Linux Final

Ace your homework & exams now with Quizwiz!

True

1. A directory is a type of file. True or False?

True

1. A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False?

False

1. A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when viewed using the ls -l command. True or False?

False

1. Because Standard Error and Standard Output represent the results of a command and Standard Input represents the input required for a command, only Standard Error and Standard Output can be redirected to/from a file. True or False?

True

1. Most source code is available on the Internet in tarball format. True or False?

False

1. NFS can be used to share files natively with computers running the Microsoft Windows operating system. True or False?

False

1. SAS transfers data to SCSI disks via parallel cables. True or False?

d. printing

1. The process of sending print jobs from the print queue to the printer is called . a. spooling b. queuing c. redirecting d. printing

d. BASH

1. What is the default shell in Linux called? a. SH b. BSH c. CSH d. BASH

c. xvidtune

1. Which command can be used to fine-tune the vsync and hsync of a video card for use in X Windows? a. vidtune b. synctune c. xvidtune d. vhtune

d. ps

1. Which command entered without arguments is used to display a list of processes running in the current shell? a. ppid b. list c. pid d. ps

d. parted

1. Which of the following commands can be used to create partitions on either a MBR or GPT hard disk? a. gdisk b. cfsck c. fdisk d. parted

b. shell

10. After you log in to a terminal, you receive a user interface called a . a. GUID b. shell c. text box

True

10. DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?

c. a 50-pin connector

10. SCSI devices that use an 8-bit-wide data path use ________________. a. an 8-pin connector b. a 15-pin connector c. a 50-pin connector d. a 68-pin connector

False

10. The Debian Package Manager (DPM) is the default package manager used by Fedora 20. True or False?

a. crontab

10. What command is used to view and modify user jobs scheduled to run with cron? a. crontab b. cron c. ps d. sched

a. routers

10. What devices are used to transfer information from one network to another? a. routers b. LANs c. DNS servers d. DHCP servers

b. shows the size of all directories within the /var directory

10. What does the du /var command do? a. shows the users connected to the /var directory b. shows the size of all directories within the /var directory c. dumps the /var directory d. displays the amount of free space in the /var directory

a. /etc/rc2.d

10. What is the name of the directory that contains symbolic links to UNIX SysV rc scripts for runlevel 2? a. /etc/rc2.d b. /etc/init.d/rc2.d c. /etc/runlevel/2 d. /etc/inittab/rc2/d

c. logrotate

10. What is the name of the utility used to rotate log files? a. syslog b. jetpack c. logrotate d. logbackup

d. the data in the file you modified as well as the data in all hard-linked files are modified because they share the same data and all have the same inode and file size

10. When you change the data in a file that is hard-linked to three others, _____________. a. only the data in the file you modified is affected b. only the data in the file you modified and any hard-linked files in the same directory are affected c. the data in the file you modified and the data in all hard-linked files are modified because they have different inodes d. the data in the file you modified as well as the data in all hard-linked files are modified because they share the same data and all have the same inode and file size

b. strings

10. Which command searches for and displays any text contents of a binary file? a. text b. strings c. od d. less

d. /etc/sudoers

10. Which file contains information regarding the users, computers, and commands used by the sudo command? a. /etc/sudo b. /etc/su.cfg c. /etc/sudo.cfg d. /etc/sudoers

d. !

10. Which of the following operators reverses the meaning of a test statement? a. #! b. -o c. -a d. !

d. parent process ID

11. Every process has a process ID and a . a. fork process b. daemon c. child process d. parent process ID

d. Press the Esc key.

11. How can a user switch from insert mode to command mode when using the vi editor? a. Press the CtrlþAltþDel keys simultaneously. b. Press the Del key. c. Type in a : character. d. Press the Esc key.

a. /boot

11. In what directory is Stage2 of the GRUB2 boot loader stored? a. /boot b. /root c. /bin d. /

b. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1

11. The command chmod 317 file1 would produce which of the following lines in the ls command? a. --w-r--rwx 1 user1 root 0 Apr 29 15:40 file1 b. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1 c. -rwxrw-r-x 1 user1 root 0 Apr 29 15:40 file1 d. --w-rw-r-e 1 user1 root 0 Apr 29 15:40 file1

False

11. Users enter commands directly to the kernel of the Linux operating system. True or False?

b. displays the number of inodes used and available in an ext2 filesystem

11. What does the command dumpe2fs -h do? a. backs up an ext2 filesystem b. displays the number of inodes used and available in an ext2 filesystem c. dumps an ext2 filesystem d. is not a valid command

d. −20 and 19

13. Nice values are used to affect process priorities using a range between . a. 0 and 20 b. 0 and −19 c. −19 and 20 d. −20 and 19

d. loopback address

13. The TCP/IP address of 127.0.0.1 is also referred to as the . a. local address b. lookup address c. local host d. loopback address

False

13. To install a new program from RPM software repositories on the Internet, you can use the yum update programname command. True or False?

d. /test

13. To which directory will the test ZFS volume from the previous question be mounted by the ZFS system? a. /mnt/test b. /media/test c. /zfs/test d. /test

b. spools and log files

13. What does the /var directory contain? a. various additional programs b. spools and log files c. temporary files d. files that are architecture-independent e. local variance devices

c. filea, fileb, filec

13. What will the following wildcard regular expression return: file[a-c]? a. filea-c b. filea, filec c. filea, fileb, filec d. fileabc

d. facility, priority

13. When referring to the /etc/rsyslog.conf file, specifies information from a certain area of the system, whereas is the level of importance of that information. a. section, priority b. service, precedents c. process, degree d. facility, priority

b. init 1

13. Which command causes the system to enter Single User Mode? a. init 0 b. init 1 c. init 6 d. initstate 5

b. Ensure that only necessary services are running.

13. Which of the following actions should you first take to secure your Linux computer against network attacks? a. Change permissions on key system files. b. Ensure that only necessary services are running. c. Run a checksum for each file used by network services. d. Configure entries in the /etc/sudoers file.

a. the CREATE DATABASE statement within the PostgreSQL utility. d. the createdb command.

13. Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.) a. the CREATE DATABASE statement within the PostgreSQL utility. b. the ADD DATABASE statement within the PostgreSQL utility. c. the adddb command. d. the createdb command.

c. You did not append the Standard Error to the Error file, and as a result it was overwritten when the command was run a second time.

13. You have redirected Standard Error to a file called Errors. You view the contents of this file afterward and notice that there are six error messages. After repeating the procedure, you notice that there are only two error messages in this file. Why? a. After you open the file and view the contents, the contents are lost. b. The system generated different Standard Output. c. You did not append the Standard Error to the Error file, and as a result it was overwritten when the command was run a second time.

a. man -k flush

13. You know a Linux command will perform a desired function for you, but you cannot remember the full name of the command. You do remember it will flush a variable from your system. Which command typed at a command prompt displays a list of commands that would likely contain the command you desire? a. man -k flush b. man -k find all c. man flush d. man -key flush

b. has no data sectiond. displays a major and minor number in place of a file size

14. A device file . (Choose all that apply.) a. has no inode section b. has no data section c. has no size d. displays a major and minor number in place of a file size e. has a fixed size of 300 kilobytes 5

a. 1U

14. Linux servers are typically installed in a rack using rackmount server hardware. Which of the following is used to describe the minimum height of a rackmount server? a. 1U b. Series A c. Type A d. Level 5

c. /var/log

14. Most log files on the system are found in which directory? a. /etc/logfiles b. /etc/log c. /var/log d. /dev/log

False

14. Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?

True

14. The line that configures the host name for the computer at boot time can be found in / etc/hostname. True or False?

True

14. The sed and awk commands are filter commands commonly used to format data within a pipe. True or False?

a. seconds

14. The timeout value in the GRUB configuration file is measured in? a. seconds b. 1/10 of minutes c. 1/10 of seconds d. 1/100 of seconds

c. It moves a directory. d. It moves a file.

14. What does the mv command do? (Choose all that apply.) a. It makes a volume. b. It makes a directory. c. It moves a directory. d. It moves a file.

d. daemon process

14. What is the name given to a process not associated with a terminal? a. child process b. parent process c. user process d. daemon process

b. Take 50 swap statistics every 3 seconds.

14. What will the command sar -W 3 50 do ? a. Take 3 swap statistics every 50 seconds. b. Take 50 swap statistics every 3 seconds. c. Take 3 CPU statistics every 50 seconds. d. Take 50 CPU statistics every 3 seconds.

d. quit without saving any changes

14. What will typing q! at the : prompt in command mode do when using the vi editor? a. quit because no changes were made b. quit after saving any changes c. nothing because the ! is a metacharacter d. quit without saving any changes

b. who

14. Which command displays the users who are currently logged in to the Linux system? a. finger b. who c. id d. d. date

b. /etc/dumpdates

14. Which file contains full and incremental back-up information for use with the dump/ restore utility? a. /etc/dumps b. /etc/dumpdates c. /etc/dumpfile d. /etc/dump.conf

d. chmod u=x,g=r,o=wx file1

15. A file has the following permissions: r-- --x-w-. The command chmod 143 would have the same effect as the command _______________. (Choose all that apply.) a. chmod u+x-r,g+r-x,o+w file1 b. chmod u=w,g=rw,o=rx file1 c. chmod u-r-w,g+r-w,o+r-x file1 d. chmod u=x,g=r,o=wx file1 e. chmod u+w,g+r-w,o+r-x file1 f. chmod u=rw,g=r,o=r file1

e. the first 10 lines of the file mary

15. A user types in the command head /poems/mary. What will be displayed on the terminal screen? a. the first line of the file mary b. the header for the file mary c. the first 20 lines of the file mary d. the last 10 lines of the file mary e. the first 10 lines of the file mary

False

15. To kill a process running in the background, you must place a % character before its process ID. True or False?

a. Nothing is wrong with the command.

15. What is wrong with the following command string: ls /etc/hosts >listofhostfile ? a. Nothing is wrong with the command. b. The file descriptor was not declared; unless 1 for standard output or 2 for standard error is indicated, the command will fail. c. The ls command is one of the commands that cannot be used with redirection. You must use | to pipe instead. d. The file listofhostfile will always only contain standard error because a file descriptor was not declared.

a. Create zone files. d. Run the name daemon (named).

15. What must you do to transform your computer into a DNS server? (Choose all that apply.) a. Create zone files. b. Create resource records for DNS lookups. c. Create NIS maps. d. Run the name daemon (named).

b. 1

15. Which RAID level is also referred to as mirroring? a. 0 b. 1 c. 4

b. ifup eth0

15. Which command would be used to activate the NIC aliased as eth0? a. ifup b. ifup eth0 c. ipup eth0 d. ifdown eth0 564 Chapter 12 Network Configuration

c. /etc/login.defs

15. Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation? a. /etc/skel b. /etc/passwd c. /etc/login.defs d. /etc/default/useradd

c. nmap

15. Which of the following commands can be used to scan the available ports on computers within your organization? a. traceroute b. tracert c. nmap d. sudo

d. /dev/nst0

15. Which of the following represents the first nonrewinding SCSI tape device on a system? a. /dev/st0 b. /dev/ht0 c. /dev/nht0 d. /dev/nst0

c. VGs are comprised of one or more PVs.

15. Which of the following statements regarding LVM structure is correct? a. PVs are collections of VGs. b. LVs are created from the free space available within PVs. c. VGs are comprised of one or more PVs. d. PVs use the space within LVs to create VGs.

c. #

15. Which prompt does the root user receive when logged in to the system? a. $ b. @ c. # d. !

d. grub2-mkconfig

15. You have recently modified the options within the /etc/default/grub file. What command can you use next to rebuild the GRUB2 configuration file? a. grub2-install b. grub-install c. grubby d. grub2-mkconfig

True

16. The lvextend command can be used to add additional unused space within a volume group to an existing logical volume. True or False?

d. displays the contents of a file in reverse order, last line first and first line last

16. The tac command . a. is not a valid Linux command b. displays the contents of hidden files c. displays the contents of a file in reverse order, last word on the line first and first word on the line last d. displays the contents of a file in reverse order, last line first and first line last

d. searches for a file only in directories that are in the PATH variable

16. The which command _______________. a. can only be used to search for executables b. searches for a file in all directories, starting from the root c. is not a valid Linux command d. searches for a file only in directories that are in the PATH variable

b. journalctl

16. What command can you use to view journald log entries on a system that uses Systemd? a. less b. journalctl c. syslog d. catlog

a. /srv/ftp

16. What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 14.04 FTP server? a. /srv/ftp b. /var/www/ftp c. /home/anonymous d. /var/ftp/pub

b. 9

16. What kill level signal cannot be trapped? a. 1 b. 9 c. 3 d. 15

a. mouse keys b. high contrast c. sticky keys d. on-screen keyboard

16. Which of the following are common assistive technologies? (Choose all that apply.) a. mouse keys b. high contrast c. sticky keys d. on-screen keyboard

a. Standard Input b. Standard Deviation

16. Which of the following is not necessarily generated by every command on the system? (Choose all that apply.) a. Standard Input b. Standard Deviation c. Standard Output d. Standard Error

d. 23

16. Which of the following port numbers is associated with telnet? a. 20 b. 137 c. 49 d. 23

b. -L

16. Which option to the dpkg command can be used to list the files that comprise a package? a. -l b. -L c. -s d. -i

a. $

16. Which prompt do regular users receive when logged in to the system? a. $ b. @ c. # d. !

c. Modify the daemon configuration file within the /etc/init directory.

16. You wish to configure the runlevels that a particular upstart daemon is started in. What should you do? a. Run the appropriate update-rc.d command. b. Modify the contents of the /etc/rc[runlevel].d directories. c. Modify the daemon configuration file within the /etc/init directory. d. Run the appropriate systemctl command.

False

16. ZFS volumes are mounted at boot time from entries within /etc/fstab by default. True or False?

d. is a rogue process

17. A runaway process that is faulty and consuming mass amounts of system resources . a. is a zombie process b. is an orphaned process c. has a PPID of Z d. is a rogue process

True

17. Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?

True

17. Hard links need to reside on the same filesystem as the target, whereas symbolic links need not be on the same filesystem as the target. True or False?

d. Precede the string with a ^.

17. How can you specify a text pattern that must be at the beginning of a line of text using a regular expression? a. Precede the string with a /. b. Follow the string with a \. c. Precede the string with a $. d. Precede the string with a ^.

c. usermod -U userna

17. Which command would you use to unlock a user account? a. unlock username b. open username c. usermod -U username d. useradd -U username

a. read

17. Which construct can be used in a shell script to read Standard Input and place it in a variable? a. read b. sum c. verify d. test

b. /etc/sysconfig/network-scripts/ifcfg-eth0

17. Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system? a. /etc/sysconfig/network-scripts/ifcfg-eth1 b. /etc/sysconfig/network-scripts/ifcfg-eth0 c. /etc/sysconfig/network-scripts/ipcfg-eth0 d. /etc/sysconfig/network-scripts/ipcfg-eth1

a. AIDE c. tripwire

17. Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? (Choose all that apply.) a. AIDE b. SWATCH c. tripwire d. Snort

b. systemctl stop lala.service

17. Which of the following Systemd commands can be used to stop a daemon called lala? a. service stop lala b. systemctl stop lala.service c. chkconfig stop lala d. stop lala

d. all of the above

17. Which of the following could result in a segmentation fault (fatal signal 11) during a Fedora installation? a. RAM problems b. overclocked CPU c. improper device driver d. all of the above

d. sdb3

17. Which of the following refers to the third primary partition on the second SCSI hard disk within Linux? a. hdb2 b. sda3 c. hdb3 d. sdb3

b. -e

17. Which option to the rpm command can be used to remove a package from the system? a. -r b. -e c. -u d. -U

d. /dev/sdc1

17. You plug a USB flash memory drive into a system that has two SATA hard disks. How will the partition on this USB flash memory drive be identified by Linux? a. /dev/sda1 b. /dev/sda2 c. /dev/sdb1 d. /dev/sdc1

True

18. A for construct is a loop construct that processes a specified list of objects. As a result, it is executed as long as there are remaining objects to process. True or False?

False

18. Along with a listing of user accounts, the /etc/passwd file contains information on account expiry. True or False?

c. default gateway

18. Before a computer can use a router, with what configuration information must it be provided? a. routing table b. subnet mask c. default gateway d. default router

True

18. Linux has only one root directory per directory tree. True or False?

c. slow and narrow

18. SCSI-1 is also referred to as ________________. a. fast and wide b. slow and wide c. slow and narrow d. fast and narrow

a. causes all new files created in the directory to have the same group membership as the directory, and not the entity that created them

18. When applied to a directory, the SGID special permission _______________. a. causes all new files created in the directory to have the same group membership as the directory, and not the entity that created them b. cannot be used, because it is applied only to files c. allows users the ability to use more than two groups for files that they create within the directory d. causes users to have their permissions checked before they are allowed to access files in the directory

False

18. When the fsck command cannot repair a nonroot filesystem, you should immediately restore all data from tape backup. True or False?

b. There is a question mark in the TTY column.

18. When you run the ps command, how are daemon processes recognized? a. The terminal is listed as tty0. b. There is a question mark in the TTY column. c. There is an asterisk in the STIME column. d. There is a "d" for daemon in the terminal identification column.

a. DELETE

18. Which SQL statement key word can be used to delete a record within a table? a. DELETE b. DROP c. REMOVE d. CLEAR

c. mount /etc/fstab

18. Which command mounts all existing filesystems in /etc/fstab? a. mount -f b. mount -a c. mount /etc/fstab d. mount /etc/mtab

a. chkconfig --level 123 lala on

18. Which of the following commands can be used to start a UNIX SysV daemon called lala in runlevels 1, 2, and 3? a. chkconfig --level 123 lala on b. update-rc.d lala defaults c. systemctl enable lala 123 d. service enable lala 123

d. tar -zcvf /dev/st0 *

18. Which of the following commands creates an archive? a. tar -cvf /dev/st0 b. tar -xvf /dev/st0 c. tar -tvf /dev/st0 d. tar -zcvf /dev/st0 *

c. swap a. /

18. Which two partitions do you typically create at minimum during a Fedora Linux instal- lation? (Choose two answers.) a. / b. /boot c. swap d. /home

c. Mount the filesystem and check the lost+found directory underneath the mount point.

19. A user runs the fsck command with the -a option on a filesystem that is showing signs of corruption. How would that user locate any files the system was unable to repair? a. Look in the root of the filesystem. b. The system prompts the user for a target location when it comes across a file it cannot repair. c. Mount the filesystem and check the lost+found directory underneath the mount point. d. View the contents of the directory /lostþfound.

True

19. If you boot your computer from Linux live media, you will be able to use a fully func tional Linux system prior to installing Linux on permanent storage. True or False?

c. [!a-d]

19. Using wildcard metacharacters, how can you indicate a character that is NOT a or b or c or d? a. [^abcd] b. not [a-d] c. [!a-d] d. !a-d

b. graphical.target

19. What Systemd target corresponds to runlevel 5? a. multi-user.target b. graphical.target c. system.target d. runlevel5.target

d. It appends Standard Output to a file.

19. What does >> accomplish when entered on the command line after a command? a. It redirects both Standard Error and Standard Output to the same location. b. It does not accomplish anything. c. It redirects Standard Error and Standard Input to the same location. d. It appends Standard Output to a file.

b. ./configure

19. When compiling source code into a binary program, which command performs a system check and creates the Makefile? a. tar b. ./configure c. make d. make install

c. bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required

19. When performing a sar -u command, you notice that %idle is consistently 10 percent. Is this good or bad? a. good, because the processor should be idle more than 5 percent of the time b. good, because the processor is idle 90 percent of the time c. bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required d. bad, because the processor is idle 10 percent of the time and perhaps a new hard disk is required

c. ntpq

19. Which command can you use to synchronize ntpd with an NTP time source? a. ntp b. ntpquery c. ntpq d. hwclock

b. mv

19. Which command do you use to rename files and directories? a. cp b. mv c. rn d. rename

c. top

19. Which command is used to gain real-time information about processes running on the system, with the most processor-intensive processes appearing at the beginning of the list? a. ps b. ps -elf c. top d. top -l

a. Apache (httpd)d. DNS (named)

19. Which of the following are stand-alone daemons? (Choose all that apply.) a. Apache (httpd) b. Washington University FTP (in.ftpd) c. telnet (in.telnetd) d. DNS (named)

a. package selection b. boot loader configuration c. system host name d. update configuration

19. Which of the following items are you typically required to configure during a Linux server installation? (Choose all that apply.) a. package selection b. boot loader configuration c. system host name d. update configuration

a. cancel Printer1-17 Printer1-21

19. You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue? a. cancel Printer1-17 Printer1-21 b. cancel -u Printer1-17 Printer1-21 c. cancel -a Printer1-17 Printer1-21 d. cancel 17 21

False

2. After a partition on a hard disk drive is formatted with a filesystem, all partitions on that hard disk drive must use the same filesystem. True or False?

c. exported

2. Before a user-defined variable can be used by processes that run in subshells, that variable must be . a. imported b. validated by running the env command c. exported d. redirected to the BASH shell

d. info

2. What equivalent to the man command generally provides an easier-to-read description of the queried command and also contains links to other related information? a. who b. man help c. man -descriptive d. info

c. FHS

2. What was created to define a standard directory structure and common file location for Linux? a. FSH b. X.500 c. FHS d. root directory

b. Putty

2. Which Windows program is often used to connect to a Linux server via SSH? a. SSHD b. Putty c. Rdesktop d. mstsc

d. pwd

2. Which command would a user type on the command line to find out which directory in the directory tree he is currently located in? a. pd b. cd c. where d. pwd

a. 0

2. Which dump level indicates a full backup? a. 0 b. 9 c. 1 d. f

d. /etc/httpd/conf/httpd.conf

2. Which file stores the Apache configuration in Fedora 20? a. /etc/apache2/httpd.conf b. /etc/apache2.conf c. /etc/httpd.conf d. /etc/httpd/conf/httpd.conf

c. sa19

2. Which of the following files is likely to be found in the /var/log/sa directory on a Fedora 20 system over time? a. 15 b. sa39 c. sa19 d. 00

c. iSCSI initiator

2. Which of the following is used to describe a computer that is used to access an iSCSI hard disk across the network? a. iSCSI target b. iSCSI requestor c. iSCSI initiator d. iSCSI terminator

b. LILO needs to be reinstalled after it has been modified.

2. Which of the following statements is true? a. The GRUB boot loader is stored in the /usr/grub directory. b. LILO needs to be reinstalled after it has been modified. c. The GRUB2 boot loader is often used on legacy Linux systems. d. GRUB needs to be reinstalled after it has been modified.

a. If /etc/at.allow exists, only users listed in it can use the at command. b. If /etc/cron.allow exists, only users listed in it can use the cron command. c. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command.

2. Which of the following statements is true? (Choose all that apply.) a. If /etc/at.allow exists, only users listed in it can use the at command. b. If /etc/cron.allow exists, only users listed in it can use the cron command. c. If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command. d. If /etc/cron.allow and /etc/cron.deny exist, only users listed in the former can use the cron command, and any users listed in the latter are denied access to the cron command. e. If a user is listed in both /etc/cron.allow and /etc/cron.deny, then /etc/cron.deny takes precedence and the user cannot access the crontab command.

True

2. You can clear a log file simply by redirecting nothing into it. True or False?

c. /etc/init.d

d. GRUB needs to be reinstalled after it has been modified. 3. Which directory stores most UNIX SysV rc scripts? a. /etc/rc5.d b. /etc/rc.d c. /etc/init.d d. /usr/local/systemd

c. cd ../..

20. A user typed in the command pwd and saw the output: /home/jim/sales/pending. How could that user navigate to the /home/jim directory? a. cd .. b. cd /jim c. cd ../.. d. cd ./.

d. /var/spool/cron/(the user's login name)

3. Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system? a. /etc/crontab b. /etc/cron/(the user's login name) c. /var/spool/cron d. /var/spool/cron/(the user's login name)

c. CNAME

3. Which DNS resource record is an alias to other records? a. A b. AAAA c. CNAME d. NS

a. .tar.gz

3. Which filename extension indicates a tarball? a. .tar.gz b. .cpio c. .dump d. .tar

d. /home/resume

3. Which of the following is an absolute pathname? (Choose all that apply.) a. Home/resume b. C:\myfolder\resume c. resume d. /home/resume e. C:home/resume

c. cat /etc/mtab

3. You want to see the filesystems that are presently in use on the system. What command could you use? a. cat /etc/fstab b. ls -l /etc/fstab c. cat /etc/mtab d. ls -l /etc/fstab

c. /var/log

3. You want to view log files to get information about a problem that occurred during a Linux installation. In which directory will you likely find the log files? a. /root/log b. /sys/log c. /var/log d. /etc/log

b. represent hardware devices such as hard disk drives and ports

4. A special device file is used to . a. enable proprietary custom-built devices to work with Linux b. represent hardware devices such as hard disk drives and ports c. keep a list of device settings specific to each individual user d. do nothing in Linux

c. .Z

4. Files that have been compressed using the compress utility typically have the extension. a. .tar.gz b. .gz c. .Z d. .bz2

d. /etc/inittab

5. Which file does the UNIX SysV init daemon reference on startup to determine the default runlevel? a. /etc/initstate b. /inittab c. /etc/init d. /etc/inittab

c. firewall setting

5. Which of the following is not a piece of information that the Fedora installation pro- gram prompts you for? a. time zone b. installation destination c. firewall settings d. keyboard layout

c. Unmount the device from the directory.

6. A user mounts a device to a mount point directory and realizes afterward there are files previously found within the mount point directory that are needed. What should this user do? a. Nothing; the files are lost and cannot ever be accessed. b. Nothing; the files could not have been there because you can only mount to empty directories. c. Unmount the device from the directory. d. Run the fsck command to recover the file. e. Look in the lostþfound directory for the file.

d. It is a hidden file.

6. After typing the ls -a command, you notice that there is a file whose filename begins with a dot ( . ). What does this mean? a. It is a binary file. b. It is a system file. c. It is a file in the current directory. d. It is a hidden file.

True

6. As daemon processes are not associated with terminals, you must use the -e switch with the ps command to view them. True or False?

d. fi

6. Every if construct begins with if and must be terminated with . a. end b. endif c. stop d. fi

False

6. Linux commands entered via the command line are not case sensitive. True or False?

False a. INPUT

6. RSA is a common symmetric encryption algorithm used by SSH and GPG. True or False? 7. What type of iptables chain targets traffic that is destined for the local computer? a. INPUT b. ROUTE c. FORWARD d. OUTPUT

d. Run chown and list the root user as the new owner.

6. The root user utilizes the chgrp command to give ownership of a file to another user. What must the root user do to regain ownership of the file? a. Run chgrp again listing the root user as the new owner. b. Nothing, because this is a one-way, one-time action. c. Have the new owner run chgrp, and list the root user as the new owner. d. Run chown and list the root user as the new owner.

d. newgrp

6. Which command can be used to alter the primary group associated with a given user temporarily? a. usermod b. chggrp c. gpasswd d. newgrp

c. startx

6. Which command can be used to start X Windows, the window manager, and the default desktop environment? a. startgui b. startgdm c. startx d. gstart

d. serial RAID

6. Which of the following is not a type of RAID? a. hardware RAID b. software RAID c. firmware RAID d. serial RAID

a. route a. ip

6. Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.) a. route b. ipconfig a. ip d. traceroute

b. Run the newaliases command.

6. You have modified the /etc/aliases file to include a new e-mail alias. However, when you send e-mail to the alias, it can not be delivered. What should you do? a. Add the line to the /etc/aliases.db file instead. b. Run the newaliases command. c. Restart the Postfix daemon. d. Log out of the system and then log back into the system and resend the e-mail.

d. It is an executable file.

7. After typing the ls -F command, you notice a filename that ends with an * (asterisk) character. What does this mean? a. It is a hidden file. b. It is a linked file. c. It is a special device file. d. It is an executable file.

d. (hd2,1)

8. Which of the following indicates the second partition on the third hard disk drive to GRUB? a. (hd3,2) b. (hd4,3) c. (hd2,3) d. (hd2,1)

c. Delegate responsibility.

8. Which of the following steps is not a common troubleshooting procedure? a. Test the solution. b. Isolate the problem. c. Delegate responsibility. d. Collect information.

a. 0, 1, 2, 3, 4

8. You have created a full backup and four incremental backups. In which order must you restore these backups? a. 0, 1, 2, 3, 4 b. 0, 4, 3, 2, 1 c. 4, 3, 2, 1, 0 d. 1, 2, 3, 4, 0

a. START b. HELO

8. You have opened a telnet session on port 25 with your e-mail server. What command can you type within your telnet session to start an e-mail session? (Choose all that apply.) a. START b. HELO c. EHLO d. WAZUP

False

9. Character devices typically transfer data more quickly than block devices. True or False?

False

9. RAID-Z is functionally equivalent to RAID level 1. True or False?

. True

9. SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

c. schedule processes to run at a single instance in the future

9. The at command is used to . a. schedule processes to run periodically in the background b. schedule processes to run periodically on a recurring basis in the future c. schedule processes to run at a single instance in the future d. schedule processes to run in the foreground

False

9. The less command offers less functionality than the more command. True or False?

True

9. To install Linux within a virtual machine, you can specify the path to an ISO image that contains the Linux installation media within virtualization software without having to first write the ISO image to a DVD or USB flash drive. True or False?

False

9. UIDs and GIDs are unique to the system and, once used, can never be reused. True or False?

b. cpio -vicdu -I /dev/fd0

9. Which of the following commands extracts an archive? a. cpio -vocBL /dev/fd0 b. cpio -vicdu -I /dev/fd0 c. cpio -vicdu -O /dev/fd0 d. cpio -vti -I /dev/fd0

c. 1

9. Which of the following file descriptor numbers represents stdout? a. 2 b. 0 c. 1 d. 3

d. firewall-cmd --add-service=ssh --permanent

9. Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted? a. firewall-cmd --add-service ssh b. firewall-cmd --add-port 22/tcp c. firewall-cmd --add-port 22/udp d. firewall-cmd --add-service=ssh --permanent

a. Edit the /etc/exports file.c. Run the exportfs -a command. d. Start or restart the NFS daemons.

9. Which of the following must you perform to share a directory using NFS? (Choose all that apply.) a. Edit the /etc/exports file. b. Mount the directory to the /etc/exports directory using the mount command. c. Run the exportfs -a command. d. Start or restart the NFS daemons.

a. X.org d. XFree86

9. Which two implementations of X Windows are commonly used in Linux? (Choose two answers.) a. X.org b. XFce c. Xconfigurator d. XFree86

. Additional entries exist within the ACL of the file that can be viewed using the getfacl command.

9. You noticed a file in your home directory that has a + symbol appended to the mode. What does this indicate? a. Special permissions have been set on the file. b. The file has one or more files on the filesystem that are hard linked to it. c. The sticky bit directory permission has been set on the file and will remain inactive as a result. d. Additional entries exist within the ACL of the file that can be viewed using the getfacl command.

d. 5

8. Which RAID level uses striping with parity? a. 2 b. 4 c. 1 d. 5

c. When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead.

11. What would be the effect of using the alias command to make an alias for the date command named cat in honor of your favorite pet? a. It cannot be done because there already is an environment variable cat associated with the cat command. b. It cannot be done because there already is a command cat on the system. c. When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead. d. There is no effect until the alias is imported because it is a user-declared variable

c. smbclient //fileserver/data

11. Which command can be used to connect to a remote Windows share called data on the server called fileserver? a. smbclient -L fileserver:data b. smbclient -L //fileserver/data c. smbclient //fileserver/data d. smbclient \\fileserver\data

b. ulimit

11. Which command can increase the number of file handles that programs can open in a shell? a. ldd b. ulimit c. lba32 d. top

d. VNC

11. Which of the following are graphical remote administration technologies? (Choose all that apply.) a. telnet b. ssh -X c. ssh d. VNC

c. rpm -ql packagename

11. Which of the following commands can be used to list the files contained within an installed RPM package? a. rpm -qa packagename b. rpm -qi packagename c. rpm -ql packagename d. rpm -q packagename

b. software RAID

11. Which type of RAID is entirely configured during the Linux installation process? a. hardware RAID b. software RAID c. firmware RAID d. serial RAID

True

11. You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

e. Precede it with a \.

12. How can you protect a metacharacter (such as the $ character) from shell interpretation? a. Precede it with a /. b. Follow it with a \. c. Precede it with a $. d. It cannot be done because metacharacters are essential. e. Precede it with a \.

d. Begin the line with #.

12. How do you indicate a comment line in a shell script? a. There are no comment lines in a shell script. b. Begin the line with #!. c. Begin the line with !. d. Begin the line with #.

c. resume

12. If "resume" is the name of a file in the home directory off the root of the filesystem and your present working directory is home, what is the relative name for the file named resume? a. /home/resume b. /resume c. resume d. \home\resume

b. port

12. The daemons associated with network services listen for network traffic associated with a particular . a. station b. port c. TCP/IP address d. allocation number

c. init

12. The first daemon loaded on a Linux system is ________________. a. initstate b. inittab c. init d. linux

c. The device file has become corrupt.

12. The first floppy drive on the system is not responding. You enter the file /dev/fd0 command and receive the following output. What is the problem? [root@server1 root]# file /dev/fd0 /dev/fd0: ASCII text [root@server1 root]# a. The floppy drive cable has come loose. b. There is no floppy disk in the drive. c. The device file has become corrupt. d. The floppy drive is seen as a character device.

d. all instances of a process with the same name

12. The killall command terminates . a. all instances of a process with the same PPID b. all instances of a process with the same PID c. all instances of a process with the same priority d. all instances of a process with the same name

True

12. The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?

True

12. The private key is used when creating a digital signature. True or False?

b. zpool create test mirror /dev/sdb /dev/sdc

12. What command can be used to create a ZFS volume called test from the space on /dev/ sdb and /dev/sdc that functions like RAID level 1? a. zpool create test /dev/sdb /dev/sdc b. zpool create test mirror /dev/sdb /dev/sdc c. zpool create test raidz /dev/sdb /dev/sdc d. zpool create test raidz2 /dev/sdb /dev/sdc

a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

12. When a printer is rejecting requests, . a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable b. the print queue accepts jobs into the print queue and holds them there until the printer is accepting requests again c. the printer appears as off-line when a lp request is sent d. the print queue redirects all print jobs sent to it to /dev/null

d. apt-get purge test

12. Which of the following command can be used to remove the test DPM package, including any test configuration files? a. dpkg remove test b. apt-get remove test c. dpkg purge test d. apt-get purge test

a. chown user1:root file1

12. Which of the following commands will change the user ownership and group ownership of file1 to user1 and root, respectively? a. chown user1:root file1 b. chown user1 : root file1 c. This cannot be done because user and group ownership properties of a file must be modified separately. d. chown root:user1file1 e. chown root : user1file1

b. The answer is not red nor blue.

20. Consider the following shell script: echo -e "What is your favorite color?--> \c" read REPLY if ["$REPLY" = "red" -o "$REPLY" = "blue"] then echo "The answer is red or blue." else echo "The answer is not red nor blue." fi What would be displayed if a user executes the program in question 20 and answered Blue when prompted? a The answer is red or blue.. b. The answer is not red nor blue. c. The code would cause an error. d. The answer is red or blue. The answer is not red nor blue.

c. Restart the DHCP daemon.

20. Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do? a. Log in as the root user and reedit the configuration file. b. Run the dhcpconf command to edit the configuration file. c. Restart the DHCP daemon. d. Restart the xinetd daemon.

a. Lock the server in a server closet. c. Ensure that SELinux or AppArmor is used to protect key services.

20. What are best practices for securing a Linux server? (Choose all that apply.) a. Lock the server in a server closet. b. Ensure that you are logged in as the root user to the server at all times. c. Ensure that SELinux or AppArmor is used to protect key services. d. Set the default run level to 1 (Single User Mode).

c. execute, read, write

20. What are the three standard Linux permissions? a. full control, read-execute, write b. read, write, modify c. execute, read, write d. read, write, examine

c. single

20. What keyword can be specified within a boot loader to force the system to boot to Single User Mode? a. init b. rescue c. single d. telinit 1

b. jobs

20. Which command can be used to see processes running in the background? a. bg b. jobs c. ps -% d. fg

c. userdel username

20. Which command is used to delete a user account? a. usermod -d username b. del username c. userdel username d. rm username

d. makeext4FS device

20. Which command is used to format a partition on a hard disk drive with the ext4 filesystem? a. format_ext4 device b. ext4mkfs device c. e2mkfs -t ext4 device d. makeext4FS device

d. journalctl -b

20. Which of the following commands can be used on a Fedora 20 system to view hardware and service startup information during the boot process? a. less /var/log/boot.log b. less /var/log/messages c. less /var/log/syslog d. journalctl -b

a. yum search oobla

20. Which of the following commands can be used to search for packages that contain the word "oobla" on RPM software repositories? a. yum search oobla b. rpm -qS oobla c. yum list oobla d. rpm -ql oobla

c. Spiceworks

20. Which of the following is not an example of virtualization software that can be used to install Linux within another operating system? a. Oracle VirtualBox b. Microsoft Hyper-V c. Spiceworks d. VMware

a. ifconfig c. ping d. netstat -i

20. Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.) a. ifconfig b. ipconfig c. ping d. netstat -i

b. two

21. Given the following output from the ls command, how many files are linked with file1? drwxr-xr-x 3 root root 4096 Apr 8 07:12 Desktop -rw-r--r-- 3 root root 282 Apr 29 22:06 file1 -rw-r--r-- 1 root root 282 Apr 29 22:06 file2 -rw-r--r-- 4 root root 282 Apr 29 22:06 file3 -rw-r--r-- 2 root root 282 Apr 29 22:06 file4 -rw-r--r-- 1 root root 282 Apr 29 22:06 file5 -rw-r--r-- 1 user1 sys 282 Apr 29 22:06 file6 a. one b. two c. three d. four

False

22. Only the root user can modify a file that has the immutable attribute set. True or False?

False

3. The alias command can be used to make a shortcut to a single command. True or False?

False

3. The lspci command can be used to isolate problems with X Windows. True or False?

False

3. There is no real difference between the "S" and "s" special permissions when displayed using the ls -l command. One just means it is on a file, and the other means that it is on a directory. True or False?

halt

3. What command can you use to safely shut down the Linux system immediately? a. shutdown -c b. shutdown -r c. down d. halt

b. the print queue accepts jobs into the print queue and holds them there until the

3. When a printer is disabled, . a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable b. the print queue accepts jobs into the print queue and holds them there until the printer is enabled again c. the printer appears as off-line when an lp request is sent d. the print queue redirects all print jobs sent to it to /dev/null

b. ldd

5. Which command indicates the shared libraries required by a certain executable program? a. ldconfig b. ldd c. rpm -V d. slconfig

e. Mount any partitions created on the two hard drives such that they are accessible by the operating system. f. Format any partitions created with a valid filesystem recognized by Linux. c. Create one or more partitions on each of the hard disk drives.

4. Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his machine. Before he can use them for data storage and retrieval, what must he do? (Choose all that apply.) a. Mount the two hard drives so they are accessible by the operating system. b. Mount a filesystem to each of the hard disk drives. c. Create one or more partitions on each of the hard disk drives. d. Use the vi editor to edit /etc/mtab and create an entry for the controller card and the hard disk drives. e. Mount any partitions created on the two hard drives such that they are accessible by the operating system. f. Format any partitions created with a valid filesystem recognized by Linux. 5

False

4. NIS clients use NIS records to access their configuration information. True or False?

a. rw-rw-rw- and rw-rw-rwb.

4. The default permissions given by the system prior to analyzing the umask are _________ for directories and _____________ for files. a. rw-rw-rw- and rw-rw-rwb. rw-rw-rw- and r--r- -r- - c. rw-rw-rw- and rwxrwxrwx d. rwxrwxrwx and rw-rw-rwe. rwxrw-rw- and rwx-rw-rw-

c. apropos keyword

4. What command is equivalent to the man -k keyword command? a. find keyword b. man keyword c. apropos keyword

d. authentication

4. What is the name used to describe a user providing a user name and password to log in to a system? a. validation b. authorization c. login d. authentication

d. /etc/resolv.conf

4. Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC? a. /etc/hosts b. /etc/host.conf c. /etc/resolve d. /etc/resolv.conf

a. RAID 0

4. Which of the following RAID levels is not fault tolerant? a. RAID 0 b. RAID 1 c. RAID 4 d. RAID 5

a. free b. sar c. vmstat

4. Which of the following commands can be used to display memory statistics? (Choose all that apply.) a. free b. sar c. vmstat d. iostat

a. /etc/profile

4. Which of the following files is always executed immediately after any user logs in to a Linux system and receives a BASH shell? a. /etc/profile b. ~/.bash_profile c. ~/.bash_login d. ~/.profile

c. init

4. Which process will always have a PID of 1 and a PPID of 0? a. the kernel itself b. ps c. init d. top

c. 0

4. Which runlevel halts the system? a. 1 b. 6 c. 0 d. 5

b. forking

5. A process spawning or initiating another process is referred to as . a. a child process b. forking c. branching d. parenting

c. /, /proc, and swap

5. Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? /dev/sda1 / ext4 defaults 1 1 none /dev/pts devpts gid=5,mode=620 1 0 none /proc proc defaults 0 1 none /dev/shm tmpfs defaults 1 0 /dev/sdc2 swap swap defaults 0 1 /dev/dvd /media/dvd iso9660 noauto,ro 0 0 /dev/fd0 /media/floppy auto noauto 0 0 a. none, as fsck must be run manually for each filesystem b. /, /dev/pts, and /dev/shm c. /, /proc, and swap d. all of them, as fsck is run automatically at boot for all filesystems

d. cd /etc

5. If a user's current directory is /home/mary/project1, which command could she use to move to the etc directory directly under the root? a. cd .. b. cd /home/mary/etc c. cd etc d. cd /etc e. cd \etc

c. make

5. The bzip2 and gzip utilities use similar compression algorithms. True or False? 514 Chapter 11 Compression, System Backup, and Software Installation 6. When compiling source code into a binary program, which command does the compiling using the GNU C Compiler? a. tar b. ./configure c. make d. make install

a. nslookup hostname b. dig hostname c. host hostname

5. To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.) a. nslookup hostname b. dig hostname c. host hostname d. resolve hostname

e. Just type cp or mv because they run in interactive mode by default.

5. What must a user do to run cp or mv interactively and be asked if she wants to overwrite an existing file? a. There is no choice because the new file will overwrite the old one by default. b. Type interactive cp or interactive mv. c. Type cp -i or mv -i. d. Type cp -interactive or mv -interactive. e. Just type cp or mv because they run in interactive mode by default.

c. testparm

5. Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors? a. apachectl b. sambactl c. testparm d. psql

c. chroot

5. Which command can you use during a system rescue to switch from the root of the live OS to the root of the Linux system installed on the hard disk? a. mount b. sysimage c. chroot d. rescue

c. usermod -L username

5. Which command can you use to lock a user account? a. lock username b. secure username c. usermod -L username d. useradd -L username

c. set

5. Which command could you use to see a list of all environment and user-defined shell variables as well as their current values? a. ls /var b. env c. set d. echo

a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.

7. After typing the ls -F command, you see the following line in the output: -rw-r-xr- - 1 user1 root 0 Apr 29 15:40 file1 What does this mean? a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file. b. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file. c. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. d. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file.

True

7. The -9 option to the gzip command results in a higher compression ratio. True or False?

a. in RAM

7. Where is the /proc filesystem stored? a. in RAM b. on the hard disk drive in the / directory c. on the hard disk drive in the /etc directory d. on the hard disk drive in the /var directory 8. Which RAID level uses striping with parity?

d. clear

7. Which command blanks the terminal screen, erasing previously displayed output? a. erase b. clean c. blank d. clear

a. lp -d Printer1 file c. lp file

7. Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.) a. lp -d Printer1 file b. lp Printer1 file c. lp file d. lp -m Printer1 file

d. df

7. Which command is used to display the amount of free space that exists on a filesystem? a. fsck b. quota c. du d. df

c. lcd

7. Which command within the command-line FTP utility can be used to change the current directory on the local computer? a. cd b. dir c. lcd d. get

a. /etc/nsswitch.conf

7. Which file holds the methods to be used and the order in which they will be applied for host name resolution? a. /etc/nsswitch.conf b. /etc/resolve.conf c. /etc/hosts d. /etc/dns.conf

c. renice -12

7. Which of the following commands will most likely increase the chance of a process receiving more time slices? a. renice 0 b. renice 15 c. renice -12 d. renice 19

b. Either the MBR/GPT or the active partition can contain the boot loader d. The boot loader points to the active partition.

7. Which of the following statements is true? a. The boot loader points to the MBR/GPT. b. Either the MBR/GPT or the active partition can contain the boot loader. c. Both the MBR/GPT and the active partition point to the boot loader. d. The boot loader points to the active partition.

a. cd /home/user1 && echo "welcome home"

7. Which of the following will display the message welcome home if the cd /home/user1 command is successfully executed? a. cd /home/user1 && echo "welcome home" b. cat "welcome home" || cd /home/user1 c. cd /home/user1 || cat "welcome home" d. echo "welcome home" && cd /home/user1

c. -- -r--rwd.

8. After typing the command umask 731, the permissions on all subsequently created files and directories will be affected. In this case, what will be the permissions on all new files? a. rw-rw-rwb. rwxrw-r-- c. -- -r--rwd. -- --wx--x

d. You can use the Ctrl+z key combination and the bg command.

8. How can you bypass the wait function and send a user process to the background? a. This cannot happen once a process is executing; it can be done only when the command is started by placing an ampersand (&) after it. b. This cannot happen; only daemon processes can run in the background. c. You can use the ps command. d. You can use the Ctrl+z key combination and the bg command.

b. echo ~ c. echo $HOME

8. The current value for the HOME variable is displayed by which of the following commands? (Choose all that apply.) a. echo HOME= b. echo ~ c. echo $HOME d. echo ls HOME

b. commande.e insert

8. The vi editor can function in which two of the following modes? (Choose both that apply.) a. text b. command c. input d. interactive e. insert

a. DHCPc. /etc/hosts

8. What are two means available to resolve a host name to the appropriate TCP/IP address? (Choose two answers.) a. DHCP b. DNS c. /etc/hosts d. /etc/resolve.conf

a. /etc/passwd

8. What is the name of the file that contains a listing of all users on the system and their home directories? a. /etc/passwd b. /etc/users c. /etc/shadow d. /etc/password

c. Unmount the filesystem.

8. What must you do to successfully run the fsck command on a filesystem? a. Run the fsck command with the -u option to automatically unmount the filesystem first. b. Choose yes when warned that running fsck on a mounted filesystem can cause damage. c. Unmount the filesystem. d. Ensure that the filesystem is mounted.

c. CtrlþAltþF1

8. When sitting at a computer running Linux, what key combination is pressed to open the graphical terminal? a. CtrlþAltþG b. CtrlþAltþF4 c. CtrlþAltþF1 d. Ctrlþ7

a. monitoring

On which part of the maintenance cycle do Linux administrators spend the most time? a. monitoring b. proactive maintenance c. reactive maintenance d. documentation


Related study sets

6013 Security in Mobile Computing Final

View Set

Unit 4 IM Grade 7 only on percents review

View Set

1042 Exam 2 - antibiotics Prep-U

View Set

Niccolo Machiavelli & il principe

View Set