Linux - Final Exam study set

Ace your homework & exams now with Quizwiz!

protocol

A network _______________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.

True

Because the Makefile often includes some documented items, it is good form to read the Makefile after running the configure script. a. True b. False

1024

By default, the shell on a Linux system limits the number of file handles a program can have open to what value? a. 256 b. 512 c. 1024 d. 2048

True

By default, the smb.conf file shares all printers and home directories for recognized Windows users. a. True b. False

True

Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses. A) True B) False

False

Each device attached to a system can be represented by multiple device files. A) True B) False

True

Each process can start an unlimited number of other processes. a. True b. False

False

Fedora 20 makes use of the XFree86 implementation of X Windows. a. True b. False

True

If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon. a. True b. False

False

In Linux, you are restricted to using only one type of filesystem on a system. A) True B) False

\l

In the PostgreSQL utility, the __________________ built-in command is used to list available databases.

False

In the past, SATA hard disks were referred to as Integrated Drive Electronics (IDE) a. True b. False

authentication

In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.

True

Linux uses a logical directory tree to organize files into different folders. A) True B) False

True

Logs from the cron daemon (crond) can be viewed using the command journalctl _COMM=crond a. True b. False

True

Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project. A) True B) False

True

The cpio command has the ability to handle long filenames and can be used to back up device files. a. True b. False

True

The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length. True False

/root

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory? A) /bin B) /home/root C) /boot D) /root

True

The Very Secure FTP daemon is a stand-alone daemon. a. True b. False

nice value

The __________________ can be used to affect the process priority indirectly.

kern

The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.

awk

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below? A) sed B) grep C) awk D) nl

True

The tar utility cannot back up device files or files with filenames longer than 255 characters. a. True b. False

False

To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor. A) True B) False

False

Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy. A) True B) False

ulimit

What command can be used to change the maximum number of file handles that can be used by a program? a. fhlimit b. pgmod c. fhch d. ulimit

/var

What directory under / contains the log files and spools for a Linux system? A) /boot B) /usr C) /opt D) /var

ssh_host_dsa_key. pub

What file contains the DSA public key in the /etc/ssh directory? a. ssh_host_dsa_key b. ssh_host_dsa_key. pub c. ssh_target_dsa_key d. ssh_target_dsa_key.pub

2

What number represents the stderr file descriptor? A) 0 B) 1 C) 2 D) 3

0

What number represents the stdin file descriptor? A) 0 B) 1 C) 2 D) 3

-V

What option can be specified with the rpm command to identify any missing files in a package or package dependency? a. -v b. -m c. -V d. -M

-P

What option for the iptables command can be used to specify the default policy for a certain chain type? a. -P b. -C c. -p d. -c

False

When a user interacts with his computer, he interacts directly with the kernel of the computer's operating system. a. True b. False

False

When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory. a. True b. False

@

When issuing the ls -F command, what special character indicates a linked file

baseline

When performance issues arise, you can compare the output of performance utilities to the ______ values found in the system log book.

wc

Which command can be used to count the number lines, words, and characters in a file? A) pr B) nl C) tr D) wc

-q

Which sar command option is used to display statistics for the processor queue? a. -r b. -c c. -q d. -v

True

You can choose to use a window manager only, and not use a desktop manager. a. True b. False

True

You can use a small bootable Linux kernel (such as on a LiveCD) to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers. A) True B) False

True

You can use the sed command to remove unwanted lines of text. A) True B) False

smbclient

You can use the______________________ command to connect to both Samba and Windows servers.

True

Zombie processes are also known as defunct processes. a. True b. False

GECOS

_______________ represents a text description of the user and is typically left blank.

subnetting

____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.

file handles

The connections that a program makes to files on a filesystem. a. baseline b. buffer overrun c. file handles d. firewall daemon (firewalld)

True

At minimum, Linux typically requires only two partitions to be created: a partition that is mounted to the root directory, and a partition for virtual memory. A) True B) False

.rpm

Packages in the Red Hat Package Manager format have filenames that indicate the hardware architecture for which the software was compiled, and end with the ___________________ extension.

True

Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets. True False

False

Performance problems are caused by hardware, not software. a. True b. False

False

Pressing the Esc key at the prompt while using the more command displays a help screen. A) True B) False

False

SLIP is a newer technology than PPP. True False

-B

Select the option that, when used with the sar command, displays swap statistics: a. -B b. -b c. -s d. -q

memtest86

Select the utility below that when run will start and perform a thorough check of RAM for hardware errors: A) memcheck68 B) memtest86 C) fixram D) fsck

False

Shell scripts do not require the execute permission in order to be run the same way binary programs are run. A) True B) False

bus mastering

Some peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ______________.

ssh_host_dsa_key.pub contains the DSA public key

System-wide RSA and DSA public/private key pairs are generated the first time the SSH daemon is started. These key pairs are stored in the /etc/ssh directory for all future sessions: • ssh_host_dsa_key contains the DSA private key • ssh_host_rsa_key contains the RSA private key • ssh_host_dsa_key.pub contains the DSA public key • ssh_host_rsa_key.pub contains the RSA public key

False

A swap partition contains a filesystem A) True B) False

runlevel

A(n) ____________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.

incremental

A(n) ___________________ backup backs up only the data that has been changed since the last backup.

process

A(n) ____________________ refers to a program that is running in memory and on the CPU.

True

After a process has been started, you can change its priority by using the renice command. a. True b. False

Run the ldconfig command.

After downloading an installing any shared libraries, what should be done to ensure the list of shared library directories and the list of shared libraries are updated? a. Check the /lib, /lib64, /usr/lib, or /usr/lib64 directories for the library. b. Run the ldconfig command. c. Run a program that uses the shared libraries. d. Perform a system restart.

True

All DNS servers contain a DNS cache file. a. True b. False

False

Almost all hardware problems are the result of damaged hardware. a. True b. False

True

Any command that can be executed on the command line can also be placed inside any environment file. A) True B) False

jabbering

Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called? a. flooding b. hiccuping c. jabbering d. dumping

False

On closed-source operating systems, hot fixes for software bugs are deployed very quickly. A) True B) False

True

Open Source Software (OSS) is freely developed and continuously improved by a large community of software developers A) True B) False

file handles

Processes can initiate numerous connections, called _____, to files on the filesystem in addition to standard input, standard output, and standard error.

rogue

Processes that have encountered an error during execution and continuously uses up system resources are referred to as ____________________ processes.

B) tty1

Question 1 In Fedora 20, what terminal is used for graphical login? A) tty0 B) tty1 C) tty2 D) tty4

memtest86

Question 2 Select the utility below that when run will start and perform a thorough check of RAM for hardware errors: A) memcheck68 B) memtest86 C) fixram D) fsck

exit

Question 3 After a shell is no longer needed, what command can be given to exit the shell? A) exit B) stop C) reset D) quit

Set

The environment variables that are set by default and their current values can be viewed with what command? A) env B) get C) Set D) setenv

master or primary

The first DNS server in a zone is called the ___________________ DNS.

False

The killall command uses the PID to kill a process. a. True b. False

False you need to use the recursive option (-R) "rmdir -R" to remove directory and all its subdirectories

The rmdir command automatically removes a directory and all of its subdirectories and files. A) True B) False

False

The rmdir command automatically removes a directory and all of its subdirectories and files. A) True B) False

False

The secure log file contains information regarding the last user to log into a system. a. True b. False

segmentation fault

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred? A) page fault B) IRQ fault C) segmentation fault D) RAM failure

SIGHUP

If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below: a. SIGINT b. SIGQUIT c. SIGTERM d. SIGHUP

default gateway

The IP address of the network interface on the router to which you send packets is called the _______________.

startx

The ________ command can be used to start X Windows and the default window manager or desktop environment.

kern

The ________________ facility used by the System Log Daemon specifies messages from the Linux kernel.

bzcat

To view the contents of a file that was compressed with the bzip2 utility, you must use the ______ command.


Related study sets

THE TRAGEDY OF JULIUS CAESAR BY WILLIAM SHAKESPEARE: ACT 3.2-3.2

View Set

Review Chapter 2 NE, Security Awareness ch 1 quiz

View Set

ATI Fundamentals for Nursing Review Module

View Set

Speed, Time, and Distance Practice Problems

View Set