Unix/Linux

Ace your homework & exams now with Quizwiz!

You want to include the date inside of your shell's prompt. What shell variable represents how the prompt is displayed? $PROMPT $SHELL $PS1 $HOME

$PS1

After failing to successfully mount the /dev/sda3 partition, you discover that the partition ID is incorrectly set to "7". What should the partition ID be for a standard Linux partition? 82 83 88 f0

82

After failing to successfully mount the /dev/sda3 partition, you discover that the partition ID is incorrectly set to "7". What should the partition ID be for a standard Linux partition? 82 f0 83 88

82

In the vi program, what command mode command will display all vi environment settings? :set all :set env :print var :env print

:set all

What two regular expressions are extended expressions and require the use of the egrep command? ? * $ (match1|match2)

? (match1|match2)

You have added the $PATH variable to ~/.bash_profile, but discover after logging in that your settings do not reflect what you configured in the file. What explanation is most likely the cause? Non-root users cannot modify their own $PATH variable. You don't have permissions to one of the folders you added in the $PATH variable. One of the folders in $PATH does not exist. The $PATH variable is defined in the ~/.profile file.

The $PATH variable is defined in the ~/.profile file.

Your supervisor has asked you to configure a server with a RAID utilizing disk striping with two sets of parity bits for additional fault tolerance, so that up to two hard disk failures can occur without data loss. What type of RAID is your supervisor describing? RAID5 RAID3 RAID1 RAID6

RAID6

You have modified the /etc/aliases file, but your postfix service is not routing mail for the new alias. You have verified the configuration in /etc/aliases, but the new aliases are still not functioning. What is most likely the problem? The postfix service must be restarted after the aliases file is changed, to read in the new aliases. Permissions on the aliases file are incorrect. The newaliases command has not been run. There is not a correspondingly named user for the alias.

The newaliases command has not been run.

You are configuring a VPN server for remote access clients, and one of the requirements of the VPN software is that the server must perform IPv4 forwarding. How is this enabled? You must enable the routed daemon in your system config. IPv4 routing must be turned on under /etc/networking. You must edit the /proc/sys/net/ipv4/conf/all/forwarding file and change the "0" to "1". You must edit the /proc/sys/net/ipv4/ip_forward file and change the "0" to "1".

You must edit the /proc/sys/net/ipv4/conf/all/forwarding file and change the "0" to "1".

Given two numerical variables A & B, and two string variables C & D, what two different test statements should be used to test numeric equality and string equality, respectively? [ C = D ] [ C -eq D ] [ A -eq B ] [ A = B ]

[ C = D ] [ A -eq B ]

How can you specify a text pattern that must be at the beginning of a line of text using a regular expression? a. Precede the string with a ^. b. Precede the string with a $. c. Precede the string with a /. d. Follow the string with a \.

a. Precede the string with a ^.

A directory is a type of file. True or False? a. True b. False

a. True

Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False? a. True b. False

a. True

Hard links need to reside on the same filesystem as the target, whereas symbolic links need not be on the same filesystem as the target. True or False? a. True b. False

a. True

The -9 option to the gzip utility results in a higher compression ratio. True or False? a. True b. False

a. True

The alias command can be used to make a shortcut to a single command. True or False? a. True b. False

a. True

The line that configures the host name for the computer at boot time can be found in /etc/sysconfig/network. True or False? a. True b. False

a. True

The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False? a. True b. False

a. True

The lvextend command can be used to add additional unused space within a volume group to an existing logical volume. True or False? a. True b. False

a. True

The operating system software is necessary for a computer to function. True or False? a. True b. False

a. True

The term used to describe a process spawning or initiating another process is referred to as: a. forking b. branching c. a child process d. parenting

a. forking

Which command indicates the shared libraries required by a certain executable program? a. ldd b. rpm -V c. slconfig d. ldconfig

a. ldd

Which command can be used to send a print job to the default printer named Printer1? a. lp -d Printer1 file b. lp -m Printer1 file c. lp Printer1 file d. lp

a. lp -d Printer1 file

A special device file is used to: a. represent hardware devices such as hard disk drives and ports b. keep a list of device settings specific to each individual user c. enable proprietary custom-built devices to work with Linux d. do nothing in Linux

a. represent hardware devices such as hard disk drives and ports

Which of the following is not a type of RAID? a. serial RAID b. software RAID c. hardware RAID d. firmware RAID

a. serial RAID

SCSI-1 is also referred to as: a. slow and narrow b. fast and narrow c. slow and wide d. fast and wide

a. slow and narrow

Which command can be used to connect to a remote Windows share called data on the server called fileserver? a. smbclient //fileserver/data b. smbclient \\fileserver\data c. smbclient -L fileserver:data d. smbclient -L //fileserver/data

a. smbclient //fileserver/data

Every computer consists of physical components and nonphysical components. The nonphysical components of a computer that understand how to work with the physical components are referred to as: a. software b. hardware c. processors d. records

a. software

Which command can be used to start X Windows, the window manager, and the default desktop environment? a. startx b. startgdm c. gstart d. startgui

a. startx

What are best practices for securing a local Linux server?\ a. Keep the server unlocked and in plain sight. b. Ensure that SELinux or AppArmor is used to protect key services. c. Set the default run level to 1 (Single User Mode). d. Ensure that you are logged in as the root user to the server at all times.

b. Ensure that SELinux or AppArmor is used to protect key services.

What was created to define a standard directory structure and common file location for Linux? a. root directory b. FHS c. FSH d. X.500

b. FHS

Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry. True or False? a. True b. False

b. False

Linux commands entered via the command line are not case sensitive. True or False? a. True b. False

b. False

UIDs and GIDs are unique to the system and once used can never be reused. True or False? a. True b. False

b. False

Users enter commands directly to the kernel of the Linux operating system. True or False? a. True b. False

b. False

When the fsck command cannot repair a nonroot filesystem, you should immediately restore all data from tape backup. True or False? a. True b. False

b. False

Which person below is one of the two co-creators of UNIX? a. Linus Torvalds b. Ken Thompson c. Dennis Stallman d. Richard Stallman

b. Ken Thompson

How can a user switch from insert mode to command mode when using the vi editor? a. Type in a : character. b. Press the Esc key. c. Press the Ctrl+Alt+Del keys simultaneously. d. Press the Del key.

b. Press the Esc key.

What terms are used to describe the Linux operating system? a. processing, closed source b. multiuser, multitasking c. large, useful d. production, stable

b. multiuser, multitasking

Which command do you use to rename files and directories? a. rn b. mv c. rename d. cp

b. mv

To test DNS configuration by resolving a host name to IP address, which command can you use? a. resolve hostname b. nslookup hostname c. hostname d. grep hostname

b. nslookup hostname

Every process has a process ID and a: a. daemon b. parent process ID c. fork process d. child process

b. parent process ID

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? a. ifdown b. ping c. ipconfig d. telnet

b. ping

Which of the following refers to the third primary partition on the second SCSI hard disk within Linux? a. hdb3 b. sdb3 c. hdb2 d. sda3

b. sdb3

What keyword can be specified within a boot loader to force the system to boot to Single User Mode? a. telinit b. single c. init d. rescue

b. single

Which culture embraced the term GNU (GNU's Not UNIX) and laid the free software groundwork for Linux? a. the Artificial Intelligence culture b. the hacker culture c. the MIT culture d. the cracker culture

b. the hacker culture

Which command displays the users who are currently logged in to the Linux system? a. finger b. who c. date d. id

b. who

You plug a USB flash memory drive into a system that has two SATA hard disks. What will the partition on this USB flash memory drive be recognized as to the Linux system? a. /dev/sda1 b. /dev/sda2 c. /dev/sdc1 d. /dev/sdb1

c. /dev/sdc1

Which file stores the Apache configuration in Fedora 20? a. /etc/apache2.conf b. /etc/httpd.conf c. /etc/httpd/conf/httpd.conf d. /etc/apache2/httpd.conf

c. /etc/httpd/conf/httpd.conf

Which directory stores most UNIX SysV rc scripts? a. /etc/rc5.d b. /etc/rc.d c. /etc/init.d d. /usr/local/system

c. /etc/init.d

Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system? a. /etc/sysconfig/network-scripts/ipcfg-eth0 b. /etc/sysconfig/network-scripts/ifcfg-eth1 c. /etc/sysconfig/network-scripts/ifcfg-eth0 d. /etc/sysconfig/network-scripts/ipcfg-eth1

c. /etc/sysconfig/network-scripts/ifcfg-eth0

You want to view log files to get information about a problem that occurred during a Linux installation. In which directory will you likely find the log files? a. /sys/log b. /etc/log c. /var/log d. /root/log

c. /var/log

Which RAID level uses striping with parity? a. 2 b. 4 c. 5 d. 1

c. 5

Which of the following are stand-alone daemons? a. TCP/IP address b. Washington University FTP (in.ftpd) c. Apache (httpd) d. telnet (in.telnetd)

c. Apache (httpd)

Which of the following is not a piece of information that the Fedora installation program prompts you for? a. Keyboard layout b. Installation destination c. Firewall settings d. Time zone

c. Firewall settings

Who was Linux was developed by and which operating system was it modeled after? a. Linus Torvalds, GNU b. Richard Stallman, MINIX c. Linus Torvalds, MINIX d. Richard Stallman, GNU

c. Linus Torvalds, MINIX

After you log into a terminal, you receive a user interface called a: a. GUID b. text box c. shell d. command screen

c. shell

Which command is used to delete a user account? a. del username b. rm username c. userdel username d. usermod -d username

c. userdel username

Which command would you use to unlock a user account? a. useradd -U username b. unlock username c. usermod -U username d. open username

c. usermod -U username

You are processing a comma separated value file named file1.csv and wish to print only the 3rd and 4th field entries on each line. What command should you use? cat file1.csv | awk -F , '{ print $3, $4 }' cat file1.csv | awk -f ',' { print $3 $4 } egrep '{,}' | echo $3 $4 grep "(*),(*)" -e $3 $4 file1.csv

cat file1.csv | awk -F , '{ print $3, $4 }'

What command will take you to the testing directory within your home directory, regardless of where your home directory is? cd ./testing cd $homedir/testing cd ~/testing echo $HOME | cd testing

cd ~/testing

What command will copy the directory proj_files and all sub directories and files from /mnt/volume/proj_files to your home directory? cat /mnt/volume/proj_files ~/ cp -a /mnt/volume/proj_files ~/ mv /mnt/volume/proj_files ~/ cp -R /mnt/volume/proj_files ~/

cp -R /mnt/volume/proj_files ~/

Which of the following operators reverses the meaning of a test statement? a. #! b. -a c. -o d. !

d. !

Nice values are used to affect process priorities using a range between: a. -19 and 20 b. 0 and -19 c. 0 and 20 d. -20 and 19

d. -20 and 19

When sitting at a computer running Linux, what key combination is pressed to open the graphical terminal? a. Ctrl+Alt+F4 b. Ctrl+Alt+G c. Ctrl+7 d. Ctrl+Alt+F1

d. Ctrl+Alt+F1

What is a means available to resolve a host name to the appropriate TCP/IP address? a. /etc/dns.conf b. DHCP c. /etc/resolve.conf d. DNS

d. DNS

What does the mv command do? a. It makes a directory. b. It removes a directory. c. It makes a volume. d. It moves a file.

d. It moves a file.

When the core components of the Linux operating system are packaged together with other Open Source Software, it is called a: a. new kernel b. new platform c. GNU Project d. Linux distribution

d. Linux distribution

Which command within the command-line FTP utility can be used to change the current directory on the local computer? a. cd b. dir c. get d. lcd

d. lcd

Which of the following commands can be used to scan the available ports on computers within your organization? a. tracert b. sudo c. traceroute d. nmap

d. nmap

The daemons associated with network services listen for network traffic associated with a particular: a. TCP/IP address b. allocation number c. station d. port

d. port

Which command would a user type on the command line to find out what directory in the directory tree he is currently in? a. cd b. pd c. where d. pwd

d. pwd

Which command can you use to lock a user account? a. secure username b. lock username c. useradd -L username d. usermod -L username

d. usermod -L username

What command can be issued after system startup in order to view messages regarding hardware detected during boot? cat /proc/hwinfo tail /var/log/boot.log dmesg hwdump

dmesg

As part of a routine audit of your Debian server's filesystem, you are investigating a strange file named file1 that you suspect may have been installed by a package. What command should you execute to see what package provides the file, if any? dpkg-query --listfiles file1 dpkg -l | grep file1 dpkg-query --find-file file1 dpkg -S file1

dpkg -S file1

A network card on your server is not starting during boot, requiring the module for the card to be loaded after startup. What command can you use to verify the kernel module used by the card on the currently running system? modprobe -l lshw -C network insmod -l ifconfig -a

lshw -C network

You have just finished creating the partition /dev/sda1, now you want to put an ext3 filesystem onto it. What two commands could you use to do this? makefs -t ext3 /dev/sda1 parted -f ext3 /dev/sda1 mke2fs -t ext3 /dev/sda1 mkfs.ext3 /dev/sda1

mke2fs -t ext3 /dev/sda1 mkfs.ext3 /dev/sda1

You are scheduling a script named script1 that will be run automatically by the system, and want to redirect both Standard Output and Standard Error to the same filename for logging purposes. What command will properly perform this redirection to the file named script1.log? script1 1&2>script1.log script1 >script1.log | tee 2>script1.log script1 >script1.log 2>&1 script1 >script1.log 2>script1.log

script1 >script1.log 2>&1

You have been instructed to install the GRUB boot manager, and to create a boot entry that points to the second partition on the second hard drive in the system. What should you specify as the root? (hd0,0) (hd2,2) (hd1,1) (hd2,1)

(hd1,1)

What two regular expressions are extended expressions and require the use of the egrep command? (match1|match2) ? * $

(match1|match2) ?

The private key is used when creating a digital signature. True or False? a. True b. False

a. True

Which command can be used to see processes running in the background? a. ps -% b. fg c. jobs d. bg

c. jobs

Which of the following commands can be used to create partitions on either a MBR or GPT hard disk? a. fdisk b. cfsck c. parted d. gdisk

c. parted

What are two ways you can permanently set the hostname on a system? Edit the /etc/sysconfig/hostname file Edit the /etc/hostname file Use the hostnamectl command Use the hostname command

Edit the /etc/hostname file Use the hostnamectl command

You have opened a telnet session on port 25 with your email server. What command can you type within your telnet session to start an email session? a. HELO b. WAZUP c. START d. OPEN

a. HELO

Most source code is available on the Internet in tarball format. True or False? a. True b. False

a. True

Using wildcard metacharacters, how can you indicate a character that is NOT an a or b or c or d? a. [!a-d] b. !a-d c. not [a-d] d. [^abcd]

a. [!a-d]

The less command offers less functionality than the more command. True or False? a. True b. False

b. False

Which dump level indicates a full backup? a. 9 b. f c. 1 d. 0

d. 0

Which of the following file descriptor numbers represents stdout? a. 0 b. 2 c. 3 d. 1

d. 1

You need to gather information on quota usage by all users on the /shares folder. What command should you use? edquota -l /shares quota -ul /shares quota -ls /shares repquota /shares

repquota /shares

What RPM command can be used to list the full paths for files within the bash package? rpm -l bash rpm --query -l bash rpm -f --dump bash rpm -q --list-full bash

rpm --query -l bash

Which type of RAID is entirely configured during the Linux installation process? a. hardware RAID b. serial RAID c. software RAID d. firmware RAID

c. software RAID

You have placed a command into the /usr/local/bin directory, but when you enter the command, the shell complains that the command couldn't be found. What shell variable should be checked? $ENV $PATH $comands $PS1

$PATH

You need to install an RPM without processing the RPM's dependencies, due to an issue with the RPM's install. What two flags must be used to accomplish the install? --bypass-deps -i --force --nodeps

-i --nodeps

What would the CIDR notation be for a Class A network that has been subnetted to allow for 1022 usable host addresses on each subnet? /20 /16 /22 /24

/22

Which of the following statements is true? a. Either the MBR/GPT or the active partition can contain the boot loader. b. The boot loader points to the active partition. c. The boot loader points to the MBR/GPT. d. Both the MBR/GPT and the active partition point to the boot loader.

a. Either the MBR/GPT or the active partition can contain the boot loader.

A service configured to run at runlevels 2-5 is crashing your server upon startup. How can the server be put into runlevel 1 utilizing LILO or GRUB? At the LILO boot: prompt, type "1" and press enter to boot the system into runlevel 1. At the LILO boot: prompt, type "root" and press enter to boot the system into runlevel 1. In the GRUB/GRUB2 configuration screen, append the word "single" to the kernel line, and then proceed to boot the system. In the GRUB/GRUB2 configuration screen, append "runlevel=1" to the root line, and then proceed to boot the system.

At the LILO boot: prompt, type "1" and press enter to boot the system into runlevel 1. In the GRUB/GRUB2 configuration screen, append the word "single" to the kernel line, and then proceed to boot the system.

A service configured to run at runlevels 2-5 is crashing your server upon startup. How can the server be put into runlevel 1 utilizing LILO or GRUB? In the GRUB/GRUB2 configuration screen, append "runlevel=1" to the root line, and then proceed to boot the system. At the LILO boot: prompt, type "root" and press enter to boot the system into runlevel 1. At the LILO boot: prompt, type "1" and press enter to boot the system into runlevel 1. In the GRUB/GRUB2 configuration screen, append the word "single" to the kernel line, and then proceed to boot the system.

At the LILO boot: prompt, type "1" and press enter to boot the system into runlevel 1. In the GRUB/GRUB2 configuration screen, append the word "single" to the kernel line, and then proceed to boot the system.

A user is complaining that their keyboard is registering duplicate key presses. What accessibility feature can correct this issue? Sticky Keys Slow Keys Fast Keys Bounce Keys

Bounce Keys

Linux has only one root directory per directory tree. True or False? a. True b. False

a. True

Which command mounts all existing filesystems in /etc/fstab? a. mount -a b. mount -f c. mount /etc/fstab d. mount /etc/mtab

a. mount -a

Which of the following Systemd commands can be used to stop a daemon called lala? a. systemctl stop lala.service b. chkconfig stop lala c. service stop lala d. stop lala

a. systemctl stop lala.service

Which filename extension indicates a tarball? a. .tar b. .tar.gz c. .dump d. .cpio

b. .tar.gz

ZFS volumes are mounted at boot time from entries within /etc/fstab by default? a. True b. False

b. False

What format should be used in the rsyslog.conf to send logging information to another computer? priority.facility:hostname:portnumber facility.priority@hostname:portnumber hostname:portnumber,facility,priority facility,priority,hostname:portnumber

facility.priority@hostname:portnumber

What two commands will search for a desired string in a stream / output / file without interpreting regular expressions in the string? fgrep ngrep grep -f egrep -i

fgrep grep -f

What hardware devices would typically be represented by block device files in the /dev directory? SCSI tape drive floppy drive PATA hard disk drive SCSI/SATA hard disk drive PS/2 mouse

floppy drive PATA hard disk drive SCSI/SATA hard disk drive

You have been asked to troubleshoot a legacy system running a critical component on your employer's network. Initial findings indicate that the system is failing to boot from the proper hard disk. According to documentation, the system should boot from the secondary master PATA hard disk. What is the name for this disk in Linux? sda sdb hda hdb

hdb

What two commands will display the first or last (respectively) 10 lines of a file when using default options? less head tail tac

head tail

A program is complaining that several C header files are missing. What directory should you look in to verify they're missing? /usr/lib /usr/local/lib /usr/local/lib/include /usr/include

/usr/include

You are testing your configuration of postfix by telnetting to your postfix server. What command should you pass to the server to test ESMTP support? HELO EHLO EXHELO HELO EXTENDED

EHLO

While traveling internationally, you discover that although you are set to obtain time from the Internet, your time zone is currently set wrong. Where can you find a listing of available time zones that can be set using the tzselect command? /etc/tzinfo /usr/share/zoneinfo /usr/local/timezone /etc/zoneinfo

/usr/share/zoneinfo

While traveling internationally, you discover that although you are set to obtain time from the Internet, your time zone is currently set wrong. Where can you find a listing of available time zones that can be set using the tzselect command? /usr/local/timezone /etc/tzinfo /etc/zoneinfo /usr/share/zoneinfo

/usr/share/zoneinfo

A junior administrator mistakenly changed the home directory for the Postgresql user to /home/postgresql. What should this user's home directory be set to? /var/lib/postgresql /etc/postgresql /usr/local/sql /var/spool/postgresql

/var/lib/postgresql

A junior administrator mistakenly changed the home directory for the Postgresql user to /home/postgresql. What should this user's home directory be set to? /var/spool/postgresql /usr/local/sql /var/lib/postgresql /etc/postgresql

/var/lib/postgresql

As part of a routine security audit, you are required to check server log files for failed attempted logins using the sshd process. What log file should contain this information? /var/log/secure /var/log/wtmp /var/log/dmesg /var/log/lastlog

/var/log/secure

Users are complaining that your mail server is not responding to IMAP account access requests. In troubleshooting the issue, you have issued the netstat -ltn command. What ports should you be looking for? 993 143 995 110

143 995

What subnet mask will provide you with a max of 510 usable host addresses? 255.255.248.0 255.255.252.0 255.255.255.0 255.255.254.0

255.255.254.0

What subnet mask will provide you with a max of 510 usable host addresses? 255.255.254.0 255.255.255.0 255.255.248.0 255.255.252.0

255.255.254.0

What is the first task that occurs immediately after a computer is powered on? The BIOS determines what devices and operating systems to execute. The POST test is performed. The boot loader instructs the system as to which drive and partition the operating system should be booted from. The operating system kernel is loaded into memory, and the system is initialized.

The POST test is performed.

Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC? a. /etc/resolv.conf b. /etc/resolve c. /etc/hosts d. /etc/host.conf

a. /etc/resolv.conf

What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 14.04 FTP server? a. /srv/ftp b. /home/anonymous c. /var/www/ftp d. /var/ftp/pub

a. /srv/ftp

To which directory will the test ZFS volume from the previous question be mounted by the ZFS system? a. /test b. /media/test c. /mnt/test d. /zfs/test

a. /test

Which RAID level is also referred to as mirroring? a. 1 b. 0 c. 5 d. 4

a. 1

Linux servers are typically installed in a rack using rackmount server hardware. Which of the following is used to describe the minimum height of a rackmount server? a. 1U b. Type A c. Level 5 d. Series A

a. 1U

You noticed a file in your home directory that has a + symbol appended to the mode. What does this indicate? a. Additional entries exist within the ACL of the file that can be viewed using the getfacl command. b. the sticky bit directory permission has been set on the file, and will remain inactive as a result. c. The file has one or more files on the filesystem that are hard linked to it. d. Special permissions have been set on the file.

a. Additional entries exist within the ACL of the file that can be viewed using the getfacl command.

What is the default shell in Linux called? a. BASH b. CSH c. SH d. BSH

a. BASH

Which DNS resource record is an alias to other records? a. CNAME b. AAAA c. A d. NS

a. CNAME

What does the SGID special permission do when applied to a directory? a. It causes all new files created in the directory to have the same group membership as the directory and not the entity that created them b. It causes users to have their permissions checked before they are allowed to access files in the directory c. It allows users the ability to use more than two groups for files that they create within the directory d. It cannot be done as it is only applied to files

a. It causes all new files created in the directory to have the same group membership as the directory and not the entity that created them

Many types of software are available today. Which type of software does Linux represent? a. Open Source Software b. shareware c. closed source software d. freeware

a. Open Source Software

How can you protect a metacharacter (such as the $ character) from shell interpretation? a. Precede it with a \. b. It cannot be done as metacharacters are essential. c. Precede it with a /. d. Follow it with a \. e. Precede it with a $.

a. Precede it with a \.

Which of the following statements are true? a. Quotas can limit both user space and the number of files a user can own. b. Hard limits allow a user to exceed them for a certain period of time. c. Quotas can only limit the number of files a user can own. d. Quotas can only limit user space.

a. Quotas can limit both user space and the number of files a user can own.

Which of the following RAID levels is not fault tolerant? a. RAID 0 b. RAID 1 c. RAID 4 d. RAID 5

a. RAID 0

Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do? a. Restart the DHCP daemon. b. Run the dhcpconf command to edit the configuration file. c. Log in as the root user and reedit the configuration file. d. Restart the xinetd daemon.

a. Restart the DHCP daemon.

When you run the ps command, how are daemon processes recognized? a. There is a question mark in the TTY column. b. There is an asterisk in the STIME column. c. There is a "d" for daemon in the terminal identification column. d. The terminal is listed as tty0.

a. There is a question mark in the TTY column.

A for construct is a loop construct that processes a specified list of objects. As a result, it is executed as long as there are remaining objects to process. True or False? a. True b. False

a. True

A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False? a. True b. False

a. True

As daemon processes are not associated with terminals, you must use the -e switch with the ps command to view them. True or False? a. True b. False

a. True

DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False? a. True b. False

a. True

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False? a. True b. False

a. True

The sed and awk commands are filter commands commonly used to format data within a pipe. True or False? a. True b. False

a. True

To install Linux within a virtual machine, you can specify the path to an ISO image that contains the Linux installation media within visualization software without having to first write the ISO image to a DVD or USB flash drive. True or False? a. True b. False

a. True

To install a new program from RPM software repositories on the Internet, you can use the yum update programname command. True or False? a. True b. False

a. True

You can clear a log file simply by redirecting nothing in to it. True or False? a. True b. False

a. True

You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False? a. True b. False

a. True

What must you do to successfully run the fsck command on a filesystem? a. Unmount the filesystem. b. Ensure that the filesystem is mounted. c. Choose yes when warned that running fsck on a mounted filesystem can cause damage. d. Run the fsck command with the -u option to automatically unmount the filesystem first.

a. Unmount the filesystem.

Which two implementations of X Windows are commonly used in Linux? a. X.org b. XFree86 c. Xconfigurator d. XFce

a. X.org b. XFree86

Which of the following commands can be used to start a UNIX SysV daemon called lala in runlevels 1, 2 and 3? a. chkconfig --level 123 lala on b. update-rc.d lala defaults c. systemctl enable lala 123 d. service enable lala 123

a. chkconfig --level 123 lala on

Which of the following commands extracts an archive? a. cpio -vicdu -I /dev/fd0 b. cpio -vti -I /dev/fd0 c. cpio -vocBL /dev/fd0 d. cpio -vicdu -O /dev/fd0

a. cpio -vicdu -I /dev/fd0

What is the name given to a process not associated with a terminal? a. daemon process b. parent process c. child process d. user process

a. daemon process

Which command would be used to activate the NIC aliased as eth0? a. ifup eth0 b. ipup eth0 c. ifdown eth0 d. ifup

a. ifup eth0

Where is the /proc filesystem stored? a. in RAM b. on the hard disk drive in the /etc directory c. on the hard disk drive in the / directory d. on the hard disk drive in the /var directory

a. in RAM

What equivalent to the man command generally provides an easier-to-read description of the queried command and also contains links to other related information? a. info b. man help c. who d. man -descriptive

a. info

Which command causes the system to enter Single User Mode? a. init 1 b. initstate 5 c. init 0 d. init 6

a. init 1

Which command can be used to alter the primary group associated with a given user temporarily? a. newgrp b. chggrp c. usermod d. gpasswd

a. newgrp

The at command is used to: a. schedule processes to run at a single instance in the future b. schedule processes to run periodically in the background c. schedule processes to run periodically on a recurring basis in the future d. schedule processes to run in the foreground

a. schedule processes to run at a single instance in the future

What does the du /var command do? a. shows the size of all directories within the /var directory b. displays the amount of free space in the /var directory c. shows the users connected to the /var directory d. dumps the /var directory

a. shows the size of all directories within the /var directory

Which of the following commands creates an archive? a. tar -zcvf /dev/st0 * b. tar -xvf /dev/st0 c. tar -cvf /dev/st0 d. tar -tvf /dev/st0

a. tar -zcvf /dev/st0 *

When a printer is rejecting requests: a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable b. the print queue does accept jobs into the print queue and holds them there until the printer is accepting requests again c. the printer appears as off-line when a lp request is sent d. the print queue redirects all print jobs sent to it to /dev/null

a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? a. when you need support in Linux for new hardware b. when you need to use kernel modules c. when you need another user interface d. when you need to decrease the stability of Linux

a. when you need support in Linux for new hardware

Which of the following commands can be used to search for packages that contain the word oobla on RPM software repositories? a. yum search oobla b. yum list oobla c. rpm -ql oobla d. rpm -qS oobla

a. yum search oobla

What two commands can you use to display scheduled job IDs on a system? cron -l at -l at --jobs atq

at -l atq

What two commands can you use to display scheduled job IDs on a system? at -l atq cron -l at --jobs

at -l atq

After typing the command umask731 the permissions on all subsequently created files and directories will be effected. In this case, what will the permissions on all new files be? a. rwxrw-r-- b. ---r--rw- c. rw-rw-rw- d. ----wx--x

b. ---r--rw-

Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? /dev/sda1 / ext4 defaults 1 1 none /dev/pts devpts gid=5,mode= 620 1 0 none /proc proc defaults 0 1 none /dev/shm tmpfs defaults 1 0 /dev/sdc2 swap swap defaults 0 1 /dev/dvd /media/dvd iso 9660 noauto,ro 0 0 /dev/fd0 /media/floppy auto noauto 0 0 a. none, as fsck must be run manually for each filesystem b. /, /dev/pts and /dev/shm c. /, /proc and swap d. all of them, as fsck is run automatically at boot for all filesystems

b. /, /dev/pts and /dev/shm

In what directory is Stage2 of the GRUB2 boot loader stored? a. / b. /boot c. /bin d. /root

b. /boot

Which file does the UNIX SysV init daemon reference on startup to determine the default runlevel? a. /etc/initstate b. /etc/inittab c. /etc/init d. /inittab

b. /etc/inittab

Which of the following files is always executed immediately after any user logs in to a Linux system and receives a BASH shell? a. ~/.bash_profile b. /etc/profile c. ~/.bash_login d. ~/.profile

b. /etc/profile

Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system? a. /etc/cron/(the user's login name) b. /var/spool/cron/(the user's login name) c. /var/spool/cron d. /etc/crontab

b. /var/spool/cron/(the user's login name)

Which of the following port numbers is associated with telnet? a. 20 b. 23 c. 49 d. 137

b. 23

Which of the following kernels are developmental kernels? a. 3.7.5 b. 3.3.4 c. 3.6.5 d. 3.4.4

b. 3.3.4

Which of the following are characteristics of Open Source Software? a. The value of the software is directly related to its price. b. Any bugs are fixed quickly. c. The source code for software is available for a small fee. d. The software is developed independently.

b. Any bugs are fixed quickly.

Which of the following is an absolute pathname? a. C:home/resume b. C:\myfolder\resume c. Home/resume d. resume e. /home/resume

b. C:\myfolder\resume

Which SQL statement key word can be used to delete a record within a table? a. DROP b. DELETE c. REMOVE d. CLEAR

b. DELETE

Which of the following steps is not a common troubleshooting procedure? a. Test the solution. b. Delegate responsibility. c. Isolate the problem. d. Collect information.

b. Delegate responsibility.

A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when viewed using the ls -l command. True or False? a. True b. False

b. False

Because Standard Error and Standard Ouput represent the results of a command and Standard Input represents the input required for a command, only Standard Error and Standard Ouput can be redirected to/from a file. True or False? a. True b. False

b. False

Character devices typically transfer data more quickly than block devices. True or False? a. True b. False

b. False

If you boot your computer from Linux live media, you will be able to use a fully-functional Linux system prior to installing Linux on permanent storage. True or False? a. True b. False

b. False

NFS can be used to share files natively with computers running the Microsoft Windows operating system. True or False? a. True b. False

b. False

NIS clients use NIS records to access their configuration information. True or False? a. True b. False

b. False

Only the root user can modify a file that has the immutable attribute set. True or False? a. True b. False

b. False

RAID-Z is functionally equivalent to RAID level 1. True or False? a. True b. False

b. False

RSA is a common symmetric encryption algorithm used by SSH and GPG. True or False? a. True b. False

b. False

SAS transfers data to SCSI disks via parallel cables. True or False? a. True b. False

b. False

Standalone daemons are started on demand using inetd or xinetd. True or False? a. True b. False

b. False

The Debian Package Manager (DPM) is the default package manager used by Fedora 20. True or False? a. True b. False

b. False

The bzip2 and gzip utilities use similar compression algorithms. True or False? a. True b. False

b. False

The lspci command can be used to isolate problems with X Windows. True or False? a. True b. False

b. False

There is no real difference between the "S" and the "s" special permissions when displayed using the ls -l command. One just means it is on a file and the other that it is on a directory. True or False? a. True b. False

b. False

To kill a process running in the background, you must place a % character before its process ID. True or False? a. True b. False

b. False

fter a partition on a hard disk drive is formatted with a filesystem, all partitions on that hard disk drive must use the same filesystem. True or False? a. True b. False

b. False

What does >> accomplish when entered on the command line after a command? a. It redirects both Standard Error and Standard Ouput to the same location. b. It appends Standard Ouput to a file. c. It does not accomplish anything. d. It redirects Standard Error and Standard Input to the same location.

b. It appends Standard Ouput to a file.

Which of the following statements is true? a. The GRUB2 boot loader is often used on legacy Linux systems. b. LILO needs to be reinstalled after it has been modified. c. GRUB needs to be reinstalled after it has been modified. d. The GRUB boot loader is stored in the /usr/grub directory.

b. LILO needs to be reinstalled after it has been modified.

What are some good reasons for using Linux in a corporate environment? a. Linux software is likely to be abandoned by its developers. b. Linux is widely available for many platforms and supports many programming languages. c. Most Linux software is closed source. d. Linux has the same total cost of ownership than other operating systems.

b. Linux is widely available for many platforms and supports many programming languages.

You wish to configure the runlevels that a particular upstart daemon is started in. What should you do? a. Run the appropriate systemctl command b. Modify the daemon configuration file within the /etc/init directory c. Modify the contents of the /etc/rc[runlevel].d directories d. Run the appropriate update-rc.d command

b. Modify the daemon configuration file within the /etc/init directory

Which of the following can be used to create a database within PostgreSQL? a. The adddb command. b. The CREATE DATABASE statement within the PostgreSQL utility. c. The ADD DATABASE statement within the PostgreSQL utility. d. The removedb command.

b. The CREATE DATABASE statement within the PostgreSQL utility.

Consider the following shell script: echo -e "What is your favorite color?--> \c" read REPLY if [ "$REPLY" = "red" -o "$REPLY" = "blue" ] then echo "The answer is red or blue." else echo "The answer is not red nor blue." fi What would be displayed if a user executes this program and answered Blue when prompted? a. The answer is red or blue. b. The answer is not red nor blue. c. The answer is red or blue. The answer is not red nor blue. d. The code would cause an error.

b. The answer is not red nor blue.

A server is currently offline and requires a package that is currently stored in an iso file (image.iso) in your home directory. What command will mount this file to /mnt/image? umount -o loop -r -t iso9660 ~/image.iso /mnt/image mount -o loop -r -t iso9660 ~/image.iso /mnt/image mount -t iso9660 ~/image.iso /mnt/image isomount -r --lock ~/image.iso

mount -o loop -r -t iso9660 ~/image.iso /mnt/image

What two commands can be used to display the route table? netstat -r ifconfig -r route ip show routes

netstat -r route

A server is being retired and you need to dump all postgresql databases to a file for migration to another server. What command should be used to export all databases? dumpdb psql -d ALL pg_dump dump_pg

pg_dump

What two items are used by asymmetric encryption algorithms to encrypt and decrypt data? private key public key a secret password pre-shared key

private key public key

Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process? renice +15 9563 nice -n -20 9563 renice 9563 127 nice -p 9563 100

renice +15 9563

What RPM command can be used to list the full paths for files within the bash package? rpm -q --list-full bash rpm -f --dump bash rpm --query -l bash rpm -l bash

rpm --query -l bash

You are scheduling a script named script1 that will be run automatically by the system, and want to redirect both Standard Output and Standard Error to the same filename for logging purposes. What command will properly perform this redirection to the file named script1.log? script1 >script1.log 2>script1.log script1 >script1.log 2>&1 script1 >script1.log | tee 2>script1.log script1 1&2>script1.log

script1 >script1.log 2>&1

After writing a large config file for a service, you discover that the hostname in the config file is incorrect in several places. What command can you use to ensure that all incorrect instances of hostname "host1" are changed to "host2"? pr -d new_config | tr host1 host2 < config_file sed s/host1/host2/g < config_file | tee new_config awk -f config_file {/host1/host2/} > config_file cat config_file | sed s/host1/host2 < new_config

sed s/host1/host2/g < config_file | tee new_config

What command can be used to view the contents of a gzipped tar file named archive.tar.gz? bzcat archive.tar.gz | tar -t tar -zcvf archive.tar.gz zcat -t archive.tar.gz | tar -vf tar -ztvf archive.tar.gz

tar -ztvf archive.tar.gz

If resume is the name of a file in the home directory off the root of the filesystem and your present working directory is home, what is the relative name for the file named resume? a. /home/resume b. resume c. /resume d. \home\resume

b. resume

Which command is used to gain real-time information about processes running on the system with the most processor-intensive processes listed at the beginning of the list? a. top -l b. top c. ps -elf d. ps

b. top

What command can be used to create a ZFS volume called test from the space on /dev/sdb and /dev/sdc that functions like RAID level 1? a. zpool create test raidz /dev/sdb /dev/sdc b. zpool create test mirror /dev/sdb /dev/sdc c. zpool create test raidz2 /dev/sdb /dev/sdc d. zpool create test /dev/sdb /dev/sdc

b. zpool create test mirror /dev/sdb /dev/sdc

What filesystem, still in development, is envisioned to be a replacement for ext4 and ReiserFS in the long term? ntfs bfs xfs btrfs

btrfs

After receiving a call from several users in your network, you discover that none of your workstations can communicate with computers in your company's branch office. What command can you use to view the path through the network? traceroute ping route netstat

traceroute

After receiving a call from several users in your network, you discover that none of your workstations can communicate with computers in your company's branch office. What command can you use to view the path through the network? traceroute route ping netstat

traceroute

A new user in your company must be added to the "developers" group on your server. What command will add the user "jsmith" to this group? usermod -G dev jsmith usermod --groups jsmith dev groupmod -a dev jsmith groupadd -g dev jsmith

usermod -G dev jsmith

A host with an odd FQDN has been attempting to log into your ssh servers, what command can you use to determine registration information for the FQDN? nslookup dig netstat whois

whois

After booting up your workstation, gdm fails to start. There appears to be no issues with the config file. What command can you use to troubleshoot the issue? xtest xstart xwininfo gdm -v

xwininfo

The command chmod317file1 would produce with of the following lines in the ls command? a. --w-rw-r-e 1 user1 root 0 Apr 29 15:40 file1 b. -rwxrw-r-x 1 user1 root 0 Apr 29 15:40 file1 c. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1 d. --w-r--rwx 1 user1 root 0 Apr 29 15:40 file1

c. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1

Which file holds the methods to be used and the order in which they will be applied for host name resolution? a. /etc/hosts b. /etc/dns.conf c. /etc/nsswitch.conf d. /etc/resolve.conf

c. /etc/nsswitch.conf

Which file contains information regarding the users, computers, and commands used by the sudo command? a. /etc/sudo b. /etc/su.cfg c. /etc/sudoers d. /etc/sudo.cfg

c. /etc/sudoers

You have created a full backup and four incremental backups. In which order must you restore these backups? a. 0, 4, 3, 2, 1 b. 4, 3, 2, 1, 0 c. 0, 1, 2, 3, 4 d. 1, 2, 3, 4, 0

c. 0, 1, 2, 3, 4

What is the most common open source Web server available for Linux? a. Pine b. Samba c. Apache d. Quid

c. Apache

How do you indicate a comment line in a shell script? a. Begin the line with !. b. There are no comment lines in a shell script. c. Begin the line with #. d. Begin the line with #!.

c. Begin the line with #.

Which of the following actions should you first take to secure your Linux computer against network attacks? a. Change permissions on key system files. b. Configure entries in the /etc/sudoers file. c. Ensure that only necessary services are running. d. Run a checksum for each file used by network services.

c. Ensure that only necessary services are running.

To which license does Linux adhere? a. artistic license b. open license c. GNU General Public License d. free source license

c. GNU General Public License

The root user utilizes the chgrp command to give ownership of a file to another user. What must the root use do to regain ownership of the file? a. Nothing as this is a one-way, one-time action. b. Run chown and list the root user as the new owner. c. Have the new owner run chgrp and list the root user as the new owner. d. Run chgrp again listing the root user as the new owner.

c. Have the new owner run chgrp and list the root user as the new owner.

A user runs the fsck command with the -a option on a filesystem that is showing signs of corruption. How would that user locate any files the system was unable to repair? a. The system prompts the user for a target location when it comes across a file it cannot repair. b. Look in the root of the filesystem. c. Mount the filesystem and check the lost+found directory underneath the mount point. d. View the contents of the directory /lost+found.

c. Mount the filesystem and check the lost+found directory underneath the mount point.

What is wrong with the following command string ls /etc/hosts >listofhostfile? a. The file listofhostfile will always only contain Standard Error as a file descriptor was not declared. b. The file descriptor was not declared; unless 1 for Standard Ouput or 2 for Standard Error is indicated, the command will fail. c. Nothing is wrong with the command. d. The ls command is one of the commands that cannot be used with redirection; you must use | to pipe instead.

c. Nothing is wrong with the command.

Which of the following can be used on Linux to provide file and print services? a. Apache b. Pine c. Samba d. Quid

c. Samba

Which of the following is no an example of virtualization software that can be used to install Linux within another operating system? a. Oracle VirtualBox b. Microsoft Hyper-V c. Spiceworks d. VMWare

c. Spiceworks

Which of the following is not necessarily generated by every command on the system? a. Standard Home b. Standard Error c. Standard Input d. Standard Ouput

c. Standard Input

Which of the following statements regarding LVM structure is correct? a. LVs are created from the free space available within PVs b. PVs are collections of VGs c. VGs are comprised of one or more PVs d. PVs use the space within LVs to create VGs

c. VGs are comprised of one or more PVs

How can you bypass the wait function and send a user process to the background? a. This cannot happen; only daemon processes can run in the background. b. This cannot happen once a process is executing; it can only be done when the command is started by placing an ampersand (&) after it. c. You can use the Ctrl+z key combination and the bg command. d. You can use the ps command.

c. You can use the Ctrl+z key combination and the bg command.

The killall command terminates: a. all instances of a process with the same priority b. all instances of a process with the same PPID c. all instances of a process with the same name d. all instances of a process with the same PID

c. all instances of a process with the same name

What is the name used to describe a user providing a user name and password to log in to a system? a. login b. authorization c. authentication d. validation

c. authentication

Which of the following commands will change the user ownership and group ownership of file1 to user1 and root respectively? a. This cannot be done because user and group ownership properties of a file must be modified separately. b. chown user1 : root file1 c. chown user1:root file1 d. chown root : user1file1 e. chown root:user1file1

c. chown user1:root file1

What command is used to view and modify user jobs scheduled to run with cron? a. ps b. sched c. crontab d. cron

c. crontab

Which command is used to display the amount of free space that exists on a filesystem? a. fsck b. du c. df d. quota

c. df

A device file: a. has no inode section b. has a fixed size of 300 kilobytes c. displays a major and minor number in place of a file size d. has no size

c. displays a major and minor number in place of a file size

Which command is used to format a partition on a hard disk drive with the ext4 filesystem? a. format_ext4 device b. ext4mkfs device c. e2mkfs -t ext4 device d. makeext4FS device

c. e2mkfs -t ext4 device

Before a user-defined variable can be used by processes that run in subshells, that variable must be: a. validated by running the env command b. redirected to the BASH shell c. exported d. imported

c. exported

What will the following wildcard regular expression return: file[a-c]? a. filea-c b. fileabc c. filea, fileb, filec d. filea, filec

c. filea, fileb, filec

What is the name of the utility used to rotate log files? a. jetpack b. syslog c. logrotate d. logbackup

c. logrotate

The TCP/IP address of 127.0.0.1 is also referred to as the: a. lookup address b. local address c. loopback address d. local host

c. loopback address

When compiling source code into a binary program, which command does the compiling using the GNU C Compiler? a. make install b. ./configure c. make d. tar

c. make

You know a Linux command will perform a desired function for you, but you cannot remember the full name of the command. You do remember it will flush a variable from your system. Which command typed at a command prompt displays a list of commands that would likely contain the command you desire? a. man -k find all b. man -key flush c. man -k flush d. man flush

c. man -k flush

On which part of the maintenance cycle do Linux administrators spend the most time? a. proactive maintenance b. documentation c. monitoring d. reactive maintenance

c. monitoring

What will typing q! at the : prompt in command mode do when using the vi editor? a. nothing as the ! is a metacharacter b. quit after saving any changes c. quit without saving any changes d. quit as no changes were made

c. quit without saving any changes

Which construct can be used in a shell script to read Standard Input and place it in a variable? a. verify b. sum c. read d. test

c. read

Which of the following commands will most likely increase the chance of a process receiving more time slices? a. renice 15 b. renice 0 c. renice -12 d. renice 19

c. renice -12

What devices are used to transfer information from one network to another? a. DHCP servers b. LANs c. routers d. DNS servers

c. routers

Which command can be used to remove the test DPM package, including any test configuration files? a. rpm -qi packagename b. rpm -q packagename c. rpm -ql packagename d. rpm -qa packagename

c. rpm -ql packagename

Which of the following files is likely to be found in the /var/log/sa directory on a Fedora 20 system over time? a. 15 b. 00 c. sa19 d. sa39

c. sa19

The which command does what? a. searches for a file in all directories starting from the root b. can only be used to search for executables c. searches for a file only in directories that are in the PATH variable d. is not a valid Linux command

c. searches for a file only in directories that are in the PATH variable

The timeout value in the GRUB configuration file is measured in? a. 1/10 of minutes b. 1/100 of seconds c. seconds d. 1/10 of seconds

c. seconds

Which command could you use to see a list of all environment and user-defined shell variables as well as their current values? a. echo b. env c. set d. ls /var

c. set

Which command searches for and displays any text content of a binary file? a. od b. text c. strings d. less

c. strings

Which partition do you typically create at minimum during a Fedora Linux installation? a. home/ b. /boot c. swap d. /home

c. swap

Which command can increase the number of filehandles that programs can open in a shell? a. top b. lba32 c. ulimit d. ldd

c. ulimit

What command can you use to quickly strip comment lines beginning with a # from the file config_file? cat config_file | sed /^#/d grep "^#" -f config_file cat config_file | sed s/$#//g egrep "{-#}" -f config_file

cat config_file | sed /^#/d

You wish to change the password expiry settings for the user "sarahj" such that the user must wait 5 days after setting a password to change passwords again, and also to specify that her password expires every 90 days with 7 days prior warning. What command can you use? chage -m 90 -M 5 -W 7 sarahj chage -m 5 -M 90 -w 7 sarahj chage -m 90 -M 5 -w 7 sarahj chage -m 5 -M 90 -W 7 sarahj

chage -m 5 -M 90 -W 7 sarahj

A user is reporting to you that they are unable to run a script named script1 within their home directory. The user has ownership of the file, and the modes on the file are "-rwxrw-rw-". What two commands could be used to set only the permissions necessary for the user to run the script? chmod 765 script1 chmod u+x script1 chmod a+wx script1 chown user:user script1

chmod 765 script1 chmod u+x script1

A user is reporting to you that they are unable to run a script named script1 within their home directory. The user has ownership of the file, and the modes on the file are "-rwxrw-rw-". What two commands could be used to set only the permissions necessary for the user to run the script? chmod u+x script1 chown user:user script1 chmod 765 script1 chmod a+wx script1

chmod u+x script1 chmod 765 script1

What CUPS commands utilize the -r flag to specify a reason for an action being performed on a printer? cupsqueue cupsenable cupsdisable cupsaccept

cupsenable cupsdisable cupsaccept

Which of the following represents the first nonrewinding SCSI tape device on a system? a. /dev/ht0 b. /dev/st0 c. /dev/nht0 d. /dev/nst0

d. /dev/nst0

Which file contains full and incremental back-up information for use with the dump/restore utility? a. /etc/dumps b. /etc/dump.conf c. /etc/dumpfile d. /etc/dumpdates

d. /etc/dumpdates

What is the name of the directory that contains symbolic links to UNIX SysV rc scripts for runlevel 2? a. /etc/init.d/rc2.d b. /etc/runlevel/2 c. /etc/inittab/rc2/d d. /etc/rc2.d

d. /etc/rc2.d

Most log files on the system are found in which directory? a. /etc/log b. /etc/logfiles c. /dev/log d. /var/log

d. /var/log

Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? a. traceroute b. SWATCH c. Snort d. AIDE

d. AIDE

Which of the following could result in a segmentation fault (fatal signal 11) during a Fedora installation? a. RAM problems b. overclocked CPU c. improper device driver d. All of the above

d. All of the above

Which common GUI environments are available in most Linux distributions? a. RPM b. pwd c. CDE d. GNOME

d. GNOME

What type of iptables chain targets traffic that is destined for the local computer? a. ROUTE b. OUTPUT c. FORWARD d. INPUT

d. INPUT

After typing the ls -a command, you notice that there is a file whose filename begins with a dot ( . ). What does this mean? a. It is a system file. b. It is a binary file. c. It is a file in the current directory. d. It is a hidden file.

d. It is a hidden file.

After typing the ls -F command, you notice a filename that ends with an * asterisk character. What does this mean? a. It is a linked file. b. It is a special device file. c. It is a hidden file. d. It is an executable file.

d. It is an executable file.

Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his machine. Before he can use them for data storage and retrieval, what must he do? a. Use the btrfs command to create one or more partitions on each of the hard disk drives. b. Mount the two hard drives so they are accessible by the operating system. c. Use the vi editor to edit /etc/mtab and create an entry for the controller card and the hard disk drives. d. Mount any partitions created on the two hard drives such that they are accessible by the operating system. e. Remove the format of any partitions created with a valid filesystem recognized by Linux. f. Mount a filesystem to each of the hard disk drives.

d. Mount any partitions created on the two hard drives such that they are accessible by the operating system.

Which Windows program is often used to connect to a Linux server via SSH? a. Rdesktop b. mstsc c. SSHD d. Putty

d. Putty

Who formed the Free Software Foundation to promote open development? a. Linus Torvalds b. Ken Thompson c. Dennie Ritchie d. Richard Stallman

d. Richard Stallman

You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do? a. Add the line to the /etc/aliases.db file instead. b. Restart the Postfix daemon. c. Log out of the system and then log back into the system and resend the email. d. Run the newaliases command.

d. Run the newaliases command.

What will the command sar -W 3 50 do? a. Take 3 CPU statistics every 50 seconds. b. Take 50 CPU statistics every 3 seconds. c. Take 3 swap statistics every 50 seconds. d. Take 50 swap statistics every 3 seconds.

d. Take 50 swap statistics every 3 seconds.

A user mounts a device to a mount point directory and realizes afterward there are files previously found within the mount point directory that are needed. What should this user do? a. Look in the lost+found directory for the file. b. Nothing; the files are lost and cannot ever be accessed. c. Nothing; the files could not have been there as you can only mount to empty directories. d. Unmount the device from the directory. e. Run the fsck command to recover the file.

d. Unmount the device from the directory.

After an unexpected shutdown of the server, you need to run a filesystem integrity check on all entries of the /etc/fstab file with a 1 or 2 in the sixth field. What flag or flags can be used with fsck to do this automatically? fsck -Va fsck -A fsck -s fsck -Cf

fsck -A

After attempting to mount a partition, you get an error that the mount has failed because the filesystem is dirty. What command should you run to fix issues with the filesystem? clean fsck -f mke2fs ext.fsck

fsck -f

What two commands will search for a desired string in a stream / output / file without interpreting regular expressions in the string? grep -f fgrep egrep -i ngrep

grep -f fgrep

What command utilizes the Limpel-Ziv (LZ77) compression algorithm and achieves a compression ratio of 60-70 percent? compress bzip bzcat gzip

gzip

You have just configured your DNS client settings and need to test DNS resolution. What commands can you use? host netstat dig nslookup ifconfig

host dig nslookup

Given two numerical variables A & B, and two string variables C & D, what two different test statements should be used to test numeric equality and string equality, respectively? whoami groups uname id

id

What command can be used to display user account IDs and group IDs for your currently logged in user account? whoami uname id groups

id

hat command can be used to display user account IDs and group IDs for your currently logged in user account? groups id uname whoami

id

You are writing a script that requires a file named "include.txt". The script should not proceed if the file is not readable. How can this condition be tested? if [ ! -r include.txt ] test -f include.txt if [ ! -f include.txt ] case include.txt in ~/

if [ ! -r include.txt ]

During the execution of a compiled program named "prog1", several error messages are printed to the screen indicating that required shared libraries are missing. What command can you use to check which shared libraries are required by prog1? ldd prog1 grep prog1 /etc/ld.so.conf ldconfig prog1 ls -s /lib | grep "prog1"

ldd prog1

What command will create a soft link of the file "script1" in your home directory and place it into the /usr/bin directory? ln -s ~/script1 /usr/bin/script1 ln ~/script1 /usr/bin/script1 ln /usr/bin/script1 ~/script1 ln -s /usr/bin/script1 ~/script1

ln -s ~/script1 /usr/bin/script1

What command can you use to find out what printer is set as the default destination printer for the lp command? lpd -d lpstat lp -a lpq --show-default

lpstat

What commands can be used to view process information on a system? taskmgr ls /proc pstree ps vmstat

ls /proc pstree ps

What command can be used to view all connected USB devices detected by the Linux kernel? cat /proc/usb lsmod lspci lsusb

lsusb

Your supervisor has asked that you generate a report on your system utilizing a script file named /bin/report.pl at 11:00 pm on October 1st, 2016. You are required to set up a scheduled job for this report that will only occur once. How should this be done? Enter the command at 10:00pm October 1, and then specify the /bin/report.pl file. Use the at 22001012016 command, and specify the /bin/report.pl file. Use the schedule command to add the file for a one time run to /etc/cron.d. Add the following line to the /etc/crontab file: 0 22 1 10 * 2016 /bin/report.pl

Enter the command at 10:00pm October 1, and then specify the /bin/report.pl file.

You need to reboot your server after updating your installed kernel packages. What two commands will reboot the server immediately? shutdown -r now shutdown -h now reboot reload

shutdown -r now reboot

Where is information regarding the number of inodes and data blocks available, as well as their sizes, stored? block table superblock first empty sector of the partition inode table

superblock

You are troubleshooting a department web server used for development that is experiencing heavy loads. What command can be used to determine who is logged in, and what their current running tasks are? who luser w last

w

The vi editor can function in which two of the following modes? a. insert b. interactive c. home d. text e. command

e. command a. insert

Which runlevel halts the system? a. 6 b. 0 c. 1 d. 5

b. 0

Which of the following indicates the second partition on the third hard disk drive to GRUB? a. (hd3,2) b. (hd4,3) c. (hd2,3) d. (hd2,1)

d. (hd2,1)

You are testing your configuration of postfix by telnetting to your postfix server. What command should you pass to the server to test ESMTP support? HELO HELO EXTENDED EHLO EXHELO

EHLO

What two functionally equivalent items consist of a table of all partition information for a certain hard disk or SSD and is stored in the first readable sector outside all partitions? File Allocation Table (FAT) GUID Partition Table (GPT) Master Boot Record (MBR) Primary Partition List (PPT)

GUID Partition Table (GPT) Master Boot Record (MBR)

What statement accurately describes the Advanced Encryption Standard (AES)? It is an improvement on the 3DES encryption method and is available in 128, 192, and 256 bit key lengths. It is a fast encryption standard that operates on streams of data instead of blocks of data and uses variable length keys up to 2048 bits in length. It is an encryption standard that uses keys that are 448 bits in length. It encrypts blocks of data in three stages using a 168-bit key length.

It is an improvement on the 3DES encryption method and is available in 128, 192, and 256 bit key lengths

What statement accurately describes the LXDE window manager? It is based on the Compiz and Beryl window managers and utilizes 3D acceleration on modern graphics cards to produce 3D graphical effects. It is a configurable window manager that allows for multiple desktops with different settings. It is designed specifically for underpowered systems such as netbooks, mobile devices, and legacy computers. It is the default window manager utilized by GNOME 3.

It is designed specifically for underpowered systems such as netbooks, mobile devices, and legacy computers.

You are reading through the /etc/crontab file and find the following entry: "*/5 * 1 * 5 /bin/myscript1" What does this entry do? It runs the /bin/myscript1 file every 5 minutes on the first of the month, provided that day is a Friday. It runs the /bin/myscript1 file every 5 minutes on Monday during the month of May. It runs the /bin/myscript1 file five times every fifth day in January. It runs the /bin/myscript1 file every 5 days at 1 am for 5 minutes

It runs the /bin/myscript1 file every 5 minutes on the first of the month, provided that day is a Friday.

What are the two versions of the X Windows system that are commonly available on Linux platforms? NeXT XFree86 Cocoa X.org

NeXT X.org

What two asymmetric algorithms are used by SSH to secure traffic between computers? Advanced Encryption Standard ARCFOUR Rivest Shamir Adleman (RSA) Digital Signature Algorithm

Rivest Shamir Adleman (RSA) Digital Signature Algorithm

After editing a configuration file for a daemon running on your system, you want to restart the daemon while maintaining the same PID. What kill signal should you use? SIGQUIT SIGHUP SIGTERM SIGINT

SIGHUP

Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False? a. True b. False

b. False

What kill level signal cannot be trapped? a. 1 b. 9 c. 15 d. 3

b. 9

When a printer is disabled: a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable b. the print queue does accept jobs into the print queue and holds them there until the printer is enabled again c. the printer appears as off-line when a lp request is sent d. the print queue redirects all print jobs sent to it to /dev/null

b. the print queue does accept jobs into the print queue and holds them there until the printer is enabled again

Which prompt do regular users receive when logged in to the system? a. ! b. @ c. $ d. #

c. $

What would be the effect of using the alias command to make an alias for the date command named cat in honor of your favorite pet? a. There is no effect until the alias is imported as it is a user-declared variable. b. It cannot be done as there already is an environment variable cat associated with the cat command. c. It cannot be done as there already is a command cat on the system. d. When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead.

d. When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead.

Which option to the rpm command can be used to remove a package from the system? a. r b. u c. U d. e

d. e

You have been asked to add a route to the 10.1.0.0/16 network via a gateway on the local network, 192.168.5.254. What command will add this route to the routing table? route add 10.1.0.0/16 192.168.5.254 route -add net 10.1.0.0 mask 255.255.0.0 192.168.5.254 ip route add 10.1.0.0/16 via 192.168.5.254 ip route add -net 10.1.0.0 netmask 255.255.255.0 gw 192.168.5.254

ip route add 10.1.0.0/16 via 192.168.5.254

After enabling sshd, you find that you are unable to reach the server remotely. The iptables -L command shows that there is no entry allowing ssh access. What command will insert a rule in the INPUT chain using a stateful filter? iptables -I INPUT -m state --state ESTABLISHED --dport 22 -j ACCEPT iptables -A INPUT -m state --state NEW --dport 22 -j ACCEPT iptables -a INPUT --service sshd iptables -c INPUT --state ESTABLISHED --dport 22

iptables -A INPUT -m state --state NEW --dport 22 -j ACCEPT

After enabling sshd, you find that you are unable to reach the server remotely. The iptables -L command shows that there is no entry allowing ssh access. What command will insert a rule in the INPUT chain using a stateful filter? iptables -a INPUT --service sshd iptables -c INPUT --state ESTABLISHED --dport 22 iptables -A INPUT -m state --state NEW --dport 22 -j ACCEPT iptables -I INPUT -m state --state ESTABLISHED --dport 22 -j ACCEPT

iptables -I INPUT -m state --state ESTABLISHED --dport 22 -j ACCEPT

A server currently has a runaway process with a PID of 2600 that can't be halted by the standard kill signal. What two kill commands will force the Linux kernel to stop the process by routing the resources for the process to /dev/null? kill -SIGHALT 2600 killall 2600 kill -SIGKILL 2600 kill -9 2600

kill -SIGKILL 2600 kill -9 2600

When using LPD, what two commands can be used in conjunction to find print job IDs and cancel them? lpstat lpq lprm lpdel

lpq lprm

Where is information regarding the number of inodes and data blocks available, as well as their sizes, stored? inode table first empty sector of the partition superblock block table

superblock

What would the CIDR notation be for a Class A network that has been subnetted to allow for 1022 usable host addresses on each subnet? /24 /22 /20 /16

/22

You are utilizing an Ubuntu workstation and need to set a static IP address on your eth0 network interface. What file must be modified to configure the static IP? /etc/network/interfaces /etc/sysconfig/networking/ifcfg-eth0 /etc/network /etc/sysconfig/network-scripts/ifcfg-eth0

/etc/network/interfaces

When configuring a PPP connection on Linux, where are passwords used for secure communications with an ISP stored? /etc/ppp/chap-secrets /etc/ppp/chap-shadow /etc/ppp/pap-secrets /etc/ppp/pap-shadow

/etc/ppp/chap-secrets

A new user has been hired to replace the retired user mikef. You have been tasked with giving the new user access to resources on a file sharing server with multiple file directories owned by mikef. What is the simplest way to ensure this new user's account has access to these files? Edit the /etc/passwd and /etc/shadow files to change mikef to the new user's login ID. Perform a chown username:username -R on mikef's old /home directory. Create the new user and specify mikef's UID utilizing the useradd -u <UID> <newuser> command. Add the new user to the mikef group in /etc/groups.

Create the new user and specify mikef's UID utilizing the useradd -u <UID> <newuser> command.

You are coaching a new junior administrator on managing user accounts, and she has asked you how to lock a user account on the system. What are valid ways to perform this task? Place a "!" in front of the relevant user in the /etc/shadow file. Use the usermod -L username command. Change the user's shell using chsh -s /bin/false username to lock the account. Use the lock username command.

Place a "!" in front of the relevant user in the /etc/shadow file. Use the usermod -L username command. Change the user's shell using chsh -s /bin/false username to lock the account.

After setting a variable named VAR1, a script complains that the variable doesn't exist. How can you ensure that this variable is available for subshells? Use the "env $VAR1" command. Add the variable to a config file in the /etc directory. Run the command "export $VAR1". Add the $VAR1 variable as a flag for the script.

Run the command "export $VAR1".

A web developer is asking you what SQL command should be used in order to show all records in the "products" table and any corresponding matches within the "orders" table, utilizing the common field name of "item_num". What SQL command will work? SELECT * FROM orders LEFT OUTER JOIN orders ON orders.item_num = products.item_num; SELECT * FROM products WHERE products.item_num = (LEFT OUTER JOIN orders.item_num); SELECT * FROM products INNER JOIN orders ON orders.item_num = products.item_num; SELECT * FROM products LEFT OUTER JOIN orders ON products.item_num = orders.item_num;

SELECT * FROM products LEFT OUTER JOIN orders ON products.item_num = orders.item_num;

What two statements regarding hard disk quotas in Linux are accurate? Hard limits are hard disk quotas that the user can't exceed for a certain period of time (5 days by default). Soft limits are hard disk quotas that the user can exceed for a certain period of time (7 days by default) Once turned on, quotas can't be disabled or turned off. Quotas can be enabled at boot time using the /etc/fstab file.

Soft limits are hard disk quotas that the user can exceed for a certain period of time (7 days by default) Quotas can be enabled at boot time using the /etc/fstab file.

What stage of the GRUB boot loader is responsible for loading filesystem support prior to the displaying the graphical boot loader screen? Stage3 Stage1.5 Stage1 Stage2

Stage1.5

Your network's stated password policy has changed, and you now need to configure your system to require a minimum password length of 10 characters. What must be done to accomplish this task? The /etc/passwd file must have the minimum password field changed for all users. The /etc/login.defs file's PASS_MIN_LEN parameter must be modified. You must modify the login.conf file under the /etc/pam.d directory to require a password of sufficient length. You must use the systemctl set passlength command.

The /etc/login.defs file's PASS_MIN_LEN parameter must be modified.

A system you are in charge of is experiencing a DNS resolution issue. You find that entries in the /etc/hosts file are functioning, but any FQDN not in the hosts file is failing. Using the nslookup command, you test resolution successfully to a name server in your resolv.conf file. What is most likely your issue? The server itself is not using a valid FQDN. The /etc/nsswitch.conf file is missing an entry for DNS. The name servers are not configured for recursive resolution of queries. The named daemon is not running / unresponsive.

The /etc/nsswitch.conf file is missing an entry for DNS.

You have just added several NTP servers to your /etc/ntp.conf, but after starting the NTP daemon, your system clock is still several hours off the correct local time, despite having the correct time zone set. What should be done to solve the issue? Edit the /etc/ntp.conf and set the jitter buffer value to 0, to allow synchronization with any server. The system must be rebooted in order for the system kernel to recognize ntpd as synchronized with the NTP servers. The NTP daemon should be stopped, and the ntpdate command should be used to manually synchronize the time with an NTP server. Use the ntpq command to check what time is being reported by the ntp servers, copy this value, and then set the time using the date command.

The NTP daemon should be stopped, and the ntpdate command should be used to manually synchronize the time with an NTP server.

You have just added several NTP servers to your /etc/ntp.conf, but after starting the NTP daemon, your system clock is still several hours off the correct local time, despite having the correct time zone set. What should be done to solve the issue? Use the ntpq command to check what time is being reported by the ntp servers, copy this value, and then set the time using the date command. The system must be rebooted in order for the system kernel to recognize ntpd as synchronized with the NTP servers. Edit the /etc/ntp.conf and set the jitter buffer value to 0, to allow synchronization with any server. The NTP daemon should be stopped, and the ntpdate command should be used to manually synchronize the time with an NTP server.

The NTP daemon should be stopped, and the ntpdate command should be used to manually synchronize the time with an NTP server.

What does a "Z" in the "S" column of ps command indicate? The process has finished executing, and has released its PID. The process has finished executing, and is waiting for the parent process to release its PID. The indicated process is currently in the running state. The process is being traced by another process in the running state.

The process has finished executing, and is waiting for the parent process to release its PID.

You are having issues on a Linux server with network connectivity. After exhausting all utilities at your disposal, you attempt to ping 127.0.0.1, and the pings fail. What can you determine from this result? The network cable is unplugged from the server, or is disconnected from a patch panel in the network. There is a critical issue with the TCP/IP stack on the server. There are no routes in the route table for reaching hosts on the local network. The iptables firewall is blocking access to the network.

There is a critical issue with the TCP/IP stack on the server.

After performing an ls -l in your current directory, you come across a file with a mode of "-rw-rw-r--+". What does the + indicate? The file is monitored by SELINUX in strict mode. There is versioning control enabled on the file, such as with SVN or git. There is an ACL on the file that can be viewed with the getfacl command. The sticky bit is set on the directory and this file has inherited permissions.

There is an ACL on the file that can be viewed with the getfacl command.

A system on your network has been found to contain only an /etc/passwd file for managing user accounts and passwords. You have been tasked with securing this system. What should you do? Force all the user accounts on the system to immediately change their passwords after editing the account security options in the /etc/login.defs file. Move the /etc/passwd file to a secured directory, then create a hard link to the file in /etc. Use the pwconv command to configure the system to use an /etc/shadow file for secured passwords. Change the permissions on the /etc/passwd so that only root has any access to the file, all other accounts / groups should not be able to read the file.

Use the pwconv command to configure the system to use an /etc/shadow file for secured passwords.

A user on your network is complaining that they are unable to login, and that they receive a message saying that their shell is invalid. How can this issue be resolved? Find the user's shell binary and run chmod a+rwx on the binary. Use the usermod -s command in conjunction with the login ID and specify a new shell for the user. Use the chsh command, followed by the user's login in order to change to a legitimate shell. Edit the /etc/passwd file and change their shell to a valid shell within the relevant field. Add the user's configured shell to /etc/shells Reinstall the package for the bash shell, as it has become corrupted.

Use the usermod -s command in conjunction with the login ID and specify a new shell for the user. Use the chsh command, followed by the user's login in order to change to a legitimate shell. Edit the /etc/passwd file and change their shell to a valid shell within the relevant field.

What are the two versions of the X Windows system that are commonly available on Linux platforms? X.org NeXT XFree86 Cocoa

X.org NeXT

What two commands can you use within to list available databases and list the tables within the current database, respectively? \d \l \t \a

\l \t

Which prompt does the root user receive when logged in to the system? a. # b. $ c. ! d. @

a. #

Which option to the dpkg command can be used to list the files that comprise a package? a. -L b. -i c. -l d. -s

a. -L

When compiling source code into a binary program, which command performs a system check and creates the Makefile? a. ./configure b. tar c. make d. make install

a. ./configure

Files that have been compressed using the compress utility typically have what extension? a. .Z b. .gz c. .tar.gz d. .bz2

a. .Z

Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation? a. /etc/login.defs b. /etc/passwd c. /etc/skel d. /etc/default/useradd

a. /etc/login.defs

What is the name of the file that contains a listing of all users on the system and their home directories? a. /etc/passwd b. /etc/shadow c. /etc/users d. /etc/password

a. /etc/passwd

When you change the data in a file that is hard-linked to three others: a. Only the data in the file you modified is affected. b. The data in the file you modified as well as the data in all hard linked files are modified as they share the same data and all have the same inode and file size. c. The date in the file you modified and the data in all hard linked files are modified as they have different inodes. d. Only the data in the file you modified and any hard linked files in the same directory are affected.

b. The data in the file you modified as well as the data in all hard linked files are modified as they share the same data and all have the same inode and file size.

The first floppy drive on the system is not responding. You enter the file /dev/fd0 command and receive the following output. What is the problem? [root@server1 root]# file /dev/fd0 /dev/fd0: ASCII text [root@server1 root]# a. The floppy drive is seen as a character device. b. The device file has become corrupt. c. The floppy drive cable has come loose. d. There is no floppy disk in the drive.

b. The device file has become corrupt.

Which of the following are graphical remote administration technologies? a. ssh b. VNC c. telnet d. DNS

b. VNC

You have redirected Standard Error to a file called Errors. You view the contents of this file afterward and notice that there are six error messages. After repeating the procedure, you notice that there are only two error messages in this file. Why? a. The system generated different Standard Ouput. b. You did not append the Standard Error to the Error file and as a result, it was overwritten when the command was run a second time. c. After you open the file and view the contents, the contents are lost. d. You must specify a new file each and every time you redirect as the system creates the specified file by default.

b. You did not append the Standard Error to the Error file and as a result, it was overwritten when the command was run a second time.

What command is equivalent to the man -k keyword command? a. man keyword b. apropos keyword c. appaloosa keyword d. find keyword

b. apropos keyword

Which command can be used to remove the test DPM package, including any test configuration files? a. dpkg remove test b. apt-get purge test c. dpkg purge test d. apt-get remove test

b. apt-get purge test

When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad? a. good, because the processor should be idle more than 5% of the time b. bad, because the processor is idle 10% of the time and perhaps a faster CPU is required c. bad, because the processor is idle 10% of the time and perhaps a new hard disk is required d. good, because the processor is idle 90% of the time

b. bad, because the processor is idle 10% of the time and perhaps a faster CPU is required

Which of the following will display the message welcome home if the cd /home/user1 command is successfully executed? a. echo "welcome home" && cd /home/user1 b. cd /home/user1 && echo "welcome home" c. cat "welcome home" || cd /home/user1 d. cd /home/user1 || cat "welcome home"

b. cd /home/user1 && echo "welcome home"

A file has the following permissions r----x-w-. The command chmod 143 would have the same effect as the command: a. chmod u=w,g=rw,o=rx file1 b. chmod u=x,g=r,o=wx file1 c. chmod u+w,g+r-w,o+r-x file1 d. chmod u+x-r,g+r-x,o+w file1 e. chmod u-r-w,g+r-w,o+r-x file1 f. chmod u=rw,g=r,o=r file1

b. chmod u=x,g=r,o=wx file1

Which command can you use during a system rescue to switch from the root of the live OS to the root of the Linux system installed on the hard disk? a. sysimage b. chroot c. rescue d. mount

b. chroot

Which command blanks the terminal screen erasing previously displayed output? a. clean b. clear c. blank d. erase

b. clear

What does the command dumpe2fs -h do? a. backs up an ext2 filesystem b. displays the number of inodes used and available in an ext2 filesystem c. dumps an ext2 filesystem d. is not a valid command

b. displays the number of inodes used and available in an ext2 filesystem

When referring to the /etc/rsyslog.conf file, this term specifies information from a certain area of the system, whereas this term is the level of importance of that information. a. service, precedents b. facility, priority c. section, priority d. process, degree

b. facility, priority

Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted? a. firewall-cmd --add-service ssh b. firewall-cmd --add-service ssh -permanent c. firewall-cmd --add-port 22/udp d. firewall-cmd --add-port 22/tcp

b. firewall-cmd --add-service ssh -permanent

What Systemd target corresponds to runlevel 5? a. multi-user.target b. graphical.target c. runlevel5.target d. system.target

b. graphical.target

You have recently modified the options within the /etc/default/grub file. What command can you use next to rebuild the GRUB2 configuration file? a. grubby b. grub2-mkconfig c. grub2-install d. grub-install

b. grub2-mkconfig

Which of the following is used to describe a computer that is used to access an iSCSI hard disk across the network? a. iSCSI terminator b. iSCSI initiator c. iSCSI target d. iSCSI requestor

b. iSCSI initiator

The first daemon loaded on a Linux system is: a. inittab b. init c. initstate d. linux

b. init

What command can you use to view journald log entries on a system that uses Systemd? a. syslog b. journalctl c. less d. catlog

b. journalctl

A production kernel refers to a kernel whose: a. revision number is even b. minor number is even c. major number is odd d. minor number is odd

b. minor number is even

Which command can you use to synchronize ntpd with an NTP time source? a. ntp b. ntpq c. hwclock d. ntpquery

b. ntpq

The process of sending print jobs from the print queue to the printer is called? a. queuing b. printing c. redirecting d. spooling

b. printing

Which command entered without arguments is used to display a list of processes running in the current shell? a. pid b. ps c. ppid d. list

b. ps

After typing the ls -F command, you see the following line in the output: -rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1 What does this mean? a. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. b. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file. c. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file. d. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.

d. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.

SCSI devices that use an 8-bit-wide data path use: a. a 15-pin connector b. an 8-pin connector c. a 68-pin connector d. a 50-pin connector

d. a 50-pin connector

Which of the following are common methods for gaining support for Linux> a. HOWTO documents at www.linuxdoc.org b. a local Linux User Group c. Internet newsgroups d. all the above

d. all the above

You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue? a. cancel 17 21 b. cancel -a Printer1-17 Printer1-21 c. cancel -u Printer1-17 Printer1-21 d. cancel Printer1-17 Printer1-21

d. cancel Printer1-17 Printer1-21

You want to see the filesystems that are presently in use on the system. What command could you use? a. cat /etc/fstab b. ls -l /etc/fstab c. ls -l /etc/fstab d. cat /etc/mtab

d. cat /etc/mtab

A user typed in the command pwd and saw the output: /home/jim/sales/pending. How could that user navigate to the /home/jim directory? a. cd / jim b. cd ./. c. cd . . d. cd . . / . .

d. cd . . / . .

If a user's current directory is /home/mary/project1, which command could she use to more the etc directory directly under the root? a. cd /home/mary/etc b. cd . . c. cd\etc d. cd /etc e. cd etc

d. cd /etc

Before a computer can use a router, what configuration information must it be provided? a. routing table b. subnet mask c. default router d. default gateway

d. default gateway

The tac command: a. is not a valid Linux command b. displays the contents of a file in reverse order last word on the line first and first word on the line last. c. displays the contents of hidden files c. displays the contents of hidden files d. displays the contents of a file in reverse order last line first and first line last

d. displays the contents of a file in reverse order last line first and first line last

The current value for the HOME variable is displayed by which of the following commands? a. echo HOME= b. echo ls HOME c. echo /HOME/ d. echo ~

d. echo ~

What are the three standard Linux permissions? a. read, write, modify b. read, write, examine c. full control, read-execute, write d. execute, read, write

d. execute, read, write

Every if construct begins with if and must be terminated with? a. stop b. endif c. end d. fi

d. fi

What command can you use to safely shut down the Linux system immediately? a. shutdown -r b. shutdown -c c. down d. halt

d. halt

Which process will always have a PID of 1 and a PPID of 0? a. ps b. the kernel itself c. top d. init

d. init

A runaway process that is faulty and consuming mass amounts of system resources: a. has a PPID of Z b. is an orphaned process c. is a zombie process d. is a rogue process

d. is a rogue process

Which of the following commands can be used on a Fedora 20 system to view hardware and service startup information during the boot process? a. less /var/log/boot.log b. less /var/log/syslog c. less /var/log/messages d. journalctl -b

d. journalctl -b

Which command can be used to modify the route table on a Linux computer? a. ipconfig b. traceroute c. nsloolup d. route

d. route

Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors? a. sambactl b. psql c. apachectl d. testparm

d. testparm

A user types in the command head /poems/mary. What will be displayed to the terminal screen? a. the header for the file mary b. the first line of the file mary c. the last 10 lines of the file mary d. the first 10 lines of the file mary e. the first 20 lines of the file mary

d. the first 10 lines of the file mary

A junior administrator is studying the filesystem layouts on a server, and wishes to know how to display the total number of available inodes for an ext3 filesystem. What command should you give to the junior administrator? dumpe2fs -h <partition> head -n 512 <partition> extfs.info -v <partition> tune2fs -a <partition>

dumpe2fs -h <partition>

What must a user do to run cp or mv interactively and be asked if she wants to overwrite an existing file? a. There is no choice as the new file will overwrite the old one by default b. Type cp - interactive or mv - interactive. c. Type interactive cp or interactive mv. d. Type cp -i or mv-i e. Just type cp or mv as they run in interactive mode by default.

e. Just type cp or mv as they run in interactive mode by default.

The default permissions given by the system prior to analyzing the umask are known as what for directories, and referred to as what for files? a. rw-rw-rw- and rw-rw-rw- b. rw-rw-rw- and r--r--r-- c. rwxrw-rw- and rwx-rw-rw- d. rw-rw-rw- and r--r--r-- e. rwxrwxrwx and rw-rw-rw-

e. rwxrwxrwx and rw-rw-rw-

What does the /var directory contain? a. various additional programs b. files that are architecture independant c. temporary files d. local variance devices e. spools and log files

e. spools and log files


Related study sets

PBS 1 - Emotion - Does affect help or hinder with regard to cognitive processing?

View Set

The psychology that is being investigated in the studies

View Set

Types of insurance policies life

View Set

Prep U Chapter 7: The Nursing Role in Genetic Assessment and Counseling

View Set