Linux LPIC 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What sequence of keystrokes will stop a job running in the foreground?

<Ctrl>z

A ____ contains the names of other files and/or directories.

Directory

In Linux, the ipconfig command is used to examine current IP address settings.

False

In an enterprise network, a "best practice" is to assign static IP addresses to all computers.

False

Linux is case sensitive

False

Maintaining system security on Linux is neither difficult nor time consuming.

False

Passwords should be easy to guess and hard to remember.

False

Structured Query Language (SQL) can be interpreted and executed by several different Linux shells.

False

The job command and the ps command both return the same information.

False

The nohup command can only be used with processes that take a short time to complete and must be executed at a very high priority.

False

The priority or importance of a job is defined by its nice number. The higher the nice number is, the more important a job is and the more resources it will take without sharing them.

False

The yellowdog updater, modified (yum), Red Hat package manager (rpm), and apt-get are package managers. By default, all three are included with all current distributions of Linux.

False

To Keep things simple, Linux only provides a single method to solve a given problem.

False

Which of the following is true of redirection?

It can redirect standard input, standard output and standard error to the same file.

A Daemon is a server process that usually is initialized at startup and runs continuously in the background.

True

The chmod (Change Mode) command is used to set or alter the read, write, and execute permissions for a user, group, or others that are associated with a file or directory, or a group of files or directories.

True

The command ls-al will give you a long list of the contents of the current working directory that includes hidden files and attributes for each file and directory.

True

The dd utility can make a low level copy of a filesystem

True

The execute permission on a script file must be enabled before the script will run.

True

The netstat command can be used to look for network activity or open ports on a computer.

True

The purpose of an IP routing table is to obtain the IP address of the next link from a destination IP address.

True

The while loop ends with the done command.

True

Transmission Control Protocol (TCP) Port 80 is used as a listener for HyperText Transport Protocol (HTTP) traffic.

True

An inode contains all of the following EXCEPT _____.

file name

The command used to rename a file in Linux is ____.

mv

Which file testing operator in the bash shell tests whether the file exists and is a regular file?

-f

Which of the following settings is best practice for permissions on the /etc/passwd and /etc/shadow files?

-rw-r--r-- /etc/passwd -rw------- /etc/shadow

Undelivered remote mail would be stored in the ____ directory.

/var/spool/mqueue

A good description of a regular express is ____?

An output of the general regular expression parser (grep)

Which of the following statements is NOT true concerning links?

Both hard links and soft links can be created between files on different low level file systems.

The procedure used to create a process is called _____.

Forking

When running the Bourne Again Shell (BASH) the ___environment variable contains the path information for the current session.

PATH

Which of the following terms refers to a unique 48 bit binary address, expressed in hexadecimal, that is assigned to each Network Interface Card during its manufacturing process?

Physical Address Hardware Address Media Access Control (MAC) address All of the above <---

The kill command is used to ______

Sends a signal to a process to terminate that process

What is the best way to prevent a single user from consuming all available disk space on a Linux filesystem?

Set a size limit of 100GBytes on the total amount of storage that can be used by a single user. Warn users when they are approaching the limit, and prevent them from saving additional files if they exceed it.

Which of the following is not a pull mail server?

Simple Mail Transfer Protocol SMTP

Which of the following commands will display the last ten lines of a file by default?

Tail

Why are Set User ID (SUID) and Set Group ID (SGID) programs potentially risky?

The SUID or SGID bits tell Linux to run the program as the user or group that owns the file. If the owner or group is root, then a user could potentially run the program as root.

In the following directory listing, which attribute contains the access permissions for owner, group, and others?

The first field (-rwxr--r--)

Which of the following should not be used as passwords?

The names of Pets Favorite books A dictionary word All of the above <---

A Variable is a placeholder in a script for a value that will be determined when the script runs.

True

A shell is a command interpreter

True

A super server is a program that listens for network connections on behalf of another program. When a connection is initiated, it hands off control of that connection to the intended server.

True

An IPv4 subnet mask is a 32 bit binary number, commonly expressed as decimal, that is used to differentiate the network part from the host part of an IP address.

True

Every unique file on a Unix partition has a unique inode.

True

Grep searches for files that contain a specific string and returns the name of the file and if the file is a text file a line of context for the string.

True

In a UNIX system, everything is a file; if something is not a file, it is a process.

True

One of the advantages of shadow passwords is that they support password aging and account expiration features.

True

The "updated" (update database) command is used to update the locate database so that it contains the most current information on the location of files and directories.

True

Which of the following SQL commands could update an existing record in a table?

UPDATE mytable SET STREET_ADDRESS='404 Error Message Lane', CITY='Internet City' Where LastName='Hacker AND FirstName='Ima'

How would you enable routing in a Linux system?

You would edit the appropriate configuration file to enable IP forwarding.

In TCP/IP over Ethernet networks, the term "host" refers to any device that has _____.

a hardware address an IP address a routing table All of the Above: <---

Using the default Fedora shell, which of the following commands would display the path to your home directory?

echo $HOME

The command used to start a suspended job in the foreground is _____.

fg

A process by which a fully qualified domain name is resolved to an IP address using the Domain Name System (DNS) is known as ____.

forward lookup

What command would be used to check the gpg signature on a downloaded source file?

gpg

Which command can be used to stop Linux?

halt

In shell scripting, the ___ command uses conditional expressions to take one of two actions.

if

Which of the following would be the most likely tool to use when searching for unnecessary active network connections?

netstat -ap, because it would display all of the open ports on the system, as well as their associated process IDs.

A process by which an IP address is resolved to a fully qualified domain name using the Domain Name System (DNS) is known as ____.

reverse lookup


Set pelajaran terkait

Renal and Acid Base Balance exam

View Set

Nurs330 Pharmacology ch.40 Drugs for Asthma and Other Pulmonary Disorders

View Set

Nutrition Exam 1 Past Quiz Questions

View Set