UNIX II
Ch. 9 Which of the software packages below are used to create virtual servers? (Check-all-that-apply)
Hyper-V VirtualBox VMware Xen
Ch. 19 Define HTML:
HyperText Markup Language
Ch. 24 What is the main component that enables virtualization a manages virtual machines?
Hypervisor
Ch. 4 What is the original process referred to that has cloned a process copy?
PPID
Ch. 16 Which type of DNS zone record is used in a reverse lookup table for dns queries based on IP Address-to-name translation?
PTR
Ch. 9 Which of the following below are the three main service models for Cloud Computing?
PaaS SaaS IaaS
Ch. 3 What is a piece of software (or a combination of software and hardware) that stores passwords for your organization in a secure fashion.
Password vault
Ch. 16 Which of the following DNS implementations is utilized the most in Unix installations? (Hint: In the Chapter Slides)
BIND
Ch. 16 Which type of DNS zone record below indicates a alias name for a host (nickname)?
CNAME
Ch. 14 If two systems start to talk to a third systems at the same time, a collision can occur. To handle collisions, the network uses a technical scheme called:
CSMA/CD
Ch. 28 Another useful tool, which uses RRDtool to store data, records and graphs SNMP data, and has an easy web-based interface.
Cacti
Define URL:
Uniform Resource Locator
Ch. 2 What are the steps in the boot process? (Check all that Apply)
Device detection and configuration Execution of system startup scripts Adminstrator intervention Reading of the boot loader from the master boot record. Loading and Initialization of the kernel Creation of kernel processes
Ch. 1 Which commands below would install the "wget" software package on variations of the Linux Operating System: (Check all that Apply)
Redhat: yum install wget Suse: yast --install wget Solaris: pkgutil --install wget Ubuntu: apt-get install wget
Ch. 3 What model assigns intermediate roles to assigned users instead of direct permissions.
Role-based access control
Ch. 1 Which protocol was developed for Unix & Linux systems to provide authentication security for TCP/IP applications when logging in and transferring files?
Secure Shell (SSH)
Ch. 16 What type of named server is an official representative of a zone?
authoritative
Ch. 5 When doing an ls command, which filetype symbol below indicates a character device file?
c
Ch. 20 What command below can be used to create a new physical volume?
pvcreate
Ch. 7 With no options, _______ displays the current listing of Bash environment and shell script variables.
set
What tricks can subvert the usage of sudo? (Check all that Apply)
shell escapes sudo su sudo /bin/sh
Ch. 2 What command is the safest, most considerate, and most thorough way to halt a system?
shutdown
Ch. 2 What command is used to restart the machine. (Click all that Apply)
shutdown -r reboot init 6
Ch. 18 What is the configuraton file that is utilized for sendmail?
/etc/mail/sendmail.cf
Ch. 16 When using a hostname only to identify a server, which file is used to identify whether to look locally on the system first or look at DNS first,? In this file, you can configure to look for the name to ip address translation in order: example: file dns
/etc/nsswitch.conf
Which configuration file below is used as a "service switch" configuration file:
/etc/nsswitch.conf
Ch. 17 Which commonly shared file below contains User account information database:
/etc/passwd
Ch. 8 Which file below contains a list of groups recognized by the system?
/etc/passwd
Ch. 8 Which file below contains a list of users recognized by the system?
/etc/passwd (pg. 245)
Ch. 21 Which path below contains startup scripts for Red Hat Linux:
/etc/rc.d/init.d/nfs
Ch. 21 Which path below contains startup scripts for AIX:
/etc/rc.nfs
Ch. 10 Which file below is the configuration file for syslog?
/etc/syslog.conf
Ch. 24 Where is the primary configuration directory for Xen?
/etc/xen
Ch. 5 Where are the default user directories located?
/home
Ch. 5 What directory below is specific to libraries and shared libraries?
/lib
Ch. 11 Another method of deploying additional software to a kernel is loadable kernel modules. Where are loadable kernel modules stored under in linux?
/lib/modules
Ch. 5 What directory below is used for optional software packages?
/opt
Ch. 29 Which of the following command provide source of hardware information on linux? (Check-All-that-Apply)
/proc/diskstats dmidecode
Ch. 29 Which of the following command provide source of hardware information on linux? (Check-All-that-Apply)
/proc/meminfo /proc/cpuinfo
Ch. 5 What directory below is the home directory of the superuser account?
/root
Ch. 5 What is the primary directory consisting of a hierarchy of secondary files and command to include directories such as sbin, share, src, lib, bin, and include.
/usr
Ch. 5 Where are the system - specific data and configuration files located and includes directories like adm, log and spool?
/var
Ch. 10 Which directories below contain log files?
/var/log /var/adm
Ch. 3 To navigate the UNIX/Linux directory structure, you use the ____ command.
cd
Ch. 2 What redhat command helps manage services?
chkconfig
What command changes the root directory of a process?
chroot
Ch. 2 What is the term traditionally used in unix system to boot the system just enough to run a shell on the system console?
single-user mode
Ch. 3 Special User Accounts, also known as Pseudo-users,, have their password replaced in the /etc/shadow file with a _________ so that their accounts cannot be logged in to.
star (*)
Ch. 3 What account substitutes the user identity, effectively allowing you to login as that user account.
su - username
Ch. 3 What program can be utilized to allow a user specific commands to be run as a different user, without giving full access to the users account. For example, the ability to cat a file that "root" owns.
sudo
Ch. 30 What arrangement optimizes the flow of cooling so that air inlets always breathe cool arid rather than another server's hot exhaust?
Having raised floors & hot and cold aisles
Ch. 31 Which of the following below are issues to consider when documenting standards? (Check all-that-apply)
Special-purpose software Supported Operating Systems Expiration of backup tapes Standard configurations
Ch. 14 When an initial network connection occurs between two devices, auto-negotiation occurs to determine the connection: (Check all-that-apply)
Speed Duplex
Ch. 18 A mail message has three distince parts: (Select-all-that-Apply)
an envelope a body a header
Ch. 7 What command can be used for matching patterns and perform an associated action?
awk
Ch. 7 What command can remove sections from each line?
cut
Ch. 7 Which command below would produce a list of unique sorted values in the password file :
cut -d: -f7 < /etc/password | sort - u
Ch. 15 Which term can be used as an equivalent to default router?
default gateway
Ch. 2 What is the default boot configuration for GRUB? (Select all that apply)
grub.conf menu.lst
Ch. 10 Which utility implements a variety of log management policies and is standard in Linux?
logrotate
Ch. 20 Select the commands that can be used to extend a volume group and logical volume respectively:
lvextend vgextend
Ch. 4 Which command below can show "live" information on the process status, similiar to "ps". This command provides more detailed cpu, memory, swap, and process information.
top (pg 101)
Ch. 4 Which commands below shows every system call that a process makes and every signal it receives? (Check All that Apply)
truss stace tusc
Ch. 4 Which "ps" command below shows a userful overview of all the processes running on HP & Solaris?
ps -ef
Ch.4 Which "ps" command below shows a useful overview of all the processes running on Linux and AIX?
ps aux
Ch. 8 What command can be used to reconcile the contents of the shadow file to those of the passwd file, picking up any new additions and deleting users that ar no longer listed in passwd?
pwconv (pg. 252)
Ch. 5 What command can be issued to confirm what directory you are in at a command line prompt?
pwd
Ch. 17 Which of the following commands is the easiest way to distribute files from a central server:
rdist
Ch. 5 What type of pathnames are interpreted as starting at the current directory?
relative
Ch. 4 Which command adjusts the nice value after initial creation?
renice
What command do you use to delete files in Unix/Linux?
rm
Ch. 5 Which command below is used to remove a directory?
rmdir
Ch. 11 What command is used to remove a loaded kernel module?
rmmod
Ch. 16 BIND includes a utility which allows command line administration of the named deamon from the local or remote host called:
rndc
Ch. 20 In what filesystem are most of the operating system files contained?
root
Ch. 17 Which command below is a souped-up version of scp that is scrupulous about preserving links, modifications times, and permissions?
rsync (pg. 594)
Ch. 17 Which command below transfers the /etc/passwd file to the machine lollipop.
rsync -gopt --password-file=/etc/rsync.pwd /etc/passwd lollipop::sysfiles
Ch. 4 Which Process state indicates the process can be executed?
runnable
Ch. 28 Which command below can be used to collect and report performance statistics over time?
sar
Ch. 29 Which command below can be used to collect and report performance statistics over time?
sar
Ch. 27 Which of the following below allows a user to execute a process of the user that owns the file.
setuid
Ch. 7 The _________ command, used to run a shell script, includes several options for debugging.
sh
Ch. 9 What does the NIST definition of Cloud Computing include: (Check-all-that-apply)
shared pool of configurable computing resources on-demand network access networks, servers, storage, applications, and services
Ch. 16 What type of named server is considered the secondary name server for a zone and copies its data from the master?
slave
Ch. 28 What useful tool can be used to obtain a complete list of available OIDs and their associate values?
snmpwalk
Ch. 6 The file below contained in the /etc/apt directory contains a list of universal packages and package source for "main" components of ubuntu.
sources.list (pg. 171)
Ch. 18 To handle delayed delivery of email, mail systems use a technique know as ______________.
spooling
Ch. 21 Determining what part of the system will track the files that each client has open is referred to generically as _______________.
state
Ch. 21 _____________ servers, each request is independent of the requests that have preceded it and the server does not know which clients have opened files.
stateless
Ch. 16 What type of named server is like a slave, but copies only name server data (not host data)?
stub
Ch. 1 A systems administrator can also be called the ______________, because a system administrator often has unlimited permission to alter the system as the "root" user.
superuser
Ch. 30 Which of the following below can be used to filter power spikes and produce the correct voltage levels: (Check all-that-apply)
surge protector UPS
Ch. 2 What command in Solaris changes the status of the service? For example, disable ssh.
svcadm
Ch. 29 Which command below can be used to obtain information on the amount of paging space being used?
swapon
Ch. 20 Select the two commands below that can be used to prepare a swap partition and then enable it for use:
swapon mkswap
Ch. 10 What is the process name of the integrated systems for logging in Unix/Linux?
syslogd
Ch. 10 Which of the following is the logging daemon and it's config file is: /etc/syslog.conf?
syslogd
Ch. 7 When analyzing a log file that is continuing to receive output from the application, what command can be used to read from the end of the file and wait for new lines to be printed?
tail -f
Ch. 11 Which files in the /proc/sys allow tunable kernel parameters (Check-all-that-apply)
tcp-fin-timeout inode-max shmmax
Ch. 7 What command is used to split the data stream and send a copy to another output?
tee
Ch. 31 What type of service is negotiated, agreed upon, and documented in IT organizations?
wrong Service Level Agreements Service contracts Service Level Agreements service contracts Service Level Agreements Service contracts Service Level Assessments Service Layer Agreements Service Level Agreements Service Level Assessments Service contracts Service Layer Agreements Service contracts service level assesments service level agreements
Ch. 20 Which of the following commands are used to obtain disk device information attached to a Unix or Linux System? (Check all that Apply)
wrong diskinfo - C - l lsdev - C - c disk ioscan - fNn - c disk diskinfo -C -l parted -l lsdev -C -c disk ioscan -fNn -c disk parted -l lsdev -C -c disk lsdev - C - c disk diskinfo - C - l
Ch. 17 Which of the following commands preserves permissions and modification times during the copying process from one server to another? (Check-all-that-apply)
wrong mv rsync rdist mv cp rsync mv rsync cp rdist cp rsync rdist cp rsync
Ch. 10 Which log files contain a record of users logins?
wtmp lastlog wtmpx
Ch. 7 Which elementary bash comparison operator is used to compare to numeric values to see if they are equal?
x -eq y
Ch. 6 Which of the following below is a metapackage manager based on RPM and similar to apt-get?
yum
Ch. 6 Which of the following below are Metapackage management systems:
yum apt
Ch. 4 Which Process state indicates the process is trying to die?
zombie
Ch. 7 Which files below in the user's home directory is used to set shell environment values?
~/.profile ~/.bash_profile
Ch. 4 Utilizing the "ps" command, the following information can be obtained: (Check all that Apply)
%MEMORY USER PID %CPU Command Stat USER or UID
Ch. 8 A user account can be locked with the usermod command using what option
-L
Ch. 7 Which base file evaluation operation is true if file exists only?
-e
Ch. 8 What option can be added to the userdel command to remove the home directory of the target user?
-r
Ch. 5 Which entry below refer to the directory itself?
.
Ch. 3 UNIX/Linux systems interpret ____ to mean the parent directory.
..
Ch. 5 Which entry below refer to the parent directory?
..
Ch. 11 A kernel can be modified by modifying which of the files below in the source directory:
.config
Ch. 6 Two package formats are in common use to install software packages:
.deb rpm
Ch. 8 Which files below are common startup files for csh when logging in?
.login .cshrc
Ch. 5 Where are the core operating system commands located?
/bin
Ch. 8 Which command below can be used as a fake shell?
/bin/false
Ch. 3 Pseudo-users also have their shells set to: (Check all that apply)
/bin/nologin /bin/false
Ch. 11 Which directory contains device files, which have a major and minor number associated with each device?
/dev
Ch. 20 Select the devices below that conform to standard naming of disks: (Check all that Apply)
/dev/hdisk0 /dev/disk/disk0 /dev/dsk/c0t0d0s2 /dev/sda
Ch. 16 Where is the named.conf file located in Linux (RHEL and SUSE)?
/etc
Ch. 21 Which file below is used to configure the exported directories (filesystems) on HP-UX?
/etc/dfs/dfstab
Ch. 21 Which file below is used to configure the exported directories (filesystems) on AIX?
/etc/exports
Ch. 21 Which file below is used to configure the exported directories (filesystems) on Linux?
/etc/exports
Ch. 21 What files can we modify to add an NFS to mount of an NFS filesystem at boot time? Depends on O/S. (Check all-that-apply)
/etc/fstab /etc/vfstab
Ch. 17 Which commonly shared file below defines UNIX groups:
/etc/group
What configuration file typically contains a list of groups and associated accounts associated with a group?
/etc/group
Ch. 21 Which path below contains startup scripts for Ubuntu:
/etc/init.d/nfs-kernel-serv er
Ch. 21 Which path below contains startup scripts for Solaris:
/etc/init.d/nfs.server
Ch. 17 Which commonly shared file below holds electronic mail aliases:
/etc/mail/aliases
Ch. 16 When configuring a linux system, which file below is used so that the linux system can do a dns lookup?
/etc/resolv.conf
Ch. 17 Which commonly shared file below holds user account passwords:
/etc/shadow
Ch. 8 What file contains a list of permitted shells?
/etc/shells
Ch. 5 Where are the main kernel components located?
/kernel
Ch. 8 On Linux, the root user always has a UID of what number??
0 (pg. 248)
Ch. 18 What occurs when a email server employs a mail alias expansion mechanism?
A forwarder allows each incoming message to be sent to one or more destinations.
Ch. 15 Which of the following statements best describes the term autonomous system?
A group of networks and routers controlled by a single administrative authority.
Ch. 13 What is a MAC Address?
A media access control address to identify a unique network interface controller card.
Ch. 21 Which of the following are major enhancements to NFS version 4. (Check all-that-apply)
Access control lists (ACLs) Strong, integrated security Good performance even on low-bandwidth connections Support for both UNIX and Windows clients Compatibility and cooperation with firewalls and NAT devices Stateful operation Support for Unicode filenames Support for replication and migration Integration of the lock and mount protocols into the core NFS protocol
Ch. 15 What main services are provided by the network layer of the TCP/IP model? (Choose two.)
Addressing Routing
Ch. 19 Using HTTP Protocol, what type of command does the browser send to specify which media or representations are acceptable?
An HTTP Accept
Ch. 19 Using HTTP Protocol, what type of command does the browser send to request a web page from the server.
An HTTP GET
Ch. 19 Using HTTP Protocol, what type of command does the browser utilize to send data to a web server? (Check-all-that-Apply)
An HTTP PUT An HTTP POST
Ch. 31 Which of the following are sample skills that demonstrate the needed skillsets and organization might need in IT? (Check all-that-apply)
Analyze log files Install new hardware Manage backups and restores Create users, remove user accounts
Ch. 6 Which tool below from SUSE is used for performing automated installations?
Autoyast
Ch. 15 In modern networks, what is the only EGP protocol used?
BGP
Ch. 15 Which of the following is considered to be an Exterior Gateway Protocol (EGP)?
BGP
Ch. 1 Linux uses the freeware ____ shell as its default command interpreter.
Bash
Ch. 7 The _____ shell, when compared to the other shells, has a more powerful programming interface.
Bash
Ch. 31 What are examples of services that might be in an SLA. Check all that apply
Business applications Internet and web browsing Email File servers Printing
Ch. 27 Which of the following below are additional sources for security information? (Check-all-that-Apply)
CERT Schneier Blog Securityfocus.com SANS
Ch. 27 Which of the following are certifications for security professionals? (Check-all-that-Apply)
CISA GIAC CISSP
Ch. 31 Which of the following standards and regulations are used today in information technology? (check all-that-apply)
CJIS COPPA FISMP COBIT
Ch. 14 What does CSMA/CD stand for: (Check all-that-apply)
Carrier Sense Collision Detection Multiple Access
Ch. 23 Which of the following below are popular CM systems? (check all-that-apply)
Chef Salt Puppet Ansible
Ch. 31 Which of the following are key areas in which IT interfaces with the rest of the organization? (Check-all-that-apply)
Communicate task status to users and the enterprise. Assist with regulatory compliance Plan for and be ready for disasters Monitor the computing environment
Ch. 16 Which protocol is used to translate a domain name to an IP address?
DNS
Ch. 31 Which of the following are key areas in which IT interfaces with the rest of the organization? (Check-all-that-apply)
Develop skills in its staff Work to ensure needs are met Maintain a list of open tasks Track emerging technologies
Ch. 14 What are the four major factors that contribute to the success of a network?
Development of a reasonable network design. Competent ongoing operations and maintenance. Selection of high-quality hardware Proper installation and documentation
Ch. 29 Which of the follow can be done to improve performance? (Check-All-that-Apply)
Double-check the configuration of the systems. Spread Traffic among several systems. Ensure the system has enought memory. Organize hard disks and filesystems
Ch. 13 DHCP protocol is defined as:
Dynamic Host Configuration Protocol
Ch. 14 Which standard below by the Telecommunications Industry Association covers telecommunication infrastructure of commercial buildings?
EIA-606
Ch. 15 Which of the following is considered to be a Hybrid routing protocol that utilizes features of both Distance Vector and Link State Protocols?
EIGRP
Ch. 15 Which of the following is considered to be an Interior Gateway Protocol (IGP)? (Check all that Apply)
EIGRP OSPF RIP IGRP
Ch. 10 What information should an Administrator consider at the least capturing from log files: (Check-all-that-Apply)
Even success or failure Date and Time of the incident Username or User ID event details Sensitive data added, altered, or removed Source address for network events
Ch. 22 Which processes below should be used when running Samba to ensure a basic level of security? (Check all-that-apply)
Explicitly specify which clients can access the resources. Block access to the server from outside your organization.
Ch. 19 Which of the protocols below can be used in URL's. (Check-all-that-apply
FTP http https ldap
Ch. 7 In Unix/Linux all shells support the same commands and programing statements. (T/F)
False
Ch. 22 CIFS provides which of the following services? (Check all-that-apply)
File Sharing Name resolution Service announcement (file server and printer "browsing) Network Printing Authentication and authorization
Ch. 18 Mail systems typically support several aliasing mechnisms.. Which of the following are considered mail alias mechnisms: (Check all-that-apply)
Flat-file maps (/etc/mail/aliases) LDAP databases mail routing databases NIS
Ch. 31 What makes users happy? (Check all-that-apply)
Friendly, knowledgeable help is available when needed Their applications software is installed and works as it's supposed to Their computers are up and running and they can login Their data files stay as they left them Their other resources such as printers and file servers are available
CH. 8 What information is contained in the GECOS field? (Check all that Apply)
Full Name Office Number and Building (pg. 249)
Ch. 8 Which fields below are in the /etc/group file? (Check all that Apply)
GID List of members Group Name Encrypted password or place holder (pg. 254)
Ch. 6 Which of the following are used to store live versions of files, allowing for check-in and checkout of files while editing?
Git subversion
Ch. 19 Which protocol below utilizes certificates to encrypt data between client and web server?
HTTPS
Ch. 10 Log data can become quite large, but also a necessity to keep. Administrators should keep these questions in mind when designing a overall log in strategy: (Check-all-that-apply)
How many systems and applications will be included? How long must logs be retained? What type of storage infrastructure is available? What types of events are important?
Ch. 14 Which type of device below sends ethernet frames to each port and acts like a repeater?
Hub
Ch. 9 Which of the following are deployment models for cloud computing? (Check-all-that-apply)
Hybrid Community Private Public
Ch. 9 What is the main component that enables virtualization and manages virtual machines?
Hypervisor
Ch. 16 What organization assigns names for top-level domains?
ICANN
Ch. 18 Which protocols below allow a client application retrieve email from a mail server?
IMAP4 POP3
Ch. 15 IP multicasting is available for both:
IPv4 IPv6
Ch. 13 DHCP permits a computer to obtain all the information needed to communicate on a given network including: (Check-all-that-Apply)
IPv4 Address Subnet Mask Default Router
Ch. 31 Which goal should be aligned with the goals of the larger organization?
IT Spending
Ch. 31 What affects everyone in the organization , and are important components of the organization's overall strategy?
IT policies
Ch. 31 Which standard has become the de factor standard for organizations seeking a comprehensive IT service management solution?
ITIL
Ch. 26 Which of the following types of tests does the CI/CD pipeline consider: (Check all-that-apply)
Infrastructure Tests Performance Tests Integration Tests Static code analysis
Ch. 15 The term Interior Gateway Protocol (IGP) as a generic description that refers to any protocol that ____________ routers use when they exchange routing information.
Interior
Ch. 18 What client email protocol allows users to view and manipulate messages on the mail server? This protocol connects with the users mailbox on the mail server.
Internet Message Access Protocol (IMAP4)
Ch. 6 Which tool below from Solaris is used for performing automated installations?
Jumpstart
Ch. 12 Which Desktop printing utility is the primariy printing tool for KDE?
KDEPrint
Ch. 13 What Layer of the OSI Model describes communication utilizing MAC address communication?
Layer 2
Ch. 8 The follow information below is contained in the password file. (Check all that Apply)
Login name Encrypted password placeholder Home directory UID Login Shell GECOS information GID
Ch. 14 If jumbo-frames are being used, to increase the associated size of the frame, the _________ must be increased.
MTU
Ch. 16 When a client queries DNS, a client must specify the type in its query; servers specify the data type in all resource records they return. A Type MX record is:
Mail Exchanger
What software, by Julian Field is an open source scanner for mail hubs and recognizes spam, viruses, and phishing attempts?
MailScanner
Ch. 31 Which of the following are sample skills that demonstrate the needed skillsets and organization might need in IT? (Check all-that-apply)
Manage software licenses Dubug mail server issues Package a Windows application in MSI format Create DNS entries
Ch. 6 Which of the following tasks do most administrators perform when it comes to software installation and management? (Check all-that-apply)
Managing add-on software packages. Automating mass installations of operating systems. Maintaining custom OS configurations for the local environment. Keeping systems and applications patched and up to date.
Ch. 29 Which of the following resources can effect performance? (Check-All-that-Apply)
Memory Network I/O Storage I/O CPU Utilization
Ch. 21 Which version of NFS utilizes TCP protocol only.
NFSv4
Ch. 17 What services was used for sharing of usernames, passwords, groups, nfs shares, hosts, and other data and was considered the first "prime time" administrative database. This service was released by Sun.
NIS
Ch. 16 Which type of DNS zone record below indicates a name server (dns)?
NS
ch. 13 Which layer of the TCP/IP network model specifies how packets travel end to end over a TCP/IP network?
Network
Ch. 21 What is the definition of NFS:
Network File System
Ch. 17 What does NIS stand for?
Network Information Service
Ch. 30 A data center is composed of: (Check all-that-apply)
Network connectivity throughout the data center, and to places beyond. Electric power sufficient to operate the installed devices. Racks that hold computer, network, and storage devices. Cooling, to keep the devices within their operating temperature ranges. A physically safe and secure space.
Ch. 15 BGP, similar to distance-vector routing protocols utilizes:
Next-Hop
Ch. 28 MIBs contain descriptions of specific data variables, which are referred to with names known as:
Object Identifiers (OIDs)
Ch. 25 Docker became of of the founding members of the ___________________________, a consortium whose mission is to guide the growth of container technology.
Open Container Initiative
Ch. 9 Which of the following platforms are used to control Hypervisor sessions across a large virtualized environment? (Check-all-that-Apply)
Openstack
Ch. 9 Each Virtual Machine has it's own: (Check-all-that-Apply)
Operating system Kernel Libraries and applications
Ch. 14 Which type of cable carries signals farther than copper pairs?
Optical fiber
Ch. 9 Which of the following are characteristics of cloud computer? (Check-all-that-Apply)
Rapid Elasticity On-demand Self-Service Broad Network Access Measured Service Resource Pooling
Ch. 20 What describes RAID?
Redundant Arrays of inexpensive disks
Ch. 14 Which type of device below forwards packets from one network to another network?
Router
Ch. 20 What is a lower - level system for abstracting storage, one that makes network storage look like a local hard disk?
SAN
Ch. 28 Which protocol below is the standard for network management in the TCP/IP protocol suite?
SMNP
Ch. 16 Which type of DNS zone record below defines the DNS zone and indicates that is the authority for the zone?
SOA
Ch. 20 Which hard disk technology below is faster, but has smaller disk size and more costly.
SSD
Ch. 7 Every process has at least three communication channels available in linux: (Click 3 choices)
STDERR (standard error) STDIN (standard input) STDOUT (standard output)
Ch. 22 Which of the following is an open source software package that implements server side of CIFS on Unix and Linux Hosts?
Samba
Ch. 20 Data is read from physical hard drives in concentric circles known as which of the following?
tracks
Ch. 14 When designing a network, one ethernet connection may be enough; however, four ethernet connections would be helpful for the following reasons (Check all-that-apply)
The can be uses with voice telephones It is much cheaper to do it initially rather than adding wires later. The can be used for visitors or demo machines The cost of materials is typically only 5% to 10% of the total cost.
Ch. 31 All of the types of information on ticketing systems below managers can extract, except:
The cpu percentage across all systems.
Ch. 17 A directory service like LDAP has some of the following data characteristics that are considered for candidates being included in the directory: (Check all-that-apply)
The database will be widely replicated and cached. The information is atttribute based. Data objecst are relatively small Data are read often but written infrequently. Searching is a common operation.
Ch. 11 The kernel abstracts several lower-level hardware features, including: (Select-all-that-apply)
The filesystem Signals and Semaphores Virtual Memory General input/output Interprocess communication Processes
Ch. 13 What does an ARP Table contain?
The table matches an IP Address with the associated MAC Address
Ch. 14 Most network design consists of specification of: (Check all-that-apply)
The types of media used The topology and routing of cables The use of switches and routers
Ch. 4 What is the identification number of the person that created or started the process called?
UID
Ch. 14 Which type of cable is the preferred cable medium for Ethernet?
UTP
Ch. 29 Which of the follow can be done to improve performance? (Check-All-that-Apply)
Use the correct RAID Solution and spread accross multiple disks Eliminate storage resources' dependence on mechincal devices. (Use SSD) Correct problems of usage Monitor the network.
Ch. 14 What does VLAN stand for?
Virtual Local Area Network
Ch. 19 What two main building blocks are used to implement the Web on top of the global Internet?
Web Server Web Browser
Ch. 19 Which of the following Servers are Application Servers? (Check-all-that-apply)
WebLogic WebSphere Tomcat
Ch. 15 A Link State routing protocol utilizes an algorithm that focuses on___________.
a destination network based on Shortest Path first, by computing topology information.
Ch. 10 Which log file attempts to keep a record of each user that is "currently" logged in?
utmp
Ch. 11 What is the standard name of the kernel file for Linux?
vmlinuz
Ch. 28 Which command below provide cpu usage information?
vmstat
Ch. 29 Which command below provide cpu usage information?
vmstat
Ch. 20 LVMs aggregate physical devices to form pools of storage called __________.
volume groups (pg. 741)
Ch. 30 When considering a UPS for a Data Center, the power all the devices consume, must be calculated to determine the size of the UPS needed. _____________________ is normally used to express power consumption of each device.
watts
Ch. 17 Which of the commands below would be an example of pulling a file:
wget
Ch. 18 What type of lists can an email server check to allow mail from specific sites?
whitelist
Ch. 18 A mail alias files can contain a list of users to send email to. In additional to a list of users, the file can contain: (Check all-that-apply)
a file to which messages should be appended a file containing a list of addresses a command to which messages should be given as input
Ch. 11 On Linux systems, device drivers are typically distributed in one of three forms:
a loadable module a patch against a specific kernel version an installation script or package that installs the drive
Ch. 12 Which of the following pieces does printing rely on? (Check-all-that-apply)
a network protocol a print spooler user-level utilities back ends that talk to the printing devices
Ch. 2 What is the standard term for "starting up a computer". During this process, the kernel is loaded into memory and begins executing.
bootstrapping
Ch. 30 If humidity is to high in a data center, the following can occur: (Check all-that-apply)
circuit boards oxidize circuit boards short circuit
Ch. 12 What defines a set of printers that share a print queue?
class
Ch. 17 Which ldap attribute below stands for common name?
cn
Ch. 16 Which of the following below are Top-Level Domain names: (Check-all-that-Apply)
com org gov edu net biz
Ch. 5 In what mode does the vi editor open by default?
command mode
Ch. 25 A ________________ image simplifies matters by packaging an application an its prerequisites into a standard, portable file
container
Ch. 25 A ________________ is an isolated group of processes that are restricted to a private root filesystem and process namespace.
container
Ch. 26 ___________________ is the process of automatically deploying builds to nonproduction environments after the continuous integration process completes.
continuous delivery
Ch. 26 ___________________ closes the loop by deploying to live systems that serve real users without any operator intervention.
continuous deployment
Ch. 26 ___________________ is described as " closes the loop by deploying to live systems that serve real users without any operator intervention."
continuous deployment
Ch. 26 ___________________ is described as "a software development practice where members of a team integrate their work frequently."
continuous integration
Ch. 26 ___________________ is the process of collaborating on a shared code base, merging disparate code changes into a version control system, and automatically creating and testing builds
continuous integration
Ch. 1 What command below copies an entire directory and retrains the permissions:
cp -rp
Ch. 5 When doing an ls - ld on /usr/include, which item below indicates the filetype?
d
Ch. 10 Which of the following sylog.conf entries sends information about daemon and auth to a centralized syslog server on the network?
daemon,auth.info @netloghost
Ch. 17 Which ldap attribute below stands for domain component?
dc
Ch. 5 In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted?
dd
Ch. 21 What type of automount map mounts filesystems that do not share a common prefix and use the full pathname?
direct maps
Ch. 17 Which file below would be used as a control file for the "rdist" command:
distfile
Ch. 10 What command below is used to view the kernel buffer and contains messages that were generated prior to "init" starting.
dmesg
Ch. 17 Select the correct distinguished name attribute for user gopher:
dn: uid=ghopper,ou=People,dc=navy,dc=mil
Ch. 18 What are the possible values in the nsswitch file for hosts? (Check all-that-apply)
dns nis files (pg. 614)
Ch. 25 The persistent daemon process that implements container and image operations for Docker is:
dockerd
Ch. 16 A ________________ reviews applications and assigns an organization a subdomain under one of the existing top-level domains.
domain name registrar
Ch. 16 With DNS, a client always contacts a local _______________ first.
domain name server
Ch. 16 The Domain Name System (DNS) is the system that provides name to address mapping for the Internet. DNS uses a hierachical naming scheme known as __________________.
domain names
Ch. 6 Which command installs, verifies and queries the status of packages in linux; Ubuntu as an example.
dpkg
Ch. 20 Select the command below that shows the size of a directory and its contents in kilobytes:
du df
An __________________ system allows users to transfer memos across the Internet.
Ch. 10 Which of the following are syslog severity levels
emerg crit err (pg. 309)
Ch. 5 Which files below are used to attach filesystems, when the system is booted? (Check all that Apply)
etc/fstab /etc/filesystems /etc/vstab
Ch. 28 SNMP defines a low-level management protocol that provides for two conceptual operations:
fetch a value from a variable store a value into a variable
Ch. 20 A _____________mediates between the raw bag of blocks presented by a partition, RAID array, or logical volumen, and the standard ____________________ interface expected by most programs.
filesystem
Ch. 20 Errors on a filesystem are common on most filesystems. What do these errors indicate?
filesystem corruption
Ch. 18 Which of the following below do mail servers have: (Check all-that-apply)
filter mail for spam, viruses, and other malware Accept Outgoing Mail from MSAs or user agents receive incoming mail from the outside world allow users to access their mailxboxes with IMAP or POP deliver mail to end-users' mailboxes
Ch. 2 Which command-line options are available with GRUB? (Check all that apply)
find root kernel reboot
Ch. 7 Which find command below would find files only?
find . -type f -name '*.log'
Ch. 7 Which find command below would discard "permission denied" error messages only:
find / -name core 2> /dev/null
Ch. 20 What command can be used to check different kinds of filesystems on Linux for errors?
fsck
Ch. 23 Which of the following terminology across the different CM applications in the book identify an op type for each product? (check all-that-apply)
function module provider Resource Type, provider
Ch. 5 Which command below shows which users are actively using a filesystem?
fuser -c
Ch. 7 What command can be used to search text in a file and print lines that match a given pattern?
grep
Ch. 10 Which commands below can be used to view log files or text files?
grep cat tail
Ch 2 What command shuts the system down, kills nonessential processes, and executes a sync, waits for filesystem writes to complete, and stops the kernel?
halt (pg. 59)
Ch. 20 Which of the following below are considered storage devices? (Check all that Apply)
hard disk flash drive Solid State Device RAID array
Ch. 16 DNS utilizes a ________________ naming scheme.
hierarchal
Ch. 19 Which of the following are valid URL's (Check-all-that-apply)
http://www.google.com https://www.bankofamerica.com http://192.168.0.34
Ch. 30 If humidity is to low in a data center, the following can occur: (Check all-that-apply)
humidifiers might be needed static electricity problems
Ch. 19 Each web page is classified as a _______________ document.
hypermedia
Ch. 24 Virtual servers are created from ___________, which are templates of configured operatied systems that a hypervisor can load and execute.
images
Ch. 29 Which command below can be used to obtain information on disk performance?
iostat
Ch. 27 Which of the following commands below are used to filter tcp connections on linux? (Check-all-that-apply)
iptables ipf
Ch. 20 What technology implements a SAN with lower costing hardware rather than dedicated Fiber Channel network.
iscsi
Ch. 10 Which command below causes syslogd to close its log files, reread its configuration file, and start logging again?
kill -HUP
Ch. 8 What other authentication methods can be used that contain a database - like repository that can store user management data? (Check all that apply)
ldap Microsoft Active Directory
Ch. 18 What are the possible values in the nsswitch file for aliases (Check all-that-apply)
ldap nis files
What is the most important characteristic of a good password?
lenght
Ch. 2 Which run level boot the system to single-user mode?
level 1
Ch. 5 Which command below is used to create a symbolic link?
ln -s archived/secure /var/log/secure
Ch. 10 Which of the following is a user-level command that submits log entries from the shell?
logger (pg. 318)
Ch. 10 The syslog.conf file contains the following entry: local5.warning /tmp/evi.log Which logger command would send messages to the associated log file?
logger -p local5.warning "error message"
Ch. 20 Volume groups can be subdivided into ______________, similar to dividing a disk into partitions.
logical volumes
Ch. 12 Which command below enqueues jobs for printing. (Sends the job to the printer)?
lp
Ch. 12 Which command below configures printers and classes?
lpadmin
Ch. 12 Which of the following below are spoolers that run as stand-alone processes (daemons) to submit print jobs to the printer?
lpd lpsched
Ch. 12 Which cups command below shows available devices or drivers?
lpinfo
Ch. 12 Which command below sets system-wide defaults for printers?
lpoptions
Ch. 12 Which command below sends a file to be printed?
lpr
Ch. 12 Which command below cancels a print job?
lprm
Ch. 12 Which command below provides information on print jobs?
lpstat
Ch. 3 What command is used to determine the ownership of a file?
ls -l filename (pg. 67)
Ch. 11 What command is used to inspect the currently loaded kernel modules?
lsmod
Ch. 11 Linux has several make targets that let the administrator configure the kernel with different interfaces. Which make targets below have a configuration interface to assist with rebuiling kernels: (Check-all-that-Apply)
make menuconfig make config make xconfig make gconfig
Ch. 1 What command below is used to provide documentation for the "grep" command?
man grep
Ch. 16 What type of named server is considered the primary name server for a zone?
master
Ch. 21 What type of automount map contains a listing of the direct and indirect maps, which provides a list of all the maps to utilizing to automount filesystems?
master maps
Ch. 20 Which command below in Linux creates raid devices?
mdadm
Ch. 2 What is the command to attach a filesystem to the unix/linux operating system?
mount
Ch. 20 To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?
mount -a
Ch. 22 Which of the following would be used to mount a samba share across the network?
mount -t cifs -u username=joe //redmond/joes /home/joe/mnt
Ch. 29 Which command below generates cpu information for each individual processor?
mpstat
Ch. 20 What is the standard software for RAID implementation in Linux?
multiple disks (md)
Ch. 1 UNIX and Linux are ____ systems, which allow one user to execute more than one program at a time.
multitasking
Ch. 1 UNIX/Linux are ____ systems, which let many people simultaneously access and share the resources of a server computer.
multiuser
Ch. 6 Which tool below from AIX is used for performing automated installations?
nim
Ch. 27 Which tool below is a network port scanner:
nmap
Ch. 22 Most of Samba's functionality is implemented by two daemons
nmbd smbd
Ch. 16 What type of named server answers a query from cache and doesn't know if the data is still valid?
nonauthoritative
Ch. 17 Which ldap attribute below stands for organization?
o
Ch. 10 Which of the following is the library routines that submit messages to syslogd?
openlog
Ch. 27 Which tools below can be used for security power tools? (Check-all-that-apply)
ossec Nessus snort John the Ripper nmap Bro
Ch. 17 Which ldap attribute below stands for organizational unit?
ou
Ch. 4 What can be used on a Linux system to trace the lineage of each child process??
parent process ID
Ch. 7 A function name differs from a variable name because a function name is followed by a set of ____.
parenthesis
Ch. 20 What is a fixed - size subsection of a storage device?
partition
Ch. 7 Regular expressions, also called "regex", are used for:
pattern matching
Ch. 6 Which of the following below is the FreeBSD package manager?
pkg
Ch. 7 In shell scripts command lines begin with a(n)______
pound (#) symbol
Ch. 7 The variable symbol in a bash script contains the number of command-line arguments?
$#
Ch. 5 When doing an ls command, which filetype symbol below indicates a regular file?
-
Ch. 8 Which file below contains the actual user encrypted passwords recognized by the system?
/etc/shadow
Ch. 13 What range of IP networks below are used for private intranet ranges? (Select all that Apply)
10.0.0.0 169.254.0.0 192.168.0.0 172.16.0.0
Ch. 13 How many bits is an IPV6 Address?
128 bits
Ch. 13 From the following list, identify a valid Class B IP address:
129.112.54.6
Ch. 14 What is the typical packet size for transmission over ethernet?
1500 bytes (1518 with framing)
Ch. 30 Which Power-Tier model for racks in a data center would be an average wattage usage for High density 1U Servers?
16 KW
Ch. 15 Which IPv4 Multicast Address Space below announces and learns about other routers on this subnet
224.0.0.1
Ch. 30 According to the 2008 ASHRAE guidelines, data center humidity should be kept between?
30% to 55%
Ch. 13 How many bits is an IPV4 Address?
32 bits
Ch. 27 Which permissions below would set the id bit, so that the process runs as the users that owns the executable file?
4000
Ch. 13 How many bits is a MAC Address?
48 bits
Ch. 18 Which of the following Delivery status notifications (DSN codes) indicates "Mailbox is full"?
5.2.2
Ch. 13 Which of the following are public IP network IDs? (Choose two.)
8.0.0.0 172.32.0.0
Ch. 14 What is the designated protocol for Wireless Communication?
802.11
Ch. 5 At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes?
:q!
Ch. 7 To replace the file's existing content or create a new file, you use:
>
Ch. 7 To redirect STDOUT and STDERR, use the following:
>&
Ch. 7 To append output to an existing file, you use ______.
>>
Ch. 26 Which of the following are possible ways to deploy software: (Check all-that-apply)
A Shell script (ssh) a configuration management tool using a container image and use container management Use something
Ch. 13 Which protocol does a router use to obtain the MAC address of a PC host located on a directly connected subnet?
ARP
Ch. 13 ARP stands for:?
Address Resolution Protocol
Ch. 22 Which of the following cross platform services can Samba implement? (Check all-that-apply)
Authentication and authorization Network printing Service announcement (File and print server "browsing" Name resolution
Ch. 30 What is the standard for measuring heat load?
British Thermal Unit
Ch. 19 What does HTTP utilize to run scripts to obtain additional information?
Common Gateway Interference
Ch. 12 What is the definition of CUPS on Linus/Unix?
Common Unix Printing System (pg. 360)
Ch. 23 Which best describes what Configuration Management is?
Configuration Management Software automates the management of operation systems on a network.
Ch. 6 Before modifying a file, it is best practices to:
Create a backup revision of the file.
Ch. 13 What protocol can be used to automatically assign IP addresses and other parameters to a host or router?
DHCP
Ch. 13 Which term can be used as an equivalent to default router?
Default gateway
Ch. 16 DNS stands for:
Domain Name System
Ch. 13 An IP address consists of a 32-bit binary number. When written like this: 192.168.1.1, it is known as ________ notation.
Dotted-Decimal
Ch. 5 It is acceptable to use shell metacharacters when naming files.
False
Ch. 15 What is the processing of choosing the path for a packet?
Forwarding
Ch. 28 What are the most common uses of netstat. (Check all-that-Apply)
Inspecting interface configuration information Viewing operational statistics for various network protocols Monitoring the status of network connections. Examining the routing table Identifying the listening network service
Ch. 16 What does ICANN stand for?
Internet Corporation for Assigned Names and Numbers (ICANN)
Ch. 24 Each Virtual Machine has it's own: (Check-all-that-Apply)
Kernel Libraries and Applications Operating System
Ch. 17 The definition for LDAP is:
Lightweight Directory Access Protocol
Ch. 24 _________________ is helpful for high-availability load balancing, disaster recovery, server maintenance and gener system flexibility. This allows virtual machines to move between hypervisors running on different physical servers.
Live Migration
Ch. 28 Which popular SNMP tool that allows for graphing and polling of SNMP data and was written by Tobi Oetiker?
MRTG
SELinux utilizes an access control system in which all permissions are assigned by administrators and called:
Mandatory access control
Ch. 18 The first email messages consisted primarily of text. However, users needed to send attachments along with an email. In order to permit non-ASCII data items through the email, the following protocol was created to permit transmission of non-ASCII data items:
Multipurpose Internet Mail Extensions (MIME)
Ch. 15 What protocol allows a host to map between an IPv6 address and a hardware address (MAC)?
NDP
Ch. 21 Which protocol below lets you share file-systems among computers?
NFS
Ch. 21 Which version of NFS allows for "stateful" operations?
NFSv4
Ch. 15 Which of the following is considered to be a link state type routing protocol?
OSPF
Ch. 30 Which of the following below can be used to insure data center availability: (Check all-that-apply)
On-Site Generator UPS's Mechanical Systems Redundant Power Feeds
Ch. 27 What of the following below are good security practices for User Accounts and Passwords? (Check-all-that-Apply)
Password Aging Password Complexity Don't allow blank passwords
Ch. 27 Which of the following below comprises security? (Check-all-that-Apply)
Password not complex RootKits Worms Viruses
Ch. 27 What is PAM and what is its purpose? (Check-all-that-Apply)
Pluggable Authentication Module Implements authentication systems
Ch. 14 What is an extension of UTP Ethernet that transmits power to devices over the same UTP cable that carries Ethernet signals?
Power Over Ethernet (PoE)
Ch. 6 What is a standard protocol from Intel that allows systems to boot from a network interface?
Preboot eXecution Environment (PXE)
Ch. 20 Which RAID level is known as mirroring?
RAID Level 1
Ch. 20 Which RAID levels combined below indicate mirrors of stripes? (Check 2)
RAID Level 1 RAID level 0
Ch. 20 Which RAID level stripes both data and parity information, adding redundancy while improving read performance, but adds two parity disks?
RAID Level 6 (pg. 756)
Ch. 15 Which of the following is considered to be a Distance Vector type routing protocol? (Check all that Apply)
RIP IGRP
Ch. 21 Which of the following flavors of authentication can be uses with NFS. (Check all-that-apply)
RPSEC_GSS AUTH_SYS AUTH_NONE
Ch. 28 Which of the following is a database tool, also written by Tobi Oetiker, to storing graphical performance metrics?
RRDtool
Ch. 23 Which of the following are sample operations that a CM system can handle right out of the box? (check all-that-apply)
Restart a Service Create or remove a database account Add a cronjob Copy files to or from systems
Ch. 19 Define the SSL protocol:
Secure Sockets Layer
Ch. 2 Solaris revamped the boot process with the introduction of its:
Service Management Facility
Ch. 9 Which two attributes are Clouds defined?
Service Models Deployment Models
Ch. 31 Which of the following below are issues to consider when documenting standards? (Check all-that-apply)
Service times House calls Upgrade Policy Response Time
Ch. 27 Which of the following below are good security practices? (Check-all-that-Apply)
Set traps to help detect intrusions and attempted intrusions. Monitor Reports from security tools Look for unusual Activity
Ch. 4 What kill signal stops a process, then restarts it with the same PID?
Sighup
Ch. 18 The standard transfer protocol for sending email across the internet is:
Simple Mail Transfer Protocol (SMTP)
Ch. 28 What is SNMP:
Simple Network Management Protocol
Ch. 8 What scheme allows credentials to be more complex for authentication and allows a login to multiple systems from linux to Microsoft?
Single sign-on systems (SSO)
Ch. 4 Which Process state indicates the process is waiting for some resource?
Sleeping
Which of the following below are process states? (Check all that Apply)
Sleeping Zombie Runnable Stopped
Ch. 27 Which of the following below comprises security? (Check-all-that-Apply)
Software not patched Social Engineering Bugs Phising
Ch. 18 Which program below written in perl by Habeeb Dinu is used to eliminate spam from email.
SpamAssassasin
Ch. 26 Many development sites run at least three environment, some more. Select the three minimum environments.
Staging Production Development
Ch. 4 Which Process state indicates the process is suspended and not allowed to execute?
Stopped
Ch. 23 Which of the following are best practices for CM? (check all-that-apply)
Subdivide configurations ruthlessly. Sensitive data should be encrypted The CM Server should be well protected as it runs as root. Don't test on Production Servers. Keep the configuration base under version control. Keep different data under different directories or repositories.
Ch. 29 Which of the following steps below are using to analyze performance problems? (Check-All-that-Apply)
Summarize the evidenc both narratively and grahpically. Formulate the question Gather and clssify evidence Develop a conclusion statemen. Critically appraise the data
Ch. 14 Which device below is a link-layer device that takes an active role in forwarding ethernet frames locally?
Switch
Ch. 14 Which type of device below sends ethernet frames based on the MAC address and the associated port.
Switch
Ch. 15 BGP is considered a reliable routing protocol because it assumes reliable transport; therefore BGP uses the following communication:
TCP
Ch. 13 Internet Protocol defines two major protocols. What are the two major protocols:
TCP UDP
Ch. 19 What components below in a URL describe how to access the object? (Check-all-that-apply)
TCP/IP Port Directory Filename Protocol or Application Hostname
Ch. 24 Multiple virtual machines can exist on the same server.
True
Ch. 5 Linux uses a logical directory tree to organize files into different folders.
True
Ch. 24 Which type of hypervisor below runs directly on the hardware without a supporting OS?
Type 1 (bare-metal)
Ch. 2 For the Ubuntu operating system, init was replaced with:
Upstart
Ch. 14 What type of technology allows a switch to act as two seperate local area networks?
VLAN
Ch. 15 A Distance-Vector routing protocol utilizes an algorithm that focuses on___________.
a destination network and a next-hop router to reach the destination.
Ch. 5 What type of pathnames are interpreted as being the full location of the file or directory?
absolute
Ch. 18 Two fields in the switch file impact the mail system:
aliases hosts
Ch. 16 When a client queries DNS, a client must specify the type in its query; servers specify the data type in all resource records they return. A Type A record is:
an IPv4 Host Address
Ch. 16 When a client queries DNS, a client must specify the type in its query; servers specify the data type in all resource records they return. A Type AAAA record is:
an IPv6 Host Address
Ch. 2 Which command on Sun hardware boots to single-user mode?
boot -s
Ch. 7 The ______ statement simplifies the selection of a match when you have a list of choices.
case
Ch. 5 To display the contents of a text file called data, what command should be used?
cat data
Ch. 5 Which chmod command below would change privilege on a file to allow full privileges to owner and group, but only read privileges to everyone else?
chmod 774 file
Ch. 5 Which command below provide the ability to modify the group and ownership of a file? (Check all that Apply)
chown chgrp
Ch. 27 Which command below confines a process to a specified directly; also referred to as "jailed"
chroot
Ch. 25 Docker's primary product is a client/server application that builds and manages containers. Written in Go and highly module, the product is called:
container engine
Ch. 10 Which of the following are syslog facility names?
daemon kern auth
Ch. 6 Which tool below from Ubuntu is used for performing automated installations?
debian-installer
Ch. 20 Which command below provides the easiest method for monitoring free space on mounted filesystems?
df
Ch. 1 Which command below can be used as an editor in Unix-Linux? (Check all that Apply)
emacs vi vim
Ch. 5 The command strings /bin/echo displays the raw binary characters inside the /bin/echo binary executable program.
false
Ch. 21 Which of the following implement file locking in Unix using system calls? (Check all-that-apply)
fctnl flock lockf
Ch. 7 The ___________ command can be used to loop through a range of values?
for
Ch. 4 To create a new process, a process copies itself with the _______ system call.
fork (pg 93)
Ch. 13 What is the processing of choosing the path for a packet?
forwarding
Ch. 27 What is a reasonable approach to patching? (check-all-that-apply)
have a regular patch schedule a change plant that documents the impact of each set of patches a understanding of what patches are relevant to the environment.
Ch. 20 What linux utility can send secure erase commands, interact with firmware of SATA, IDE, and SAS hard disks?
hdparm
Ch. 7 What command reads the beginning of a file?
head
Ch. 28 Which of the following below are monitoring software?
icinga nagios SignalFX Solarwinds
Ch. 21 What type of automount map mounts several filesystems underneath a common directory?
indirect maps
Ch. 2 After the kernel is running, the _______ process begins executing startup scripts.
init
Ch. 2 What process defines one single-user and several network-enabled "run levels" to determine which of the system resources are enabled?
init
Ch. 28 Which command below can be used to obtain information on disk performance?
iostat
Ch. 18 Which email address below is a valid email address:
Ch. 30 When considering a UPS for a Data Center, the power all the devices consume, must be calculated to determine the size of the UPS needed. The amount of power a UPS can provide is typicalled labeld in:
kVA (kilovolt-amperes)
Ch .2 During the bootstrapping process, what is the first program loaded into memory to be executed?
kernel
Ch. 6 Which tool below from Red Hat is used for performing automated installations?
kickstart (pg. 156)
Ch. 10 Which daemon handles the kenre's ongoing loggin?
klogd
Ch. 5 When doing an ls command, which filetype symbol below indicates a symbolic link?
l
Ch. 10 Which command below accesses the log file which contains a record of users logins?
last
Ch. 5 Which command below is used to create a directory?
mkdir
Ch. 11 Which command can devices files be created manually with?
mknod
Ch. 11 What command is used to load a kernel module and look for dependencies?
modprobe
Ch. 11 What command is used to pass parameters to a loadable kernel module?
modprobe
Ch. 21 Which command below can be used to make a filesystem available on an NFS client.
mount
Ch. 28 Which command below generates cpu information for each individual processor?
mpstat
Ch. 16 Which file below, located in /usr/sbin on Linux, is the name server daemon?
named
Ch. 16 What configuration file is used in BIND that identifies each zone, zone type, and the associate file, which contains all the zone records?
named.conf
Ch. 29 What command below allows for looking at network information?
netstat
Ch. 8 To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?
newgrp
Ch. 17 Which of the following commands is primarily a "push" of files. For example, pushes files from a central server to another server in the infrastructure.
rdist
Ch. 6 Which command installs, verifies and queries the status of packages in linux; redhat as an example.
rpm (pg. 164)
Ch. 22 Which file below can be used to configure Samba options:
smb.conf
Ch. 22 Which of the following commands below would be used to diagnose any Samba issues?
smbstatus
Ch. 4 Which of the following below are process information files in the Linux "/proc" directory? (Check all that Apply)
stat fd environ maps
Ch. 21 _____________ servers keep track of all open files across the network.
stateful
Ch. 7 What command reads from the end of a file?
tail
Ch. 16 With DNS, hierarchical machine names are assigned according to the structure of organizations that obtain authority for parts of the namespace, not necessarily according to:
the structure of the physical network interconnections.
Ch. 7 A ____ is used to refer to the users' home directory.
tilde (~)
Ch. 11 Which deamon listens for messages from the kernel regarding device status changes?
udevd
Ch. 5 Which built - in shell command below sets the default permission for a user, when a file is initially created?
umask
Ch. 5 Which command below detaches a filesystem to the operating system?
unmount
Ch. 8 In order to create user accounts on a Linux system, what command should be utilized?
useradd
Ch. 20 What two commands can be used to show information about physical volumes and logical volumes respectively?
vgdisplay lvdisplay
Ch. 9 Which of the following of the two items defines cloud computing?
virtualization abstraction
Ch. 9 In order for something to be considered in the "cloud", the primary technology must be:
virtualized
Ch. 20 Which Linux command below provide the ability to partition filesystems? (Check all that Apply)
wrong fdisk cfdisk fdisk cfdisk idisk fdisk format fdisk cfdisk
Ch. 21 Which file below is used to configure the exported directories (filesystems) on Solaris?
/etc/dfs/dfstab
Ch. 2 Ubuntu uses job definition files instead of an inittab file to startup processes. The directory is located in:
/etc/event.d
Ch. 21 Access to NFS volumes is granted by the following file:
/etc/exports
Ch. 30 When cooling a datacenter, which of the following components need to be considered for heat load?
All of the above
Ch. 28 What is a MIB?
Management Information Base
Ch. 20 Which of the following below combines multiple storage devices into one virtualized device?
RAID array
Ch. 5 The more command should not be used on binary files.
True
Ch. 9 Multiple virtual machines can exist on the same server.
True
Ch. 6 It's possible to upgrade an entire system full of software with a single ____________ command.
apt-get
Ch. 4 Which command sets the process's nice value at the time of creation?
nice (pg 103)
Ch. 7 The ______ statement continues to look and execute commands or statements as long as a given condition or set of conditions is true.
while
Ch. 7 Which special character in regular expression matches one of the preceding element?
?
Ch. 20 Describe the Linux Recipe to add an additional partition.
?? Run sudo fdisk -l to list the system's disks and identify the new drive. Install a partition table using fdisk command. The n subcommand created a new partition.
Ch. 27 Which of the following tools are used for cryptographic utilities in Linux? (Check-all-that-Apply
PGP SSH Kerberos
Ch. 4 What is the unique process number that the kernel assigns to a process called?
PID
Ch. 19 Which of the following are embedded scripting modules for the Apache web server? (Check-all-that-apply)
Perl Ruby on Rails Python PHP
Ch. 18 What is the most popular protocol used to transfer email messages from a permanent remote mailbox to a local computer?
Post Office Protocol
Ch. 31 Which of the following processes below are part of the Information Technology Infrastructure Library? (Check all-that-apply)
Problem Management Configuration Management Help Desk Change Management Release Management Incident Management
Ch. 14 When designing a network, what are prime targets for central control: (Check all-that-apply)
Protocols, mostly to ensure that they interoperate Routing policy to the Internet The backbone network itself, including the connections to it. The network design, including the use of subnets, routers, switches, etc.. Host IP addresses, hostnames, and subdomain names
Ch. 11 Which methods below are used to configure a Linux Kernel?
Providing operational directives at boot time through the kernel loader. (GRUB) Loading new drives and modules into an exiting kernel on the fly. Modifying tunable kernel configuration parameters Build a kernel from scratch
Ch. 20 Which RAID level stripes both data and parity information, adding redundancy while improving read performance?
RAID level 5
Ch. 18 Which of the following are SMTP commands? (Check all-that-apply)
RCPT TO: fwdpath HELO hostname MAIL From: revpath DATA
Ch. 18 In theory, a mail system consists of the following components (Check all-that-apply)
access agent mail user agent mail submission agent delivery agent mail transport agent
Ch. 15 To handle large intranets and limit routing overhead, OSPF allows a site to partition its networks and routers into subset called ________.
areas (pg. 489)
Ch. 13 What command can be used on most modern PC operating systems to display the contents of the ARP cache from the CLI?
arp -a
Ch. 21 Instead of hard mounting an NFS filesystem at boot time, we can utilize the ______________ daemon process to mount the NFS filesystem, only when we need it. For example, using the change directory command "cd /filesystem:".
automountd
Ch. 8 Which files below are common startup files for bash, when logging in?
bashrc .bash_profile
Ch. 18 What type of lists can an email server check to reject mail from specific sites?
blacklist
Ch. 4 The _____________ of a process is a numeric hint to the kernel about how the process should be treated in relation to other processes contending for the CPU.
niceness (pg 102)
Ch. 2 Which file tells the "init" process what to do at each run level?
/etc/inittab
Ch. 2 What directory is the majority of scripts stored for each run level? Each rclevel.d directory, then contains a symbolic link to the primary directory where the scripts are stored.
/etc/int.d
Ch. 3 Which file stores protected passwords for accounts?
/etc/shadow
What two files on the Unix/Linux systems contain usernames and their passwords.
/etc/shadow /etc/passwd
Ch. 3 When sudo is run, which file is consulted and lists the people who are authorized to use sudo and the commands they are allowed to run on each host?
/etc/sudoers (pg 71)
Ch. 2 Many of RedHat Linux's configurations during the boot process are located under which directory:
/etc/sysconfig
Ch. 2 When a Unix or Linux Operating System on a PC or proprietary system is first turned on, the boot process begins at which level. (Check all that Apply)
Bios (PC) Firmware ROM
Ch. 4 What is the name of the filesystem that "ps" reads process status information from?
/proc
Ch. 4 What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?
-e
Ch. 4 What two ps options can be used to display a full list of information about each process, and a long list of information about each process?
-f -l
Ch. 1 The following operating system below is not a popular Linux Distribution:
AIX
Ch. 1 What are the essentilal duties of a Systems Administrator? (Check All that Apply)
Adding & Removing Hardward Monitoring the System Performing Backups Account Provisioning Installing and Upgrading Software Firefighting & Troubleshooting Documentation
Ch. 4 What is the effective user identification of a process called?
EUID
Ch 4. What is the identification number of the group that created or started the process called?
GID
Ch. 3 A _________ gives a group of users equal access files that they all share.
GID
Ch. 2 What is the default boot loader for most UNIX and Linux system with Intel Processors and loads the unix/linux kernel?
Grand Unifed Boot Loader (GRUB)
Ch. 2 Which type of file stops the process for the associated runlevel, when a Unix/Linux Server is shutdown?
K80cups
Ch. 3 _________ also deals with authentication similar to PAM, but uses a specific authentication method; unlike PAM which is a framework.
Kerberos (pg 81)
Ch. 2 When the BIOS selects the device to boot from, it tries to read the first block of the device, know as the:
Master Boot Record (MBR)
Ch. 3 In the Unix/Linux Operating System permissions on a files and directories consist of: (Ex... rwxrwxrwx (Check All that Apply)
Other Group Owner or user
Ch. 3 What technology is an authentication technology rather than an access control technology?
Pluggable Authentication Modules (PAM)
Ch. 4 Utilizing the kill command, what "number" would be used to send a Quit?
kill -3
Ch. 4 Utilizing the kill command, what "number" would be used to send a Kill?
kill -9
Ch. 2 Which run level "reboots" the system?
level 6
Ch. 1 What command below prints a list of manual pages that have the keyword "translate".
man -k translate
Ch. 1 What command shows the path to manual pages?
manpath
Ch. 5 Which command below attaches a filesystem to the operating system?
mount
Ch. 2 What state with the svcs command in Solaris indicates enabled and successfully started:
online
Ch. 4 In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?
process state
Ch. 4 Which command below sets the nice value to of process to 5?
renice 5 -u boggs
For security reasons, most Unix/Linux systems allow _________ logins to be disabled on terminals through network access, except on the main console.
root
Ch. 3 What account on a Unix System is known as the "superuser" account?
root (pg. 67)
Ch. 1 What command below would be utilized to check if the python package was installed on the Red Hat or SUSE Linux Operating Systems?
rpm -q python
Ch. 1 What is the easiest command to utilize to understand whether a command is available and installed on the system. For example, the Gnu C compiler. (Check All that apply)
which gcc