Linux 2 Midterm

Ace your homework & exams now with Quizwiz!

Which of the following is the full path and file name where the Debian Package Manager repositories can be configured? a. /etc/dpm/repositories.conf b. /etc/dpm.conf c. /etc/apt.source.conf d. /etc/apt/sources.list

d./etc/apt/sources.list

Which of the following commands will display the print jobs in the print queue for printer1 only? a. lpq -p printer1 b. lpq -d printer1 c. lp -j printer1 d. lpstat -o printer1

d.lpstat -o printer1

When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in ___________ in the ~/.ssh/ directory.

known_hosts

Which of the following is not a valid compression file extension for the Linux operating system? a. .vz b. .gz c. .xz d. .bz2

a. .vz

The System Log Daemon, rsyslogd, creates a socket for other system processes to write to. What is the path to this socket? a. /dev/log b. /var/log.sock c. /etc/rsyslog.socket d. /tmp/log

a. /dev/log

Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command?

a. /etc/sudoers

Which of the following SQL statements can be used to delete a table from a database?

a. DROP TABLE table_name;

What DNS resource record type is used to provide the IP address for the e-mail server for a zone?

a. MX

Which of the following is a protocol originally developed by Cisco that uses TCP to handle authentication, authorization, and accounting services?

a. TACACS+

Which of the following can you use to start network daemons in order to limit which computers are allowed to connect to the network service?

a. TCP Wrapper

What is the most commonly used LAN protocol?

a. TCP/IP

Which of the following package managers are used to install RPM packages on the SUSE or openSUSE distributions by default?

a. Zypper

Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address?

a. files

Which of the following commands will generate a GPG public/private key pair?

a. gpg --gen-key

What command can be used to view and modify the date and time within the BIOS?

a. hwclock

You want to determine whether your Linux workstation was able to get assigned an IP address from the DHCP server once you connected it to the network. Which of the following legacy commands might help you determine this?

a. ifconfig eth0

Which of the following commands can you use to send a print job to printer1? (Choose all that apply.) a. lp -d printer1 mydocument.txt b. lpr -d printer1 mydocument.txt c. lp -p printer1 mydocument.txt d. lpr -P printer1 mydocument.txt

a. lp -d printer1 mydocument.txt d. lpr -P printer1 mydocument.txt

Which of the following hashing algorithm commands reduces the chances of collisions due to the bit length of the message digest? a. sha256sum b. sha1sum c. md4sum d. md5sum

a. sha256sum

When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take?

a. tracepath c. mtr d. traceroute

Which of the following files contains the list of shared libraries? a. /etc/ld.so.cache b. /lib/ld.so.conf c. /etc/ld.so.conf d. /lib/shared.conf

a./etc/ld.so.cache

What is the path to where the journald.conf file is located? a. etc/systemd/journald.conf b. /etc/rsyslog/journald.conf c.etc/rsyslogd/journald.conf d./etc/journald/journald.conf

a./etc/systemd/journald.conf

What zone configuration file contains a PTR record used to identify the loopback adapter?

a./var/named/named.local

Where is the default document root directory for the Apache Web server?

a./var/www/html

Which of the following will display the contents of the /etc/shadow file? (Choose all that apply.) a.getent shadow b.show /etc/shadow c.read /etc/shadow d.cat /etc/shadow

a.getent shadow d.cat/etc/shadow

Which of the following is a special group that provides its members with the ability to run the su and sudo commands? a. wheel b. sudoers c. adm d. sys

a.wheel

What FTP command runs a shell on the local computer?

b. !

Which of the following RPM options will update a software package to the newest version, or install the package if it does not already exist on a system? a. -i b. -U c. -F d. -u

b. -U

When using the compress command to archive a set of files into a single file, which of the following options will display the compression ratio of the individual files making up the new compressed file? a. -s b. -v c. -a d. -c

b. -v

Which of the following files contains the encrypted passwords for users on a modern Linux system by default?

b. /etc/shadow

Which of the following is a valid APIPA address?

b. 169.254.38.101

Which of the following ports should you disable so that they no longer respond to network requests on a Linux system due to a lack of encryption? (Choose all that apply.)

b. 21 c. 23

Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables?

b. INNER JOIN

Which of the following is the default option for the kind of keys to be generated when using the gpg --gen-key command?

b. RSA and RSA

You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of?

b. UDP

When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration?

b. Users must use at least 3 characters as numbers in their passwords.

Which of the following commands can you use to search available repository information? (Choose two.) a. apt query b. apt-cache c. apt-query d. apt

b. apt-cache d. apt

Which of the following commands will change the SELinux security context of a file?

b. chcon

Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.) a. rmg b. delgroup c. rmgroup d. groupdel

b. delgroup d. groupdel

Which of the following commands can be used to modify configuration options for DPM packages after they have been installed?

b. dpkg-reconfigure

Which of the following will display entries from the Name Service Switch libraries?

b. getent

Which of the following two commands can be used to add custom log file entries to the journald database? (Choose two.) a. mklog b. logger c. systemd-cat d. systemd-make e. logentry

b. logger c. systemd-cat

If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance?

b. testwr

Which of the following can be used at the command line to download a file using the HTTP protocol? (Choose two.)

b. wget

Which of the following files does the hostnamectl command modify to set the hostname on a machine?

b./etc/hostname

Which of the following commands can be used to set the number of days until user account jsmith with an expired password is disabled? a. usermod -e 15 jsmith b. usermod -f 15 jsmith c. usermod -d 15 jsmith d. usermod -x 15 jsmith

b.usermod -f 15 jsmith

Which of the following is a valid SQL statement for adding a new row of data to a SQL database table?

c. INSERT INTO users (firstname, lastname) values ('George', 'Washington');

On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination?

c. /etc/inittab

Which of the following ports would be used to resolve a domain name to an IP address?

c. 53

Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory?

c. Kerberos

Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system? a. tar b. APT c. YUM d. wget

c. YUM

Which of the following commands can be used to install the latest versions of all packages currently installed on the system from the sources configured in sources.list? a. apt-upgrade b. apt update c. apt upgrade d. apt upgrade all

c. apt upgrade

Which of the following is the log file where Dandified YUM writes its log entries? a. yumd.log b. dnf.log c. dnf.rpm.log d. dyum.log

c. dnf.rpm.log

Which of the following can you use to configure firewall rules for IPv6 on a Linux system?

c. ip6tables

Which of the following commands can you use to view events within the journald database? a. journald --list b. viewlogs --journald c. journalctl d. journal --display

c. journalctl

What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer and allows the use of wildcard metacharacters to specify the filename?

c. mput filename

Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.)

c. nameserver 10.1.1.4

Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.)

c. netstat -u

On a system running NetworkManager, which of the following commands can be used to view or modify connection information?

c. nmcli

Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel?

c. ping -c 4 server1

Which of the following commands will install an RPM package while ignoring any other packages that it may be dependent upon for proper operation? a. rpm -ivhn package.rpm b. rpm -in package.rpm c. rpm -ivh --nodeps package.rpm d. rpm -i --ignoredeps package.rpm

c. rpm -ivh --nodeps package.rpm

Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password?

c. su

Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen? a. tar -nzaf b. tar -ngac c. tar -czvf d. tar -cfza

c. tar -czvf

Which of the following files contain the path and filename where DNS servers should be configured?

c./etc/resolv.conf

Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do?

d. Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?

d. DNS

When logging into a system, you are prompted to type in a code from a small token that you carry around with you. The code on this token constantly changes. What type of technology has been implemented?

d. OTP

Which type of CM software can connect to inventory members via SSH to perform configuration management activities?

d. agentless

Which of the following is used on modern Linux distributions that reads YAML configuration files to add apps, modify existing configuration settings, or perform administrative tasks at boot time?

d. cloud-init

Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them?

d. declarative configuration

Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed? a. dpackage.log b. packages.log c. dpm.log d. dpkg.log

d. dpkg.log

If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem?

d. fsck

You run the command hostname server1 and issue the reboot command. You notice that the host name has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead?

d. hostnamectl set-hostname server1

The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up?

d. ifup eth0

Which of the following commands can be used to set the default printer for all users on a Linux system where printer1 is the name of the printer? a. lpq --set-default printer1 b. lpd -d printer1 c. lp -d printer1 d. lpoptions -d printer1

d. lpoptions -d printer1

Which of the following commands can be used to display any email messages awaiting delivery alongside the reason that they were not delivered?

d. mailq

Which of the following commands can be used to display socket information out to the terminal screen?

d. ss

Which of the following commands can be used to delete a user account? a. rmuser b. expireuser c. deluser d. userde

d. userdel

Which of the following is the first field of the /etc/passwd file? a. GECOS b. GID c. UID d. username

d. username

Which of the following utilities will allow you to view information about virtual memory usage on a Linux system?

d. vmstat

The SUSE and openSUSE Linux distributions use an alternative to yum but that provides the same functionality. What is the name of the command they use? a. dnf b. apt c. rpm d. zypper

d. zypper


Related study sets

International Business Final Exam Review

View Set

*****compiled Exam 2 sos please send help

View Set

Ch. 6 Emerging Technologies - Adaptive Learning Assignment

View Set

Unit 10: Closing Procedures/Closing the Real Estate Transaction

View Set

CompTIA Project+ Practice Assessment

View Set

Chemistry Chapter 9 Powerpoint Review

View Set

Exam 1: Unit 14 - The Real Estate Business

View Set