Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
168 Cards in this Set
- Front
- Back
A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices? |
4 |
|
After a shell is no longer needed, what commands can be given to exit the shell? |
Exit |
|
After logging into a terminal, a user will receive an interface known as which option below |
Shell |
|
If a file's permissions are set to 750, what permissions are available to the group assigned to the file? |
Read, exexute |
|
a permission that is unavailable is represented by what character? |
- |
|
In Linux, the core component of the GUI is known as |
X Windows |
|
In order to create a hard or soft link what commands must be used |
ln |
|
In order to move from the to the, what command below should be issued in order to move from the /home/joe/test/data directory to the /home/Joe directory, what command below should be issued? |
Cd ../.. |
|
Selected command below that can be used to provide a long listing for each file in the directory |
ls -l |
|
Select the command below that shows the size of the directory and its contents and kilo bytes |
du |
|
Select a command that can be used to create partitions that will be stored in the MBR after installation |
fdisk |
|
The contents of a certain variable in memory can be viewed using which meta character below in combination with the echo command |
$ |
|
The file system hierarchy standard specifies what directly as the root user's home directory |
/root |
|
The Linux kernel was developed and released in 1991 by |
Linus torvalds |
|
File quotas for certain users can be edited by using which command |
edquota |
|
The mkfs commands can be issued with what switch in order to specify a file system type |
-t |
|
To display the contents of a text file called data what command should be used |
cat |
|
To mount all file systems in the /etc/fstab file that are intended to mount at boot time, what commands can be used |
mount -a |
|
What command below takes a list of arguments specifying the absolute or relative path names of files to remove |
rm |
|
What can man can be issued to confirm what directory you are in at the command line prompt |
pwd |
|
What commands can be used to check different kinds of file systems on Linux for errors |
fsck |
|
What commands can be used to copy files |
cp |
|
What commands can be used to display the last five lines of a text file |
tail -5 |
|
What metacharacters can be used to refer to the current user's home directory |
~ |
|
What metacharacter indicates background command execution |
& |
|
What piece of software tells the operating system how to use a specific hardware device |
Device driver |
|
What term describes the physical hardware and the underlying operating system upon which a virtual machine runs |
Virtual host |
|
When using command line terminal, specific letters that start with a dash and appear after command names are considered to be |
Options |
|
When using chmod command, the mode rwx can be represented by which number? |
7 |
|
When viewing the version number for a Linux kernel what number indicates the stability of the kernel |
Minor number |
|
Which command below provides the easiest method for monitoring free space on mounted |
df |
|
Which command can you use to display your current login name |
whoami |
|
One of the most commonly used metacharacters is the blank character, which tells the shell that the following text refers to a variable |
$ |
|
Select the mode that corresponds to the setting r-x |
5 |
|
The core component of the Linux operating system is the Linux blank |
Kernel |
|
The blank command is used to display lines and text files that match a certain common regular expression |
grep |
|
The blank command Prints text to the terminal screen |
Echo |
|
What two commands below can be used to locate files on a file system |
Find, locate |
|
When the core components of the Linux operating system are packaged together with other open source software it is called a what |
Distribution |
|
Which comon GUI environments are available in most Linux distributions |
KDE, GNOME |
|
You plug a USB flash memory drive into a system that has two SATA hard disk what will the partition on this USB flash memory drive be recognized as to the Linux system |
/dev/sdc1 |
|
You want to use the file systems that are presently in use on the system what command could you use |
mount |
|
After a partition on a hard disk drive is formatted with a file system, all partitions on that disk drive must use the same file system. True or false? |
False |
|
What command can you use to view journald the log entries on a system that uses system D |
journalctl |
|
Which option to the RPM command can be use to remove a package from the system |
-e |
|
What two commands can be used to modify the password expiry information and a user's default shell |
chage, chsh |
|
Which file contains full and incremental backup information for use with the dump / restore utility |
/etc/dumpdates |
|
The debian package manager is the default package manager used by fedora 20 true or false |
False |
|
Network interfaces can be configured automatically using what |
DHCP |
|
Adding the -t option to what command below will provide a list of all printers on the system and their status? |
Lpstat |
|
What option can be used with the tar command to extract a specified archive |
-x |
|
In order to download DPM packages what command should be used |
Apt-get |
|
What Linux command can be used to assign a TCP / IP configuration to a nic as well as view the current configuration of all network interfaces |
ifconfig |
|
What is the most commonly used LAN protocols |
Tcp/ip |
|
What is the name of the file that contains a listing of all users on the system and their home directories |
/etc/passwd |
|
What option can be added to the RPM command in order to query packages |
-q |
|
What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet |
DNS |
|
What devices are used to transfer information from one network to another |
routers |
|
What command looks for a makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture |
Make |
|
What option can be added to the userdel command to remove the home directory of the target user |
-r |
|
Which command should be used to restrict access to printers |
lpadmin |
|
Which file name extension indicates a tarball that is not using a compression utility |
.tar |
|
In order to create user accounts on a Linux system what command should be utilized |
useradd |
|
What commands can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer |
Traceroute |
|
In order to send a print job to a printer using CUPS what command must be used |
Lp |
|
Ipv6 IP addresses are delimited by what character below |
: |
|
On Linux the root user always has a UID of what number |
0 |
|
Which to NTP demons that are commonly used on Linux systems |
Chronyd, ntpd |
|
What to below was designed as a secure remote access utility that encrypts information that passes across the network |
Secure she'll SSH |
|
RPM packages that require other RPM packages to be installed on a system prior to being installed create a relationship known as |
Package dependency |
|
When compiling source code into a binary program which command performs a system check and creates the Makefile |
./configure |
|
Before a computer can use a router what configuration information must it be provided |
Default gateway |
|
Which command can you use to lock a user account |
usermod -L username |
|
Which of the following Damon's enables Linux to act like a Windows file server |
Samba |
|
A subnet mask is used to differentiate the host portion from the network portion in an ipv4 address true or false |
True |
|
Which file stores the TCP / IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC |
/etc/resolv.conf |
|
What to Damon's can be used to start and manage connections for smaller networks such as telnet and rlogin |
Xinetd, inetd |
|
Select a command that can be used to send a small TCP / IP packet to another IP address and await a response |
Ping |
|
Which command would you use to unlock a user account |
usermod -U |
|
The Apache Damon listens for HTTP requests on what port by default |
TCP 80 |
|
Which of the following commands can be used to search for packages that contain the word oobla on rpm software repositories |
Yum search oobla |
|
Mary is a system administrator in your organization she has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do |
Restart the DHCP daemon |
|
Which of the following are to logging Damon's used on Linux systems |
journald, rsyslogd |
|
What directive below in Apache httpd.vonf file specifies that the index.HTML file in the document root directory will be sent to client to request an HTML document |
DirectoryIndex index.html |
|
where is the skeleton directory located on most Linux |
/etc/skel |
|
To change the primary group temporarily to another group that is listed in the output of the groups and ID commands, you can use which command below |
newgrp |
|
what are two means available to resolve a hostname to the appropriate TCP / IP address |
/etc/hosts, DNS |
|
The demons associated with network services listen for network traffic associated with a particular what |
Port |
|
On which part of the maintenance cycle to Lenox administrators spend the most time |
Monitoring |
|
What are best practices for securing a local Linux server |
Lock the server in a server closet. Ensure that SELinux or apparmor is used to protect key services |
|
What type of iptables chain targets traffic that is destined for the local computer |
Input |
|
What will the command sar -W 3 50 do? |
Take 3 CPU statistics every 50 seconds. |
|
When performing a sar -u command, you notice that percentile is consistently 10%, is this good or bad |
Bad because the processor is idle 10% of the time and perhaps a faster CPU is required |
|
Which command can increase the number of file handles that programs can open in a shell |
ulimit |
|
Which command indicates the shared libraries required by a certain executable program |
ldd |
|
Which file contains information regarding the users, computers, and commands used by the sudo command |
/etc/sudoers |
|
Which of the following actions should you first take to secure your main computer against network attacks |
Ensure that only necessary services are running |
|
What are common assistive technologies |
High contrast, sticky keys, on screen keyboard, mouse keys |
|
What 3 cmands commands can be used to display memory statistics |
vmstat, sar, free |
|
Which of the following commands can be used to scan the available ports on computers within your organization |
nmap |
|
Which of the following files is likely to be found in the /var/log/sa directory on Fedora 20 system over time |
sa19 |
|
Which of the following firewall D commands can be used to allow incoming SSH connection the next time the system is booted |
firewall-cmd --add-service ssg --permanent |
|
What two Linux intrusion detection systems can be used to detect altered files and directories |
Tripwire, AIDE |
|
What are three common troubleshooting procedures |
Test the solution, isolate the problem, collect information |
|
RSA is a common symmetric encryption algorithm used by SSH and GPG true or false |
False |
|
The lspci command can be used to isolate problems with with X Windows true or false |
False |
|
The private key is used when creating a digital signature true or false |
True |
|
When the fsck command cannot repair a non root file system, you should immediately restore all data from tape backup true or false |
False |
|
What is a common for Linux that monitors files and directories |
Tripwire |
|
What is a software program that can be used to automatically authenticate users using their private key |
SSH agent |
|
A daemon used on some Linux systems to provide for easier configuration of netfilter via the ipchains command |
Firewall daemon (firewalld) |
|
A command that lists the files that are currently being viewed Ramada side by software programs and users |
Isof command |
|
The connections that a program makes to files on a file system |
File handles |
|
A program that can be used to detect unauthorized access to a Linux system |
IDS intrusion detection system |
|
A measure of normal system activity |
Baseline |
|
What is the command that can be used to scan ports on network computers |
nmap |
|
The process of embedding network packets with in other network packets |
Tunneling |
|
An attack in which a network service is altered in memory |
Buffer overrun |
|
Which two implementations of X windows are commonly used in Linux |
X.org Xfree86 |
|
What terms describe a computer connected to a remote hard disk via iSCSI, and the remote hard disk? |
ISCSI initiator, iSCSI target |
|
What keyword can be specified within a bootloader to force the system to boot to single user mode |
Single |
|
Which command can be used to see processes running in the background |
Jobs |
|
What number represents the stderr file descriptor |
2 |
|
Which command can be used to start X Windows, the window manager, and the default desktop environment |
Startx |
|
Which runlevel halts the system |
0 |
|
The current value for the HOME variable is displayed by which of the following commands |
echo ~ echo $HOME |
|
What number represents the stdin file descriptor |
0 |
|
What Konstruct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on |
for |
|
Term used to describe a process spawning or initiating another process |
forking |
|
You have recently modified the options within the /etc/default/grub file. What command can you use next to rebuild the GRUB2 configuration file |
grub2-mkconfig |
|
What character, when appended to a command, causes the command to be run in the background |
& |
|
When you run the PS command, how are Damon processes recognized |
There is a question mark in the TTY column |
|
The first Damon loaded on a Linux system |
Init |
|
The kill all command terminates what |
All instances of a process with the same name |
|
Which of the following commands will most likely increase the chance of a process receiving more time slices |
renice -12 |
|
After a background process has been started, what command below can be used to move it to the foreground |
fg |
|
To verify hardware settings, you can examine the contents of the blank directory |
/proc |
|
Which of the following system D commands can be used to stop a demon called Lala |
systemctl stop lala.service |
|
What does >> accomplish when entered on the command line after a command |
It appends standard output to a file |
|
Which file does the UNIX sysV init daemon reference on startup to determine the default runlevel |
/etc/inittab |
|
Which process will always have a PID of one and a PPID of 0 |
Init |
|
What command is used to view and modify user jobs scheduled to run with cron |
Crontab |
|
a user-defined variable that can be used by processes that run in sub shells, the variable must be what |
Exported |
|
What kill level signal cannot be trapped |
9 |
|
Which of the following commands can be used to start a UNIX sysV Damon called Lala and run levels 1, 2 & 3? |
chkconfig --level 123 lala on |
|
CFS volumes are mounted at boot time from entries within /etc/fstab by default true or false |
False |
|
Which command can you use during a system rescue to switch from the root of the live is to the root of the Linux system installed on the hard disk |
chroot |
|
Select the meta character that can be used to send the standard output of one command to another command as standard input |
| |
|
What grade level is commonly referred to as disk striping with parity |
5 |
|
What to raid types below utilize disc striping with parity providing protection against one or two drive failures respectively |
5,6 |
|
Lilo needs to be reinstalled after it has been modified True or false? |
True |
|
Where is the /proc file system stored |
Ram |
|
In order to redirect a file to the standard input of a command what metscharacter should be used |
< |
|
You want to view log files to get information about a problem that occurred during a Linux installation. In which directory will you likely find the log files |
/var/log |
|
Which construct can be used in a shell script to read standard and put in place it in a variable |
Read |
|
Which command entered without arguments is used to display a list of processes running in the current shell |
Ps |
|
In Fedora 20, the logging system used to record the messages normally stored within the boot.Log, messages, and syslog files has been replaced by a journaling database system called what |
Journald |
|
Zombie processes are also known as defunkt processes true or false |
True |
|
Which of the following grade levels is not fault tolerant |
0 |
|
Which of the following indicates the second partition on the third hard disk drive to grub |
(hd2,1) |
|
The Blank is a high performance file system and volume management software that was designed for large-scale Linux systems that need to store data on multiple disks, SANs, and remote systems |
ZFS |
|
Insta Dora Lenox, a blank file is a script file that specifies the choices that you would normally choose when you install the operating system |
Kickstart |
|
A list of all exported environment and user defined variables in a shell can be viewed with what command |
env |
|
The standard output and standard error from a terminal screen within the bash shell can be redirected to a file on the file system using what shell made a character followed by the absolute or relative path name of a file |
> |
|
How do you indicate a comment line in a shell script |
Begin the line with # |
|
The alias command can be used to make a shortcut to a single command true or false |
True |
|
What systemd target corresponds to run level 5 |
graphical.target |
|
What is the name given to a process not associated with a terminal |
Daemon process |