Unix Midterm
What command shuts the system down, kills nonessential processes, and executes a sync, waits for filesystem writes to complete, and stops the kernel?
Shutdown
What scheme allows credentials to be more complex for authentication and allows a login to multiple systems from linux to Microsoft?
Single sign-on systems (SSO)
Which Process state indicates the process is waiting for some resource?
Sleeping
Special User Accounts, also known as Pseudo-users, have their password replaced in the /etc/shadow file with a _________ so that their accounts cannot be logged in to.
Star
Which Process state indicates the process is suspended and not allowed to execute?
Stopped
DHCP permits a computer to obtain all the information needed to communicate on a given network including: (Check-all-that-Apply)
Subnet Mask IPv4 Address Default Router
What program can be utilized to allow a user specific commands to be run as a different user, without giving full access to the users account. For example, the ability to cat a file that "root" owns.
Sudo
A systems administrator can also be called the ______________, because a system administrator often has unlimited permission to alter the system as the "root" user.
Super User
Linux uses a logical directory tree to organize files into different folders.
True
Multiple virutal machines can exist on the same server.
True
The more command should not be used on binary files.
True
Internet Protocol defines two major protocols. What are the two major protocols:
UDP TCP
What is the identification number of the person that created or started the process called?
UID
Which commands below would install the "wget" software package on variations of the Linux Operating System: (Check all that Apply)
Ubuntu: apt-get install wget Suse: yast --install wget Wrong
For the Ubuntu operating system, init was replaced with:
Upstart
To display the contents of a text file called data, what command should be used?
cat data
What redhat command helps manage services?
chkconfig
Which command below can be used as an editor in Unix-Linux? (Check all that Apply)
emacs, vi, vim
Which of the following below are process information files in the Linux "/proc" directory? (Check all that Apply)
environ maps stat fd All fd environ maps Wrong
Which find command below would find files only?
find . -type f -name '*.log'
Which find command below would discard "permission denied" error messages only:
find / -name core 2> /dev/null
The ___________ command can be used to loop through a range of values?
for
To create a new process, a process copies itself with the _______ system call.
fork
What is the processing of choosing the path for a packet?
forwarding
Which command below shows which users are actively using a filesystem?
fuser -c
What command can be used to search text in a file and print lines that match a given pattern?
grep
Which commands below can be used to view log files or text files?
grep cat tail
What command reads the beginning of a file?
head
After the kernel is running, the _______ process begins executing startup scripts.
init
During the boostrapping process, what is the first program loaded into memory to be executed?
init
What process defines one single-user and several network-enabled "run levels" to determine which of the system resources are enabled?
init
What command is used to restart the machine. (Click all that Apply)
init 6 reboot shutdown -r
What command is used to load a kernel module?
insmod
Which tool below from Solaris is used for performing automated installations?
jumpstart
Which tool below from Red Hat is used for performing automated installations?
kickstart
Utilizing the kill command, what "number" would be used to send a Kill?
kill -9
Which command below causes syslogd to close its log files, reread its configuration file, and start logging again?
kill -HUP
Utilizing the kill command, what "number" would be used to send a Quit?
kill =9 Kill -1 Kill -3 Wrong
Which daemon handles the kenre's ongoing loggin?
klogd
When doing an ls command, which filetype symbol below indicates a symbolic link?
l
Which command below accesses the log file which contains a record of users logins?
last
What other authentication methods can be used that contain a database-like repository that can store user management data? (Check all that apply)
ldap Microsoft Active Directory
What is the most important characteristic of a good password?
length
Which run level "reboots" the system?
leve 6
Which run level boot the system to single-user mode?
level 1
Which command below is used to create a symbolic link?
ll -s archived/secure /var/log/secure
Which of the following is a user-level command that submits log entries from the shell?
logger
The syslog.conf file contains the following entry: local5.warning /tmp/evi.log Which logger command would send messages to the associated log file?
logger -p local5.warning "error message"
Which utility implements a variety of log management policies and is standard in Linux?
logrotate
Which command below enqueues jobs for printing. (Sends the job to the printer)?
lp
Which command below configures printers and classes?
lpadmin
Which cups command below shows available devices or drivers?
lpinfo
Which command below sets system-wide defaults for printers?
lpotions
Which command below sends a file to be printed?
lpr
Which command below cancels a print job?
lprm
Which of the following below are spoolers that run as stand-alone processes (daemons) to submit print jobs to the printer?
lpsched lpd
Which command below provides information on print jobs?
lpstat
What command is used to determine the ownership of a file?
ls -l filename
What command is used to inspect the currently loaded kernel modules?
lsmod
What command below prints a list of manual pages that have the keyword "translate".
man -k Translate
What command below is used to provide documenation for the "grep" command?
man grep
What command shows the path to manual pages?
manpath
Which command below is used to create a directory?
mkdir
Which command can devices files be created manually with?
mknod
What command is used to pass parameters to a loadable kernel module?
modprobe
What is the command to attach a filesystem to the unix/linux operating system?
mount
Which command below attaches a filesystem to the operating system?
mount
When analyzing a log file that is continuting to receive output from the application, what command can be used to read from the end of the file and wait for new lines to be printed?
tail -f
Which log file attemts to keep a record of each user that is "currently" logged in?
utmp
Which of the following of the two items defines cloud computing?
virtualization abstraction
In order for something to be considered in the "cloud", the primary technology must be:
virtualized
What is the standard name of the kernel file for Linux?
vmlinuz
The ______ statement continues to look and execute commands or statements as long as a given condition or set of conditions is true.
while
Which log files contain a record of users logins?
wtmp wtmpx lastlog
Which elementary bash comparison operator is used to compare to numeric values to see if they are equal?
x -eq y
Which of the followin below is a metapackage manager based on RPM and similiar to apt-get?
yum
Which of the following below are Metapackage management systems:
yum apt
Which files below in the user's home directory is used to set shell environment values?
~/.bash_profile ~/.profile
When doing an ls command, which filetype symbol below indicates a regular file?
-
A user account can be locked with the usermod command using what option
-L
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?
-e
Which base file evaulation operation is true if file exists only?
-e
What two ps options can be used to display a full list of information about each process, and a long list of information about each process?
-f -e -e -l -e -p -f -l Wrong
What option can be added to the userdel command to remove the home directory of the target user?
-r
Which entry below refer to the directory itself?
.
UNIX/Linux systems interpret ____ to mean the parent directory.
..
Which entry below refer to the parent directory?
..
Which files below are common startup files for bash, when logging in?
.bashrc .bash_profile
Two package formats are in common use to install software packages:
.deb tar Wrong
Which files below are common stratup files for csh when logging in?
.login .cshrc
Where are the core operating system commands located?
/bin
Which command below can be used as a fake shell?
/bin/false
Pseudo-users also have their shells set to: (Check all that apply)
/bin/false /bin/nologin
Which directory contains device files, which have a major and minor number associated with each device?
/dev
Which files below are used to attach filesystems, when the system is booted? (Check all that Apply)
/etc/fstab
What configuration file typically contains a list of groups and associated accounts associated with a group?
/etc/group
Ubuuntu uses job definition files instead of an inittab file to startup processes. The directory is located in:
/etc/init.d
Which file tells the "init" process what to do at each run level?
/etc/inittab
What range of IP networks below are used for private intranet ranges? (Select all that Apply)
10.0.0.0 192.168.0.0 172.16.0.0
How many bits is an IPV6 Address?
128 Bits
From the following list, identify a valid Class B IP address:
129.112.54.6
Which of the following are public IP network IDs? (Choose two.)
172.32.0.0 8.0.0.0
How many bits is an IPV4 Address?
32 Bits
How many bits is a MAC Address?
48 bits
What is a standard protocl from Intel that allows systems to boot from a network interface?
Preboot eXecution Environment (PXE)
What command do you use to delete files in Unix/Linux?
RM
What model assigns intermediate roles to assigned users instead of direct permissions.
Role-based access control (RBAC)
What account on a Unix System is known as the "superuser" account?
Root
Which type of file stops the process for the associated runlevel, when a Unix/Linux Server is shutdown?
S80cups
What kill signal stops a process, then restarts it with the same PID?
SIGHUP
Every process has at leaste three communication channesl available in linux: (Click 3 choices)
STDERR STDOUT STDIN
Which protocol was developed for Unix & Linux systems to provide authentication security for TCP/IP applications when logging in and transferring files?
Secure Shell (SSH)
Solaris revamped the boot process with the introduction of its:
Service Management Facility
What tricks can subvert the usage of sudo? (Check all that Apply)
Shell Escapes sudo su sudo /bin/bash
The variable symbol in a bash script containes the number of command-line arguments?
$#
What directory is the majority of scripts stored for each run level? Each rclevel.d directory, then contains a symbolic link to the primary directory where the scripts are stored.
/etc/int.d
Which file below contains a list of groups recongized by the system?
/etc/passwd
Which file below contains a list of users recongized by the system?
/etc/passwd
Which file below contains the actual user encrypted passwords recongized by the system?
/etc/passwd
What two files on the Unix/Linux systems contain usernames and their passwords.
/etc/passwd /etc/shadow
Which file stores protected passwords for accounts?
/etc/shadow
What file contains a list of permitted shells?
/etc/shells
When sudo is run, which file is consulted and lists the people who are authorized to use sudo and the commands they are allowed to run on each host?
/etc/sudoers
Many of RedHat Linux's configrations during the boot process are located uner which directory:
/etc/sysconfig
Which file below is the configuration file for syslog?
/etc/syslog.conf
Where are the default user directories located?
/home
Where are the main kenel compones located?
/kernel
What directory below is specific to libraries and shared libraries?
/lib
Another method of deploying additional software to a kernel is loadable kernel modules. Where are loadable kernel modules stored under in linux?
/lib/modules
What directory below is used for optional software packages?
/opt
What is the name of the filesystem that "ps" reads process status information from?
/proc
What directory below is the home directory of the superuser account?
/root
What is the primary directory consisting of a hierarchy of secondary files and command to include directories such as sbin, share, src, lib, bin, and include.
/usr
Where are the system-specific data and configuration files located and includes directories like adm, log and spool?
/var
Which directories below contain log files?
/var/adm /var/log
On Linux, the root user always has a UID of what number??
0
At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes?
:q!
To replace the file's existing content or create a new file, you use:
>
To append output to an existing file, you use ______.
>>
To redirect STDOUT and STDERR, use the following:
>>&
Which special charactoer in regular expression matches one of the preceding element?
?
What is a MAC Address?
A media access control address to identify a unique network interface controller card.
The following operating system below is not a popular Linux Distribution:
AIX
Which fields below are in the /etc/group file? (Check all that Apply)
ALL
Which of the following are characteristics of cloud computer? (Check-all-that-Apply)
ALL
Which of the software packages below are used to create virtual servers? (Check-all-that-apply)
ALL
Which protocol does a router use to obtain the MAC address of a PC host located on a directly connected subnet?
ARP
ARP stands for:?
Address Resolution Protocol
What does the NIST definition of Cloud Computing include: (Check-all-that-apply)
All
Which of the following are deployment models for cloud computing? (Check-all-that-apply)
All
What are the essential duties of a Systems Administrator? (Check All that Apply)
All of them
Which of the following tasks do most administrators perform when it comes to software installation and management? (Check all-that-apply)
Automating mass installations of operating systems. Maintaining custom OS configurations for the local environment. Managing add-on software packages. Keeping systems and applications patched and up to date.
Linux uses the freeware ____ shell as its default command interpreter.
Bash
The _____ shell, when compared to the other shells, has a more powerful programming interface.
Bash
To navigate the UNIX/Linux directory structure, you use the ____ command.
CD
Which two attributes are Clouds defined?
Characteristics Service Models Wrong
What is the definition of CUPS on Linus/Unix?
Common Unix Printing System
Before modifying a file, it is best practices to:
Create a backup revision of the file.
What protocol can be used to automatically assign IP addresses and other parameters to a host or router?
DHCP
Which term can be used as an equivalent to default router?
Default gateway
An IP address consists of a 32-bit binary number. When written like this: 192.168.1.1, it is known as ________ notation.
Dotted-decimal
DHCP protocol is defined as:
Dynamic Host Configuration Protocol
What is the effective user identification of a process called?
EUID
The follow information below is contained in the password file. (Check all that Apply)
Encrypte password placeholder Login name Home directory Login Shell UID GECOS information GID
In Unix/Linux all shells support the same commands and programing statements. (T/F)
False
It is acceptable to use shell metacharacters when naming files.
False
The command strings /bin/echo displays the raw binary characters inside the /bin/echo binary executable program.
False
When a Unix or Linux Operating System on a PC or proprietary system is first turned on, the boot process begins at which level. (Check all that Apply)
Firmware ROM Bios (PC)
What information is contained in the GECOS field? (Check all that Apply)
Full Name Office Number and Building
A _________ gives a group of users equal access files that they all share.
GID
What is the identification number of the group that created or started the process called?
GID
Which of the following are used to store live versions of files, allowing for checkin and checkout of files while editing?
Git Subversion
What is the default boot loader for most UNIX and Linux system with Intel Processors and loads the unix/linux kernel?
Grand Unifed Boot Loader (GRUB)
In the Unix/Linux Operating System permissions on a files and directories consist of: (Ex... rwxrwxrwx (Check All that Apply)
Group User/Owner Other
What is the main component that enables virtualization a manages virtual machines/
Hypervisor
Which of the following below are the three main sevice models for Cloud Computing?
IaaS SaaS PaaS
Which Desktop printing utility is the primariy printing tool for KDE?
KDEPrint
_________ also deals with authentication similar to PAM, but uses a specific authentication method; unlike PAM which is a framework.
Kerberos
What Layer of the OSI Model describes communication utilizing MAC address communication?
Layer 2
What technology is an authentication technology rather than an access control technology?
Pluggable Authentication Modules (PAM)
What are the steps in the boot process? (Check all that Apply)
Loading and Initialization of the kernel Device detection and configuration Creation of kernel processes Reading of the boot loader from the master boot record. Execution of system startup scripts
When the BIOS selects the device to boot from, it tries to read the first block of the device, know as the:
MBR
SELinux utilizes an access control system in which all permissions are assigned by administrators and called:
Mandatory Access Control
UNIX and Linux are ____ systems, which allow one user to execute more than one program at a time.
Multitasking
Which layer of the TCP/IP network model specifies how packets travel end to end over a TCP/IP network?
Network
Which of the following platforms are used to control Hypervisor sessions across a large virtualized environment? (Check-all-that-ApplY)
OpenStack
Each Virtual Machine has it's own: (Check-all-that-Apply)
Operating System Librariers and Applications Kernel
What is the unique process number that the kernel assigns to a process called?
PID
Utilizing the "ps" command, the following information can be obtained: (Check all that Apply)
PID USER or UID %CPU Wrong
What is the original process referred to that has cloned a process copy?
PPID
What is a piece of software (or a combination of software and hardware) that stores passwords for your organizatino in a secure fashion.
Password Vault
The ______ statement simplifies the selection of a match when you have a list of choices.
case
What does an ARP Table contain?
The table matches an IP Address with the associated MAC Address
What is the easiest command to utilize to understand wheter a command is available and installed on the system. For example, the Gnu C compiler. (Check All that apply)
Which gcc
Which Process state indicates the process is trying to die?
Zombie
Which Process state indicates the process can be executed?
Zombie Wrong
Which of the following below are process states? (Check all that Apply)
Zombie Sleeping Stopped Wrong
On Linux systems, device drivers are typically distributed in one of three forms:
a loadable module an installation script or package that installs the drive a patch against a specific kernel version
What type of pathnames are interpreted as being the full location of the file or directory?
absolute
Linux has several make targets that let the administrator configure the kernel with different interfaces. Which make targets below have a configuration interface to assist with rebuiling kernels: (Check-all-that-Apply)
all
Log data can become quite large, but also a necessity to keep. Administrators should keep these questions in mind when designing a overall loggin strategy: (Check-all-that-apply)
all
The kernel abstracts everal lower-leve hardware features, including: (Select-all-that-apply)
all
WHich of the following pieces does printing rely on? (Check-all-that-apply)
all
What information should an Administrator consider at the least capturing from log files: (Check-all-that-Apply)
all
Which methods below are used to ocnfigure a Linux Kernel?
all
It's possible to upgrade an entire system full of software with a single ____________ command.
apt-get
What command can be used on most modern PC operating systems to display the contents of the ARP cache from the CLI?
arp -a
Which tool below from SUSE is used for performing automated installations?
autoyast
What command can be used for matching patterns and perform an associated action?
awk
WHich command on Sun hardware boots to single-user mode?
boot -s
What is the standard term for "starting up a computer". During this process, the kernel is loaded into memory and begins executing.
bootstrapping
When doing an ls command, which filetype symbol below indicates a charcter device file?
c
Which chmod command below would change privledge on a file to allow full privledges to owner and group, but only read privledges to everyone else?
chmod 774 file
Which command below provide the ability to modify the group and ownership of a file? (Check all that Apply)
chown chgrp
What command changes the root directory of a process?
chproc
What defines a set of printers that share a print queue?
class
In what mode does the vi editor open by default?
command mode
A kernel can be modified by modifying which of the files below in the source directory:
config
What command below copies an entire directory and retrains the permissions:
cp -rp
Which of the following are syslog severity levels
crit err emerg
What command can remove sections from each line?
cut
Which command below would produce a list of unique sorted values in the password file :
cut -d: -f7 < /etc/password | sort - u
When doing an ls -ld on /usr/include, which item below indicates the filetype?
d
Which of the following are syslog facillity names?
daemon auth kern
Which of the following sylog.conf entries sends information about daemon and auth to a centralized syslog server on the network?
daemon,auth.info @netloghost
In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted?
dd
Which tool below from Ubuntu is used for performing automated installations?
debian-installer
What command below is used to view the kernel buffer and contains messages that were generated prior to "init" starting.
dmesg
Which command installs, verifies and queries the status of packages in linux; Ubuntu as an example.
dpkg
UNIX/Linux are ____ systems, which let many people simultaneously access and share the resources of a server computer
multiuser
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?
newgrp
Which command sets the process's nice value at the time of creation?
nice
The _____________ of a process is a numeric hint to the kernel about how the process should be treated in relation to other processes contending for the CPU.
niceness
Which tool below from AIX is used for performing automated installations?
nim
What state with the svcs command in Solaris indicates enabled and successfully started:
online
Which of the following is the library routines that submit messages to syslogd?
openlog
What can be used on a Linux system to trace the lineage of each child process??
parent process ID
A function name differs from a variable name because a function name is followed by a set of ____.
parentheses
Regular expressions, also called "regex", are used for:
pattern matching
Which of the following below is the FreeBSD package manager?
pkg
In shell scripts commend lines begin with a(n)______
pound (#) symbol
In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?
process state
Which "ps" command below shows a userful overview of all the processes running on Linux and AIX?
ps aux
Which "ps" command below shows a useful overview of all the processes running on HP & Solaris?
ps aux ps -list wrong
What command can be used to reconcile the contents of the shadow file to those of the passwd file, picking up any new additions and deleting users that ar no longer listed in passwd?
pwconv
What command can be issued to confirm what directory you are in at a command line prompt?
pwd
What type of pathnames are interpreted as starting at the current directory?
relative
Which command adjusts the nice value after initial creation?
renice
Which command below sets the nice value to of process to 5?
renice 5 -u boggs
What is the default boot configuration for GRUB? (Select all that apply)
resolv.conf
Which command below is used to remove a directory?
rmdir
What command is used to remove a loaded kernel module?
rmmod
For security reasons, most Unix/Linux systems allow _________ logins to be disabled on terminals through network access, except on the main console
root
Which comman-line options are available with GRUB? (Check all that apply)
root find kernel reboot
Which command installs, verifies and queries the status of packages in linux; redhat as an example.
rpm
What command below would be utilized to check if the python package was installed on the Red Hat or SUSE Linux Operating Systems?
rpm -q python
With no options, _______ displays the current listing of Bash environment and shell script variables.
set
The _________ command, used to run a shell script, includes several options for debugging.
sh
What command is the safest, most considerate, and most thorough way to halt a system?
shutdown
What is the term traditionally used in unix system to boot the system just enough to run a shell on the system console?
single-user mode
The file below contained in the /etc/apt directory contains a list of universal packages and package source for "main" components of ubuntu.
sources.list
What command in Solaris changes the status of the service? For example, disable ssh.
ssh down
Which commands below shows every system call that a process makes and every signal it receives? (Check All that Apply)
strace truss wrong
What account substitues the user identity, effectively allowing you to login as that user account.
su - username
What is the process name of the integrated systems for logging in Unix/Linux?
syslogd
Which of the following is the logging daemon and it's config file is: /etc/syslog.conf?
syslogd
What command reads from the end of a file?
tail
Which files in the /proc/sys allow tunable kernel parameters (Check-all-that-apply)
tcp-fin-timeout inode-max shmmax
What command is used to split the data stream and send a copy to another output?
tee
A ____ is used to refer to the users' home directory.
tilde (~)
Which command below can show "live" information on the process status, similiar to "ps". This command provides more detailed cpu, memory, swap, and process information.
top
Which deamon listens for messages from the kernel regarding device status changes?
udevd
Which built-in shell command below sets the default permission for a user, when a file is initially created?
umask
Which command below detaches a filesystem to the operating system?
unmount
In order to create user accounts on a Linux system, what command should be utilized?
useradd