chapter 10 quiz linux, chapter 11 quiz linux, Chapter 12 quiz linux, chapter 13 quiz linux, chapter 13 homework linux, chapter 12 homework linu, chapter 11 homework linux, chapter 10 homework Linux
Which option to the dpkg command can be used to list the files that comprise a package?
-L
When using the compress command to archive a set of files into a single file, which of the following options will display the compression ratio of the individual files making up the new compressed file?
-v
When compiling source code into a binary program, which command performs a system check and creates the Makefile?
./configure
Which of the following is not a valid compression file extension for the Linux operating system?
.vz
Files that have been compressed using the xz utility typically have the ______ extension.
.xz
Which of the following is the full path and file name where the Debian Package Manager repositories can be configured?
/etc/apt/sources.list
Which of the following files does the hostnamectl command modify to set the hostname on a machine?
/etc/hostname
What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.)
/etc/hosts DNS
Which file stores the Apache configuration in Fedora 28?
/etc/httpd/conf/httpd.conf
Which of the following files contains the list of shared libraries?
/etc/ld.so.cache
Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?
/etc/login.defs
Which file holds the methods to be used and the order in which they will be applied for host name resolution?
/etc/nsswitch.conf
What is the name of the file that contains a listing of all users on the system and their home directories?
/etc/passwd
Which file stores the IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the network interface?
/etc/resolv.conf
In which of the following directories can you place files that will be copied to new user directories when new users are created?
/etc/skel
Which file would you modify to permanently change the IP address of a network interface on a Fedora 28 system?
/etc/sysconfig/network-scripts/ifcfg-enp8s0
What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 18 FTP server?
/srv/ftp
Most log files on the system are found in which directory?
/var/log
What zone configuration file contains a PTR record used to identify the loopback adapter?
/var/named/named.local
Which dump level indicates a full backup?
0
You have created a full backup and four incremental backups. In which order must you restore these backups?
0, 1, 2, 3, 4
Which of the following port numbers is associated with SSH?
22
The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of?
48
Along with a listing of user accounts, the /etc/passwd file contains information on account expiry. True or False?
False
The bzip2 and gzip utilities use similar compression algorithms. True or False?
False
To install a new program from RPM software repositories on the Internet, you can use the dnf update programname command. True or False?
False
UIDs and GIDs are unique to the system and, once used, can never be reused. True or False?
False
You can purchase object storage from a cloud provider to provide persistent filesystem-based storage. True or False?
False
When working with Sendmail, what command can be used to test SMTP support?
HELO
Which Windows program is often used to connect to a Linux server via SSH?
Putty
Which of the following must you perform to share a directory using NFS? (Choose all that apply.)
Start or restart the NFS daemons. Edit the /etc/exports file. Run the exportfs -a command.
What is the most commonly used LAN protocol?
TCP/IP
Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?
True
DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?
True
Most source code is typically available on the Internet in tarball format or as a git repository. True or False?
True
PaaS cloud providers host sandboxed Web apps using containers for scalability. True or False?
True
SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?
True
The -9 option to the gzip utility results in a higher compression ratio. True or False?
True
The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?
True
The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?
True
You can clear a log file simply by redirecting nothing into it. True or False?
True
You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?
True
Which of the following can be used to graphically remotely administer a Linux machine?
VNC
Which of the following can be used to provide graphical remote administration? (Choose all that apply.)
VNC ssh -X
Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system?
YUM
Which of the following commands can you use to search available repository information? (Choose two.)
apt apt-cache
What is the term used to describe a user providing a user name and password to log in to a system?
authentication
Which command can be used to create an image backup of a partition?
dd
Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them?
declarative configuration
When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information.
facility, priority
Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)
ifconfig nmcli iwconfig ping
What command can you use to view journald log entries on a system that uses Systemd?
journalctl
What is the name of the utility used to rotate log files?
logrotate
The IP address of 127.0.0.1 is also referred to as the _____.
loopback address
Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)
lp -d Printer1 file lp file
When compiling source code into a binary program, which command does the compiling using the GNU C Compiler?
make
Which command can be used to temporarily alter the primary group associated with a given user?
newgrp
On a system running NetworkManager, which of the following commands can be used to view or modify connection information?
nmcli
Which command would you use to unlock a user account?
passwd -u username
The daemons associated with network services listen for network traffic associated with a particular _____.
port
The process of sending print jobs from the print queue to the printer is called _____.
printing
Which of the following commands can be used to list the files contained within an installed RPM package?
rpm -ql packagename
Which command can be used to connect to a remote Windows share called data on the server called fileserver?
smbclient //fileserver/data
You want to generate SSH keys for your user account and copy them to a remote computer to simplify future SSH authentication. What two commands can you use to perform these actions? (Choose two answers.)
ssh-keygen ssh-copy-id
Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?
testparm
When a printer is disabled, ________.
the print queue accepts jobs into the print queue and holds them there until the printer is enabled again
When a printer is rejecting requests,____________.
the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable
Which command is used to delete a user account?
userdel username
Which command can you use to lock a user account?
usermod -L username
Which of the following commands can be used to set the number of days until user account jsmith with an expired password is disabled?
usermod -f 15 jsmith
Which of the following file extensions are used by the Debian Package Manager?
.deb
Which filename extension indicates a tarball?
.tar.xz
The Debian Package Manager (DPM) is the default package manager used by Fedora 28. True or False?
False
You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue?
cancel Printer1-17 Printer1-21
Which of the following are stand-alone daemons? (Choose all that apply.)
DNS (named) Apache (httpd)
Which of the following will display the contents of the /etc/shadow file? (Choose all that apply.)
cat /etc/shadow getent /etc/shadow
Which of the following is used on modern Linux distributions that reads YAML configuration files to add apps, modify existing configuration settings, or perform administrative tasks at boot time?
cloud-init
Which of the following commands extracts an archive?
cpio -vicdu -I /dev/fd0
Which command can be used at a BASH command prompt to obtain a Web page?
curl
Which command can be used to list containers that are currently running on the operating system only?
docker ps
Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.)
domain comptia.org nameserver 10.1.1.4
Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed?
dpkg.log
Which option to the rpm command can be used to remove a package from the system?
e
Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address?
files
After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem?
make install
Which commands can be used to display TCP/IP connections on your Linux system? (Choose all that apply.)
mtr
Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.)
netstat --udp
To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.)
nslookup hostname dig hostname host hostname
Which command can you use to synchronize ntpd with an NTP time source?
ntpq
What PostgreSQL command-line utility backs up PostgreSQL database settings?
pg_dump
Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel?
ping -c 4 server1
Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen?
tar -czvf
Which of the following commands creates an archive?
tar -zcvf /dev/st0 *
Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.)
the createdb command. the CREATE DATABASE statement within the PostgreSQL utility.
Which of the following is the first field of the /etc/passwd file?
username
Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables?
INNER JOIN
Which of the following is a valid SQL statement for adding a new row of data to a SQL database table?
INSERT INTO users (firstname, lastname) values ('George', 'Washington');
Which term is used to describe the process of pushing new versions of a Web app to a cloud provider for testing?
CD
Which DNS resource record is an alias to other records?
CNAME
What must you do to transform your computer into a DNS server? (Choose all that apply.)
Create NIS maps. Create zone files. Run the name daemon (named).
What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?
DNS
Standalone daemons are started on demand using xinetd. True or False?
False
Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?
False
The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False?
False
Which of the following environment variables can you change the value of to set the default printer on a Linux system? (Choose two.)
LPDEST PRINTER
Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?
Restart the DHCP daemon.
You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do?
Run the newaliases command.
You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of?
UDP
Which type of CM software can connect to inventory members via SSH to perform configuration management activities?
agentless
Which of the following commands can be used to remove the test DPM package, including any test configuration files?
apt purge test
Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system?
apt-get upgrade
Before a computer can use a router, what configuration information must it be provided?
default gateway
Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.)
delgroup groupdel
Emily accidentally created a new user account on the wrong server. Which of the following commands could she use to delete the account she created? (Choose all that apply.)
deluser userdel
Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)
ip route
Which of the following commands can you use to view events within the journald database?
journalctl
Which command within the command-line FTP utility can be used to change the current directory on the local computer?
lcd
Which of the following commands should be run following the installation of a shared library to update the /etc/ld.so.conf and /etc/ld.so.cache files?
ldconfig
Which of the following commands can be used to set the default printer for all users on a Linux system where printer1 is the name of the printer?
lpoptions -d printer1
Which of the following commands can be used to search for packages that contain the word oobla on RPM software repositories?
yum search oobla