• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/168

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

168 Cards in this Set

  • Front
  • Back

A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices?

4

After a shell is no longer needed, what commands can be given to exit the shell?

Exit

After logging into a terminal, a user will receive an interface known as which option below

Shell

If a file's permissions are set to 750, what permissions are available to the group assigned to the file?

Read, exexute

a permission that is unavailable is represented by what character?

-

In Linux, the core component of the GUI is known as

X Windows

In order to create a hard or soft link what commands must be used

ln

In order to move from the to the, what command below should be issued in order to move from the /home/joe/test/data directory to the /home/Joe directory, what command below should be issued?

Cd ../..

Selected command below that can be used to provide a long listing for each file in the directory

ls -l

Select the command below that shows the size of the directory and its contents and kilo bytes

du

Select a command that can be used to create partitions that will be stored in the MBR after installation

fdisk

The contents of a certain variable in memory can be viewed using which meta character below in combination with the echo command

$

The file system hierarchy standard specifies what directly as the root user's home directory

/root

The Linux kernel was developed and released in 1991 by

Linus torvalds

File quotas for certain users can be edited by using which command

edquota

The mkfs commands can be issued with what switch in order to specify a file system type

-t

To display the contents of a text file called data what command should be used

cat

To mount all file systems in the


/etc/fstab file that are intended to mount at boot time, what commands can be used

mount -a

What command below takes a list of arguments specifying the absolute or relative path names of files to remove

rm

What can man can be issued to confirm what directory you are in at the command line prompt

pwd

What commands can be used to check different kinds of file systems on Linux for errors

fsck

What commands can be used to copy files

cp

What commands can be used to display the last five lines of a text file

tail -5

What metacharacters can be used to refer to the current user's home directory

~

What metacharacter indicates background command execution

&

What piece of software tells the operating system how to use a specific hardware device

Device driver

What term describes the physical hardware and the underlying operating system upon which a virtual machine runs

Virtual host

When using command line terminal, specific letters that start with a dash and appear after command names are considered to be

Options

When using chmod command, the mode rwx can be represented by which number?

7

When viewing the version number for a Linux kernel what number indicates the stability of the kernel

Minor number

Which command below provides the easiest method for monitoring free space on mounted

df

Which command can you use to display your current login name

whoami

One of the most commonly used metacharacters is the blank character, which tells the shell that the following text refers to a variable

$

Select the mode that corresponds to the setting r-x

5

The core component of the Linux operating system is the Linux blank

Kernel

The blank command is used to display lines and text files that match a certain common regular expression

grep

The blank command Prints text to the terminal screen

Echo

What two commands below can be used to locate files on a file system

Find, locate

When the core components of the Linux operating system are packaged together with other open source software it is called a what

Distribution

Which comon GUI environments are available in most Linux distributions

KDE, GNOME

You plug a USB flash memory drive into a system that has two SATA hard disk what will the partition on this USB flash memory drive be recognized as to the Linux system

/dev/sdc1

You want to use the file systems that are presently in use on the system what command could you use

mount

After a partition on a hard disk drive is formatted with a file system, all partitions on that disk drive must use the same file system. True or false?

False

What command can you use to view journald the log entries on a system that uses system D

journalctl

Which option to the RPM command can be use to remove a package from the system

-e

What two commands can be used to modify the password expiry information and a user's default shell

chage, chsh

Which file contains full and incremental backup information for use with the dump / restore utility

/etc/dumpdates

The debian package manager is the default package manager used by fedora 20 true or false

False

Network interfaces can be configured automatically using what

DHCP

Adding the -t option to what command below will provide a list of all printers on the system and their status?

Lpstat

What option can be used with the tar command to extract a specified archive

-x

In order to download DPM packages what command should be used

Apt-get

What Linux command can be used to assign a TCP / IP configuration to a nic as well as view the current configuration of all network interfaces

ifconfig

What is the most commonly used LAN protocols

Tcp/ip

What is the name of the file that contains a listing of all users on the system and their home directories

/etc/passwd

What option can be added to the RPM command in order to query packages

-q

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet

DNS

What devices are used to transfer information from one network to another

routers

What command looks for a makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture

Make

What option can be added to the userdel command to remove the home directory of the target user

-r

Which command should be used to restrict access to printers

lpadmin

Which file name extension indicates a tarball that is not using a compression utility

.tar

In order to create user accounts on a Linux system what command should be utilized

useradd

What commands can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer

Traceroute

In order to send a print job to a printer using CUPS what command must be used

Lp

Ipv6 IP addresses are delimited by what character below

:

On Linux the root user always has a UID of what number

0

Which to NTP demons that are commonly used on Linux systems

Chronyd, ntpd

What to below was designed as a secure remote access utility that encrypts information that passes across the network

Secure she'll SSH

RPM packages that require other RPM packages to be installed on a system prior to being installed create a relationship known as

Package dependency

When compiling source code into a binary program which command performs a system check and creates the Makefile

./configure

Before a computer can use a router what configuration information must it be provided

Default gateway

Which command can you use to lock a user account

usermod -L username

Which of the following Damon's enables Linux to act like a Windows file server

Samba

A subnet mask is used to differentiate the host portion from the network portion in an ipv4 address true or false

True

Which file stores the TCP / IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC

/etc/resolv.conf

What to Damon's can be used to start and manage connections for smaller networks such as telnet and rlogin

Xinetd, inetd

Select a command that can be used to send a small TCP / IP packet to another IP address and await a response

Ping

Which command would you use to unlock a user account

usermod -U

The Apache Damon listens for HTTP requests on what port by default

TCP 80

Which of the following commands can be used to search for packages that contain the word oobla on rpm software repositories

Yum search oobla

Mary is a system administrator in your organization she has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do

Restart the DHCP daemon

Which of the following are to logging Damon's used on Linux systems

journald, rsyslogd

What directive below in Apache httpd.vonf file specifies that the index.HTML file in the document root directory will be sent to client to request an HTML document

DirectoryIndex index.html

where is the skeleton directory located on most Linux

/etc/skel

To change the primary group temporarily to another group that is listed in the output of the groups and ID commands, you can use which command below

newgrp

what are two means available to resolve a hostname to the appropriate TCP / IP address

/etc/hosts, DNS

The demons associated with network services listen for network traffic associated with a particular what

Port

On which part of the maintenance cycle to Lenox administrators spend the most time

Monitoring

What are best practices for securing a local Linux server

Lock the server in a server closet. Ensure that SELinux or apparmor is used to protect key services

What type of iptables chain targets traffic that is destined for the local computer

Input

What will the command sar -W 3 50 do?

Take 3 CPU statistics every 50 seconds.

When performing a sar -u command, you notice that percentile is consistently 10%, is this good or bad

Bad because the processor is idle 10% of the time and perhaps a faster CPU is required

Which command can increase the number of file handles that programs can open in a shell

ulimit

Which command indicates the shared libraries required by a certain executable program

ldd

Which file contains information regarding the users, computers, and commands used by the sudo command

/etc/sudoers

Which of the following actions should you first take to secure your main computer against network attacks

Ensure that only necessary services are running

What are common assistive technologies

High contrast, sticky keys, on screen keyboard, mouse keys

What 3 cmands commands can be used to display memory statistics

vmstat, sar, free

Which of the following commands can be used to scan the available ports on computers within your organization

nmap

Which of the following files is likely to be found in the /var/log/sa directory on Fedora 20 system over time

sa19

Which of the following firewall D commands can be used to allow incoming SSH connection the next time the system is booted

firewall-cmd --add-service ssg --permanent

What two Linux intrusion detection systems can be used to detect altered files and directories

Tripwire, AIDE

What are three common troubleshooting procedures

Test the solution, isolate the problem, collect information

RSA is a common symmetric encryption algorithm used by SSH and GPG true or false

False

The lspci command can be used to isolate problems with with X Windows true or false

False

The private key is used when creating a digital signature true or false

True

When the fsck command cannot repair a non root file system, you should immediately restore all data from tape backup true or false

False

What is a common for Linux that monitors files and directories

Tripwire

What is a software program that can be used to automatically authenticate users using their private key

SSH agent

A daemon used on some Linux systems to provide for easier configuration of netfilter via the ipchains command

Firewall daemon (firewalld)

A command that lists the files that are currently being viewed Ramada side by software programs and users

Isof command

The connections that a program makes to files on a file system

File handles

A program that can be used to detect unauthorized access to a Linux system

IDS intrusion detection system

A measure of normal system activity

Baseline

What is the command that can be used to scan ports on network computers

nmap

The process of embedding network packets with in other network packets

Tunneling

An attack in which a network service is altered in memory

Buffer overrun

Which two implementations of X windows are commonly used in Linux

X.org


Xfree86

What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk?

ISCSI initiator, iSCSI target

What keyword can be specified within a bootloader to force the system to boot to single user mode

Single

Which command can be used to see processes running in the background

Jobs

What number represents the stderr file descriptor

2

Which command can be used to start X Windows, the window manager, and the default desktop environment

Startx

Which runlevel halts the system

0

The current value for the HOME variable is displayed by which of the following commands

echo ~


echo $HOME

What number represents the stdin file descriptor

0

What Konstruct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on

for

Term used to describe a process spawning or initiating another process

forking

You have recently modified the options within the /etc/default/grub file. What command can you use next to rebuild the GRUB2 configuration file

grub2-mkconfig

What character, when appended to a command, causes the command to be run in the background

&

When you run the PS command, how are Damon processes recognized

There is a question mark in the TTY column

The first Damon loaded on a Linux system

Init

The kill all command terminates what

All instances of a process with the same name

Which of the following commands will most likely increase the chance of a process receiving more time slices

renice -12

After a background process has been started, what command below can be used to move it to the foreground

fg

To verify hardware settings, you can examine the contents of the blank directory

/proc

Which of the following system D commands can be used to stop a demon called Lala

systemctl stop lala.service

What does >> accomplish when entered on the command line after a command

It appends standard output to a file

Which file does the UNIX sysV init daemon reference on startup to determine the default runlevel

/etc/inittab

Which process will always have a PID of one and a PPID of 0

Init

What command is used to view and modify user jobs scheduled to run with cron

Crontab

a user-defined variable that can be used by processes that run in sub shells, the variable must be what

Exported

What kill level signal cannot be trapped

9

Which of the following commands can be used to start a UNIX sysV Damon called Lala and run levels 1, 2 & 3?

chkconfig --level 123 lala on

CFS volumes are mounted at boot time from entries within /etc/fstab by default true or false

False

Which command can you use during a system rescue to switch from the root of the live is to the root of the Linux system installed on the hard disk

chroot

Select the meta character that can be used to send the standard output of one command to another command as standard input

|

What grade level is commonly referred to as disk striping with parity

5

What to raid types below utilize disc striping with parity providing protection against one or two drive failures respectively

5,6

Lilo needs to be reinstalled after it has been modified True or false?

True

Where is the /proc file system stored

Ram

In order to redirect a file to the standard input of a command what metscharacter should be used

<

You want to view log files to get information about a problem that occurred during a Linux installation. In which directory will you likely find the log files

/var/log

Which construct can be used in a shell script to read standard and put in place it in a variable

Read

Which command entered without arguments is used to display a list of processes running in the current shell

Ps

In Fedora 20, the logging system used to record the messages normally stored within the boot.Log, messages, and syslog files has been replaced by a journaling database system called what

Journald

Zombie processes are also known as defunkt processes true or false

True

Which of the following grade levels is not fault tolerant

0

Which of the following indicates the second partition on the third hard disk drive to grub

(hd2,1)

The Blank is a high performance file system and volume management software that was designed for large-scale Linux systems that need to store data on multiple disks, SANs, and remote systems

ZFS

Insta Dora Lenox, a blank file is a script file that specifies the choices that you would normally choose when you install the operating system

Kickstart

A list of all exported environment and user defined variables in a shell can be viewed with what command

env

The standard output and standard error from a terminal screen within the bash shell can be redirected to a file on the file system using what shell made a character followed by the absolute or relative path name of a file

>

How do you indicate a comment line in a shell script

Begin the line with #

The alias command can be used to make a shortcut to a single command true or false

True

What systemd target corresponds to run level 5

graphical.target

What is the name given to a process not associated with a terminal

Daemon process