Linux +

Ace your homework & exams now with Quizwiz!

In NTP, stratum ____ consists of atomic devices or GPS clocks.

0

The IP addresses___and___ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

0.0.0.0; 255.255.255.255.

To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command. 1) -t 2) -f 3) -c 4) -o

1) -t

It is good form to check the installation log files after installation as well as verify settings on the system after installation to ensure that all hardware was detected with the correct values. 1) True 2) False

1) True

To check whether the /mnt/floppy directory is being used by any users, you can use the fuser command with the -u option 1) True 2) False

1) True

To perform a Linux installation over a network, you can connect to a server with the appropriate installation files via FTP. 1) True 2) False

1) True

To view the size of a directory and its contents in Kilobytes, you can use the du command. 1) True 2) False

1) True

You can use a small bootable Linux kernel to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers. 1) True 2) False

1) True

Should most files residing in a user's home directory be owned by that user? 1) Yes 2) No

1) Yes

You can edit the quotas for certain users by using the ____ command. 1) edquota 2) editquota 3) quota 4) repquota

1) edquota

Some installation fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders.

1024

The shell restricts the number of file handles that programs can open to ____ by default.

1024

The BIOS configurations on different computers are generally very similar or exactly the same. 1) True 2) False

2) False

____ installation log file(s) is/are created by the Fedora installation program. 1) One 2) Two 3) Three 4) Four

2) Two

The subnet mask for a Class B IP address is ____.

255.255.0.0

The subnet mask for a Class C IP address is ____.

255.255.255.0

In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader. 1) /load 2) /bin 3) /boot 4) /mnt

3) /boot

Devices that transfer data in a character-by-character fashion are referred to as ____ devices. 1) text 2) block 3) character 4) binary

3) character

In the FHS, the ____ directory is the root user's home directory. 1) /bin 2) /home 3) /boot 4) /root

4) /root

If a Linux installation ends abnormally and the screen displays a "fatal signal ____" error message, it indicates an error known as a segmentation fault. 1) 0 2) 1 3) 10 4) 11

4) 11

The compression algorithm used by the compass utility has an average compression ratio of _____%

40-50

By default, all print jobs have a priority of____.

50

If no level of compression is specified, the gzip command assumes the number____.

6

The average compression ratio for gzip is ______%

60-70

Each octet in an IP address represents a(n)_____ binary number.

8-bit

IPv6 IP addresses are delimited by the ____ character.

:

The _____ priority used by the system log daemon indicates an error that should be rectified immediately, such as a corrupt system database.

Alert

On a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.

Cancel

____________________ is used to reduce the size of a file or set of files.

Compression

____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet.

DNS

The ____ SQL statement is used to delete a database.

DROP DATABASE

The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.

DirectoryIndex index.html

A LILO version available for Intel Pentium and Itanium computers that use Extensible Firmware Interface (EFI).

ELILO

Most printers are plug and play compatible and must be manually configured when they are plugged into the system.

False

When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.

False

When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.

False

Most common boot loader on modern Linux systems.

Grand unified bootloader

When working with Sendmail, you can use the ____ command to test SMTP support.

HELO

To send a print job to a printer, you nust first use the ___ command and specify what to print.

Ip

You can restrict who can print to certain by using the ____ command.

Ipadmin

The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.

Kern

The first readable sector of a hard disk, where partition definitions are stored

MBR

The first readable sector of a hard disk, where partition definitions are stored.

MBR

Shares password databases among Linux systems

Network Information Service (NIS)

What are specific letters that start with a dash (-)?

Options

Client computers can retrieve e-mail from e-mail servers via ____ or ____.

POP; FTP

Most linux distributions today use____ as their package manager.

RPM

When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.

SIGHUP

The ___ log file contains information and error messages regarding netork access generated by daemons such as sshd and xinetd.

Secure

Hard disk quotas that the user can exceed for a certain period of time.

Soft limits

_____ of the GRUB boot loader typically resided on the Master boot record

Stage 1

____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.

Subnetting

Apache daemon listens for HTTP requests on port ____.

TCP 80

A(n) ____ is a program that can start a network daemon.

TCP wrapper

The most command LAN protocol used today is____.

TCP/IP

The /etc/resolv.conf file can contain up to ____ DNS servers.

Three(3)

A route table is a list of TCP/IP networks that is stored in system memory.

True

All DNS servers contain a DNS cache file

True

Class D addresses are used for multicasting.

True

Passwords used by the PPP daemon are stored in two files:/etc/ppp/pap-secrets and /etc/ppp/chap-secrets.

True

The compress utility preserves the original ownership, modification, and access time for each file that it compresses.

True

The tar utility cannot back up device files or files with filenames longer than 255 characters

True

The use of NFS is less common than the use of FTP to transfer files on public networks.

True

The very secure FTP Daemin is a stand-alone Daemon.

True

NTP uses port ____.

UDP 123

Modifies the look and feel of X Windows

Window manager

Programs that tell X Windows how to draw teh graphics and display the reult

X Client

___ is a freely available version of X Windows used in many Linux Distributions.

XFree86

Partition to which the MBR points

active partition

Specify a commands' working parameters

arguments

In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.

authentication

Program started by the BIOS that loads the Linux kernel into memory from a hard disk partition inside the computer

boot loader

Some peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ____________________.

bus mastering

To view the contents of a file that was compressed with the bzip2 utility, you must use the ____________________ command.

bzcat

Devices that transfer data in a character-by-character fashion are referred to as______devices.

character

Command used to change the ownership of a file or directory.

chown

A system process tha performs useful tasks, such as printing, scheduling, and operating system maintenance

daemon

The IP address of the network interface on the router to which you send packets is called the ____________________.

default gateway

The easiest method for monitoring free space by mounted filesystems is to use the _____ command

df

Shell variables that are typically set by the system and contain information that the system and programs access regularly

environment variables

Labels representing command input and output

file descriptors

Creating a filesystem on a device is commonly referred to as ____________________.

formatting

To create an encrypted password for use in the /boot/grub/grub.conf, you can use the ____ command

grub-md5-crypt

Rigid quota limits that the user cannot exceed

hard limits

Rigid quota limits that the user cannot exceed.

hard limits

IPv6 IP addresses are written using eight 16-bit ____ numbers.

hexadecimal

The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

ifconfig

In the /etc/lilo.conf file, the ____ keyword specifies the absolute pathname to the Linux kernel.

image=

A(n) ____________________ backup backs up only the data that has been changed since the last backup.

incremental

Another name for runlevels

initstates

In the /etc/lilo.conf file, the ____ keyword specifies the file that contains the physical layout of the disk drive.

install=

To see a list of all printers on the system and their status, you can use the -t option to the _____ command.

ipstat

The two most common dsktop environments that are used on Linux are ____and____.

kde and gnome

The first DNS server in a zone is called the ____________________ DNS server.

master or primary

The ______ window manager is used for the GNOME desktop in Red Hat Fedora Core 2

metacity

Two or more computers that are connected with media that can exchange information are called a(n) ____________________.

network

When working with Sendmail, if you modify the /etc/aliases file, you need to run the ____ command to rebuild the aliases database

newaliases

You can perform up to____ different incremental backups using the dump/restore utility.

nine

To see what network services are running on your network, you can run the ____ command.

nmap

Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.

nohup

Command used to test network connectivity

ping

Command used to test network connectivity.

ping

The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

ping

Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.

public ; private

To Convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.

pwconv

Databases store information in the form of ____, each of which contains ____.

records; tables

The _____ filesystem contains most of the operating system files.

root

Packages in the Red Hat Package Manager format have filenames that indicate the hardware architecture for which the software was compiled, and end with the ____________________ extension.

rpm

You can use the ____ command to start, stop, or restart any daemons listed within the /etc/rc.d/init.d directory.

service

Files that are typically used to create custom programs that perform administrative tasks on Linux systems.

shell scrpits

A file that allows a process on another computer to write to a file on the local computer while another process reads from that file

socket file

Any error messages generated by a command

stderr

By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.

ten

A common utility used to troubleshoot routing is the ____ command.

traceroute

Command used to create modify filesystem parameters.

tune2fs

You can create user accounts on the Linux system by using the ____.

useradd

After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility withing the desktop environment.

xvidtune

The____ command can be used to display the contents of a compressed file.

zcat

You can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command

$

The ____ option for the sar command is used to display swap statistics.

-B

The______ option, when used with the Gzip Command, causes the compression ratio for files that have been compressed to be listed.

-I

To lock an account, you can use the usermod command with the____ option.

-L

The ____ option to the iptables command can be used to specify the default policy for a certain chain type.

-P

To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.

-V

When used with the uncompress command, the ___ option displays the contents of the compressed file to Standard Output.

-c

The ____ option to the iptables command can be used to specify the destination address of packets for a rule.

-d

The ip command uses the ___ option to specify the destination printer name.

-d

To remove a package from the system, you can use the ___ option to the rpm command.

-e

When used with the uncompressed command, the _____ option can be used to compress symbolic links.

-f

When using the cpio utility, the ___ option causes a new archive to be created.

-o

The ___ option to the ipstat command causes a list of printers that are enabled to be displayed.

-p

When used with the tar utility, the ___ option causes filenames to be stored in an archive using absolute pathnames.

-p

The ____ option for the sar command is used to displays statistics for the processor queue.

-q

You can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents.

-r

To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.

-t

The _____ option can be used with the tar command to extract a specified archive.

-x

When using the compress utility, each file is renamed with a(n)_____ filename extension to indicate that is compressed.

.Z

The Filename extension given to files compressed with bzip2 is ____.

.bz2

In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader

/boot

The Linux kernel is stored in the _____ directory.

/boot

Directory that stores device files.

/dev

Directory that stores devices files

/dev

The _____ environment fiel is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.

/etc/profile

After the entries in /etc/inittab have been executed, the ____ file is executed to perform tasks that must occur after system startup.

/etc/rc.d/rc.local

If your system uses the X.org implementation of X Windows, the mouse, keyboard, monitor, and video adapter card information is stored in the ____ file in text format

/etc/x11/xorg.conf

In FHS, the ____ directory is the root user's home directory

/root

File that contains a lists of packages that were installed as well as a list of those that were not installed

/root/install.log

File that lists all of the system events that occurred during the installation, such as the creation of user and group accounts

/root/install.log.syslog

The ____ zone configuration file contains a PTR record used to identify the loopback adapter.

/var/named/named.local

A Linux system in runlevel ___ is a system that has no daemons active in memory and is ready to be powered off

0

The ____ ftp utility command runs a shell on the local computer.

!


Related study sets

Test 3 - Recip; repair, re-assembly, testing

View Set

Begin: Exam - Chapters 12 and 13

View Set

Prep-U Chapter 14: Shock and Multiple Organ Dysfunction Syndrome

View Set

Genetics Chapter 19: Gene Mutation, DNA Repair and Recombination

View Set