Final Revised

Ace your homework & exams now with Quizwiz!

A. 3 Common Name: Extended Multiuser Mode

A system that has the same abilities as Multiuser Mode, yet with all extra networking services started (e.g., SNMP, NFS). A. 3 B. 2 C. 5 D. 6

d. /dev/nst0

Which of the following represents the first nonrewinding SCSI tape device on a system? a. /dev/st0 b. /dev/ht0 c. /dev/nht0 d. /dev/nst0

d. ps

1. Which command entered without arguments is used to display a list of processes running in the current shell? a. ppid b. list c. pid d. ps

a. crontab

10. What command is used to view and modify user jobs scheduled to run with cron? a. crontab b. cron c. ps d. sched

d. /etc/inittab/rc2/d

10. What is the name of the directory that contains symbolic links to UNIX SysV rc scripts for runlevel 2? a. /etc/rc2.d b. /etc/init.d/rc2.d c. /etc/runlevel/2 d. /etc/inittab/rc2/d

d. parent process ID

11. Every process has a process ID and a_____________ . a. fork process b. daemon c. child process d. parent process ID

a. /boot

11. In what directory is Stage2 of the GRUB2 boot loader stored? a. /boot b. /root c. /bin d. /

d. −20 and 19

13. Nice values are used to affect process priorities using a range between________________________ . a. 0 and 20 b. 0 and −19 c. −19 and 20 d. −20 and 19

b. init 1

13. Which command causes the system to enter Single User Mode? a. init 0 b. init 1 c. init 6 d. initstate 5

a. seconds

14. The timeout value in the GRUB configuration file is measured in? a. seconds b. 1/10 of minutes c. 1/10 of seconds d. 1/100 of seconds

d. daemon process

14. What is the name given to a process not associated with a terminal? a. child process b. parent process c. user process d. daemon process

False

15. To kill a process running in the background, you must place a % character before its process ID. True or False?

d. grub2-mkconfig

15. You have recently modified the options within the /etc/default/grub file. What command can you use next to rebuild the GRUB2 configuration file? a. grub2-install b. grub-install c. grubby d. grub2-mkconfig

b. 9

16. What kill level signal cannot be trapped? a. 1 b. 9 c. 3 d. 15

c. Modify the daemon configuration file within the /etc/init directory.

16. You wish to configure the runlevels that a particular upstart daemon is started in. What should you do? a. Run the appropriate update-rc.d command. b. Modify the contents of the /etc/rc[runlevel].d directories. c. Modify the daemon configuration file within the /etc/init directory. d. Run the appropriate systemctl command.

d. is a rogue process

17. A runaway process that is faulty and consuming mass amounts of system resources__________________________ . a. is a zombie process b. is an orphaned process c. has a PPID of Z d. is a rogue process

b. systemctl stop lala.service

17. Which of the following Systemd commands can be used to stop a daemon called lala? a. service stop lala b. systemctl stop lala.service c. chkconfig stop lala d. stop lala

b. There is a question mark in the TTY column.

18. When you run the ps command, how are daemon processes recognized? a. The terminal is listed as tty0. b. There is a question mark in the TTY column. c. There is an asterisk in the STIME column. d. There is a "d" for daemon in the terminal identification column.

a. chkconfig --level 123 lala on

18. Which of the following commands can be used to start a UNIX SysV daemon called lala in runlevels 1, 2, and 3? a. chkconfig --level 123 lala on b. update-rc.d lala defaults c. systemctl enable lala 123 d. service enable lala 123

b. graphical.target

19. What Systemd target corresponds to runlevel 5? a. multi-user.target b. graphical.target c. system.target d. runlevel5.target

c. top

19. Which command is used to gain real-time information about processes running on the system, with the most processor-intensive processes appearing at the beginning of the list? a. ps b. ps -elf c. top d. top -l

b. LILO needs to be reinstalled after it has been modified.

2. Which of the following statements is true? a. The GRUB boot loader is stored in the /usr/grub directory. b. LILO needs to be reinstalled after it has been modified. c. The GRUB2 boot loader is often used on legacy Linux systems. d. GRUB needs to be reinstalled after it has been modified.

a. If /etc/at.allow exists, only users listed in it can use the at command. b. If /etc/cron.allow exists, only users listed in it can use the cron command. c. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command.

2. Which of the following statements is true? (Choose all that apply.) a. If /etc/at.allow exists, only users listed in it can use the at command. b. If /etc/cron.allow exists, only users listed in it can use the cron command. c. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command. d. If /etc/cron.allow and /etc/cron.deny exist, only users listed in the former can use the cron command, and any users listed in the latter are denied access to the cron command. e. If a user is listed in both /etc/cron.allow and /etc/cron.deny, then /etc/cron.deny takes precedence and the user cannot access the crontab command.

d. /etc/resolv.conf

Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC? a. /etc/hosts b. /etc/host.conf c. /etc/resolve d. /etc/resolv.conf

b. /etc/sysconfig/network-scripts/ifcfg-eth0

Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system? a. /etc/sysconfig/network-scripts/ifcfg-eth1 b. /etc/sysconfig/network-scripts/ifcfg-eth0 c. /etc/sysconfig/network-scripts/ipcfg-eth0 d. /etc/sysconfig/network-scripts/ipcfg-eth1

A. .tar.gz

Which filename extension indicates a tarball? a. .tar.gz b. .cpio c. .dump d. .tar

c. tripwire a. AIDE

Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? (Choose all that apply.) a. AIDE b. SWATCH c. tripwire d. Snort

b. Ensure that only necessary services are running.

Which of the following actions should you first take to secure your Linux computer against network attacks? a. Change permissions on key system files. b. Ensure that only necessary services are running. c. Run a checksum for each file used by network services. d. Configure entries in the /etc/sudoers file.

a. mouse keys b. high contrast c. sticky keys d. on-screen keyboard

Which of the following are common assistive technologies? (Choose all that apply.) a. mouse keys b. high contrast c. sticky keys d. on-screen keyboard

d. VNC b. ssh -X

Which of the following are graphical remote administration technologies? (Choose all that apply.) a. telnet b. ssh -X c. ssh d. VNC

a. Apache (httpd) d. DNS (named)

Which of the following are stand-alone daemons? (Choose all that apply.) a. Apache (httpd) b. Washington University FTP (in.ftpd) c. telnet (in.telnetd) d. DNS (named)

a. the CREATE DATABASE statement within the PostgreSQL utility. d. the createdb command.

Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.) a. the CREATE DATABASE statement within the PostgreSQL utility. b. the ADD DATABASE statement within the PostgreSQL utility. c. the adddb command. d. the createdb command.

d. apt-get purge test

Which of the following command can be used to remove the test DPM package, including any test configuration files? a. dpkg remove test b. apt-get remove test c. dpkg purge test d. apt-get purge test

a. free b. sar c. vmstat

Which of the following commands can be used to display memory statistics? (Choose all that apply.) a. free b. sar c. vmstat d. iostat

c. rpm -ql packagename

Which of the following commands can be used to list the files contained within an installed RPM package? a. rpm -qa packagename b. rpm -qi packagename c. rpm -ql packagename d. rpm -q packagename

c. nmap

Which of the following commands can be used to scan the available ports on computers within your organization? a. traceroute b. tracert c. nmap d. sudo

a. yum search oobla

Which of the following commands can be used to search for packages that contain the word "oobla" on RPM software repositories? a. yum search oobla b. rpm -qS oobla c. yum list oobla d. rpm -ql oobla

d. tar -zcvf /dev/st0 *

Which of the following commands creates an archive? a. tar -cvf /dev/st0 b. tar -xvf /dev/st0 c. tar -tvf /dev/st0 d. tar -zcvf /dev/st0 *

b. cpio -vicdu -I /dev/fd0

Which of the following commands extracts an archive? a. cpio -vocBL /dev/fd0 b. cpio -vicdu -I /dev/fd0 c. cpio -vicdu -O /dev/fd0 d. cpio -vti -I /dev/fd0

c. sa19

Which of the following files is likely to be found in the /var/log/sa directory on a Fedora 20 system over time? a. 15 b. sa39 c. sa19 d. 00

d. firewall-cmd --add-service ssh --permanent

Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted? a. firewall-cmd --add-service ssh b. firewall-cmd --add-port 22/tcp c. firewall-cmd --add-port 22/udp d. firewall-cmd --add-service ssh --permanent

a. Edit the /etc/exports file. c. Run the exportfs -a command. d. Start or restart the NFS daemons.

Which of the following must you perform to share a directory using NFS? (Choose all that apply.) a. Edit the /etc/exports file. b. Mount the directory to the /etc/exports directory using the mount command. c. Run the exportfs -a command. d. Start or restart the NFS daemons.

d. 23

Which of the following port numbers is associated with telnet? a. 20 b. 137 c. 49 d. 23

a. ifconfig c. ping d. netstat -i

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.) a. ifconfig b. ipconfig c. ping d. netstat -i

b. -L

Which option to the dpkg command can be used to list the files that comprise a package? a. -l b. -L c. -s d. -i

b. -e

Which option to the rpm command can be used to remove a package from the system? a. -r b. -e c. -u d. -U

a. route c. ip

Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.) a. route b. ipconfig c. ip d. traceroute

True

You can clear a log file simply by redirecting nothing into it. True or False?

True

You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

a. 0, 1, 2, 3, 4

You have created a full backup and four incremental backups. In which order must you restore these backups? a. 0, 1, 2, 3, 4 b. 0, 4, 3, 2, 1 c. 4, 3, 2, 1, 0 d. 1, 2, 3, 4, 0

b. Run the newaliases command.

You have modified the /etc/aliases file to include a new e-mail alias. However, when you send e-mail to the alias, it can not be delivered. What should you do? a. Add the line to the /etc/aliases.db file instead. b. Run the newaliases command. c. Restart the Postfix daemon. d. Log out of the system and then log back into the system and resend the e-mail.

b. HELO c. EHLO

You have opened a telnet session on port 25 with your e-mail server. What command can you type within your telnet session to start an e-mail session? (Choose all that apply.) a. START b. HELO c. EHLO d. WAZUP

A. cancel Printer1-17 Printer1-21

You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue? a. cancel Printer1-17 Printer1-21 b. cancel -u Printer1-17 Printer1-21 c. cancel -a Printer1-17 Printer1-21 d. cancel 17 21

d. /var/spool/cron/(the user's login name)

3. Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system? a. /etc/crontab b. /etc/cron/(the user's login name) c. /var/spool/cron d. /var/spool/cron/(the user's login name)

c. /etc/init.d

3. Which directory stores most UNIX SysV rc scripts? a. /etc/rc5.d b. /etc/rc.d c. /etc/init.d d. /usr/local/systemd

d. /etc/inittab

5. Which file does the UNIX SysV init daemon reference on startup to determine the default runlevel? a. /etc/initstate b. /inittab c. /etc/init d. /etc/inittab

True

6. As daemon processes are not associated with terminals, you must use the -e switch with the ps command to view them. True or False?

c. startx

6. Which command can be used to start X Windows, the window manager, and the default desktop environment? a. startgui b. startgdm c. startx d. gstart

A. Integrity Checking Utility (ICU)

A PERL-based program that is designed to work with AIDE to check the integrity of Linux computers remotely across a network. A. Integrity Checking Utility (ICU) B. PortSentry C. Simple WATCHer (SWATCH) D. Linux Intrusion Detection System (LIDS)

C. Snor/Airsnort

A complex IDS that can be used to capture and monitor network packets. It can be used to detect a wide range of network attacks and port probing. A. Integrity Checking Utility (ICU) B. PortSentry C. Snor/Airsnort D. Linux Intrusion Detection System (LIDS)

B. 6 Common Name: Reboot

A special runlevel used to reboot the system. A. 9 B. 6 C. 8 D. 7

True

A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False?

B. 2 Common Name: Multiuser Mode

A system that has most daemons running and allows multiple users the ability to log in and use system services. Most common network services other than specialized network services are available in this runlevel as well. A. 3 B. 2 C. 5 D. 6

B. 0 Common Name: Halt

A system that has no daemons active in memory and is ready to be powered off. A. 1 B. 0 C. 8 D. 4

A. 1 s S single Common Name: Single User Mode

A system that has only enough daemons to allow one user (the root user) to log in and perform system maintenance tasks. A. 1 s S single B. s S Single C. 3 D. 4

B. 5 Common Name: Graphical Mode

A system that has the same abilities as Extended Multiuser Mode, yet with a graphical login program. On systems that use the GNOME desktop, this program is called the GNOME Display Manager (gdm) and is started on tty1 or tty7 to allow for graphical logins. A. 7 B. 5 C. 3 D. 2

False

Along with a listing of user accounts, the /etc/passwd file contains information on account expiry. True or False?

D. Linux Intrusion Detection System (LIDS)

An IDS that involves modifying the Linux kernel to increase process and file security as well as detect security breaches. A. Integrity Checking Utility (ICU) B. PortSentry C. Simple WATCHer (SWATCH) D. Linux Intrusion Detection System (LIDS)

C. Simple WATCHer (SWATCH)

An IDS that monitors log files and alerts administrators when an intrusion is detected. A. Integrity Checking Utility (ICU) B. PortSentry C. Simple WATCHer (SWATCH) D. Linux Intrusion Detection System (LIDS)

B. PortSentry

An IDS that monitors traffic on ports and allows you to detect whether hackers are probing your ports using port scanning utilities such as nmap. A. Integrity Checking Utility (ICU) B. PortSentry C. Simple WATCHer (SWATCH) D. Linux Intrusion Detection System (LIDS)

d. (hd2,1)

8. Which of the following indicates the second partition on the third hard disk drive to GRUB? a. (hd3,2) b. (hd4,3) c. (hd2,3) d. (hd2,1)

c. schedule processes to run at a single instance in the future

9. The at command is used to________________________ . a. schedule processes to run periodically in the background b. schedule processes to run periodically on a recurring basis in the future c. schedule processes to run at a single instance in the future d. schedule processes to run in the foreground

a. X.org d. XFree86

9. Which two implementations of X Windows are commonly used in Linux? (Choose two answers.) a. X.org b. XFce c. Xconfigurator d. XFree86

c. default gateway

Before a computer can use a router, with what configuration information must it be provided? a. routing table b. subnet mask c. default gateway d. default router

True

Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?

True

DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?

-D number

Deletes a rule for a chain specified by additional arguments. Rules start at number 1. A. -D number B. -A chain C. -d address D. -R number

prompt

Displays a LILO boot prompt provided there is no message= keyword specified

C. .Z

Files that have been compressed using the compress utility typically have the________________extension. a. .tar.gz b. .gz c. .Z d. .bz2

read-only

Initially mounts the linux root filesystem as read-only to reduce any errors with running fsck during system startup.

-L chain

Lists rules for a certain chain. If no chain is given, all chains are listed. A. -L chain B. -A chain C. -d address D. -R number

False

RSA is a common symmetric encryption algorithm used by SSH and GPG. True or False?

-F chain

Removes all rules for a certain chain. If no chain is specified, it removes all rules for all chains. A. -L chain B. -d address C. -F chain D. -j action

-R number

Replaces a rule for a chain specified by additional arguments. Rules start at number 1. A. -L chain B. -A chain C. -d address D. -R number

True

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

True

The private key is used when creating a digital signature. True or False?

D. Printing

The process of sending print jobs from the print queue to the printer is called__________________ . a. spooling b. queuing c. redirecting d. printing

False

To install a new program from RPM software repositories on the Internet, you can use the yum update programname command. True or False?

a. nslookup hostname b. dig hostname c. host hostname

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.) a. nslookup hostname b. dig hostname c. host hostname d. resolve hostname

False

UIDs and GIDs are unique to the system and, once used, can never be reused. True or False?

append

Useful for manually passing information to Linux Kernel

Class B

What Class is the following info. 144.129.188.1 255.255.0.0 A. Class C B. Class A C. Class E D. Class B E. Class D

Class C

What Class is the following info. 192.168.1.1 255.255.255.0 A. Class C B. Class A C. Class E D. Class B E. Class D

Class A

What Class is the following info. 3.4.1.99 255.0.0.0 A. Class C B. Class A C. Class E D. Class B E. Class D

a. Lock the server in a server closet. c. Ensure that SELinux or AppArmor is used to protect key services.

What are best practices for securing a Linux server? (Choose all that apply.) a. Lock the server in a server closet. b. Ensure that you are logged in as the root user to the server at all times. c. Ensure that SELinux or AppArmor is used to protect key services. d. Set the default run level to 1 (Single User Mode).

b. DNS c. /etc/hosts

What are two means available to resolve a host name to the appropriate TCP/IP address? (Choose two answers.) a. DHCP b. DNS c. /etc/hosts d. /etc/resolve.conf

B. journalctl

What command can you use to view journald log entries on a system that uses Systemd? a. less b. journalctl c. syslog d. catlog

a. routers

What devices are used to transfer information from one network to another? a. routers b. LANs c. DNS servers d. DHCP servers

a. /srv/ftp

What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 14.04 FTP server? a. /srv/ftp b. /var/www/ftp c. /home/anonymous d. /var/ftp/pub

A. /etc/passwd

What is the name of the file that contains a listing of all users on the system and their home directories? a. /etc/passwd b. /etc/users c. /etc/shadow d. /etc/password

C. Logrotate

What is the name of the utility used to rotate log files? a. syslog b. jetpack c. logrotate

D. Authentication

What is the name used to describe a user providing a user name and password to log in to a system? a. validation b. authorization c. login d. authentication

a. Create zone files. c. Create NIS maps. d. Run the name daemon (named).

What must you do to transform your computer into a DNS server? (Choose all that apply.) a. Create zone files. b. Create resource records for DNS lookups. c. Create NIS maps. d. Run the name daemon (named).

a. INPUT

What type of iptables chain targets traffic that is destined for the local computer? a. INPUT b. ROUTE c. FORWARD d. OUTPUT

b. Take 50 swap statistics every 3 seconds.

What will the command sar -W 3 50 do ? a. Take 3 swap statistics every 50 seconds. b. Take 50 swap statistics every 3 seconds. c. Take 3 CPU statistics every 50 seconds. d. Take 50 CPU statistics every 3 seconds.

D. newgrp

Which command can be used to alter the primary group associated with a given user temporarily? a. usermod b. chggrp c. gpasswd d. newgrp

c. smbclient //fileserver/data

Which command can be used to connect to a remote Windows share called data on the server called fileserver? a. smbclient -L fileserver:data b. smbclient -L //fileserver/data c. smbclient //fileserver/data d. smbclient \\fileserver\data

c. testparm

Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors? a. apachectl b. sambactl c. testparm d. psql

c. xvidtune

Which command can be used to fine-tune the vsync and hsync of a video card for use in X Windows? a. vidtune b. synctune c. xvidtune d. vhtune

A. lp -d Printer1 file C. lp file

Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.) a. lp -d Printer1 file b. lp Printer1 file c. lp file d. lp -m Printer1 file

b. ulimit

Which command can increase the number of file handles that programs can open in a shell? a. ldd b. ulimit c. lba32 d. top

c. usermod -L username

Which command can you use to lock a user account? a. lock username b. secure username c. usermod -L username d. useradd -L username

c. ntpq

Which command can you use to synchronize ntpd with an NTP time source? a. ntp b. ntpquery c. ntpq d. hwclock

b. ldd

Which command indicates the shared libraries required by a certain executable program? a. ldconfig b. ldd c. rpm -V d. slconfig

C. userdel username

Which command is used to delete a user account? a. usermod -d username b. del username c. userdel username d. rm username

c. lcd

Which command within the command-line FTP utility can be used to change the current directory on the local computer? a. cd b. dir c. lcd d. get

b. ifup eth0

Which command would be used to activate the NIC aliased as eth0? a. ifup b. ifup eth0 c. ipup eth0 d. ifdown eth0

C. usermod -U username

Which command would you use to unlock a user account? a. unlock username b. open username c. usermod -U username d. useradd -U username

A. 0

Which dump level indicates a full backup? a. 0 b. 9 c. 1 d. f

C. /etc/login.defs

Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation? a. /etc/skel b. /etc/passwd c. /etc/login.defs d. /etc/default/useradd

b. /etc/dumpdates

Which file contains full and incremental back-up information for use with the dump/ restore utility? a. /etc/dumps b. /etc/dumpdates c. /etc/dumpfile d. /etc/dump.conf

d. /etc/sudoers

Which file contains information regarding the users, computers, and commands used by the sudo command? a. /etc/sudo b. /etc/su.cfg c. /etc/sudo.cfg d. /etc/sudoers

a. /etc/nsswitch.conf

Which file holds the methods to be used and the order in which they will be applied for host name resolution? a. /etc/nsswitch.conf b. /etc/resolve.conf c. /etc/hosts d. /etc/dns.conf

d. /etc/httpd/conf/httpd.conf

Which file stores the Apache configuration in Fedora 20? a. /etc/apache2/httpd.conf b. /etc/apache2.conf c. /etc/httpd.conf d. /etc/httpd/conf/httpd.conf

False

The lspci command can be used to isolate problems with X Windows. True or False?

c. init

12. The first daemon loaded on a Linux system is ________________. a. initstate b. inittab c. init d. linux

d. all instances of a process with the same name

12. The killall command terminates____________________ . a. all instances of a process with the same PPID b. all instances of a process with the same PID c. all instances of a process with the same priority d. all instances of a process with the same name

c. single

20. What keyword can be specified within a boot loader to force the system to boot to Single User Mode? a. init b. rescue c. single d. telinit

b. jobs

20. Which command can be used to see processes running in the background? a. bg b. jobs c. ps -% d. fg

c. init

4. Which process will always have a PID of 1 and a PPID of 0? a. the kernel itself b. ps c. init d. top

c. 0

4. Which runlevel halts the system? a. 1 b. 6 c. 0 d. 5

b. forking

5. A process spawning or initiating another process is referred to as______________________________. a. a child process b. forking c. branching d. parenting

c. renice -12

7. Which of the following commands will most likely increase the chance of a process receiving more time slices? a. renice 0 b. renice 15 c. renice -12 d. renice 19

b. Either the MBR/GPT or the active partition can contain the boot loader.

7. Which of the following statements is true? a. The boot loader points to the MBR/GPT. b. Either the MBR/GPT or the active partition can contain the boot loader. c. Both the MBR/GPT and the active partition point to the boot loader. d. The boot loader points to the active partition.

d. You can use the Ctrlþz key combination and the bg command.

8. How can you bypass the wait function and send a user process to the background? a. This cannot happen once a process is executing; it can be done only when the command is started by placing an ampersand (&) after it. b. This cannot happen; only daemon processes can run in the background. c. You can use the ps command. d. You can use the Ctrlþz key combination and the bg command.

c. Restart the DHCP daemon.

Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do? a. Log in as the root user and reedit the configuration file. b. Run the dhcpconf command to edit the configuration file. c. Restart the DHCP daemon. d. Restart the xinetd daemon.

c. /var/log

Most log files on the system are found in which directory? a. /etc/logfiles b. /etc/log c. /var/log d. /dev/log

True

Most source code is available on the Internet in tarball format. True or False?

False

NFS can be used to share files natively with computers running the Microsoft Windows operating system. True or False?

False?

NIS clients use NIS records to access their configuration information. True or False?

A. 4

Not normally used, but can be customized to suit your needs. A. 4 B. 7 C. 8 D. 3

a. monitoring

On which part of the maintenance cycle do Linux administrators spend the most time? a. monitoring b. proactive maintenance c. reactive maintenance d. documentation

default=

Specified the label for the default operating system kernel.

-m match

Specifies a match parameter that should be used within the rule. The most common match used is state, which creates a stateful packet filtering firewall. A. -d address B. -p protocol C. -P policy D. -m match

password=

Specifies a password required to boot the linux kernel

append=

Specifies parameters that are passed to the linux kernel when loaded.

linear

Specifies that LILO uses linear sector addressing.

image=

Specifies the absolute pathname to the Linux kernel

message=

Specifies the absolute pathname to the file that contains a graphical LILO screen that can be used instead of a prompt. Y; you can press Ctrl+X at this graphical screen to switch to the LILO boot: prompt.

-j action

Specifies the action that is taken for a rule. A. -j action B. -p protocol C. -d address D. -R number

-A chain

Specifies the chain used. A. -L chain B. -A chain C. -d address D. -R number

-P policy

Specifies the default policy for a certain chain type. A. -d address B. -p protocol C. -P policy D. -m match

-d address

Specifies the destination address of packets for a rule. A. -j action B. -p protocol C. -d address D. -R number

-dport port#

Specifies the destination port number for a rule. A. -sport port# B. -p protocol C. -dport port# D. -s address

root=

Specifies the device and the partition that contains the Linux root filesystem.

map=

Specifies the file that contains the exact location of the Linux kernel on the hard disk.

install=

Specifies the file that contains the physical layout of the disk drive.

label=

Specifies the friendly name used to identify an OS kernel within boot loader screens

-i interface

Specifies the input network interface. A. -sport port# B. -p protocol C. -dport port# D. -i interface

timeout=

Specifies the number of 1/10th seconds to wait for user input before loading the default operating system kernel.

-o interface

Specifies the output network interface. A. -o interface B. -P policy C. -j action D. -L chain

initrd=

Specifies the pathname to a ramdisk image used to load modules into memory needed for the linux kernel at boot time.

-p protocol

Specifies the protocol type for a rule. A. -d address B. -p protocol C. -P policy D. -m match

-s address

Specifies the source address of packets for a rule. A. -sport port# B. -s address C. -p protocol D. -A chain

-sport port#

Specifies the source port number for a rule. A. -sport port# B. -p protocol C. -dport port# D. -s address

boot=

Specifies where LILO should be installed. If the device specified is a partition on a hard disk, LILO is installed to the MBR on that device.

False

Stand-alone daemons are started on demand using inetd or xinetd. True or False?

False

Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?

True

The -9 option to the gzip command results in a higher compression ratio. True or False?

False

The Debian Package Manager (DPM) is the default package manager used by Fedora 20. True or False?

d. loopback address

The TCP/IP address of 127.0.0.1 is also referred to as the_______ . a. local address b. lookup address c. local host d. loopback address

False

The bzip2 and gzip utilities use similar compression algorithms. True or False?

b. port

The daemons associated with network services listen for network traffic associated with a particular____________________ . a. station b. port c. TCP/IP address d. allocation number

True

The line that configures the host name for the computer at boot time can be found in / etc/hostname. True or False?

True

The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?

B. The print queue accepts jobs into the print queue and holds them there until the printer is enabled again.

When a printer is disabled, . a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable b. the print queue accepts jobs into the print queue and holds them there until the printer is enabled again c. the printer appears as off-line when an lp request is sent d. the print queue redirects all print jobs sent to it to /dev/null

A. The print queue does not accept jobs and sends a message to the user nothing that the printer is unavailable.

When a printer is rejecting requests,______________ . a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable b. the print queue accepts jobs into the print queue and holds them there until the printer is accepting requests again c. the printer appears as off-line when a lp request is sent d. the print queue redirects all print jobs sent to it to /dev/null

C. make

When compiling source code into a binary program, which command does the compiling using the GNU C Compiler? a. tar b. ./configure c. make d. make install

b. ./configure

When compiling source code into a binary program, which command performs a system check and creates the Makefile? a. tar b. ./configure c. make d. make install

c. bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required

When performing a sar -u command, you notice that %idle is consistently 10 percent. Is this good or bad? a. good, because the processor should be idle more than 5 percent of the time b. good, because the processor is idle 90 percent of the time c. bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required d. bad, because the processor is idle 10 percent of the time and perhaps a new hard disk is required

D. facility, priority

When referring to the /etc/rsyslog.conf file, specifies information from a certain area of the system, whereas is the level of importance of that information. a. section, priority b. service, precedents c. process, degree d. facility, priority

False

When the fsck command cannot repair a nonroot filesystem, you should immediately restore all data from tape backup. True or False?

c. CNAME

Which DNS resource record is an alias to other records? a. A b. AAAA c. CNAME d. NS

a. DELETE

Which SQL statement key word can be used to delete a record within a table? a. DELETE b. DROP c. REMOVE d. CLEAR

b. Putty

Which Windows program is often used to connect to a Linux server via SSH? a. SSHD b. Putty c. Rdesktop d. mstsc


Related study sets

Interpersonal Communications Final

View Set

Week 12 NCLEX Practice Questions

View Set

Mock Exam LO1 Intrinsic and Extrinsic Factors

View Set

NURSU 454 Med Surg Respiratory Assessment HESI REVIEW

View Set