UNIX/Linux Final Exam
A user account can be locked with the usermod command using what option?
-L
What two protocols below are used for mail retrieval?
-POP -IMAP
Describe the telnet and SSH utilities. What is the difference between them?
-SSH: communication protocol, public key authentication, both data transmitted and received are encrypted -Telnet: communication protocol, not secure, no authentication policies or data encryption techniques, data is transmitted in plaintext -Difference: SSH is encrypted and telnet isn't
What two options can be used with the tar utility to either compress or decompress an archive using the gzip or compress utilities respectively?
-Z -z
Select the iptables option that specifies the destination address of packets for a rule:
-d
What two options below are used to tell the useradd command where a user's home directory will be, and where the skeleton directory is?
-d -k
What option can be added to the netstat command in order to display network statistics?
-i
Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed:
-l
Which sar command option is used to display statistics for the processor queue?
-q
What option can be added to the userdel command to remove the home directory of the target user?
-r
Files with what two file extensions are commonly known as tarballs?
.tar.gz .tgz
Where is the default document root directory for the Apache web server?
/var/www/html
On Linux, the root user always has a UID of what number?
0 (zero)
What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?
DNS
T/F: Almost all hardware problems are the result of damaged hardware.
FALSE
T/F: If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
FALSE
T/F: On most Linux systems, the logrotate utility is automatically scheduled to run weekly
FALSE
T/F: When connecting to the vsftpd daemon using an FTP client utility as the user "anonymous", you will be placed in the root user's home directory.
FALSE
T/F: When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.
FALSE
What is the most common hardware component to fail on a Linux system?
Hard disk drives
What DNS resource record type is used to provide the IP address for the e-mail server for a zone?
MX
What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?
alert
In order to download DPM packages, what command should be used below?
apt-get
Which command below can be used at a BASH command prompt to obtain a web page?
curl
What command can be used to search for DPM package information?
dpkg-query
An IPv6 IP address consists of 16-bit numbers in what numbering scheme?
hexadecimal
What utility in the sysstat package measures the flow of information to and from disk devices?
iostat
Adding the -t option to what command below will provide a list of all printers on the system and their status?
lpstat -t or -t lpstat
Which command can be used to see what network services are running on your network?
nmap
What command can be used to see what actual time servers are being used for synchronization?
ntpq
RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?
package dependency
Select the command that can be used to send a small TCP/IP packet to another IP address and await a response:
ping
What two FTP commands below can be used to close the ftp utility?
quit bye
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
secure
In order to create user accounts on a Linux system, what command should be utilized?
useradd
If X Windows fails to start, what command can be used to troubleshoot the issue?
xwininfo
What yum command below can display a list of package group names?
yum grouplist
What is the subnet mask for a Class C IP address?
255.255.255.0
What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?
255.255.255.255 0.0.0.0
What is the default print job priority for all print jobs created by the lp command?
50
What tool below was designed as a secure remote access utility that encrypts information that passes across the network?
Secure Shell (SSH)
What is the most commonly used LAN protocol?
TCP/IP
T/F: A route table is a list of TCP/IP networks that is stored in system memory.
TRUE
T/F: If the / filesystem becomes corrupted, the system is unstable and must be turned off.
TRUE
T/F: The Very Secure FTP daemon is a stand-alone daemon.
TRUE
T/F: The email command is an example of a Mail User Agent (MUA).
TRUE
T/F: The tar utility cannot back up device files or files with filenames longer than 255 characters.
TRUE
What well-known TCP port is utilized by the SMTP service?
25
Most Linux distributions make use of what package manager?
RPM