Linux - Final Exam

Ace your homework & exams now with Quizwiz!

To lock an account, you can use the usermod command with the ____ option. Selected Answer: -L -U -u -L -l

-L

To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package. -v -m -V -M

-V

When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed. Answers: .Z .c .cpm .cpz

.Z

The filename extension given to files compressed with bzip2 is ____. Answers: .bz .bz2 .gz .Z

.bz2

In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader. /load /bin /boot /mnt

/boot

The ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave). /dev/hdc1 /dev/hdb1 /dev/hda1 /dev/hdc2

/dev/hdb1

The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH. ~/.bash_profile ~/.bash_login /etc/profile ~/.profile

/etc/profile

To verify hardware settings, you can examine the contents of the ____ directory. /log /root /proc hw

/proc

The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively. 1.1.1.1; 255.255.255.255 0.0.0.0; 255.255.255.255 0.0.0.0; 256.256.256.256 1.1.1.1; 256.256.256.256

0.0.0.0; 255.255.255.255

RAID level ____ is often referred to as disk mirroring. 1 2 3 4

1

NetBIOS names can be up to ____ characters long. 15 25 50 100

15

The subnet mask for a Class C IP address is ____. 255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255

255.255.255.0

Hard disks can contain a maximum of ____ major partitions. 4 8 6 32

4

There are ____ different kill signals that the kill command can send to a certain process. 16 32 64 128

64

Each octet in an IP address represents a(n) ____ binary number. 4-bit 8-bit 4-byte 8-byte

8-bit

The shell that is used by default in Linux is the ____ shell. BASH root gdm command line

BASH

____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet. DNS DHCP NTP NIS

DNS

A(n) ____ service provides an efficient method for transferring files over the Internet. FTP DNS Web Mail

FTP

____ are the most common hardware component to fail on Linux systems. Floppy drives Hard drives NICs Video cards

Hard drives

The two most common desktop environments that are used on Linux are ____ and ____. KDE; kwin KDE; Xfce KDE; GNOME Xfce; GNOME

KDE; GNOME

The concept of ____ enables software developers to read other developers' source code, modify that source code to make the software better, and redistribute that source code to other developers who might improve it further. Open Source Software Linux Closed Source Software Freeware

Open Source Software

Client computers can retrieve email from email servers via ____ or ____. SSH; FTP POP; IMAP POP; FTP SSH; IMAP

POP; IMAP

Most Linux distributions today use ____ as their package manager. RPM PRM MPR PRMM

RPM

Apache daemon listens for HTTP requests on port ____. TCP 20 TCP 25 TCP 80 TCP 110

TCP 80

A(n) ____ is a program that can start a network daemon. network bootstrapper IP wrapper TCP wrapper daemon launcher

TCP wrapper

The most common LAN protocol used today is ____. UDP/IP IPX/SPX TCP/IP DLC

TCP/IP

If you type enough unique letters of a directory and press ____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information. Alt Ctrl Tab Esc

Tab

NTP uses port ____. TCP 20 TCP 25 UDP 69 UDP 123

UDP 123

To display the contents of a file called data, use the command ____. disp data ls data ls l data cat data

cat data

Most configuration files on Linux systems are delimited using ____ characters. tab colon space semicolon

colon

Copying a file can be accomplished using the ____ command. cp cpy copy mv

cp

A system process that is not associated with a terminal is called a(n) ____ process. daemon user parent startup

daemon

To create partitions after installation, you can use the ____ command. format formatdisk fdisk partition

fdisk

Solaris, HPUX and AIX are all ____ of Unix. versions flavors types instances

flavors

The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer. ipconfig ifconf ipconf ifconfig

ifconfig

The ____ file in the /proc directory contains statistics on the performance of the processor. loadavg cpuinfo modules kcore

loadavg

To send a print job to a printer, you must first use the ____ command and specify what to print. print pl lp pr

lp

You can restrict who can print to certain printers by using the ____ command. lpadmin lpa lpr admin

lpadmin

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the ____ command. newgroup groupmod groupadd newgrp

newgrp

To see what network services are running on your network, you can run the ____ command. map nmap nm networkmap

nmap

The ____ command sends a small TCP/IP packet to another IP address and awaits a response. ping ring png ipquery

ping

Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key. authentication ; encryption public ; private unidirectional ; bidirectional data ; code

public ; private

The ____ command will confirm the system directory that you are currently in. dir pwd whereami ld

pwd

You can use the ____ command to start, stop, or restart any daemons listed within the /etc/rc.d/init.d directory. daemon manipdaemon service daemonservice

service

The ____ command can be used to obtain root access when you need to perform an administrative task. su sudo swu switchu

su

Databases store information in the form of ____, each of which contains ____. lists; fields fields; records records; tables tables; records

tables; records

All Linux problems can be divided into ____ categories. two three four five

three

A common utility used to troubleshoot routing is the ____ command. route ip traceroute routeadd

traceroute

You can create user accounts on the Linux system by using the ____ command. uadd usercreate adduser useradd

useradd

The ____ command counts the number of lines, words, and characters in a file. pr nl tr wc

wc


Related study sets

Bio 121 | | Lectures 1-29 | Final Exam

View Set

Declaration of the Rights of Man and Citizen

View Set

FABM 1: ACCOUNTING CONCEPTS, PRINCIPLES, AND ASSUMPTIONS

View Set

Lecture 17 Ch 9 (Cytoskeleton III, motor proteins)

View Set

Nicholas and Alexandra Questions

View Set

Ch. 9.5 Functions and Their Inverses

View Set

Power Transmission and lubrication Homework review

View Set