UNIX/Linux Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A user account can be locked with the usermod command using what option?

-L

What two protocols below are used for mail retrieval?​

-POP -IMAP

Describe the telnet and SSH utilities. What is the difference between them?

-SSH: communication protocol, public key authentication, both data transmitted and received are encrypted -Telnet: communication protocol, not secure, no authentication policies or data encryption techniques, data is transmitted in plaintext -Difference: SSH is encrypted and telnet isn't

What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?

-Z -z

Select the iptables option that specifies the destination address of packets for a rule:

-d

What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?

-d -k

What option can be added to the netstat command in order to display network statistics?​

-i

Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed:

-l

Which sar command option is used to display statistics for the processor queue?

-q

What option can be added to the userdel command to remove the home directory of the target user?

-r

Files with what two file extensions are commonly known as tarballs?​

.tar.gz .tgz

Where is the default document root directory for the Apache web server?

/var/www/html

On Linux, the root user always has a UID of what number?​

0 (zero)

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?

DNS

T/F: Almost all hardware problems are the result of damaged hardware.

FALSE

T/F: If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.

FALSE

T/F: On most Linux systems, the logrotate utility is automatically scheduled to run weekly

FALSE

T/F: When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory.

FALSE

T/F: When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.

FALSE

What is the most common hardware component to fail on a Linux system?

Hard disk drives

What DNS resource record type is used to provide the IP address for the e-mail server for a zone?​

MX

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?

alert

In order to download DPM packages, what command should be used below?​

apt-get

Which command below can be used at a BASH command prompt to obtain a web page?

curl

What command can be used to search for DPM package information?

dpkg-query

An IPv6 IP address consists of 16-bit numbers in what numbering scheme?

hexadecimal

What utility in the sysstat package measures the flow of information to and from disk devices?​

iostat

Adding the -t option to what command below will provide a list of all printers on the system and their status?

lpstat -t or -t lpstat

Which command can be used to see what network services are running on your network?

nmap

What command can be used to see what actual time servers are being used for synchronization?

ntpq

​RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?

package dependency

Select the command that can be used to send a small TCP/IP packet to another IP address and await a response:

ping

What two FTP commands below can be used to close the ftp utility?​

quit bye

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?

secure

In order to create user accounts on a Linux system, what command should be utilized?

useradd

If X Windows fails to start, what command can be used to troubleshoot the issue?

xwininfo

What yum command below can display a list of package group names?

yum grouplist

What is the subnet mask for a Class C IP address?

255.255.255.0

What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?​

255.255.255.255 0.0.0.0

What is the default print job priority for all print jobs created by the lp command?

50

What tool below was designed as a secure remote access utility that encrypts information that passes across the network?

Secure Shell (SSH)

What is the most commonly used LAN protocol?

TCP/IP

T/F: A route table is a list of TCP/IP networks that is stored in system memory.

TRUE

T/F: If the / filesystem becomes corrupted, the system is unstable and must be turned off.

TRUE

T/F: The Very Secure FTP daemon is a stand-alone daemon.

TRUE

T/F: The email command is an example of a Mail User Agent (MUA).​

TRUE

T/F: The tar utility cannot back up device files or files with filenames longer than 255 characters.

TRUE

What well-known TCP port is utilized by the SMTP service?​

25

Most Linux distributions make use of what package manager?

RPM


Set pelajaran terkait

CIT: 332 Systems Development II @ WKU - Spring 2019 Study Tool

View Set

History- Political Statement: from the Universal Declaration of Human Rights

View Set

Econ 1101 - Final Exam Review (Compilation of all Chapter Exam Reviews)

View Set

Sociology Chapter 2: Sociological Research Methods

View Set

Exam 2 Material for Human Injuries and Preventative Medicine

View Set

MGMT 320 EXAM2 CH 11 question bank

View Set

Texas Life and Health: Life Policy Riders, provisions, Options and Exclusions

View Set

Mental Health: Chapter 8: Assessment

View Set