Linux LPIC 1
What sequence of keystrokes will stop a job running in the foreground?
<Ctrl>z
A ____ contains the names of other files and/or directories.
Directory
In Linux, the ipconfig command is used to examine current IP address settings.
False
In an enterprise network, a "best practice" is to assign static IP addresses to all computers.
False
Linux is case sensitive
False
Maintaining system security on Linux is neither difficult nor time consuming.
False
Passwords should be easy to guess and hard to remember.
False
Structured Query Language (SQL) can be interpreted and executed by several different Linux shells.
False
The job command and the ps command both return the same information.
False
The nohup command can only be used with processes that take a short time to complete and must be executed at a very high priority.
False
The priority or importance of a job is defined by its nice number. The higher the nice number is, the more important a job is and the more resources it will take without sharing them.
False
The yellowdog updater, modified (yum), Red Hat package manager (rpm), and apt-get are package managers. By default, all three are included with all current distributions of Linux.
False
To Keep things simple, Linux only provides a single method to solve a given problem.
False
Which of the following is true of redirection?
It can redirect standard input, standard output and standard error to the same file.
A Daemon is a server process that usually is initialized at startup and runs continuously in the background.
True
The chmod (Change Mode) command is used to set or alter the read, write, and execute permissions for a user, group, or others that are associated with a file or directory, or a group of files or directories.
True
The command ls-al will give you a long list of the contents of the current working directory that includes hidden files and attributes for each file and directory.
True
The dd utility can make a low level copy of a filesystem
True
The execute permission on a script file must be enabled before the script will run.
True
The netstat command can be used to look for network activity or open ports on a computer.
True
The purpose of an IP routing table is to obtain the IP address of the next link from a destination IP address.
True
The while loop ends with the done command.
True
Transmission Control Protocol (TCP) Port 80 is used as a listener for HyperText Transport Protocol (HTTP) traffic.
True
An inode contains all of the following EXCEPT _____.
file name
The command used to rename a file in Linux is ____.
mv
Which file testing operator in the bash shell tests whether the file exists and is a regular file?
-f
Which of the following settings is best practice for permissions on the /etc/passwd and /etc/shadow files?
-rw-r--r-- /etc/passwd -rw------- /etc/shadow
Undelivered remote mail would be stored in the ____ directory.
/var/spool/mqueue
A good description of a regular express is ____?
An output of the general regular expression parser (grep)
Which of the following statements is NOT true concerning links?
Both hard links and soft links can be created between files on different low level file systems.
The procedure used to create a process is called _____.
Forking
When running the Bourne Again Shell (BASH) the ___environment variable contains the path information for the current session.
PATH
Which of the following terms refers to a unique 48 bit binary address, expressed in hexadecimal, that is assigned to each Network Interface Card during its manufacturing process?
Physical Address Hardware Address Media Access Control (MAC) address All of the above <---
The kill command is used to ______
Sends a signal to a process to terminate that process
What is the best way to prevent a single user from consuming all available disk space on a Linux filesystem?
Set a size limit of 100GBytes on the total amount of storage that can be used by a single user. Warn users when they are approaching the limit, and prevent them from saving additional files if they exceed it.
Which of the following is not a pull mail server?
Simple Mail Transfer Protocol SMTP
Which of the following commands will display the last ten lines of a file by default?
Tail
Why are Set User ID (SUID) and Set Group ID (SGID) programs potentially risky?
The SUID or SGID bits tell Linux to run the program as the user or group that owns the file. If the owner or group is root, then a user could potentially run the program as root.
In the following directory listing, which attribute contains the access permissions for owner, group, and others?
The first field (-rwxr--r--)
Which of the following should not be used as passwords?
The names of Pets Favorite books A dictionary word All of the above <---
A Variable is a placeholder in a script for a value that will be determined when the script runs.
True
A shell is a command interpreter
True
A super server is a program that listens for network connections on behalf of another program. When a connection is initiated, it hands off control of that connection to the intended server.
True
An IPv4 subnet mask is a 32 bit binary number, commonly expressed as decimal, that is used to differentiate the network part from the host part of an IP address.
True
Every unique file on a Unix partition has a unique inode.
True
Grep searches for files that contain a specific string and returns the name of the file and if the file is a text file a line of context for the string.
True
In a UNIX system, everything is a file; if something is not a file, it is a process.
True
One of the advantages of shadow passwords is that they support password aging and account expiration features.
True
The "updated" (update database) command is used to update the locate database so that it contains the most current information on the location of files and directories.
True
Which of the following SQL commands could update an existing record in a table?
UPDATE mytable SET STREET_ADDRESS='404 Error Message Lane', CITY='Internet City' Where LastName='Hacker AND FirstName='Ima'
How would you enable routing in a Linux system?
You would edit the appropriate configuration file to enable IP forwarding.
In TCP/IP over Ethernet networks, the term "host" refers to any device that has _____.
a hardware address an IP address a routing table All of the Above: <---
Using the default Fedora shell, which of the following commands would display the path to your home directory?
echo $HOME
The command used to start a suspended job in the foreground is _____.
fg
A process by which a fully qualified domain name is resolved to an IP address using the Domain Name System (DNS) is known as ____.
forward lookup
What command would be used to check the gpg signature on a downloaded source file?
gpg
Which command can be used to stop Linux?
halt
In shell scripting, the ___ command uses conditional expressions to take one of two actions.
if
Which of the following would be the most likely tool to use when searching for unnecessary active network connections?
netstat -ap, because it would display all of the open ports on the system, as well as their associated process IDs.
A process by which an IP address is resolved to a fully qualified domain name using the Domain Name System (DNS) is known as ____.
reverse lookup