Linux Final

Ace your homework & exams now with Quizwiz!

Which of the following is the greatest expense for companies using Linux? a. Additional software b. Software upgrades c. Operating system cost d. Hiring people to maintain the Linux system

d. Hiring people to maintain the Linux system

What DNS resource record type is used to provide the IP address for the e-mail server for a zone?​ a. CNAME b. NS c. SOA d. MX

d. MX

The mutt software is an example of what type of mail service software on Linux?​ a. ​Mail Delivery Agent b. Mail Transfer Agent c. Mail Transport Agent d. Mail User Agent

d. Mail User Agent

Proxy servers keep track of the information passed to each client by maintaining what type of table?​ a.​ routing b. firewall c. caching d. Network Address Translation (NAT)

d. Network Address Translation (NAT)

What option can be used in the journald configuration file to specify a file size limit to the event log?​ a. Max_file_size b. SizeLimit c. Journal_Limit d. SystemMaxUse

d. SystemMaxUse

What two characters below should not be used in filenames?​ Select one or more: a. _ b. $ c. ​. d. *

b. $ d. *

Select the two ​filename extensions that are associated with C++ programming language source code files: Select one or more: a. .c b. .cpp c. .cc d. .c++

b. .cpp c. .cc

Under the root directory in Linux, which directory contains system commands and utilities? a. /opt b. /usr c. /var d. /boot

b. /usr

Each octet in an IP address represents a binary number consisting of how many bits / bytes? a. 4-bit b. 8-bit c. 4-byte d. 8-byte

b. 8-bit

Each octet in an IP address represents a binary number consisting of how many bits / bytes? a. 8-byte b. 8-bit c. 4-byte d. 4-bit

b. 8-bit

To which license does Linux adhere? a. Artistic license b. GNU General Public License c. Free source license d. Open license

b. GNU General Public License

Which of the following statements are true? (Choose all that apply.) a. Soft limits can never be exceeded b. Hard limits can never be exceeded c. Hard limits allow a user to exceed them for a certain period of time d. Quotas can limit both user space and the number of files a user can own. e. Soft limits allow a user to exceed them for a certain period of time

b. Hard limits can never be exceeded d. Quotas can limit both user space and the number of files a user can own. e. Soft limits allow a user to exceed them for a certain period of time

What does the mv command do? (Choose all that apply.) a. It makes a directory. b. It moves a directory. c. It moves a file. d. It makes a volume.

b. It moves a directory. c. It moves a file.

​The QT toolkit is utilized by which GUI environment? a. Enlightenment b. KDE c. Xfce d. GNOME

b. KDE

Assistive technologies are configured using what utility on Fedora 20 in GNOME?​ a. Accessibility b. Universal Access c. Access Helper d. Usability

b. Universal Access

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database? a. alias b. mail c. sendmail d. newaliases

d. newaliases

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing? a. PID b. process flag c. process priority d. process state

d. process state

Which prompt does the root user receive when logged in to the system? a. ! b. @ c. # d. $

c. #

A production kernel refers to a kernel whose _________. a. revision number is even b. major number is odd c. minor number is even d. minor number is odd

c. minor number is even

The ___________ command can be used to search Internet software repositories for RPM packages that map to your architecture, and automatically install or upgrade those packages on your system.

yum

By default, Fedora 20 allows the root user to log into the GNOME desktop.​ True False

False

Character devices typically transfer data more quickly than block devices True False

False

Fedora 20 makes use of the XFree86 ​implementation of X Windows. True False

False

In the past, SATA hard disks were referred to as Integrated Drive Electronics (IDE).​ True False

False

Linux commands entered via the command line are not case sensitive. True False

False

Performance problems are caused by hardware, not software. True False

False

Performing regular system backups and identifying potential problem areas are examples of reactive maintenance. True False

False

SLIP is a newer technology than PPP. True False

False

Which command do you use to rename files and directories? a. mv b. rename c. rn d. cp

a. mv

What two FTP commands below can be used to close the ftp utility?​ Select one or more: a. quit b. exit c. close d. bye

a. quit d. bye

The Linux kernel exists as a file named:​ a. vmlinuz b. kernel.0 c. krn.linux d. vmlinux

a. vmlinuz

What was created to define a standard directory structure and common file location for Linux? a. FSH b. root directory c. FHS d. X.500

c. FHS

Where is the /proc filesystem stored? a. on the hard disk drive in the / directory b. on the hard disk drive in the /var directory c. in RAM d. on the hard disk drive in the /etc directory

c. in RAM

What PostgreSQL command-line utility backs up PostgreSQL database settings? a. pg_restore b. pg_dumpall c. pg_dump d. pg_backup

c. pg_dump

After logging into a terminal, a user will receive an interface known as which option below? a. processor b. swap memory c. shell d. user interface

c. shell

In order to change the time zone of a system after installation, what command must be used?​ a. tzmod b. tzchange c. tzselect d. time_zone

c. tzselect

What command can be used to change the maximum number of file handles that can be used by a program?​ a. ​pgmod b. fhlimit c. ulimit​ d. fhch

c. ulimit​

In order to redirect a file to the standard input of a command, what metacharacter should be used? a.| b.# c.> d.<

d. <

In order to download DPM packages, what command should be used below?​ a. dpm-grab b. yum c. ​apt-search d. apt-get

d. apt-get

In Fedora 20, what terminal is used for graphical login?​ a. tty0 b. tty2 c. tty4 d. tty1

d. tty1

What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file? a. execute b. sticky bit c. read d. write

d. write

The ________ can be used to affect the process priority indirectly.

nice value

In a file listing, the 9 characters following the file type (for example, -rwxr-xr-x) refer to the file's ____________

permissions

A network __________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.

protocol

Text wildcards used to ease the searching of specific text information are called_____________ . .

regular expressions

Most commands that are run by the shell are run in a separate _________ , which is created by the current shell.

subshell

An alternative to the vi editor that offers an equal set of functionality is the GNU _____________ .

Emacs editor

________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.

FHS

The less command offers less functionality than the more command. True False

False

The _____________ environment variable contains a list of directories to search for executable programs.

Path

Any command that can be executed on the command line can also be placed inside any environment file. True False

True

If the / filesystem becomes corrupted, the system is unstable and must be turned off. True False

True

If you boot your computer from Linux live media, you will be able to use a fully functional Linux system prior to installing Linux on permanent storage. True False

True

Linux has only one root directory per directory tree. True or False? True False

True

Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project.​ True False

True

The cpio command has the ability to handle long filenames and can be used to back up device files.​ True False

True

The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations. True False

True

You can use wildcard metacharacters with the find command. True False

True

What operator below is known as the NOT operator? a.​ ! b. -a c. -o d. %

a. !

When used with the uncompress command, what option displays the contents of the compress file to Standard Output? a. -c b. -r c. -f d. -v

a. -c

What option can be added to the rpm command in order to query packages?​ a. -q b. -v c. -i d. -h

a. -q

Which sar command option is used to display statistics for the processor queue? a. -q b. -v c. -c d. -r

a. -q

What option, when added to the rm command, is commonly referred to as the -resume option? a. -r b. -i c. -f d. -d

a. -r

What file in the /proc directory contains information about a computer's CPU?​ a. /proc/cpuinfo b. /proc/meminfo c. /proc/cpu_info d. /proc/proc_info

a. /proc/cpuinfo

You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?​ a. /var/log/boot.log b. /var/log/wtmp c. /var/log/messages d. /var/log/startup.log

a. /var/log/boot.log

What zone configuration file contains a PTR record used to identify the loopback adapter? a. /var/named/named.local b. /var/named/named.ca c. /etc/named.loop d. /etc/named.conf

a. /var/named/named.local

Which RAID level is also referred to as mirroring? a. 1 b. 5 c. 0 d. 4

a. 1

Which of the following kernels are developmental kernels? (Choose all that apply.) a. 3.5.5 b. 3.2.7 c. 3.4.4 d. 3.3.4

a. 3.5.5 d. 3.3.4

Which RAID level uses striping with parity? a. 5 b. 2 c. 1 d. 4

a. 5

Which of the following are characteristics of Open Source Software? (Choose all that apply.) a. Any bugs are fixed quickly. b. The software is developed collaboratively. c. The source code for software is available for a small fee. d. The value of the software is directly related to its price.

a. Any bugs are fixed quickly. b. The software is developed collaboratively.

What is the most common open source Web server available for Linux? a. Apache b. pine c. Samba d. Squid

a. Apache

After typing the ls -a command, you notice that there is a file whose filename begins with a dot ( . ). What does this mean? a. It is a hidden file. b. It is a system file. c. It is a file in the current directory. d. It is a binary file.

a. It is a hidden file.

After typing the ls -F command, you notice a filename that ends with an * asterisk character. What does this mean? a. It is an executable file. b. It is a special device file. c. It is a hidden file. d. It is a linked file.

a. It is an executable file.

Who formed the Free Software Foundation to promote open development? a. Richard Stallman b. Ken Thompson c. Dennis Ritchie d. Linus Torvalds

a. Richard Stallman

After typing the ls -F command, you see the following line in the output: -rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1 What does this mean? a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file. b. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. c. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file. d. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file.

a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.

What is the term for a ZFS managed filesystem that is created from ZFS pools?​ a. ZFS volume b. ZFS store c. ZFS lake d. ZFS vault

a. ZFS volume

Which of the following could result in a segmentation fault (fatal signal 11) during a Fedora installation? a. all of the above b. improper device driver c. overclocked CPU d. RAM problems

a. all of the above

What two NTP daemons below are commonly used on Linux systems? Select one or more: a. chronyd b. ntpd c. timed d. sntpd

a. chronyd b. ntpd

What two commands below can be used to modify the password expiry information and a user's default shell? Select one or more: a. chsh b. chexp c. chage d. shellmod

a. chsh c. chage

In an if construct, what statements are optional?​ Select one or more: a. else b. then c. elif d. fi

a. else c. elif

What two commands below can display memory information and swap usage? Select one or more: a. free b. swap_stat c. vmstat d. memtop

a. free c. vmstat

What two commands below can be used to stop a process, either by PID number or process name?​ Select one or more: a. kill​ b. end c. killall d. stop

a. kill​ c. killall

Linux is __________ and __________ operating system. a. multiuser, multitasking b. processing, closed source c. production, stable d. large, useful

a. multiuser, multitasking

A special device file is used to ___________. a. represent hardware devices such as hard disk drives and ports b. enable proprietary custom-built devices to work with Linux c. do nothing in Linux d. keep a list of device settings specific to each individual user

a. represent hardware devices such as hard disk drives and ports

The environment variables that are set by default and their current values can be viewed with what command? a. set b. get c. env d. setenv

a. set

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed? a. sixth b. first c. second d. fifth

a. sixth

What does the /var directory contain? a. spools and log files b. local variance devices c. various additional programs d. temporary files

a. spools and log files

​Select the two commands below that can be used to prepare a swap partition and then enable it for use: Select one or more: a. swapon b. swapit c. mkswap d. mkfs.swap

a. swapon c. mkswap

What two resource record types map FQDNs to IPv4 and IPv6 addresses respectively?​ Select one or more: a. AAAA b. CNAME c. A d. NS

a. ​AAAA c. A

The first software RAID volume on a system will​ use a multiple disk device file that starts with what number? a. 255 b. 127 c. 254 d. 128

b. 127

In what year was the source code for the Linux kernel released? a. 1987 b. 1991 c. 1993 d. 1990

b. 1991

How many different kill signals can be sent by the kill command to a given process? a. 32 b. 64 c. 128 d. 16

b. 64

Which common GUI environments are available in most Linux distributions? (Choose all that apply.) a. CDE b. KDE c. RPM d. GNOME

b. KDE d. GNOME

What Linux distribution is the most commonly used distribution within organizations today? a. Debian b. Red Hat c. Mandrake d. SuSE

b. Red Hat

If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below: a. SIGTERM b. SIGHUP c. SIGINT d. SIGQUIT

b. SIGHUP

​What two Linux distributions below utilize the Debian package manager by default? Select one or more: a. SUSE Linux b. Ubuntu Linux c. Linux Mint d. Red Hat Linux

b. Ubuntu Linux c. Linux Mint

The tac command _________. a. displays the contents of a file in reverse order last word on the line first and first word on the line last b. displays the contents of a file in reverse order last line first and first line last c. displays the contents of hidden files d. is not a valid Linux command

b. displays the contents of a file in reverse order last line first and first line last

After a background process has been started, what command below can be used to move it to the foreground? a. b2f b. fg c. fgd d. fgnd

b. fg

Which of the following is NOT a piece of information that the Fedora installation program prompts you for? a. installation destination b. firewall settings c. keyboard layout d. time zone

b. firewall settings

​What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on? a. switch b. for c. while d. case

b. for

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file? a. o+r-w b. g+r-w c. u+r+w d. g-r+w

b. g+r-w

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​ a. grub-compile b. grub-mkconfig c. grub-config d. grub2-install

b. grub-mkconfig

elect below the command and the associated alias available on most Linux systems that displays ​a long listing for each file in a directory? Select one or more: a. ls -F b. ll c. ls -l d. lf

b. ll c. ls -l

In order to send a print job to a printer using CUPS, what command must be used? a. print b. lp c. pl d. pr

b. lp

Which command is used to format a partition on a hard disk drive with the ext4 filesystem? a. format_ext4 device b. mkfs -t ext4 device c. makeext4FS device d. ext4mkfs device

b. mkfs -t ext4 device

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below? a. groupmod b. newgrp c. newgroup d. groupadd

b. newgrp

Which of the following commands can be used to create partitions on either a MBR or GPT hard disk? a. gdisk b. parted c. fdisk d. cfsck

b. parted

The default permissions given by the system prior to analyzing the umask are ___________for directories, and __________ for files. a. rw-rw-rw- and rwxrwxrwx b. rwxrwxrwx and rw-rw-rw- c. rw-rw-rw- and rw-rw-rw- d. rw-rw-rw- and r--r--r--

b. rwxrwxrwx and rw-rw-rw-

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a: a. DBMS b. tarball c. router d. package manager

b. tarball

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a: a. package manager b. tarball c. router d. DBMS

b. tarball

In order to quickly create an empty file, what command can be used?​ a. echo file1 b. vim file1 c. create file1 d. touch file1

b. vim file1

The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need another user interface b. when you need to increase the stability of Linux c. when you need support in Linux for new hardware d. when you need to use kernel modules

b. when you need to increase the stability of Linux c. when you need support in Linux for new hardware

​What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively? Select one or more: a. -e b. -Z c. -z d. -u

b. ​-Z c. -z

When performance issues arise, you can compare the output of performance utilities to the _________ values found in the system log book.

baseline

Which prompt do regular users receive when logged in to the system? a. ! b. @ c. $ d. #

c. $

Linux servers are typically installed in a rack using rackmount server hardware. Which of the following is used to describe the minimum height of a rackmount server? a. Series A b. Level 5 c. 1U d. Type A

c. 1U

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?​ a.​ 23 b. ​827 c. 514 d. 1012

c. 514

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics? a. x b. $ c. Ctrl+g d. P

c. Ctrl+g

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?​ a. dd b. Ctrl+a c. Ctrl+k d. Ctrl+d

c. Ctrl+k

What software type is software that is distributed free of charge, but the source code is not available? a. Shareware b. Open source software c. Freeware d. Close source software

c. Freeware

What must a user do to run cp or mv interactively and be asked if she wants to overwrite an existing file? a. There is no choice as the new file will overwrite the old one by default. b. Type cp -i or mv-i. c. Just type cp or mv as they run in interactive mode by default. d. Type interactive cp or interactive mv.

c. Just type cp or mv as they run in interactive mode by default.

How can a user switch from insert mode to command mode when using the vi editor? a. Type in a : character b. Press the Del key c. Press the Esc key d. Press the Ctrl+Alt+Del keys simultaneously

c. Press the Esc key

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Alt b. Ctrl c. Tab d. Esc

c. Tab

Which of the following commands will change the user ownership and group ownership of file1 to user1 and root respectively? a. chown root:user1file1 b. chown user1 : root file1 c. chown user1:root file1 d. chwon root : user1file1

c. chown user1:root file1

What character is used to delimit most Linux configuration files? a. tab b. semicolon c. colon d. space

c. colon

What are the three standard Linux permissions? a. read, write, examine b. full control, read-execute, write c. execute, read, write d. read, write, modify

c. execute, read, write

What command can be used to view what shared libraries are required by a certain program? a. ldlist b. showlibs c. ldd​ d. ​ldconfig

c. ldd​

When displaying a large text file, what two commands provide the ability to show text in a page by page fashion?​ a. buffer b. paged​ c. less d. more

c. less d. more

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred? a. page fault b. IRQ fault c. segmentation fault d. RAM failure

c. segmentation fault

What two processes below will show up as PID 1, depending on whether a system uses UNIX SysV or Systemd init processes? Select one or more: a. kthreadd b. syslogd c. systemd d. init

c. systemd d. init

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called? a. device ID b. SCSI controller c. target ID d. SCSI number

c. target ID

How many DNS servers can be configured in the /etc/resolv.conf file? a. two b. five c. three d. four

c. three

What two commands can be used to show information about physical volumes and logical volumes respectively?​ Select one or more: a. ​showvg b. showlv c. ​lvdisplay d. vgdisplay

c. ​lvdisplay d. vgdisplay

Select the iptables option that specifies the destination address of packets for a rule: a. -D b. -L c. -F d. -d

d. -d

What option should be used in conjunction with the lp command in order to specify the destination printer name? a. -l b. -p c. -n d. -d

d. -d

Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? /dev/sda1 / ext4 defaults 1 1 none /dev/pts devpts gid=5,mode=620 1 0 none /proc proc defaults 0 1 none /dev/shm tmpfs defaults 1 0 /dev/sdc2 swap swap defaults 0 1 /dev/dvd /media/dvd iso9660 noauto,ro 0 0 /dev/fd0 /media/floppy auto noauto 0 0 a. none, as fsck must be run manually for each filesystem b. /, /dev/pts and /dev/shm c. all of them, as fsck is run automatically at boot for all filesystems d. /, /proc and swap

d. /, /proc and swap

In what year was the source code for the Linux kernel released? a. 1990 b. 1993 c. 1987 d. 1991

d. 1991

When issuing the ls -F command, what special character indicates a linked file? a. * b. & c. = d. @

d. @

What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document? a. DocumentRoot index.html b. UseIndex index.html c. Index index.html d. DirectoryIndex index.html

d. DirectoryIndex index.html

What service provides a method for the efficient transfer of files over the Internet? a. Telnet b. HTML c. SMTP d. FTP

d. FTP

What software type is software that is distributed free of charge, but the source code is not available? a. Shareware b. Open source software c. Close source software d. Freeware

d. Freeware

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below? a. grep b. nl c. sed d. awk

d. awk

In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued? a. cd .. b. cd ./.. c. /home/joe d. cd ../..

d. cd ../..

After a background process has been started, what command below can be used to move it to the foreground? a. b2f b. fgnd c. fgd d. fg

d. fg

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file? a. u+r+w b. g-r+w c. o+r-w d. g+r-w

d. g+r-w

What utility in the sysstat package measures the flow of information to and from disk devices?​ a. drivemon b. iodump c. mpstat d. iostat

d. iostat

Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called?​ a. dumping b. hiccuping c. flooding d. jabbering​

d. jabbering​

Adding the -t option to what command below will provide a list of all printers on the system and their status? a. lp b. lpr c. lps d. lpstat

d. lpstat

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command? a. passwd b. passwdconv c. pwdcv d. pwconv

d. pwconv

In what filesystem are most of the operating system files contained? a. boot b. data c. mnt d. root

d. root

Select the escape sequence that starts a new line when used with echo: a. \a b. \r c. \\ d. \n

d. ​\n

What is the most common hardware component to fail on a Linux system? a. Video cards b. NICs c. Floppy drives d. Hard disks

d.Hard disks

The _____________ command can be used to create and work with up to 128 primary partitions on a GPT hard disk using an interface that is nearly identical to fdisk.​

gdisk

To prevent signals from bouncing back and forth on a SCSI cable, each end of the cable must have a(n)________ to stop signals from being perpetuated.

terminator

The __________command can be used to search Internet software repositories for RPM packages that map to your architecture, and automatically install or upgrade those packages on your system.

yum


Related study sets

Bontrager Chapter 7: Femur and Pelvic Girdle Anatomy

View Set

triceps brachii ( origin, insertion, action, innervation)

View Set

Ch 2 Interpersonal Communication & Emotional Intelligence

View Set

Fundamentals of Building Construction - Ch. 2 - Foundations

View Set

Prep U Fundamentals of Nursing CH 32

View Set