Linux HW3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which filename extension indicates a tarball?

.tar.xz

Files thet have been compressed using the xz flity typically have the _____ extension.

.xz

Which file stores the Apache configuration in Fedora?

/etc/httpd/conf/httpd.conf

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

What is the name of the file that contains a listing of all users on the system and their home directories?

/etc/passwd

What directory are you placed in when you log in as the anonymous user to an Ubuntu FTP server?

/srv/ftp

Most log files on the system are found in which directory?

/var/log

Which of the following port numbers is associated with SSH?

22

Which of the following are stand-alone daemons? (Choose all that apply.)

Apache (httpd) DNS (named)

Which DNS resource record is an alias to other records?

CNAME

What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.)

DNS /etc/hosts

The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface.

False

Which of the following commands should be run following the installation of a shared library to update the /ete/ld.so.conf and /ete/Id.so.cache files?

Idconfig

Which of the following commands can be used to remove the test DPM package, including any test configuration files?

apt purge test

What is the term used to describe a user providing a user name and password to log in to a system?

authentication

Which command can be used to create an image backup of a partition?

dd

Which of the following commands can be used to search for packages that contain the word "oobla" on RPM software repositories?

dnf search oobla

Which command can be used to list containers that are currently running on the operating system only?

docker ps

When referring to the /etc/rsyslog.conf file, _____ specifies information from a certain area of the system, whereas _____ is the level of importance of that information.

facility, priority

What command can you use to view journald log entries on a system that uses Systemd?

journalctl

Which command within the command-line FT utility can be used to change the current directory on the local computer?

lcd

What is the name of the utility used to rotate log files?

logrotate

The IP address of 127.0.0.1 is also referred to as the _____.

loopback address

Which of the following utilities can be used to view and configure a network renderer? (Choose all that apply.)

networkctl

Which command can be used to temporarily alter the primary group associated with a given user?

newgrp

Which command can you use to synchronize ntpd with an NTP time source?

ntpq

Which command would you use to unlock a user account?

passwd -u username

Which of the following terms refers to a single copy of a web app that is run within a Kubernetes cluster?

pod

Which command can be used to connect to a remote Windows share called data on the server called fileserver?

smbclient //fileserver/data

Which of the following commands creates an archive?

tar -zcvf /dev/st0 *

When a printer is disabled,_____.

the print queue accepts jobs into the print queue and holds them there until the printer is enabled again

Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?

/etc/login.defs

Which file stores the IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the network interface?

/etc/resolv.conf

What must you do to transform your computer into a DNS server? (Choose all that apply.)

Create zone files Run the name daemon (named) Create resource records for DNS lookups.

Which of the following must you perform to share a directory using NFS? (Choose all that apply.)

Edit the /etc/exports file Run the exportfs -a command. Start or restart the NFS daemons.

DHCP clients send a DHCPREQUEST packet when they require a new IP configuration.

False

To install a new program from RPM software repositories on the Internet, you can use the dnf get programname command.

False

UIDs and GIDs are unique to the system and, once used, can never be reused.

False

You can purchase object storage from a cloud provider to provide persistent filesystem-based storage.

False

Which Windows program is often used to connect to a Linux server via SSH?

Putty

Which of the following commands extracts an archive?

cpio —vicdu —I archive.epio

Which command will list the Flatpak applications available on a remote Flatpak repository?

flatpak remote-ls

When compiling source code into a binary program, which command does the compiling of the program itself?

make

Which of the following commands can be used to list the files contained within an installed RPM package?

rpm -ql packagename

Which commands can be used to display TCP/IP connections on your Linux system? (Choose all that apply.)

ss -t netstat -t

You want to generate SSH keys for your user account and copy them to a remote computer to simplify future SSH authentication. What two commands can you use to perform these actions? (Choose two answers.)

ssh-keygen ssh-copy-id

Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?

testparm

Which command can you use to lock a user account?

usermod -L username

Which option to the dpkg command can be used to list the files that comprise a package?

-L

Which option to the rpm command can be used to remove a package from the system?

-c

Which file would you modify to permanently change the IP configuration of a network interface on a modern Fedora Workstation system?

/etc/NetworkManager/system-connections/name.nmconnection

You have created a full backup and four incremental backups using dump. In which order must you restore these backups based on their dump level?

0, 1, 2, 3, 4

You use Ipstat and determine that a user named User1 has placed two large print jobs in the queue for Printerl that have yet to start printing. They have print job IDs of Printer 1-17 and Printer 1-21, respectively. Which command would you use to remove these two jobs from the print queue?

cancel Printer1-17 Printer1-21

Before a computer can use a router, with what configuration information must it be provided?

default gateway

Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)

lp -d Printer1 file lp file

The daemons associated with network services listen for network traffic associated with a particular_____.

port

The process of sending print jobs from the print queue to the printer is called

printing

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.)

resolvectl query hostname dig hostname nslookup hostname host hostname

Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)

route ip

Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.)

the CREATE DATABASE statement within the PostgreSQL utility. the createdb command

When a printer is rejecting requests,_____.

the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

Which command is used to delete a user account?

userdel username

Cloud providers use the PaaS delivery model to host web apps using containers for scalability.

True

Docker Hub is an example of a container registry.

True

Most source code is typically available on the Internet in tarball format or as a git repository.

True

Network daemons are started on demand using inetd, xinetd, or Systemd socket units.

True

SSH encrypts all traffic that passes across the network, whereas telnet does not.

True

Stratum 1 NTP servers do not obtain time information from other NTP servers.

True

The -9 option to the gzip command results in a higher compression ratio.

True

The Debian Package Manager (DPM) is the default package manager used by Ubuntu Linux.

True

The line that configures the host name for the computer at boot time can be found in /etc/hostname.

True

To create a container using the docker build command, you must first create a Dockerfile.

True

You can clear a log file simply by redirecting nothing into it.

True

You can lock a user account by changing the default login shell to an invalid shell in /ete/passwd.

True

Which of the following can be used to provide graphical remote administration? (Choose all that apply.)

VNC ssh -X

Along with a listing of user accounts, the /etc/passwd file contains information on account expiry.

False

AppImage applications have a app extension and can be executed directly on a system.

False

Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?

Restart the DHCP daemon.

You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do?

Run the newaliases command.

Which of the following are package managers that can be used to install sandboxed applications? (Choose all that apply.)

Snap Flatpak


Set pelajaran terkait

Digital Forensics exam review ch 4 and 5

View Set

13. NVPRC - Health Insurance Providers

View Set

Chp 6 - Business Strategy: Differentiation, Cost Leadership

View Set

Quiz 1: Vocabulary and Pronunciation

View Set

Chapter 12: Disorders of the Immune Response

View Set

Chapter 19 Cost-Volume-Profit Analysis: Additional Issues

View Set

Module 4 NUR 114 (Ch.74 IGGY), chapter 73 Medsurg Transgender, Chapter 72: Care of Patients with Male Reproductive Problems, Adult Health Exam 4

View Set

Chapter 9 Using a Relational Database

View Set