• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/130

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

130 Cards in this Set

  • Front
  • Back

Open Source Software (OSS) is freely developed and continuously improved by a large community of software developers.

True

Commands indicate the name of a program to execute and are case sensitive.

True

Linux uses a logical directory tree to organize files into different folders.

True

It is acceptable to use shell metacharacters when naming files.

False

The rmdir command automatically removes a directory and all of its subdirectories and files.

False

There can be multiple device files per device.

False

You can use a small bootable Linux kernel to fix problems related to the following: the boot loader;filesystems and partitions; the configuration file; and drivers.

True

You are limited to using one pipe | metacharacter on the command line to pipe information from onecommand to another command.

False

Each process can start an unlimited number of other processes.

True

The ps command is the only command that can view process information.

False

The killall command uses the PID to kill a process.

False

After a process has been started, you can change its priority by using the renice command.

True

If you want to enable a printer, you must specify the printer name to the cupsenable command.

True

CUPS contains versions of the lpr, lpc, lpq, and lprm commands.

True

A user can only be a member of one group.

False

The tar utility cannot back up device files or files with filenames longer than 255 characters.

True

It is good form to read the Makefile after you run the configure script.

True

Home users can use a LAN, but not a WAN.

False

Class D addresses are used for multicasting.

True

A route table is a list of TCP/IP networks that is stored in system memory.

True

The use of NFS is less common than the use of FTP to transfer files on public networks.

True

Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.


False

If the / filesystem becomes corrupted, the system is unstable and must be turned off.

True

Performance problems are caused by hardware, not software.

False

A(n) ____ is a piece of software that tells the operating system how to use a specific hardware device.

device driver

The ____ indicates the stability of a Linux kernel.

major number

The concept of ____ enables software developers to read other developers’ source code, modify that source code to make the software better, and redistribute that source code to other developers who might improve it further.

Open Source Software

The ____ stipulates that the source code of any software published under its license must be freely available.

GNU General Public License

The core component of the GUI in Linux is referred to as ____.

X Windows

Companies and institutions using computers to perform extraordinarily large calculations that would be unsuitable for most computers would employ a(n) ____.

supercomputer

____ is the most common method of installing Linux.

Installation from a DVD

The shell that is used by default in Linux is the ____ shell.

BASH

____ are specific letters that start with a dash (“-“).

Options

The command that displays the calendar for the current month is ____.

cal

The ____ metacharacter indicates background command execution.

&

____ is the metacharacter for command termination.

;

The ____ command will confirm the system directory that you are currently in.

pwd

To move from the /home/joe/test/data to the /home/joe directory, use the ____ command.

cd ../..

The ____ regular expression metacharacter matches 0 or more occurrences of the previous character.

*

In the FHS, the ____ directory contains most system commands and utilities.

/usr

Copying a file can be accomplished using the ____ command.

cp

The fastest method to search for files in the Linux directory tree is to use the ____ command.

locate

To create a hard link, you must use the ____ command.

ln

The section of an inode that stores permissions is called the ____ of the file.

mode

Devices that transfer data in a character-by-character fashion are referred to as ____ devices.

character

If you do not know the type, major, or minor number of a device, you can use the ____ command to re-create the device based on the common name.

mknod

The ____ filesystem is used by software programs that write to a CD-RW or DVD-RW drive.

udf

Data is read off of hard disks in concentric circles called ____.

tracks

To ensure that Linux has detected the correct amount of RAM in the system after installation, you can view the contents of the ____ file.

/proc/meminfo

The ____ file in the /proc directory contains a list of memory address ranges reserved for device use.

ioports

The file descriptor stderr is represented by the number ____.

2

You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file.

>

You can redirect a file to the standard input of a command using the ____ metacharacter.

<

You can send the standard output of one command to another command as standard input using the ____ shell metacharacter.

|

The ____ command counts the number of lines, words, and characters in a file.

wc

The ____ command can be used to extract, manipulate, and format text using pattern-action statements.

awk

To see a list of the environment variables and their current values on a system, you can use the ____command.

set

In the /etc/lilo.conf file, the ____ keyword specifies the absolute pathname to the Linux kernel.

image=

In the /etc/lilo.conf file, the ____ keyword specifies the file that contains the physical layout of the disk drive.

install=

In Linux, runlevel ____ is also known as multiuser mode.

2

After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility within the desktop environment.

xvidtune

In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.

process state

The ____ option to the ps command displays all processes that do not run on terminals.

x

After a background process has been started, it can be moved to the foreground by using the ____ command.

fg

Processes are started with a nice value of ____ by default.

0

To send a print job to a printer, you must first use the ____ command and specify what to print.

lp

To see a list of all printers on the system and their status, you can use the -t option to the ____ command.

lpstat

You can restrict who can print to certain printers by using the ____ command.

lpadmin

The ____ log file contains information and error messages regarding network access generated by daemons such as sshd and xinetd.

secure

The ____ priority used by the System Log Daemon indicates an error that should be rectified immediately, such as a corrupt system database.

alert

You can create user accounts on the Linux system by using the ____ command.

useradd

The compression algorithm used by the compress utility has an average compression ratio of ____%.

40-50

When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.

.Z

When using the cpio utility, the ____ option causes a new archive to be created.

-o

The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.

make

The subnet mask for a Class B IP address is ____.

255.255.0.0

The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

ifconfig

The /etc/resolv.conf file can contain up to ____ DNS servers.

three

A common utility used to troubleshoot routing is the ____ command.

traceroute

The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

rlogin

____ is a remote administration tool that encrypts information that passes across the network.

Secure Shell (SSH)

The ____ zone configuration file contains a PTR record used to identify the loopback adapter.

/var/named/named.local

In NTP, stratum ____ consists of atomic devices or GPS clocks.

0

To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.

-V

The shell restricts the number of file handles that programs can open to ____ by default.

1024

The ____ option to the iptables command can be used to specify the default policy for a certain chaintype.

-P

The ____ option to the iptables command can be used to specify the destination address of packets for a rule.

-d

____________________ consists of the physical components inside a computer that are electrical in nature.

Hardware

The ____________________ is the core component of the Linux operating system.

Linux Kernel

A(n) ____________________ is a computer or special hardware device that provides interconnection between company networks, home networks, and institutional networks.

router

The ability for a computer to increase workload as the number of processors increases is known as ____________________.

scalability

A(n) ____________________ specifies the parameters that tailor a command to your particular needs.

argument

When a user logs into their Linux system, he is placed in the ____________________ directory.

home

Text wildcards used to ease the searching of specific text information are called ____________________.

regular expressions

An alternative to the vi editor that offers an equal set of functionality is the GNU ____________________.

Emacs editor

To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -R option.

recursive

The ____________________ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.

which

To create a(n) ____________________ link, you use the -s option to the ln command.

symbolic

When a user creates a file or directory, that user’s name and ____________________ becomes the owner and group owner of the file, respectively.

primary group

If you find a corrupted device file, or accidentally delete a device file, the ____________________ command can be used to re-create the device file if you know the type, major, and minor numbers.

mknod

Creating a filesystem on a device is commonly referred to as ____________________.

formatting

An extended partition can contain many subpartitions called ____________________.

logical drives

Fault tolerant hard disk configurations are typically implemented by a(n) _____________________________________________.

RAID

If you have an installed Linux system, you can use the ____________________ command to write an ISO image to a USB flash memory drive.

dd

Most commands that are run by the shell are run in a separate ____________________, which is created by the current shell.

subshell

The ____________________ command takes user input from stdin and places it in a variable specified by an argument.

read

When a computer first initializes, the system BIOS performs a(n) _________________________.

Power On Self Test

The first daemon process on a system is called the ____________________ daemon.

initialize (init)

The init daemon uses its configuration file, ____________________, determine the number of daemons that need to be loaded on the system to provide system services.

/etc/inittab

A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.

runlevel

You can see whether a daemon script was executed successfully at boot time by checking the contents of the____________________ file after the system has fully initialized.

/var/log/messages

A(n) ____________________ refers to a program that is running in memory and on the CPU.

process

The ____________________ can be used to affect the process priority indirectly.

nice value

Processes that have encountered an error during execution and continuously uses up system resources are referred to as ____________________ processes.

rogue

In a process referred to as ____________________, when executing compiled programs or shell scripts, the BASH shell that interprets the command you typed creates a new BASH shell.

forking

A set of information that is sent to a printer at the same time is called a(n) ____________________.

print job

On a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.

cancel

The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.

kern

The ____________________ utility uses the Burrows-Wheeler Block Sorting Huffman Coding algorithm when compressing files.

bzip2

A(n) ____________________ backup backs up only the data that has been changed since the last backup.

incremental

Two or more computers that are connected with media that can exchange information are called a(n) ____________________.

network

A network ____________________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.

protocol

The IP address of the network interface on the router to which you send packets is called the____________________.

default gateway

____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.

Subnetting

You can view or set the host name for a Linux computer using the ____________________ command.

hostname

The first DNS server in a zone is called the ____________________ DNS server.

master or primary

To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.

Samba

Processes can initiate numerous connections, called ____________________, to files on the filesystem in addition to standard input, standard output, and standard error.

file handles

When performance issues arise, you can compare the output of performance utilities to the ____________________ values found in the system log book.

baseline

The ____________________ command is used to view the current SELinux status.

sestatus