 filename
C. head -n 10 filename
Which of the following lines would you find in the file /etc/nsswitch.conf? A. order hosts,bind B. 192.168.168.4 dns-server C. hosts: files dns D. domain mycompany.com
C. hosts: files dns
On a dual boot system, every time the system is booted back into Linux the time has been set backward by two hours. Which of the following commands will correct the problem so it will not occur again? A. ntpdate pool.ntp.org B. date -d 'two hours' C. hwclock -hctosys -localtime D. time hwclock
C. hwclock -hctosys -localtime
You are working on a server that has multiple ethernet network interfaces, and you wish to find out the IP address assigned to the eth1 interface. Which of the following commands will print the necessary information? A. ipconfig /dev/eth1 B. ethconfig -d eth1 C. ifconfig eth1 D. prntconf eth1
C. ifconfig eth1
Which of the following commands can be used to activate a specific network interface? A. ipup B. net C. ifup D. netup
C. ifup
Which of the following could be used to load kernel modules for a 2.4.x kernel? A. vi/proc/modules B. rmmod C. kmod D. depmod
C. kmod
After modifying LILO's configuration file, what command should you run for the changes to take effect? A. kill -HUP 'pidof lilo' B. lilo-install C. lilo D. reboot
C. lilo
Which of the following commands will provide locale-specific information about your system and its environment? A. loconfig B. getlocale C. locale D. tzconfig E. tzselect
C. locale
Which of the following commands can typically be used to configure a kernel? A. ./config B. ./configure C. make config D. make configure
C. make config
According to the PPP HOWTO which piece of software could help you test a modem? A. chat B. dhcpd C. minicom D. Hylafax E. netconfig
C. minicom
On a debian system which of the following would build a boot disk? A. mkboot /dev/floppy B. makeboot --device /dev/fd0 2.4.18-12 C. mkboot --device /dev/fd0 2.4.18-12 D. mkboot /boot/vmlinux-2.4.18-12 E. mkbootdisk /boot/vmlinux-2.4.18-12
C. mkboot --device /dev/fd0 2.4.18-12
You need to create a simple hierarchy of directories: images/photos/summer/ottawa/. None of the directories on that path exists. What command will create all of the needed directories in one step? A. mkdir -r images/photos/summer/ottawa/ B. mkdir -R images/photos/summer/ottawa/ C. mkdir -p images/photos/summer/ottawa/ D. mkdir -P images/photos/summer/ottawa/ E. mkdir -m images/photos/summer/ottawa/
C. mkdir -p images/photos/summer/ottawa/
Which of the following commands will load a kernel module along with any required dependency modules? A. depmod B. insmod C. modprobe D. module_install E. loadmod
C. modprobe
What command would load the module msdos.o and all its dependancies? A. modinfo -a msdos B. lsmod -a msdos C. modprobe msdos D. insmod -d msdos
C. modprobe msdos
When reading man pages, a lot of extra characters are shown on screen. Which of the following commands can help to deal with this problem? A. col B. grep C. more D. pg E. row
C. more
Which of the following is used to establish a PPP link to another computer? A. pppconn B. linkppp C. pppd D. pppconf
C. pppd
Which of the following commands is used to restore files from backups made with dump? A. extract B. cpio -d C. restore D. udump
C. restore
What RPM command would show you detailed information for a package called openssh- 3.6.i386.rpm? A. rpm --showinformation openssh-3.6.i386.rpm B. rpm --showdetails --package openssh-3.6.i386.rpm C. rpm --query --info --package openssh-3.6.i386.rpm D. rpm --verify openssh-3.6.i386.rpm
C. rpm --query --info --package openssh-3.6.i386.rpm
How can you update a package only if an earlier version is currently installed on the system? A. rmp -- update rpmname B. rpm -U rpmname C. rpm -F rpmname D. rpm -- force rpmname E. rpm -u rpmname
C. rpm -F rpmname
You see following output while trying to install an updated package: [root@example pub]# rpm I gthumb- 2.2.0.i386.rpm package gthumb- 1.0.1.i386.rpm is already installed. Which command will allow you to install the updated version? A. rpm -i gthumb-2.2.0.i386.rpm B. rpm -ivh gthumb-2.2.0.i386.rpm C. rpm -U gthumb-2.2.0.i3S6.rpm D. rpm -qu gthumb-2.2.0.i386.rpm E. rpm -qiv gthumb-2.2.0.i386.rpm
C. rpm -U gthumb-2.2.0.i3S6.rpm
The GRUB_TIMEOUT parameter specifies a timeout period when booting in what unit of time? A. milliseconds B. tenths of seconds C. seconds D. minutes
C. seconds
What BASH environment variable will prevent you from overwriting a file with a ">" or ">>"? A. set -o safe B. set -o noglob C. set -o noclobber D. set -o append E. set -o nooverwrite
C. set -o noclobber
Which bash option will prevent you from overwriting a file with a ">"? A. set -o safe B. set -o noglob C. set -o noclobber D. set -o append E. set -o nooverwrite
C. set -o noclobber
What command should be invoked to give the user sally read and write, but not execute, access to the file strategy.txt using Extended ACL entries? A. setfacl -setperm sally:rw strategy.txt B. setfacl -m user::sally+rw strategy.txt C. setfacl -m user:sally:rw strategy.txt D. setfacl -setperm user:sally+rw strategy.txt
C. setfacl -m user:sally:rw strategy.txt
Which daemon allows Linux to share it's file systems and printers with unmodified Windows clients? A. X Window B. nmbd C. smbd D. WINS E. NFS
C. smbd
What command is used to monitor connections to the SMB server? A. smbclient B. testparm C. smbstatus D. smbstat
C. smbstatus
Which of the following services would you be least likely to configure to be governed over by the Internet Super Server? A. ftp B. telnet C. ssh D. finger E. bind
C. ssh
What command do you use to generate an OpenSSH host key? A. sshd B. ssh-agent C. ssh-keygen D. ssh-add
C. ssh-keygen
In Bash, inserting "1>&2" after a command redirects A. standard error to standard input B. standard input to standard error C. standard output to standard error D. standard error to standard output E. standard output to standard input
C. standard output to standard error
You are logged in as user tux1, but now you want to switch users to tux2 with tux2's environment. How would you do this? A. su tux2 B. su -e tux2 C. su - tux2 D. su -m tux2 E. su -f tux2
C. su - tux2
Which of the following commands will display the last 30 lines of /var/log/bigd.log as well as new content as it is appended to the file by another process? A. cut -30 -v /var/log/bigd.log B. head -30 -e /var/log/bigd.log C. tail -f -n 30 /var/log/bigd.log D. tac -30 /var/log/bigd.log E. cat -r -n 30 /var/log/bigd.log
C. tail -f -n 30 /var/log/bigd.log
What single command (no options or arguments) can be used to fully extract a file called abc.tar.bz2? A. gzip B. gunzip C. tar D. bz2unzip
C. tar
Which of the following lines would you expect to see in the file /etc/services? A. in.tftpd: LOCAL B. tftp dgram upd wait root /usr/sbin/tcpd in.tftpd C. tftp 69/tcp D. udp 17 UDP
C. tftp 69/tcp
What is NOT contained in the locale setting of the operating system? A. currency symbol B. language C. timezone D. thousands separator
C. timezone
Which of the following commands will change all CR-LF pairs in an imported text file, userlist.txt, to Linux standard LF characters and store it as newlist.txt? A. tr '\r\n' '' < userlist.txt > newlist.txt B. tr -c '\n\r' '' < newlist.txt > userlist.txt C. tr -d '\r' < userlist.txt > newlist.txt D. tr '\r' '\n' userlist.txt newlist.txt E. tr -s '^M' '^J' userlist.txt newlist.txt
C. tr -d '\r' < userlist.txt > newlist.txt
Which utility would you use to change how often a filesystem check was performed over an EXT2 filesystem (without losing any data stored on that filesystem)? A. mod2fs B. fsck C. tune2fs D. mke2fs E. fixe2fs
C. tune2fs
Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes? A. core B. edquota C. ulimit D. quota
C. ulimit
Which of the following commands can be used to limit the amount of memory a user may use? A. umask B. usermod C. ulimit D. passwd E. chage
C. ulimit
To allow a regular user account to mount and unmount a filesystem (for instance, a cdrom or floppy), which option will need to be added to the corresponding line in /etc/fstab? A. nouidchk B. alluser C. user D. auto
C. user
The files in the /etc/skel directory are used by the A. pwconv command. B. pwunconv command. C. useradd command. D. passwd command.
C. useradd command.
User Bob Swanson (bswanson) has left Company.com. His data has already been removed from his directory. How do you remove his account and directory? A. rm -rf /home/bswanson B. deluser /home/bswanson C. userdel -r bswanson
C. userdel -r bswanson
Which of the following commands will lock the user foobar's account? A. userdel -r foobar B. moduser -l foobar C. usermod -L foobar D. userconf -l foobar
C. usermod -L foobar
Which of the following programs will only find files that are in your PATH? A. locate B. slocate C. which D. find
C. which
Which one of the following programs will only find files that are in your PATH? A. locate B. slocate C. which D. find
C. which
To learn more about the management or ownership of a website, what's the best utility to use? A. tracert B. traceroute C. whois D. ping E. telnet
C. whois
After installing and configuring Xfree86, you notice that when you start X, the display is not centered. What program can you run to find a better modeline setting? A. XF86Setup B. xf86config C. xvidtune D. xvideoagent
C. xvidtune
Which of the following commands shows the current color depth of the X Server? A. xcd B. xcdepth C. xwininfo D. xcolordepth E. cat /etc/X11
C. xwininfo
X is running okay but you're concerned that you may not have the right color depth set. What single command will show you the running color depth while in X? A. xcd B. xcdepth C. xwininfo D. xcolordepth E. cat /etc/X11
C. xwininfo
You are the system administrator for a consulting firm where several people use Linux as their desktop operating system. One of your users has installed a commercial publishing program that works under X on a variety of UNIX and Linux platforms. The user made a series of configuration changes regarding the initial window size, location and color. Now, he is having difficulty undoing these changes and is asking for your help. In which file would you think you would most likely find the configuration settings you are seeking to change? A. ~/.xinitrc B. ~/.xconfig C. ~/.Xdefaults D. ~/.XF86Config E. /etc/X11/XF86Config
C. ~/.Xdefaults
You have just set up the Gnome Display Manager as your default display manager. What file should you edit to change the default greeting for it? A. /etc/X11/prefdm B. /etc/X11/XF86Config C. /etc/X11/gdm.conf D. /etc/X11/gdm/lnit/Default
D. /etc/X11/gdm/lnit/Default
Which file should be edited to select the network locations from which Debian installation package files are loaded? A. /etc/dpkg/dpkg.cfg B. /etc/apt/apt.conf C. /etc/apt/apt.conf.d D. /etc/apt/sources.list E. /etc/dpkg/dselect.cfg
D. /etc/apt/sources.list
A file exists on a server, but has no content. Users cannot submit jobs to an attached printer. Choose the correct file that must be edited to fix this problem. A. /etc/hosts B. /etc/hosts.allow C. /etc/host.deny D. /etc/hosts.lpd E. /var/spool/hosts.lpd
D. /etc/hosts.lpd
You have a standard Apache web server installation and want to make it respond to requests on port 8088. To do this, what configuration file do you need to change? A. None. This is the default port. B. /etc/httpd/apache.conf C. /etc/httpd/ports.conf D. /etc/httpd/httpd.conf E. /etc/httpd/access.conf
D. /etc/httpd/httpd.conf
What file is typically used to display messages at the login prompt when remote users telnet in to the machine? A. /etc/issue B. /etc/motd C. /etc/net.banner D. /etc/issue.net
D. /etc/issue.net
In the LPD system, a print queue is defined in what file? A. /etc/lprconf B. /etc/printer C. /etc/printqueue D. /etc/printcap
D. /etc/printcap
The following output shows an excerpt from a standard network configuration file: time 37/tcp timserver time 37/udp timeserver rlp 39/udp resource # resource location name 42/udp nameserver whois 43/tcp nickname # usually to sri-nic domain 53/tcp domain 53/udp mtp 57/tcp # deprecated bootps 67/udp # bootp server bootpc 68/udp # bootp client tftp 69/udp Which file could this be from? A. /etc/hosts B. /etc/inetd.conf C. /etc/named.conf D. /etc/services E. /etc/syslog.conf
D. /etc/services
Which file contains the date of the last change of a user's password? A. /etc/gshadow B. /etc/passwd C. /etc/pwdlog D. /etc/shadow E. /var/log/shadow
D. /etc/shadow
Which directory contains additional information about installed packages? A. /usr/share/documentation B. /usr/local/share/documentation C. /usr/local/doc D. /usr/share/doc E. /usr/packages/doc
D. /usr/share/doc
Which of the following looks like a correct entry in the /etc/hosts file? A. localhost 127.0.0.1 localhost.localdomain B. localhost.localdomain localhost 127.0.0.1 C. localhost localhost.localdomain 127.0.0.1 D. 127.0.0.1 localhost.localdomain localhost E. localhost.localdomain 127.0.0.1 localhost
D. 127.0.0.1 localhost.localdomain localhost
Which two of the following Class B IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose two) A. 128.0.0.0 B. 169.16.0.0 C. 169.254.0.0 D. 172.16.0.0 E. 172.20.0.0
D. 172.16.0.0 E. 172.20.0.0
The correct crontab entry to execute the script chklog three times per month between 3 p.m. and 5 A. m.: B. * 3,4,5 1 * * chklog C. 3 3,4,5 1 * * chklog D. 3 15,16,17 * * * chklog E. 0 15,16,17 1 * * chklog F. * 15,16,17 1 * * chklog
D. 3 15,16,17 * * * chklog
Which of the following crontab entries will execute myscript at 30 minutes past every hour on Sundays? A. 0 * * * 30 myscript B. 30 * * * 6 myscript C. 30 0 * * 0 myscript D. 30 0-23 * * 0 myscript E. 0 0-23 * * 30 myscript
D. 30 0-23 * * 0 myscript
How many cron fields are there for specifying the time to execute a cron job? A. 1 B. 3 C. 4 D. 5 E. 6
D. 5
While editing a file in vi, the file changes due to another process. Without exiting vi, how can the file be reopened for editing with the new content? A. :r B. :n C. :w D. :e
D. :e
The hosts.lpd file provides: A. A list of network printer IP addresses. B. A listening of printers available on the local network. C. A listening of computers that have printer (lpd) daemons running. D. A listening of hosts allowed to use printers on the local machine. E. A list of hosts on the local network that are not allowed access to printers attached to the local machine.
D. A listening of hosts allowed to use printers on the local machine.
If Linux detects an ACPI BIOS on bootup, what does it automatically deactivate? A. PnP B. PCI C. ATA D. APM
D. APM
Which of the following PPP authentication protocols never sends a password in the clear? A. PAM B. PAP C. PGP D. CHAP
D. CHAP
You have generated a DSA authentication key on host linux1. In order to log into host linux2 with the new key, what do you need to do? A. Copy the new authentication key into /etc/ssh/sshd_config on linux2. B. Copy the new authentication key into $HOME/.ssh/authorized_keys on linux2. C. Copy the new authentication key into $HOME/.ssh/id_dsa on linux2. D. Copy the new authentication key into $HOME/.ssh/id_dsa on linux1. E. Log into linux2 using the command ssh --key.
D. Copy the new authentication key into $HOME/.ssh/id_dsa on linux1.
On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate? A. The local routing information may be corrupted and must be re-validated using a routing protocol. B. One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout. C. There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default. D. DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.
D. DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.
You want a secure and fast DNS server that must also be quickly accessible remotely. You should: A. Reject all udp packets. B. Reject all icmp packets. C. Reject all icmp untrusted-host packets. D. Disable inetd, run ssh_d and named as standalone daemons. E. Use tcpwrappers to only allow connections to ports 22 and 53.
D. Disable inetd, run ssh_d and named as standalone daemons. E. Use tcpwrappers to only allow
You have a user whose account you want to disable but not remove. What should you do? A. Edit /etc/gshadow and just remove his name. B. Edit /etc/passwd and change all numbers to 0. C. Edit /etc/shadow file and remove the last field. D. Edit /etc/passwd and insert an * after the first :. E. Edit /etc/group file and put a # sign in front of his name.
D. Edit /etc/passwd and insert an * after the first :.
Your senior system administrator asked you to edit the /etc/inetd.conf file in order to disable the time service. After doing so, what would be the next thing to do? A. Reboot the machine B. Restart the inetd C. Find the PID of inetd and kill it with kill -15 D. Find the PID of inetd and send it a SIGHUP
D. Find the PID of inetd and send it a SIGHUP
Which protocol is used by ping? A. TCP B. UDP C. SMB D. ICMP E. OSPF
D. ICMP
Which of the following benefits does an alias in bash provide? A. It provides faster lookups for commands in the system directory. B. It creates a local copy of a file from another directory. C. It hides what command you are running from others. D. It allows a string to be substituted for the first word of a simple command.
D. It allows a string to be substituted for the first word of a simple command.
What is true about the file /etc/localtime? A. It is a plain text file containing a string such as Europe/Berlin. B. It is created and maintained by the NTP service based on the geolocation of the system's IP address. C. It is a symlink to /sys/device/clock/ltime and always contains the current local time. D. It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin.
D. It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin.
What does the command mount -a do? A. It mounts the floppy disk for all users B. It shows all mounted file systems C. It opens /etc/fstab to edit D. It mounts all file systems listed in /etc/fstab
D. It mounts all file systems listed in /etc/fstab
What does the command mount -a do? A. It mounts the floppy disk for all users. B. It shows all mounted file systems. C. It opens /etc/fstab to edit. D. It mounts all file systems listed in /etc/fstab.
D. It mounts all file systems listed in /etc/fstab.
What is the purpose of the command mailq? A. It fetches new emails from a remote server using POP3 or IMAP. B. It is a multi-user mailing list manager. C. It is a proprietary tool contained only in the qmail MTA. D. It queries the mail queue of the local MTA. E. It is a command-line based tool for reading and writing emails.
D. It queries the mail queue of the local MTA.
What does the + symbol mean in the following grep regular expression: grep '^d[aei]\+d$' /usr/share/dict/words A. Match the preceding character set ([aei]) one or more times. B. Match the preceding character set ([aei]) zero or more times. C. Match the preceding character set ([aei]) zero or one times. D. Match a literal + symbol.
D. Match a literal + symbol.
Each entry in a crontab must end with what character? A. Tab B. Space C. Backslash D. Newline
D. Newline
You decide to use xinetd instead of inetd. What must be done in order to properly configure xinetd? A. You must create a new configuration file for xinetd. B. You must add xinetd to /etc/services. C. You must add xinetd support to your tcpwrappers configuration files. D. Nothing, xinetd uses the same configuration files as inetd.
D. Nothing, xinetd uses the same configuration files as inetd.
In the following output, which is representative of the host performing gateway functions? Destination Gateway Genmask Flags Metric Ref Use Iface 10.3.3.0 192.168.1.1 255.255.255.255 UGH 0 0 0 eth0 192.168.1.0 * 255.255.255.0 U 0 0 0 etho0 192.168.77.0 * 255.255.255.0 U 0 0 0 vmnet1 127.0.0.0 * 255.0.0.0 U 0 0 0 lo default 192.168.1.1 0.0.0.0 UG 0 0 0 etho0 A. The default gateway is on 192.168.77.0 network B. The current host is the also the default gateway C. Its eth0 interface is incorrectly configured D. The 192.168.1.1 is the default gateway
D. The 192.168.1.1 is the default gateway
You want to make the directory /local available via NFS. Everything works fine, but on the client machine, the super user is unable to read any files on the NFS-mounted file system. Why? A. The NFS protocol does not allow this. B. The super user has different user IDs on the client and the server machine. C. The client, when mounting the NFS filesystem, must specify the option trusted. D. The exports entry on the server machine does not include the option no_root_squash
D. The exports entry on the server machine does not include the option no_root_squash
You are writing a script and want to test the exit status of a process. Which of the following is true? A. The normal exit value differs. B. You can't test the normal exit value. C. The normal exit value is $EXIT. D. The normal exit value is 0.
D. The normal exit value is 0.
An administrator is looking into a new script they received from a senior executive. In the very first line the administrator notices a #! followed by a file path. This indicates that: A. The file at that location was used to make the script. B. This script provides identical functionality as the file at that location. C. This script will self-extract into a file at that location. D. The program at that location will be used to process the script.
D. The program at that location will be used to process the script.
What is the purpose of the dig command? A. To adjust a directory's hidden permissions B. To search for files on the filesystem C. To adjust a file's hidden permissions D. To perform hostname lookups E. To ping all known hosts on the current subnet
D. To perform hostname lookups
What is the purpose of the bash built-in export command? A. To allow disks to be mounted remotely. B. To run a command as a process in a sub-shell. C. To make the command history available to sub-shells. D. To setup environment variables for applications. E. To share NFS partitions for use by other systems on the network.
D. To setup environment variables for applications.
What does the following command accomplish: "export PATH=$PATH:$APPLICATIONS" A. Changes path to the applications directory. B. Updates the path with the value of $APPLICATIONS. C. All NFS users can mount the applications directly. D. Updates path with the applications directory.
D. Updates path with the applications directory.
What is true regarding the file ~/.forward? A. As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command. B. After editing ~/.forward the user must run newaliases to make the mail server aware of the changes. C. Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses. D. When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.
D. When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.
You are preparing a new set of shared libraries in /usr/local/applib and you have written and compiled some code that uses these libraries. You have already performed and ldconfig, however the system still cannot find the shared libraries. What is most likely the cause of this? A. You used the wrong compiler. B. You did not update your PATH variable. C. You compiled the code with wrong library. D. You forgot to put the library path in ld.so.conf
D. You forgot to put the library path in ld.so.conf
In order to save and restore your sound card's configuration between sessions, the ALSA sound system uses what program? A. setalsa B. setsound C. soundctl D. alsactl E. alsaset
D. alsactl
You are a junior administrator of a high-traffic production web server. Which of the following commands would you run to restart the Apache web service without aborting existing connections? A. apachectl reload B. apachectl restart C. apachectl -k stop; apachectl start D. apachectl graceful E. /etc/init.d/httpd reload
D. apachectl graceful
You need to find all references in your system documentation to the word "copy". Which of the following will best accomplish this task? A. man copy B. which copy C. locate copy D. apropos copy E. grep "copy" /usr/man/*
D. apropos copy
Which of the following commands makes /bin/foo executable by everyone but only writable by its owner? A. chmod 557 /bin/foo B. chmod o +rwx, a+rx /bin/foo C. chown 557 /bin/foo D. chmod 755 /bin/foo
D. chmod 755 /bin/foo
Which chown command will change the ownership to dave and the group to staff on a file named data.txt? A. chown dave/staff data.txt B. chown -u dave -g staff data.txt C. chown -user dave -group staff data.txt D. chown dave:staff data.txt
D. chown dave:staff data.txt
To increase system security, it is often desirable to run daemons for system services with nonroot user ids. Which one of the following services can be run as a non-root user? A. inetd B. named C. rlogind D. crond E. telnetd
D. crond
Which of the following commands will print the amount of disk space used by files specified on the command line? A. dc B. dd C. df D. du
D. du
Which of the following commands should be added to /etc/bash_profile in order to change the language of messages for an internationalized program to Portuguese (pt)? A. export LANGUAGE="pt" B. export MESSAGE="pt" C. export UI_MESSAGES="pt" D. export LC_MESSAGES="pt" E. export ALL_MESSAGES="pt"
D. export LC_MESSAGES="pt"
Given the following output: prompt> myapp [1]+ Stopped myapp prompt> Which of the following commands will resume executing the stopped process and make it the current job? A. bg myapp B. continue myapp C. exec myapp D. fg myapp E. myapp &
D. fg myapp
Which of the following commands can be used to convert text files in one character encoding to another character encoding? A. cat B. convert C. dd D. iconv E. utf2utf
D. iconv
You are using iptables to protect your private network but allow it to access the Internet. What command do you run to view the current list of rules for masquerading? A. iptables -L masquerade B. iptables -t filter -L C. iptables -t block -L D. iptables -t nat -L
D. iptables -t nat -L
The system utility that automatically creates new log files and moves old ones is called what? A. newlog B. mvlog C. rotatelog D. logrotate
D. logrotate
Which of the following commands is used to rotate, compress, and mail system logs? A. rotatelog B. striplog C. syslogd --rotate D. logrotate E. logger
D. logrotate
Which of the following tools is used to configure CUPS? A. lpc B. lpadmin C. lpr D. lpd E. lpctrl
D. lpd
The legacy program, provided by CUPS for sending files to the printer queues on the command line is: A. lpd B. lpp C. lpq D. lpr
D. lpr
Which of the following is a legacy program provided by CUPS for sending files to the printer queues on the command line? A. lpd B. lpp C. lpq D. lpr
D. lpr
In order to append the output of ls to a file called bazz, which of the following command lines would you use? A. ls > bazz B. ls > & bazz C. ls &> bazz D. ls >> bazz
D. ls >> bazz
The file /etc/ssh_known_hosts typically contains hosts keys for ______. A. all hosts that have logged into this server via ssh B. all hosts that users have logged into from this server via ssh C. clients allowed to connect to this host via ssh D. machines the system administrator trusts users to connect to using ssh
D. machines the system administrator trusts users to connect to using ssh
What command will compile the Linux kernel and leave a file called bzImage in the floppy disk? A. make bzImage B. make compile C. make Image D. make bzdisk
D. make bzdisk
You have just added a CD-ROM drive (/dev/hdd) to your system and have added it to your fstab. Typically you can use which of the following commands to mount media in that drive to /mnt/cdrom? A. mount/dev/cdrom/mnt/cdrom B. mount/dev/cdrom C. mount -t cdrom/dev/cdrom/mnt/cdrom D. mount/mnt/cdrom E. automount/mnt/hdd/mnt/cdrom
D. mount/mnt/cdrom
The _____ is used by the local host to determine which hosts are on the local subnet, and which hosts are on remote networks. A. DNS B. ARP C. gateway D. netmask E. routing protocol
D. netmask
After modifying GRUB's configuration file, what command should you run for the changes to take effect? A. kill HUP `pidof grub` B. grubinstall C. grub D. no action is required
D. no action is required
When in Normal mode in vi, which command character will insert a blank line below the current cursor position and place the insert cursor at the beginning of the new line? A. a B. i C. n D. o
D. o
Which file inside the CUPS configuration directory contains the definition of the printers? A. cups-devices.conf B. snmp.conf C. printcap.conf D. printers.conf E. cupsd.conf
D. printers.conf
Which of the following commands will produce the following output: USERPID %CPU %MEMVSZ RSS TTY STAT STARTTIME COMMAND root 1255 4.4 0.9 6071634824 tty7 Ss+ 09:25 19:04 /usr/bin/X :0 - root 2016 0.0 0.0 792 560 tty1 Ss+ 09:26 0:00 /sbin/getty -8 matt 5204 0.0 0.1 6320 3696 pts/4 Ss 13:12 0:00 bash matt 5219 0.0 0.0 3988 624 pts/4 S+ 13:12 0:00 man bash matt 5229 0.0 0.0 3584 932 pts/4 S+ 13:12 0:00 pager -s matt 6768 0.0 0.1 10504 3880 pts/2 S+ 15:11 0:00 vi README.txt A. jobs B. proclist C. netstat D. ps
D. ps
Which of the following commands is run last during boot on a system with quotas enabled? A. fsck B. mount C. quotacheck D. quotaon
D. quotaon
The file /etc/ssh/ssh_host_rsa_key should be: A. world-readable B. readable to group sys C. readable to root only D. readable by all SSH users
D. readable by all SSH users
When you run the command newaliases, it will: A. ask for input on stdin to create new mail aliases. B. restart sendmail. C. remove the aliases currently configured. D. rebuild the aliases database for the file /etc/aliases
D. rebuild the aliases database for the file /etc/aliases
When you run the command newaliasses, it will: A. ask for input on stdin to create new mail aliases. B. restart sendmail. C. remove the aliases currently configured. D. rebuild the aliases database for the file /etc/aliases.
D. rebuild the aliases database for the file /etc/aliases.
Identify the statement that would create a default route using a gateway of 192.168.1.1 A. netstat-add default gw B. route default 192.168.1.1 C. ip route default 192.168.1.1 D. route add default gw 192.168.1.1 E. ifconfig default gw 192.168.1.1 eth0
D. route add default gw 192.168.1.1
You want to preview where the package file, apache-xml.i386.rpm, will install its files before installing it. What command do you issue? A. rpm -qp apache-xml.i386.rpm B. rpm -qv apache-xml.i386.rpm C. rpm -ql apache-xml.i386.rpm D. rpm -qpl apache-xml.i386.rpm
D. rpm -qpl apache-xml.i386.rpm
You have created a really long letter and after you are done, you notice that you used the name "Bob" many times but your forgot to capitalize it in many instances. Which command would you replace "bob" with "Bob" in all instances and generate a new letter for printing? A. sed `/bob/Bob' letter > newletter B. sed s/bob/Bob/ letter < newletter C. sed `s/bob/Bob' letter > newletter D. sed `s/bob/Bob/g' letter > newletter E. sed s/bob, Bob/' letter > newletter
D. sed `s/bob/Bob/g' letter > newletter
Many people like the vi text editor but the default bash command line editor recognizes emacs keystrokes. What command entered into abash initialization file will have bash recognize vi keystrokes after login? A. history -p vi B. alias emacs=vi C. HISTCMD=vi D. set -o vi E. unset emacs
D. set -o vi
In bash, inserting 2>&1 after a command redirects A. standard error to standard input. B. standard input to standard error. C. standard output to standard error. D. standard error to standard output. E. standard output to standard input.
D. standard error to standard output.
When you start XWindows, which series of programs and/or scripts would most closely describe the start-up process? A. xdm --> xinit --> xinitrc --> Xclients B. kde --> xinitrc --> xinit --> Xclients C. startx --> xinitrc --> Xclients --> kde D. startx --> xinit --> xinitrc --> Xclients E. startx-->xinit-->Xclients-->xinitrc
D. startx --> xinit --> xinitrc --> Xclients
When you start the X Window System, which series of programs and/or scripts would most closely describe the start-up process? A. xdm -> xinit -> xinitrc -> Xclients B. kde -> xinitrc -> xinit -> Xclients C. startx -> xinitrc -> Xclients -> kde D. startx -> xinit -> xinitrc -> Xclients E. startx -> xinit -> Xclients -> xinitrc
D. startx -> xinit -> xinitrc -> Xclients
In the command foo < bar | foobar, which ONE of the following statements is correct? A. the stdout from the command foobar is saved to the file foo. B. the stdout from the command foo is saved to the file foobar. C. the command foobar receives its stdin from the stderr of foo. D. the command foobar receives its stdin from the stdout of foo. E. the command bar receives its stdin from the contents of the file foobar.
D. the command foobar receives its stdin from the stdout of foo.
Which command will allow an administrator to adjust the number of mounts after which an existing filesystem will be checked by e2fsck? A. debugfs B. dumpe2fs C. mode2fs D. tune2fs E. mke2fs
D. tune2fs
Which of the following lines would you expect to see in the file /etc/protocols? A. in.tftpd: LOCAL B. tftp dgram udp wait root /usr/sbin/tcpd in.tftpd C. tftp 69/udp D. udp 17 UDP
D. udp 17 UDP
Which command is used to display user resource limits? A. uname B. limit -a C. usrlmt D. ulimit
D. ulimit
According to the File System Hierarchy Standard, the lost+found directory is used for: A. files with unknown owners B. missing device files found by/proc C. unknown binary files found by find D. unlinked files found by fsck
D. unlinked files found by fsck
Once a shell variable has been created, how can the variable be removed from the environment? A. VAR= B. set -d VAR C. set -u VAR D. unset VAR
D. unset VAR
Which option must be listed in /etc/fstab to activate user quotas automatically? A. quota B. user C. quotaon D. usrquota
D. usrquota
Which of the following commands will write a message to the terminals of all logged in users? A. bcast B. mesg C. print D. wall E. yell
D. wall
Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow? A. * B. - C. s D. x
D. x
Which of the following commands will print the current video settings to stdout in XF86Config "Modeline" format? A. xinfo -mode B. xset -info C. xf86config -list D. xvidtune -show
D. xvidtune -show
In the vi editor, which of the following commands will copy the current line into the vi buffer? A. c B. cc C. 1c D. yy E. 1y
D. yy
Some loadable kernel modules accept options at load time. This can be used to set interrupt or IO addresses, for example. The place to set these options is? A. /etc/conf.modules B. /etc/lilo.conf C. /boot/System.map D. /etc/sysconfig E. /boot/module-info
E. /boot/module-info
Which crontab entry could be used to set the system time at regular intervals? A. 1 0 * * * date $d $t $24 B. 1 0 * * * settime $d $t $24 C. 1 0 * * * date<ntp1.digex.net D. 1 0 * * * /usr/sbin/runcron date <ntp1.digex.net E. 1 0 * * * /usr/sbin/ntpdate ntp1.digex.net > /dev/null 2>1
E. 1 0 * * * /usr/sbin/ntpdate ntp1.digex.net > /dev/null 2>1
Which crontab entry could be used to set the system time at regular intervals? A. 10 * * * date $d$t$24 B. 10 * * * settime $d$t$24 C. 10 * * * date<ntpl.digex.net D. 10 * * * /usr/sbin/runcron date <ntpl.digex.net E. 10 * * * /usr/sbin/ntpdate ntp1.digex.net> /dev/null2>&1
E. 10 * * * /usr/sbin/ntpdate ntp1.digex.net> /dev/null2>&1
The lspci command can display information about devices except the following: A. Card bus speed (e.g. 66Mhz) B. Card IRQ settings C. Card vendor identification D. Card AGP rate (e.g. 1x, 2x, 4x) E. Card Ethernet MAC address
E. Card Ethernet MAC address
To disable telnet service on a system, which action should you take? A. Put NONE in /etc/telnet.allow B. Remove the appropriate telnet init script. C. Put a line `ALL:ALL' in /etc/hosts.deny D. Comment the telnet entry in /etc/inittab E. Comment the telnet entry in /etc/inetd.conf
E. Comment the telnet entry in /etc/inetd.conf
What is the purpose of the iconv command? A. It converts bitmap images from one format to another such as PNG to JPEG. B. It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS). C. It displays additional meta information from icon files ending in .ico. D. It changes the mode of an inode in the ext4 file system. E. It converts files from one character encoding to another.
E. It converts files from one character encoding to another.
What would the following line accomplish if run as root? chown -R bert /home/bert/* A. Nothing, this command is invalid. B. It would revoke bert's ownership of all files in /home/bert to bert. C. It would change user ownership of all files in /home/bert to bert. D. It would set the group ownership of the directory /home/bert to bert E. It would set ownership of all files and subdirectories in /home/bert to bert
E. It would set ownership of all files and subdirectories in /home/bert to bert
What can the tee command be used for? A. Print the contents of a file in reverse order B. Use the output of one command as arguments to another C. Add line numbers to the output of a command D. Pipe the output of one command into the input of another E. Send a command's output to stdout and a to file at the same time
E. Send a command's output to stdout and a to file at the same time
The directory /usr/share/doc/ contains: A. HTML versions of man pages B. Man pages for installed packages C. Programs for reading documentation D. User-created documentation about the system E. Supplemental information about installed packages
E. Supplemental information about installed packages
What is the disadvantage of using the command kill -9 ? A. A core dump file will be created. B. It affects the entire process group. C. It makes excessive use of system resources. D. The action can be blocked by buggy or malicious processes. E. The affected process is unable to clean up before exiting.
E. The affected process is unable to clean up before exiting.
You are trying to make a hard link to an ordinary file but ln returns an error. Which of the following could cause this? A. The source file is hidden. B. The source file is readonly. C. The source file is a shell script. D. You do not own the source file. E. The source and the target are on different filesystems.
E. The source and the target are on different filesystems.
You have just upgraded your PC to a 60 gigabyte IDE drive. While partitioning the drive, you notice that only 32 gigabytes are available. Which of the following will most likely allow you to use the entire drive? A. Create two smaller partitions of 30 gigabytes each. B. Set the PC BIOS to use LBA mode. C. Create a partition that resides entirely below the first 1024 cylinders. D. Use GRUB or the latest version of LILO as a bootloader. E. Upgrade the PC BIOS to the latest version available.
E. Upgrade the PC BIOS to the latest version available.
Which shell built-in command can be used to create a shortcut or pseudonym for a longer command? Assume a modern bourne-like shell, such as bash. A. shortcut B. ln C. sudo D. link E. alias
E. alias
What command would help you identify the I/O address range being used by the network card? A. cat/proc/modules B. cat/proc/devices C. cat/proc/meminfo D. cat/io/dma E. cat/proc/ioports
E. cat/proc/ioports
You want to change the aging information in the /etc/shadow file. What is the best utility to use to do this? A. vi B. emacs C. usermod D. modinfo E. chage
E. chage
Which utility is used to create the modules.dep file that is required by modprobe? A. ksyms B. makemod C. makedep D. lsmod E. depmod
E. depmod
How do you get a list of files that have been installed from a dpkg package? A. dpkg -l pkgname B. dpkg -C pkgname C. dpkg -s pkgname D. dpkg -S pkgname E. dpkg -L pkgname
E. dpkg -L pkgname
What command will uninstall a package but leave its configuration files in case a package is re- installed? A. none, no command will do this B. dpkg -s pkgname C. dpkg -L pkgname D. dpkg -P pkgname E. dpkg -r pkgname
E. dpkg -r pkgname
What is the name of the primary configuration file for Apache? A. srm.cfg B. httpd.cfg C. access.cfg D. apache.conf E. httpd.conf
E. httpd.conf
Which of the following commands is equivalent to kill 1234? A. kill -1 1234 or kill -s SIGHUP 1234 B. kill -2 1234 or kill -s SIGINT 1234 C. kill -3 1234 or kill -s SIGQUIT 1234 D. kill -9 1234 or kill -s SIGKILL 1234 E. kill -15 1234 or kill -s SIGTERM 1234
E. kill -15 1234 or kill -s SIGTERM 1234
While performing a security audit, you discover that a machine is accepting connections on TCP port 184, but it is not obvious which process has the port open. Which of the following programs would you use to find out? A. traceroute B. strace C. debug D. nessus E. lsof
E. lsof
Which of the following is NOT a Mail Transport Agent? A. exim B. postfix C. sendmail D. qmail E. mail
E. mail
Which of the following is not a valid make command during a kernel recompile? A. make dep B. make clean C. make xconfig D. make modules E. make gzlilo
E. make gzlilo
QUESTION 181 Bob accidentally created the subdirectory \bobsdir in his home directory. He tried to remove the subdirectory with the command rmdir \bobsfile only to receive the error, "No such file or directory." Which command will remove the directory? A. rmdir 'bob/\bobsdir' B. rmdir "bob/\bobsdir" C. rmdir ~bob/ 'bobsdir' D. rmdir bob/\bobsdir E. rmdir ~bob/\\bobsdir
E. rmdir ~bob/\\bobsdir
You installed a beta rpm package, but are experiencing some problems with it. How can you remove this package? A. rpm -qe rpmname B. rpm -V --remove rpmname C. rpm -r rpmname D. rpm -d rpmname E. rpm -ev rpmname
E. rpm -ev rpmname
Which command will list all the files installed from the RPM package file named, vorbis-tools- 1.1.i386. rpm? A. rpm -qf vorbis-tools-1.1.i386.rpm B. rpm- F vorbis-tools-1.1.i386.rpm C. rpm -pf vorbis-tools-1.1.i386.rpm D. rpm -ql vorbis-tools-1.1.i386.rpm E. rpm -qlp vorbis-tools-1.1.i386.rpm
E. rpm -qlp vorbis-tools-1.1.i386.rpm
Which of the following commands will NOT execute the bash script /usr/local/bin/runme.sh? A. source /usr/local/bin/runme.sh B. . /usr/local/bin/runme.sh C. /bin/bash /usr/local/bin/runme.sh D. /usr/local/bin/runme.sh E. run /usr/local/bin/runme.sh
E. run /usr/local/bin/runme.sh
Which file system should never be backed up, and therefore never have to be restored? A. ufs B. usr C. tmp D. home E. swap
E. swap
An administrator suspects that a gateway machine on the network has failed but they are unsure which machine. Which of the following commands will help locate the problem? A. ps B. netstat C. nslookup D. ifconfig E. traceroute
E. traceroute
If you suspect that a gateway machine on your network has failed but you are unsure which machine, which command will help locate the problem? A. ps B. netstat C. nsloopup D. ifconfig E. traceroute
E. traceroute
Which command manipulates the TTL (Time to Live) field in the IP protocol in order to get ICMP responses from gateways along the path to a host? A. dig B. host C. ping D. tcpdump E. traceroute
E. traceroute
Which of the following commands will help identify a broken router between the local and the remote machine? A. ps B. netstat C. nslookup D. ifconfig E. traceroute
E. traceroute
Which of the following programs can be used to determine the routing path to a given destination? A. dig B. netstat C. ping D. route E. traceroute
E. traceroute
Which of the following commands can remove a user from a group? A. grouprm B. groupmod C. passwd D. usergroups E. usermod
E. usermod