Unix/Linux Study Guide Part 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

179. The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

0.0.0.0; 255.255.255.255

85. RAID level ____ is often referred to as disk mirroring.

1

212. The shell restricts the number of file handles that programs can open to ____ by default.

1024

90. If a Linux installation ends abnormally and the screen displays a "fatal signal ____" error message, it indicates an error known as a segmentation fault.

11

200. NetBIOS names can be up to ____ characters long.

15

82. Most Parallel SCSI controllers support up to ____ devices.

15

10. The source code for Linux was released in ____.

1991

118. In Linux, runlevel ____ is also known as multiuser mode.

2

98. The file descriptor stderr is represented by the number ____.

2

21. The recommended size for the /home directory is ____ per user.

200 MB

180. The subnet mask for a Class B IP address is ____.

255.255.0.0

181. The subnet mask for a Class C IP address is ____.

255.255.255.0

20. Hard disks can contain a maximum of ____ major partitions

4

161. The compression algorithm used by the compress utility has an average compression ratio of ____%.

40-50%

167. If no level of compression is specified, the gzip command assumes the number ____.

5

86. RAID level ____ is commonly referred to as disk striping with parity.

5

148. By default, all print jobs have a priority of ____.

50

133. There are ____ different kill signals that the kill command can send to a certain process.

64

164. The average compression ratio for gzip is ____%.

67-70%

63. When using the chmod command, the mode rwx can be represented by the number ____.

7

83. The highest priority SCSI device is given a SCSI ID of ____.

7

178. Each octet in an IP address represents a(n) ____ binary number.

8-bit

182. IPv6 IP addresses are delimited by the ____ character.

:

31. ____ is the metacharacter for command termination.

;

100. You can redirect a file to the standard input of a command using the ____ metacharacter.

<

99. You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file.

>

39. The ____ symbol indicates a linked file.

@

25. The shell that is used by default in Linux is the ____ shell.

BASH

46. Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?

Ctrl+g

193. ____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet.

DNS

207. The ____ SQL statement is used to delete a database.

DROP DATABASE

198. The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.

DirectoryIndex Index.html

47. The ____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor.

Emacs editor

14. A(n) ____ service provides an efficient method for transferring files over the Internet.

FTP

4. The ____ stipulates that the source code of any software published under its license must be freely available.

GNU General Public License

204. When working with Sendmail, you can use the ____ command to test SMTP support.

HELO

124. The two most common desktop environments that are used on Linux are ____ and ____.

KDE and GNOME

7. HOWTO documents are centrally collected by the ____.

Linux documentation project

15. A(n) ____ service allows users to post messages in forums.

News

203. Client computers can retrieve e-mail from e-mail servers via ____ or ____.

POP and IMAP

174. Most Linux distributions today use ____ as their package manager.

RPM

13. ____ Linux is the most common Linux distribution used today.

Red Hat

84. The ____ standard support speeds of up to 80 MB/second.

SCSI-3 Ultra2 Wide

134. The ____ kill signal stops a process and then restarts it with the same PID.

SIGHUP

213. When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.

SIGHUP

135. The ____ kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory.

SIGQUIT

114. ____ of the GRUB boot loader typically resides on the Master Boot Record.

Stagel

197. Apache daemon listens for HTTP requests on port ____.

TCP 80

220. A(n) ____ is a program that can start a network daemon.

TCP wrapper

177. The most common LAN protocol used today is ____.

TCP/IP

92. ____ installation log file(s) is/are created by the Fedora installation program.

Two

195. NTP uses port ____.

UPD 123

22. The ____ filesystem is compatible with the Windows FAT filesystem.

VFAT

11. The core component of the GUI in Linux is referred to as ____.

X Windows

123. ____ is a freely available version of X Windows used in many Linux distributions.

XFree86

41. Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?

[1-4]

112. The test statement ____ would be used to determine if A is numerically greater than B.

[A -gt B]

111. The ____ escape sequence represents a form feed.

\f

154. The ____ priority used by the System Log Daemon indicates an error that should be rectified immediately, such as a corrupt system database.

alert

104. The ____ command can be used to extract, manipulate, and format text using pattern-action statements.

awk

29. The command that displays the calendar for the current month is ____.

cal

42. To display the contents of a file called data, use the command ____.

cat data

35. To move from the /home/joe/test/data to the /home/joe directory, use the ____ command.

cd../..

65. Devices that transfer data in a character-by-character fashion are referred to as ____ devices.

character

64. To set all of the special permissions on a certain file or directory, you can use the command ____, where name is the name of the file or directory.

chmod 7777 name

105. Most configuration files on Linux systems are delimited using ____ characters.

colon

78. Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.

corruption

52. Copying a file can be accomplished using the ____ command.

cp

199. The ____ command can be used in the BASH prompt to obtain a Web page from the Apache server.

curl

129. A system process that is not associated with a terminal is called a(n) ____ process.

daemon

1. A(n) ____ is a piece of software that tells the operating system how to use a specific hardware device.

device driver

77. The easiest method for monitoring free space by mounted filesystems is to use the ____ command.

df

107. The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.

echo $PS1

80. You can edit the quotas for certain users by using the ____ command.

edquota

108. To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command.

env

28. Which Linux command gets you out of your current shell?

exit

73. CD-ROMs typically use the ____ filesystem type.

ext3

76. To create partitions after installation, you can use the ____ command.

fdisk

139. After a background process has been started, it can be moved to the foreground by using the ____ command.

fg

9. Solaris, HP-UX and AIX are all ____ of Unix.

flavors

5. ____ is software that is distributed free of charge, but the source code is not available.

freeware

79. To check a filesystem for errors, you can use the ____ command, which can check filesystems of many different types.

fsck

62. When using the chmod command for a specific file, the ____ argument would add read permission and remove write permission for the group permissions.

g+r-w

48. The ____ editor is functionally analogous to the Windows Wordpad and Notepad editors.

gedit

115. To create an encrypted password for use in the /boot/grub/grub.conf, you can use the ____ command

grub-md5-crypt

210. ____ are the most common hardware component to fail on Linux systems.

hard disks

183. IPv6 IP addresses are written using eight 16-bit ____ numbers.

hexadecimal

8. Which of the following is the greatest expense for companies using Linux?

hiring people to maintain the linux System

186. Computer names are called ____.

host names

184. The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

ifconfi

116. In the /etc/lilo.conf file, the ____ keyword specifies the absolute pathname to the Linux kernel.

image=

117. In the /etc/lilo.conf file, the ____ keyword specifies the file that contains the physical layout of the disk drive.

install=

18. ____ is the most common method of installing Linux.

installation from a DVD

95. The ____ file in the /proc directory contains a list of memory address ranges reserved for device use.

ioports

88. In Fedora Linux, a ____ file is a script file that specifies the choices that you would normally choose when you install the operating system.

kickstart

57. To create a hard link, you must use the ____ command.

ln

96. The ____ file in the /proc directory contains statistics on the performance of the processor.

loadavg

54. The fastest method to search for files in the Linux directory tree is to use the ____ command.

locate

145. To send a print job to a printer, you must first use the ____ command and specify what to print.

lp

150. You can restrict who can print to certain printers by using the ____ command.

lpadmin

146. To see a list of all printers on the system and their status, you can use the -t option to the ____ command.

lpstat

40. The ____ command can be used to provide a long listing for each file in a certain directory.

ls l

175. The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.

make

32. To find all of the commands that have the word "list" in their name or description, you would type ____.

man -k list

125. The ____ window manager is used for the GNOME desktop in Red Hat Fedora Core 2.

metacity

2. The ____ indicates the stability of a Linux kernel.

minor number

59. The section of an inode that stores permissions is called the ____ of the file.

mode

72. To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, you can simply type the ____ command.

mount -a

201. The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.

mput filename

205. When working with Sendmail, if you modify the /etc/aliases file, you need to run the ____ command to rebuild the aliases database.

newaliases

160. To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the ____ command.

newgrp

173. You can perform up to ____ different incremental backups using the dump/restore utility.

nine

219. To see what network services are running on your network, you can run the ____ command.

nmap

217. Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.

nohup

122. Which utility can be used to modify runtime configuration files so that they start and stop daemons when entering a particular runlevel?

ntsysv

3. The concept of ____ enables software developers to read other developers' source code, modify that source code to make the software better, and redistribute that source code to other developers who might improve it further.

open source software

26. ____ are specific letters that start with a dash ("-").

options

208. The ____ PostgreSQL command-line utility backs up PostgreSQL database settings.

pg_dump

185. The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

ping

17. Because you need to document so many pieces of hardware and software information, you should create a ____ that contains all important installation information as well as hardware information.

preinstallation checklist

131. In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.

process state

223. Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.

public and private

155. To convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.

pwconv

33. The ____ command will confirm the system directory that you are currently in.

pwd

110. If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.

read and execute

189. The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

rlogin

53. The ____ command takes a list of arguments specifying the absolute or relative pathnames of files to remove.

rm

70. The ____ filesystem contains most of the operating system files.

root

152. The ____ log file contains information and error messages regarding network access generated by daemons such as sshd and xinetd.

secure

191. ____ is a remote administration tool that encrypts information that passes across the network.

secure shell (SSH)

121. You can use the ____ command to start, stop, or restart any daemons listed within the /etc/rc.d/init.d directory.

service

106. To see a list of the environment variables and their current values on a system, you can use the ____ command.

set

24. In Linux, a(n) ____ is used to accept input from the user and pass the input to the kernel for processing.

shell

87. A Fedora 13 CD installation requires ____ CDs.

six

143. The ____ field in a cron table contains the absolute pathname to the command to be executed.

sixth

224. In SSH, the /etc/ssh directory stores the DSA public key in the ____ file.

ssh_host_dsa_key. pub

6. Consider the phrase "collaboration between several developers with a common need speeds up software creation, and when bugs in the software are found by these users, bug fixes are created very quickly" from the chapter. This statement describes which advantage of the Linux operating system?

stability and security

218. The ____ command can be used to obtain root access when you need to perform an administrative task.

su

56. The ____ section of a filesystem is the section that contains information about the filesystem in general.

superblock

16. Companies and institutions using computers to perform extraordinarily large calculations that would be unsuitable for most computers would employ a(n) ____.

supercomputer

127. To configure your keyboard, you can use the ____ command from either a GUI or terminal environment and restart X Windows.

system-config-keyboard

36. If you type enough unique letters of a directory and press ____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information.

tab

206. Databases store information in the form of ____, each of which contains ____.

tables and records

43. The ____ command displays the last five lines of a text file.

tail -5

12. A ____ is merely a compressed archive of files that usually contain scripts that install the software contents to the correct location on the system.

tarball

81. Each SCSI device is assigned a unique ID number known as a(n) ____.

target ID

214. By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.

ten

37. Most files on a Linux system that contain configuration information are ____ files.

text

91. Some installations fail to place a boot loader on the hard disk properly

this is often the case with large hard disk drives that have over ____ cylinders.;1024

136. You can execute ____ main types of Linux commands.

three

187. The /etc/resolv.conf file can contain up to ____ DNS servers.

three

209. All Linux problems can be divided into ____ categories.

three

101. The ____ command can be used to replace characters in a file sent via Standard Input.

tr

75. Data is read off of hard disks in concentric circles called ____.

tracks

19. During Linux installation, you need to configure a minimum of ____ user account(s).

two

58. The chgrp command takes ____ argument(s) at minimum.

two

74. Linux requires ____ partition(s) at minimum.

two

69. The ____ filesystem is used by software programs that write to a CD-RW or DVD-RW drive.

udf

156. You can create user accounts on the Linux system by using the ____ command.

useradd

192. Remote computers can connect to a configured VNC server using the ____ command.

vneviewer

103. The ____ command counts the number of lines, words, and characters in a file.

wc

27. Which Linux command displays your login name?

whoami

61. If a user has ____ permission for a file, they can open, read, and edit the contents of a file.

write

132. The ____ option to the ps command displays all processes that do not run on terminals.

x

128. After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility within the desktop environment.

xvidtune

163. The ____ command can be used to display the contents of a compressed file.

zcat

44. Which is an extended regular expression metacharacter?

{}

102. You can send the standard output of one command to another command as standard input using the ____ shell metacharacter.

|

34. The ____ metacharacter can also be used to refer to the current user's home directory.

~

138. When killing a background job with the kill command, you must prefix the background job IDs by a(n) ____.

%

137. When you append a(n) ____ to a command, the command is run in a background process.

&

30. The ____ metacharacter indicates background command execution.

&

45. The ____ regular expression metacharacter matches 0 or more occurrences of the previous character.

*

140. When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.

+

60. In a file's mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode.

-

215. The ____ option for the sar command is used to display swap statistics.

-B

38. To view a list of files and their type, use the ____ switch to the ls command.

-F

158. To lock an account, you can use the usermod command with the ____ option.

-L

221. The ____ option to the iptables command can be used to specify the default policy for a certain chain type.

-P

211. To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.

-V

166. When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.

-c

147. The lp command uses the ____ option to specify the destination printer name.

-d

222. The ____ option to the iptables command can be used to specify the destination address of packets for a rule.

-d

130. To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.

-e

144. To create or edit a user cron table, you can use the ____ option to the crontab command.

-e

176. To remove a package from the system, you can use the ____ option to the rpm command.

-e

165. When used with the compress command, the ____ option can be used to compress symbolic links.

-f

142. To display a list of at Job IDs, you can specify the ____ option to the at command.

-l

168. The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.

-l

172. When using the cpio utility, the ____ option causes a new archive to be created.

-o

149. The ____ option to the lpstat command causes a list of printers that are enabled to be displayed.

-p

170. When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames.

-p

216. The ____ option for the sar command is used to displays statistics for the processor queue.

-q

159. You can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents.

-r

71. To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.

-t

171. The ____ option can be used with the tar command to extract a specified archive.

-x

188. A common utility used to troubleshoot routing is the ____ command.traceroute

...

162. When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.

.Z

169. The filename extension given to files compressed with bzip2 is ____.

.bz2

113. The Linux kernel is stored in the ____ directory.

/boot

49. In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader.

/boot

68. If you do not know the type, major, or minor number of a device, you can use the ____ command to re-create the device based on the common name.

/dev/MAKEDEV

66. The ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave).

/dev/hdbl

67. The ____ device file represents the second serial port on the system (COM2).

/dev/ttyS1

126. If your system uses the X.org implementation of X Windows, the mouse, keyboard, monitor, and video adapter card information is stored in the ____ file in text format.

/etc/X11/xorg.conf

190. One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

/etc/hosts.equiv

109. The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.

/etc/profile

120. After the entries in /etc/inittab have been executed, the ____ file is executed to perform tasks that must occur after system startup.

/etc/rc.d/rc.local

157. The skeleton directory on most Linux systems is ____.

/etc/skel

93. To verify hardware settings, you can examine the contents of the ____ directory.

/proc

94. To ensure that Linux has detected the correct amount of RAM in the system after installation, you can view the contents of the ____ file.

/proc/meminfo

50. In the FHS, the ____ directory is the root user's home directory.

/root

23. The ____ directory contains system commands and utilities.

/usr

51. In the FHS, the ____ directory contains most system commands and utilities.

/usr

151. Log files are typically stored in the ____ directory.

/var/log

194. The ____ zone configuration file contains a PTR record used to identify the loopback adapter.

/var/named/named.local

119. A Linux system in runlevel ____ is a system that has no daemons active in memory and is ready to be powered off.

0

141. Processes are started with a nice value of ____ by default.

0

196. In NTP, stratum ____ consists of atomic devices or GPS clocks.

0

97. The file descriptor stdin is represented by the number ____.

0

202. The ____ ftp utility command runs a shell on the local computer.

!

153. Any line that starts with a(n) ____ character is a comment in the /etc/rsyslog.conf file.

#

89. Any line in a kickstart file that starts with a(n) ____ symbol is a comment line and is ignored by the installation program.

#

55. You can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command.

$


Set pelajaran terkait

La négritude (fondateurs et ses philosophies)

View Set

Similarities and Differences between the Articles of Confederation and Constitution

View Set

Clinical Pharmacology Dosage Calculation

View Set

Health and Behavior Change Quiz 4

View Set