Linux Test 1,2,3
The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?
$PS1
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.
(h0,0)
Under what directory is the Linux kernel stored?
/boot
In Fedora 20, where are user configured settings for Xorg stored?
/etc/X11/xorg.conf.d/
Under the root directory in Linux, which directory contains system commands and utilities?
/usr
At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?
0
On Linux, the root user always has a UID of what number?
0
What number represents the stdin file descriptor?
0
reverse lookup
A DNS name resolution request whereby an IP address is resolved to a FQDN.
daemon
A Linux system process that provides a system service.
disk mirroring
A RAID configuration consisting of two identical hard disks to which identical data are written in parallel, thus ensuring fault tolerance. Also known as RAID 1.
disk striping
A RAID configuration in which a single file is divided into sections, which are then written to different hard disks concurrently to speed up access time; this type of RAID is not fault tolerant. Also known as RAID 0.
Internet SCSI
A SCSI technology that transfers data via TCP/IP networks.
target unit
A Systemd term that is used to describe the number and type of daemons running on a Linux system. It is functionally equivalent to the UNIX SysV term runlevel .
runlevel
A UNIX SysV term that defines a certain type and number of daemons on a Linux system.
UNIX Sys V
A UNIX standard that is used to provide the structure of the system initialization process on Linux systems.
checksum
A calculated value that is unique to a file's size and contents.
lsof command
A command that lists the files that are currently being viewed or modified by software programs and users.
gunzip command
A command used to decompress files compressed by the gzip command.
zmore command
A command used to view the contents of an archive created with compress or gzip to Standard Output in a page-by-page fashion.
tripwire
A common IDS for Linux that monitors files and directories.
True
A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator.
NIS client
A computer in an NIS domain that receives its configuration from an NIS master server or NIS slave server.
firewall daemon (firewalld)
A daemon used on some Linux systems to provide for easier configuration of netfilter via the ipchains command.
terminator
A device used to terminate an electrical conduction medium to absorb the transmitted signal and prevent signal bounce.
Standard Output (stdout)
A file descriptor that represents the desired output from a command.
cron table
A file specifying tasks to be run by the cron daemon
printer class
A group of CUPS printers that are treated as a single unit for the purposes of printing and management.
package group
A group of RPM packages that are commonly installed to provide a specific function on the system.
Zettabyte File System (ZFS)
A high-performance filesystem and volume management software that is often used to create volumes from multiple storage devices on Linux and UNIX systems.
baseline
A measure of normal system activity.
classless interdomain routing (CIDR) notation
A notation that is often used to represent an IP address and its subnet mask.
parent process
A process that has started other processes.
child process
A process that was started by another process.
Intrusion Detection System (IDS)
A program that can be used to detect unauthorized access to a Linux system.
NetBIOS
A protocol used by Windows computers that adds a unique 15-character name to file- and printer-sharing traffic.
upstart
A recent version of the UNIX SysV system initialization process used on modern Linux distributions.
Systemd
A relatively new software framework used on Linux systems that provides a system initialization process and system management functions.
True
A route table is a list of TCP/IP networks that is stored in system memory.
SSH agent
A software program that can be used to automatically authenticate users using their private key.
decision construct
A special construct used in a shell script to alter the flow of the program based on the outcome of a command or contents of a variable. Common decision constructs include if, case, &&, and ||.
1024
By default, the shell on a Linux system limits the number of filehandles a program can have open to what value?
True
By default, the smb.conf file shares all printers and home directories for recognized Windows users.
True
CUPS contains versions of the lpr, lpc, lpq, and lprm commands.
True
Class D addresses are used for multicasting.
The software whose source code is not freely available from the original author; Windows 98 is an example.
Closed Source Software
What installation media source is the most common source for Linux packages?
DVD
target ID
Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?
8-bit
Each octet in an IP address represents a binary number consisting of how many bits / bytes?
True
Each process can start an unlimited number of other processes.
What software type is software that is distributed free of charge, but the source code is not available?
Freeware
The way in which a hard disk or SSD partition is formatted to allow data to reside on the physical media.
GUID Partition Table
False
Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully.
@server
How can you specify the intended DNS server to query with the dig command?
three
How many DNS servers can be configured in the /etc/resolv.conf file?
64
How many different kill signals can be sent by the kill command to a given process?
every ten minutes
How often are sar commands scheduled to run on both Fedora 20 and Ubuntu Server 14.04?
:
IPv6 IP addresses are delimited by what character below?
segmentation fault
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
SIGHUP
If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below:
TCP wrapper
If network services that are started by inetd or xinetd are in use, what can be used to provide extra security?
6
If no level of compression is specified, the gzip command assumes what compression level?
False
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
True
If the / filesystem becomes corrupted, the system is unstable and must be turned off.
True
If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.
/etc/X11/xorg.conf.d/
In Fedora 20, where are user configured settings for Xorg stored?
2
In Linux, what runlevel is also known as the multiuser mode?
7
In a SCSI chain the highest priority SCSI device is given what SCSI ID?
sixth
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?
elif,else
In an if construct, what statements are optional?
system-config-keyboard
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?
tzselect
In order to change the time zone of a system after installation, what command must be used?
-l
In order to display a list of at job IDs, what option can be specified to the at command?
apt-get
In order to download DPM packages, what command should be used below?
zfs get all
In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?
/var/lib/dhcpd/dhcpd.leases,/var/lib/dhcpd/dhcpd6.leases
In order to look up IPv4 and IPv6 DHCP leases, what two files should be viewed?
lp
In order to send a print job to a printer using CUPS, what command must be used?
1024
In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?
(hd0,0)
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.
image=
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?
True
Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond
forking
The act of creating a new BASH shell child process from a parent BASH shell process.
authentication
The act of verifying a user's identity by comparing a user name and password to a system database (/etc/passwd and /etc/shadow)
time slice
The amount of time a process is given on a CPU in a multiprocessing operating system.
chfn command
The command used to change the GECOS for a user.
groupmod command
The command used to modify the name or GID of a group on the system.
cancel command
The command used to remove print jobs from the print queue in the CUPS print system
background command
The command used to run a foreground process in the background.
X server
The component of X Windows that draws graphics to windows on the terminal screen.
X client
The component of X Windows that requests graphics to be drawn from the X server and displays them on the terminal screen.
CUPS daemon
The daemon responsible for printing in the CUPS printing system.
echo $PS1
The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?
mutter window manager
The default window manager for the GNOME Desktop Environment in Fedora 13
jitter
The difference between time measurements from several different NTP servers.
offset
The difference in time between two computers that use the NTP protocol.
overclocked
Term used to describe a CPU that runs faster than the clock speed for which it has been rated.
fault tolerant
Term used to describe a device that exhibits a minimum of downtime in the event of a failure.
True
The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length.
40-50
The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent?
4 GB
The GUI components and related software take up how much space on a typical Linux installation?
kwin,Qt toolkit
The K desktop environment utilizes what window manager and toolkit below?
rsyslog.conf,rsyslog.d
The System Log Daemon rsyslogd loads what configuration file under /etc, as well as any files within which directory under /etc?
514
The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?
True
The Very Secure FTP daemon is a stand-alone daemon.
zpool status,zpool iostat
The state and performance of a RAID-Z volume can be viewed using what two commands?
False
To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.
/boot
Under what directory is the Linux kernel stored?
!
What FTP command runs a shell on the local computer?
pg_dump
What PostgreSQL command-line utility backs up PostgreSQL database settings?
SCSI-3 Ultra2 Wide
What SCSI type supports speeds of up to 80 MB/second?
alert
What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?
parent process ID
What can be used on a Linux system to trace the lineage of each child process?
#!
What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?
colon
What character is used to delimit most Linux configuration files?
&
What character, when appended to a command, causes the command to be run in the background?
lilo -U
What command below can be used to uninstall the LILO bootloader from an active partition?
pstree
What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?
ifconfig
What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?
ulimit
What command can be used to change the maximum number of file handles that can be used by a program?
grubby
What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?
zcat
What command can be used to display the contents of a file that was compressed with the compress utility?
tr
What command can be used to replace characters in a file sent via Standard Input?
traceroute
What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?
hwclock
What command can be used to view and modify the date and time within the BIOS?
mdadm
What command is used to manage a software RAID configuration after installation?
make
What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?
/dev/nht0
What device file below indicates the first ATAPI IDE tape device (nonrewinding)?
DirectoryIndex index.html
What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document?
/etc/profile
What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?
ssh_host_dsa_key. pub
What file contains the DSA public key in the /etc/ssh directory?
/etc/systemd/system/default.target
What file controls the default runlevel when using Systemd?
ioports
What file in the /proc directory contains a list of memory address ranges reserved for device use?
/proc/cpuinfo
What file in the /proc directory contains information about a computer's CPU?
modules
What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?
mput filename
What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.
256-bit
What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size?
60%-70%
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?
50
What is the default print job priority for all print jobs created by the lp command?
graphical.target
What is the default target on a system with a GUI installed?
15
What is the maximum number of characters that can be used in a NetBIOS name?
Hard disks
What is the most common hardware component to fail on a Linux system?
255.255.0.0
What is the subnet mask for a Class B IP address?
255.255.255.0
What is the subnet mask for a Class C IP address?
ZFS volume
What is the term for a ZFS managed filesystem that is created from ZFS pools?
quiet
What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?
SIGINT,2
What kill signal and number can be used to send an interrupt signal to a process, and is the same as using the Ctrl+c combination to kill a running process?
SIGHUP
What kill signal stops a process, then restarts it with the same PID?
secure
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
127
What number indicates the lowest kernel priority (PRI) of a process possible?
2
What number represents the stderr file descriptor?
0
What number represents the stdin file descriptor?
!
What operator below is known as the NOT operator?
-i
What option can be added to the netstat command in order to display network statistics?
-q
What option can be added to the rpm command in order to query packages?
-V
What option can be specified with the rpm command to identify any missing files in a package or package dependency?
-X
What option can be used with ssh to enable tunneling of X Windows information?
-e
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?
-P
What option for the iptables command can be used to specify the default policy for a certain chain type?
-d
What option should be used in conjunction with the lp command in order to specify the destination printer name?
-e
What option, when added to the crontab command, opens the vi editor with a user's cron table?
read and execute
What permissions are required to execute a shell script in a manner similar to any other executable program on the system?
UDP 123
What port is used by the Network Time Protocol (NTP) for communication?
panic
What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?
0-1023
What range of ports is considered to be "well-known"?
Stage1
What stage of the GRUB boot loader typically resides on the MBR / GPT?
iSCSI initiator,iSCSI target
What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk?
Secure Shell (SSH)
What tool below was designed as a secure remote access utility that encrypts information that passes across the network?
bye,quit
What two FTP commands below can be used to close the ftp utility?
0.0.0.0,255.255.255.255
What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?
ip route,route
What two commands below can be used to manipulate the routing table?
kill,killall
What two commands below can be used to stop a process, either by PID number or process name?
bzmore,bzless
What two commands below can be used to view the contents of a bzip2-compressed file page by page?
free,vmstat
What two commands below can display memory information and swap usage?
inetd,xinetd
What two daemons can be used to start and manage connections for smaller network daemons such as telnet and rlogin?
/dev/st0,/dev/nst0
What two device files below represent the first SCSI tape device, rewinding and non-rewinding?
/etc/profile,/etc/bashrc
What two files below are the first two BASH environment files to be executed?
/etc/cups/cupsd.conf,/etc/cups/printers.conf
What two files contain settings for the CUPS daemon and the configuration information for each printer installed on a system, respectively?
-sport,-dport
What two iptables options are used to specify the source and destination ports for a rule?
wtmp,lastlog
What two log files below will show a history of all login sessions, or a list of users and their last login time, depending on which one is viewed?
init,systemd
What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes?
A,AAAA
What two resource record types map FQDNs to IPv4 and IPv6 addresses respectively?
compiz,beryl
What two window managers is the Compiz Fusion window manager based upon?
25
What well-known TCP port is utilized by the SMTP service?
False
When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory.
%
When killing a background job with the kill command, the background job ID must be prefixed by what character below?
+
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?
-f
When used with the compress command, what option below can be used to compress symbolic links?
-c
When used with the uncompress command, what option displays the contents of the compress file to Standard Output?
.Z
When using the compress utility, each file specified for compression is renamed with what extension?
The process is high priority.
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?
HELO
When working with Sendmail, what command can be used to test SMTP support?
True
When you print to a printer class, the print job is send to the first available printer in the printer class.
/var/log/samba
Where are the log files for the Samba daemon located?
curl
Which command below can be used at a BASH command prompt to obtain a web page?
service
Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?
wc
Which command can be used to count the number lines, words, and characters in a file?
nmap
Which command can be used to see what network services are running on your network?
lpadmin
Which command should be used to restrict access to printers?
SIGQUIT
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?
-q
Which sar command option is used to display statistics for the processor queue?
bit rot,misdirected writes
Which two problems below are typically seen on large systems that write large amounts of data to a non-ZFS filesystem?
In Linux, the core component of the GUI is known as:
X Windows
The component of X Windows that requests graphics to be drawn from the X server and displays them on the terminal screen.
X client
The component of X Windows that draws graphics to windows on the terminal screen.
X server
False
You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.
/var/log/boot.log
You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?
True
You can use a small bootable Linux kernel (such as on a LiveCD) to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers.
True
You can use the sed command to remove unwanted lines of text.
False
Zombie processes are also known as defunct processes.
The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?
awk
The TCP/IP communication destined for all computers on a network.
broadcast
A command used to decompress files compressed by the bzip2 command
bunzip2
A calculated value that is unique to a file's size and contents.
checksum
The command used to change the GECOS for a user.
chfn
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?
chkconfig
A system process that is not associated with a terminal.
daemon process
A list of all exported environment and user-defined variables in a shell can be viewed with what command below?
env
The area of the system from which information is gathered when logging system events.
facility
The act of creating a new BASH shell child process from a parent BASH shell process.
forking
What is the default target on a system with a GUI installed?
graphical.target
What yum command below can display a list of package group names?
grouplist
The command used to modify the name or GID of a group on the system.
groupmod
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?
grub-mkconfig
A command used to decompress files compressed by the gzip command.
gunzip
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?
image=
Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?
live media image
Which command should be used to restrict access to printers?
lpadmin
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?
newgrp
What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?
quiet
A command used to extract archives created with the dump command.
restore
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
secure
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?
system-config-keyboard
To display a text file in reverse order, what command should be used?
tac
What command can be used to display the last five lines of a text file?
tail-5
The amount of time a process is given on a CPU in a multiprocessing operating system.
time slice
What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?
traceroute
The process of ignoring a kill signal.
trapping
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?
xvidtune
A command used to view the contents of an archive created with compress or gzip to Standard Output in a page-by-page fashion
zmore
What metacharacter can be used to refer to the current user's home directory?
~
8,24
A Class A network uses how many bits for the network ID, and how many bits for the host ID?
RAID-Z
A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:
nmap command
A command that can be used to scan ports on network computers.
bunzip2 command
A command used to decompress files compressed by the bzip2 command
restore command
A command used to extract archives created with the dump command.
Standard Error (stderr)
A file descriptor that represents any error messages generated by a command.
Standard Input (stdin)
A file descriptor that represents information input to a command during execution.
DNS cache file
A file that contains the IP addresses of top-level DNS servers.
tarball
A gzip-compressed tar archive.
octet
A portion of an IP address that represents eight binary bits.
Internet Protocol (IP) address
A series of four 8-bit numbers that represent a computer on a network.
protocol
A set of rules of communication used between computers on a network.
loop construct
A special construct used in a shell script to execute commands repetitively. Common decision constructs include for and while.
spanning
A type of RAID level 0 that allows two or more devices to be represented as a single large volume.
Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?
Artistic
The GNU General Public License (GPL) was developed by which organization?
Free Software Foundation (FSF)
xwininfo
If X Windows fails to start, what command can be used to troubleshoot the issue?
The process is currently running on the processor.
In the process state column, what does an "R" indicate?
chroot
Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment.
-u,-i
Select the options to use with the cpio utility to cause the utility to extract files from an archive, and overwrite existing files during extraction without prompting for user confirmation:
The channel that allows a certain user to log in and communicate with the kernel via a user interface
Terminal
multicast
The TCP/IP communication destined for a certain group of computers.
broadcast
The TCP/IP communication destined for all computers on a network.
compression ratio
The amount of compression that occurred during compression algorithm.
facility
The area of the system from which information is gathered when logging system events.
at command
The command used to schedule commands and tasks to run at a preset time in the future.
file handles
The connections that a program makes to files on a filesystem.
hashpling
The first line in a shell script, which defines the shell that will be used to interpret the commands in the script file.
primary group
The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user.
False
The minimum height of a rackmount server is 2 inches; this is called a 1U server.
IP version 4 (IPv4)
The most common version of IP used on the Internet. It uses a 32-bit addressing scheme organized into different classes
link local
The portion of an IPv6 address that refers to a unique computer. It is analogous to the host portion of an IPv4 address.
redirection
The process of changing the default locations of Standard Input, Standard Output, and Standard Error.
tunneling
The process of embedding network packets within other network packets.
system backup
The process whereby files are copied to an archive.
environment variables
The variables that store information commonly accessed by the system or programs executing on the system; together, these variables form the user environment.
dpkg-query
What command can be used to search for DPM package information?
ntp_query
What command can be used to see what actual time servers are being used for synchronization?
ldd
What command can be used to view what shared libraries are required by a certain program?
login.defs
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?
for
What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?
-P
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?
-F
What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?
PWD,SHELL
What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively?
ntpd,chronyd
What two NTP daemons below are commonly used on Linux systems?
RAID5,RAID6
What two RAID types below utilize disk striping with parity, providing protection against one or two drive failures respectively?
chage,chsh
What two commands below can be used to modify the password expiry information and a user's default shell?
-d,-k
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?
-z,-Z
What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?
-f,-l
What two ps options can be used to display a full list of information about each process, and a long list of information about each process?
/var/www/html
Where is the default document root directory for the Apache web server?
A variable that is altered by loop constructs to ensure that commands are not executed indefinitely.
counter variable
The numeric labels used to define command input and command output.
file descriptors
The first line in a shell script, which defines the shell that will be used to interpret the commands in the script file.
hashpling
The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user.
primary group
When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts
systemctl
spooling
the process of accepting a print job into a print queue.
Select the mode below that corresponds to setting r-x
5
What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output?
;
The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?
>
Universal Access
Assistive technologies are configured using what utility on Fedora 20 in GNOME?
True
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.
False
Performance problems are caused by hardware, not software.
False
Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.
False
SLIP is a newer technology than PPP.
turn off CPU cache memory, increase the number of memory wait states in BIOS
Segmentation faults can sometimes be fixed by performing what two tasks below?
DROP DATABASE
Select the SQL statement below that can be used to delete a database:
ping
Select the command that can be used to send a small TCP/IP packet to another IP address and await a response:
\f
Select the escape sequence that is used for a form feed:
\n
Select the escape sequence that starts a new line when used with echo:
|
Select the metacharacter that can be used to send the standard output of one command to another command as standard input:
-p
Select the option that can be used with the lpstat command to display a list of printers that are enabled:
-l
Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed:
-B
Select the option that, when used with the sar command, displays swap statistics:
wc -l,wc -c
Select the two commands below that will provide the number of lines in a file, and the number of characters in a file, respectively:
\t,\v
Select the two escape sequences that represent a horizontal tab and a vertical tab, respectively:
append=,boot=
Select the two keywords that can be used in the lilo.conf file in order to specify where LILO should be installed, and what parameters should be passed to the Linux kernel when loaded:
32,128
Select the two numbers below that represent the number of bits needed to make an IPv4 or IPv6 IP address:
metacity,mutter
Select the two window managers that have been used in GNOME:
A file descriptor that represents any error messages generated by a command.
Standard Error (stderr)
A file descriptor that represents information input to a command during execution.
Standard Input (stdin)
A file descriptor that represents the desired output from a command.
Standard Output
What option can be used in the journald configuration file to specify a file size limit to the event log?
SystemMaxUse
In Linux, what runlevel is also known as the multiuser mode?
2
What number represents the stderr file descriptor?
2
A utility that can be used to manage DPM packages using a graphical interface.
Aptitude
daemon process
A system process that is not associated with a terminal.
pwconv
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?
route table
A table of information used to indicate which networks are connected to network interfaces.
iSCSI target
A term that refers to a storage device within an iSCSI SAN.
process ID (PID)
A unique identifier assigned to every process as it begins.
User Identifier (UID)
A unique number assigned to each user account.
host name
A user-friendly name assigned to a computer.
Aptitude
A utility that can be used to manage DPM packages using a graphical interface.
counter variable
A variable that is altered by loop constructs to ensure that commands are not executed indefinitely.
lpstat
Adding the -t option to what command below will provide a list of all printers on the system and their status?
True
After a process has been started, you can change its priority by using the renice command.
Run the ldconfig command.
After downloading an installing any shared libraries, what should be done to ensure the list of shared library directories and the list of shared libraries are updated?
grub-mkconfig
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?
True
All DNS servers contain a DNS cache file.
False
Almost all hardware problems are the result of damaged hardware.
hexadecimal
An IPv6 IP address consists of 16-bit numbers in what numbering scheme?
rpm2cpio
An RPM package can be converted to a cpio archive using what command?
buffer overrun
An attack in which a network service is altered in memory
True
Any command that can be executed on the command line can also be placed inside any environment file.
RPM
Most Linux distributions make use of what package manager?
15
Most Parallel SCSI controllers are capable of supporting up to how many devices?
jabbering
Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called?
chkconfig
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?
0
On Linux, the root user always has a UID of what number?
/var/spool/at
On a Fedora based system, where are the shell environment and scheduled commands for at stored?
/var/log/secure,/var/log/auth.log
On a system that is not using Systemd, what two log files contain information related to PAM?
False
On most Linux systems, the logrotate utility is automatically scheduled to run weekly.
xvidtune
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?
When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:
Options
True
RAID level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance and allows up to two simultaneous hard disk drive failures while remaining fault tolerant.
nohup
Running background processes using what command allows you to exit your command-line shell without ending any background processes?
True
SCSI devices that act as a gateway are associated with a unique Logical Unit Number (LUN)
True
The email command is an example of a Mail User Agent (MUA).
127
The first software RAID volume on a system will use a multiple disk device file that starts with what number?
False
The killall command uses the PID to kill a process.
DHCPD daemon
The most common Linux daemon used to provide IPv4 and IPv6 addresses to other computers on the network.
GRUB
The most common boot loader used on Linux systems. It loads and executes the Linux kernel at boot time.
File Transfer Protocol (FTP)
The most common protocol used to transfer files across networks such as the Internet.
file descriptors
The numeric labels used to define command input and command output.
active partition
The partition searched for an operating system after the MBR/GPT.
zone transfer
The process of copying resource records for a zone from a master to a slave DNS server.
trapping
The process of ignoring a kill signal.
False
The secure log file contains information regarding the last user to log in to a system.
/etc/ssh/sshd_config
The sshd daemon is configured by editing what configuration file?
Berkeley Internet Name Domain (BIND)
The standard that all DNS servers and configuration files adhere to.