OSP201 Old Key (For Reference Only)
OSP201 Old Key (For Reference Only)
|
is a rogue process
When you run the ps command, how are daemon processes recognized? | There is a question
mark in the TTY column.
Which command is used to gain real-time information about processes running on the system,
with the most processor-intensive processes appearing at the beginning of the list? | top
Which command can be used to see processes running in the background? | jobs
The process of sending print jobs from the print queue to the printer is called _________. |
printing
You can clear a log file simply by redirecting nothing into it. True or False? | true
When a printer is disabled, ______________. | the print queue accepts jobs into the print queue
and holds them there until the printer is enabled again
What is the name used to describe a user providing a user name and password to log in to a
system? | authentication
Which command can you use to lock a user account? | usermod -L username
Which command can be used to alter the primary group associated with a given user
temporarily? | newgrp
Which command can be used to send a print job to the default printer named Printer1? (Choose
all that apply.) | lp -d Printer1 file
What is the name of the file that contains a listing of all users on the system and their home
directories? | /etc/passwd
UIDs and GIDs are unique to the system and, once used, can never be reused. True or False? |
False
What is the name of the utility used to rotate log files? | logrotate
You can lock a user account by changing the default login shell to an invalid shell in
/etc/passwd. True or False? | true
When a printer is rejecting requests,_________ | the print queue does not accept jobs and sends a
message to the user noting that the printer is unavailable
When referring to the /etc/rsyslog.conf file, __________specifies information from a certain area
of the system, whereas __________ is the level of importance of that information. | facility,
priority
Most log files on the system are found in which directory? | /var/log
Which file contains default information such as UID and GID ranges and minimum password
length to be used at user creation? | /etc/login.defs
What command can you use to view journald log entries on a system that uses Systemd? |
journalctl
Which command would you use to unlock a user account? | usermod -U username
Along with a listing of user accounts, the /etc/passwd file contains information on account
expiry. True or False? | false
You use lpstat and determine that a user named User1 has placed two large print jobs in the
queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and
Printer1-21, respectively. Which command would you use to remove these two jobs from the
print queue? | cancel Printer1-17 Printer1-21
Which command is used to delete a user account? | userdel username
Most source code is available on the Internet in tarball format. True or False? | true
Which dump level indicates a full backup? | 0
Which filename extension indicates a tarball? | .tar.gz
Files that have been compressed using the compress utility typically have the ___________
extension. | .Z
The bzip2 and gzip utilities use similar compression algorithms. True or False? | false
When compiling source code into a binary program, which command does the compiling using
the GNU C Compiler? | make
The -9 option to the gzip command results in a higher compression ratio. True or False? | true
You have created a full backup and four incremental backups. In which order must you restore
these backups? | 0, 1, 2, 3, 4
Which of the following commands extracts an archive? | cpio -vicdu -I /dev/fd0
The Debian Package Manager (DPM) is the default package manager used by Fedora 20. True or
False? | false
Which of the following commands can be used to list the files contained within an installed
RPM package? | rpm -ql packagename
Which of the following command can be used to remove the test DPM package, including any
test configuration files? | apt -get purge test
To install a new program from RPM software repositories on the Internet, you can use the yum
update programname command. True or False? | false
Which file contains full and incremental back-up information for use with the dump/restore
utility? | /etc/dumpdates
Which of the following represents the first nonrewinding SCSI tape device on a system? |
/dev/nst0
Which option to the dpkg command can be used to list the files that comprise a package? | -L
Which option to the rpm command can be used to remove a package from the system? | -e
Which of the following commands creates an archive? | tar -zcvf /dev/st0 *
When compiling source code into a binary program, which command performs a system check
and creates the Makefile? | ./configure
Which of the following commands can be used to search for packages that contain the word
"oobla" on RPM software repositories? | yum search oobla
A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP
address. True or False? | true
Which Windows program is often used to connect to a Linux server via SSH? | Putty
Stand-alone daemons are started on demand using inetd or xinetd. True or False? | false
Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS
servers are specified within the network configuration file for the NIC? | /etc/resolv.conf
To test DNS configuration by resolving a host name to an IP address, which command or
commands can you use? (Choose all that apply.) | nslookup hostname
Which two commands can be used to modify the route table on a Linux computer? (Choose two
answers.) | ip
Which file holds the methods to be used and the order in which they will be applied for host
name resolution? | /etc/nsswitch.conf
What are two means available to resolve a host name to the appropriate TCP/IP address?
(Choose two answers.) | /etc/hosts
SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False? |
true
What devices are used to transfer information from one network to another? | routers
Which of the following are graphical remote administration technologies? (Choose all that
apply.) | ssh -X
The daemons associated with network services listen for network traffic associated with a
particular ____________. | port
The TCP/IP address of 127.0.0.1 is also referred to as the ___________ . | loopback address
The line that configures the host name for the computer at boot time can be found in
/etc/hostname. True or False? | true
Which command would be used to activate the NIC aliased as eth0? | ifup eth0
Which of the following port numbers is associated with telnet? | 23
Which file would you modify to permanently change the TCP/IP address of the first wired NIC
on a Fedora 20 system? | /etc/sysconfig/network-scripts/ifcfg-eth0
Before a computer can use a router, with what configuration information must it be provided? |
default gateway
Which of the following are stand-alone daemons? (Choose all that apply.) | Apache (httpd)
Which of the following utilities can be used to check TCP/IP configuration and test network
connectivity? (Choose all that apply.) | ifconfig ping netstat -i
which of the following are two logging daemons used on linux systems? | ryslogd, journald
The filename extension given to files compressed with gzip is_____________ | .gz
Log files are typically stored in the________ directory. | /var/log
Which of the following daemons enables Linux to act like a Windows fileserver? | Samba
Which two NTP daemons that are commonly used on Linux systems? | ntpd, chronyd
What is the most commonly used LAN protocols? | TCP/IP
In order to send a print job to a printer using CUPS, what command must be used? | lp
What kind of servers resolve fully qualified domain names to IP addresses for a certain
namespace on the Internet? | DNS
The daemons associated with network services listen for network traffic associated with a
particular_____ | port
Network interfaces can be configured automatically using _____ | DHCP
What command can be used to troubleshoot routing by displaying all routers between the current
computer and a remote computer? | traceroute
The Red Hat Package Manager is the default package manager used by Fedora 20. True or
False? | True
To change the primary group temporarily to another group that is listed in the output of the
"groups" and "id" command, you can use which below? | newgrp
Which of the following commands can be used to search for packages that contain the wor "
oobla" on RPM software repositories? | yum search oobla
What command looks for a Makefile and uses the information within to compile the source code
into binary programs using the appropriate compiler program for the local hardware
architecture? | make
IPv6 IP addresses are delimited by what character below? | :
Which filename extension indicates a tarball that is not using a compression utility? | .tar
What are two means available to resolve a host name to the appropriate TCP/IP addresses | DNS,
/etc/hosts
Select the command that can be used to send a small TCP/IP packet to another IP address and
await a response? | ping
Which command should be used to restrict access to printers? | lpadmin
What option can be added to the "userdel" command to remove the home directory of the target
user??? | -r
The ______ option can be used with the tar command to extract a specified archive | -x
RPM packages that require other RPM packages to be installed on a system prior to being
installed creates a relationship known as??? | package dependency
What is the subnet mask for a Class C IP address? | 255.255.255.0
Where is the skeleton directory located on most Linux systems? | /etc/skel
What two daemons can be used to start and manage connections for smaller network daemons
such as "telnet" and "rlogin" | inetd, xinetd
What two commands below can be used to modify the password expiry information and a user's
default shell? | chage, chsh
The filename extension given to files compressed with bzip2 is ______ | .bz2
What directive below in Apache's httpd.conf file specifies that the index.html file in the
document root directory will be sent to clients who request a n HTML document? |
DirectoryIndex index.html
Select the two numbers below that represent the number of bits needed to make an IPv4 or IPv6
IP address | 32, 128
adding the -t option to what command below will provide a list of all printers on the system and
their status? | lpstat
A subnet mask is used to differentiate the host portion from the network portion in a IPv4
address. True or False? | True
Mary is a system administrator in your organization. She has recently made changes to the
DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes.
What should she do? | Restart the DHCP daemon
What option can be added to the rpm command in order to query packages? | -q
In order to download DPM packages, what command should be used below? | apt-get
The Apache daemon listens for HTTP requests on what port by default? | TCP 80
What tool below was designed as a secure remote access utility that encrypts information that
passes across the network? | Secure Shell (SSH)
Before a computer can use a router, what configuration information must it be provided? |
default gateway
What Linux command can be used to assign a TCP/IP configuration to a NIC as well as view the
current configuration of all network interfaces? | ifconfig
On Linux, the root user always has a UID of what number? | 0
In order to create user accounts on a Linux system, what command should be utilized? | useradd
A list of all exported environment and user-defined variables in a shell can be viewed with what
command below? | env
What terms describe a computer connected to a remote hard disk via iSCSI and the remote hard
disk? | iSCSI initiator, iSCSI target
Which two implementations of X Windows are commonly used in Linux? | X.org, XFree86
ZFS volumes are mounted at boot time from entries within /etc/fstab by default. True or False? |
False
What character when appended to a command, causes the command to be run in the
background? | &
The term used to describe a process spawning or initiating another process is referred to as
______ | forking
In Fedora Linux, a ______ file is a script file that specifies the choices that you would normally
choose when you install the operating system | kickstart
In Fedora 20, the logging system used to record the messages normally stored within the
boot.log, messages and syslog files has been replaced by a journaling database system called????
| journald
What systemd target corresponds to runlevel 5? | graphical.target
When you run the "ps" command, how are daemon processes recognized? | There is a question
mark in the TTY column
What does >> accomplish when entered on the command line after a command? | It appends
Standard Output to a file
What number represents the stdin file descriptor? | 0
The first daemon loaded on a Linux system is ______________ | init
Which of the following Systemd commands can be used to sop a daemon called lala? | systemctl
stop lala.service
Which of the following commands can be used to start a UNIX SysV daemon caled lala in
runlevels 1,2, and 3 | chkconfig --level 123 lala on
The ________ is a high performance filesystem and volume management software that was
designed for large-scale Linux systems that need to store data on multiple disks, SANs, and
remote systems. | ZFS
What number represents the stderr file descriptor? | 2
In order to redirect a file to the standard input of a command, what metacharacter should be
used? | <
The standard output and standard error from a terminal screen within the BASH shell can be
redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or
relative pathname of the file. | >
Zombie processes are also known as defunt processes. True or False? | False
After a background process has been started, what command below can be used to move it to the
foreground? | fg
The current value for the HOME variable is displayed by which of the following commands? |
echo $HOME, echo ~
Which of the following statements is true? | LILO needs to be reinstalled after it has been
modified
Before a user defined variable can be used by processes that run in subshells, the variable must
be ______________ | exported
You want to view log files to get information about a problem that occurred during a Linux
installation. IN which directory will you likely find the log files? | /var/log
Which construct can be used in a shell script to read Standard Input and place it in variable? |
read
The alias command can be used to make a shortcut to a single command. True or False? | True
How do you indicate a comment line in a shell script? | Begin the line with #
Which process will always have a PID of 1 and a PID of 0? | init
What two RAID types below utilize disk striping with parity, providing protection against one or
two drive failures respectively? | RAID 6, RAID 5
To verify hardware settings, you can examine the contents of the ________directory. | /proc
Where is the /pro filesystem stored? | in RAM
The killall command terminates | all instances of a process with the same name
What RAID level is commonly referred to as disk striping with parity? | RAID5
What construct is intended for use in processing a list of objects, such as files, directories, users,
printers and so on? | for
A hard drive or SSD can be divided into partitions. What is the maximum number of primary
partitions that can be used on these devices? | 4
After a shell is no longer needed, what command can be given to exit the shell? | exit
After logging into a terminal, a user will receive an interface known as which option below? |
shell
If a files permissions are set to 750, what permissions are available to the group assigned to the
file? | read, execute
If enough unique letters of a directory name have been typed, what key can be pressed to
activate the BASH shells completion feature? | Tab
In a file's mode, a permission that is unavailable is represented by what character? | -
In Linux, the core component of the GUI is known as: | X Windows
In order to create a hard or soft link, what command must be used? | ln
In order to move from the /home/joe/test/data to the /home/joe directory, what command below
should be used? | cd ../..
select the command below that can be used to provide a long listing for each file in directory | ls
-l
Select the command below that shows the size of a directory and its contents in kilobytes | du
Select the command that can be used to create partitions that will be stored in an MBR after
installation | fdisk
The contents of a certain variable in memory can be viewed using which metacharacter below in
combination with the "echo" command? | $
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?
| /root
The Linux kernel was developed and released in 1991 by: | Linus Torvalds
The quotas for certain users can be edited by using which command? | edquota
The "mkfs" command can be issued with what switch in order to specify a filesystem type? | -t
To display the contents of a text file called data, what command should be used? | cat data
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what
command can be used? | mount -a
What command below takes a list of arguments specifying the absolute or relative pathnames of
files to remove? | rm
What command can be issued to confirm what directory you are in at a command line prompt? |
pwd
What command can be used to check different kinds of filesystems on Linux for errors? | fsck
What command can be used to copy files? | cp
What command can be used to display the last five lines of a text file? | tail -5
What metacharacter can be used to refer to the current user's home directory? | ~
What metacharacter indicates background command execution? | &
What piece of software tells the operating system how to use a specific hardware device? |
device driver
What term describes the physical hardware and the underlying operating system upon which a
virtual machine runs? | virtual host
When using command line terminal, specific letters that start with a dash ("-") and appear after
command names are considered to be | options
When using chmod command, the mode rwx can be represented by which number? | 7
When viewing the version number for a Linux kernel, what number indicates the stability of the
kernel? | minor number
Which command below provides the easiest method for monitoring free space on mounted
filesystems? | df
Which Linux command can be utilized to display your current login name? | whoami
GNU stands for _____ | GNU's not UNIX
if DATA is the name of a file in the /user1/home directory and your present working directory is
/user1/home, what is the relative name for the file named DATA? | DATA
One of the most commonly used metacharacters is the _____ character, which tells the shell that
the following text refers to a variable. | $
Select the mode below that corresponds to r-x | 5
The core component of the Linux operating system is the Linux ___________ | kernenl
The __________ command is used to display lines in text files that match a certain common
regular expression | grep
The ___________ command prints text to the terminal screen.. | echo
What key do you press to quit the less command? | q
What two commands below can be used to locate files on a filesystem? | find, locate
When the core components of the Linux operating system are packaged together with other
Open Source Software, it is called a | Linux Distribution
Which common GUI environments are available in most LInux Distributions? | GNOME, KDE
You plug a USB flash memory drie into a system that has two SATA hard disks. What will the
partition on this USB flash memory drive be recognized as to the Linux system? | /dev/sdc1
You want to see the filesysems that are presently i use on the system. What command could you
use? | mount
Open Source Software is freely developed and continuously improved by a large community of
software developers. True or False? | true
After a partition on a hard disk drive is formatted with a filesystem, all partitions on that hard
disk drive must use the same filesystem. True or False? | False
LInux commands are case sensitive. | true
On which part of the mainenance cycle do linux administrators spend the most time? |
monitoring
What are the best practices for securing a local linux server | lock the server in a closet
What type of iptables chain target traffic that is destined for the local computer? | input
What will the command sar -W 3 50 do? | take 50 swap statistics every 3 seconds
when performing a sar -u command, you notice that %idle is consistently 10%. Is this good or
bad? | bad, because the processor is idle 10% of the time and perhaps a faster CPU is required
which command can increase the number of filehandles that programs can open in a shell | ulimit
which command indicates the shared libraries required by a certain executable program? | ldd
which file contains information regarding the users, computers, and commands used by the sudo
command? | /etc/sudoers
which of the following actions should you first take to secure your linux computer agains
network attacks? | ensure that only necessary services are running
Common asssistive technologies | high contrast sticky key mouse keys on-screen keyboard
which of the following commands can be used to display memory statistics? | sar free vmstat
which of the following commands can be used to scan the available ports on computers within
your organization? | nmap
which of the following files is likely to be found in the /var/log/sa directory on a Fedora 20
system over time? | sa19
You type history -c at a bash command prompt. What will be the result? | The command history
will be cleared (deleted).
Which of the following commands is used to append the list of files in the /tmp directory to an
existing file named deletelater.txt? | ls /tmp >> deletelater.txt
Fill in the blank by selecting the appropriate option from the list. | The --lines=lines option to the
split command splits a file into chunks with no more than the specified number of lines.
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-
based network. You want to save a list of the current processes running on the system to the
ProStat.txt file. Which of the following commands will you use to accomplish the task? | ps >
ProStat.txt
What is the purpose of the cut command? | It extracts information from within lines of a file.
Richard created a document on his Linux system. He finds all the characters in uppercase and
tries to convert all those uppercase characters to lowercase characters. Which of the following
commands should he run to get his task done? | tr
How do grep and egrep differ? | The grep command uses basic regular expressions by default,
whereas egrep uses extended regular expressions by default.
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-
based network. John is working as a root user on the Linux operating system. He has stored all
user names, one name per line, in the file named users.txt. Now, he wants to search for such user
names that does not contain the letter D. Which of the following commands will John use to
accomplish his task? | grep -v D users.txt
Drag the dpkg primary actions to match them with their descriptions. | -r or --remove Removes a
package but leaves configuration files intact
Mark works as a Network Administrator for Perfect Solutions Inc. He wants to install a non-
Debian package on the Debian system. Therefore, he has to run a command to convert a non-
Debian package into a Debian format. Which of the following commands should Mark use to
accomplish the task? | alien -i packagename
Which of the following commands will you use to remove a Debian file along with its
configuration files? | dpkg --purge
Each correct answer represents a complete solution. Choose two. | dpkg --remove
You want to convert the my_package.rpm rpm package into the Debian package. Which of the
following commands will you use to accomplish the task? | alien --to-deb my_package.rpm
Which of the following commands lists all partially installed Debian packages on the Linux
operating system and also suggests what to do with them to get them working correctly? | dpkg -
C
Which of the following files stores the default configuration settings of the dpkg files? |
/etc/dpkg/dpkg.cfg
Each correct answer represents a complete solution. Choose all that apply. | A tarball is an
archive file created by tar and optionally compressed with gzip or bzip2.
What is the function of the following command? | It sets the value of the environment variable
$THEFILE to /usr/local/bin/theprogram.
Each correct answer represents a complete solution. Choose two. | /etc/ld.so.conf
Which of the following commands can be used to display the ld.so.cache file? | ldconfig
Drag the commands from the bottom onto their matching functions on the top. | screen: Offers
the ability to detach a long running process (or a program, or a shell-script) from a session and
then attach it back at a later time.
Each correct answer represents a complete solution. Choose all that apply. | pgrep
How would you direct the output of the uptime command to a file called uptime-stats.txt? |
uptime > uptime-stats.txt
Each correct answer represents a complete solution. Choose two. | killall
Each correct answer represents a complete solution. Choose three. | ps -aux | grep cc
ps -aux | more
You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based network.
You have configured a database server in the network. Users complain that the server has
become remarkably slow. However, the previous day, the server was performing well. You
know that some of the processes may be the cause of the issue. You run the ps command on the
server. While reviewing this output, which information will you look at that suggests the
problematic process? | A high CPU time
Which of the following is the most frequent use of IRQ 14? | Primary IDE or ATA controller
Execute the command to see how PCI devices are connected to the PCI bus in your system in a
tree structure. | lspci -t
Fill in the blank with the appropriate command. | You can add a new kernel module in the Linux
operating system by using the insmod command.
Each correct answer represents a complete solution. Choose two. | usbmgr
You have to create a primary partition on one of your hard disk in a Linux system. How many
primary partitions can you create? | 4
Execute the command to create the ext3 filesystem on the /dev/sda1 partition. | mkfs -t ext3
/dev/sda1
Which of the following commands is used to create the extended ext2/ext3 filesystem on a
partition? | mke2fs
You are configuring a new hard disk on your Linux server. The new hard disk will become the
second hard disk of the server. You use the fdisk command to make it a single partition drive.
You want to format the partition with the ext2 filesystem. Which of the following commands
will you use to accomplish this? | mkfs -t ext2 /dev/hdb1
Each correct answer represents a complete solution. Choose two. | Creating swap space on a
primary partition
You work as a Network Administrator for Net World International. You have installed a Linux
server on the company's network. Users report that they are unable to write on a filesystem. You
verify that there is no free space available on the hard disk drive. You mount another hard disk
drive to resolve the issue. How will you prevent the issue from happening again? | Track the
amount of free space on the hard disk.
You want to mount all partitions listed in /etc/fstab. Which of the following commands will you
use? | mount -a
You want to allow a user to unmount a filesystem that the user has mounted. Which of the
following options will you add in the /etc/fstab file? | user
Which of the following files lists the filesystems to be mounted automatically at startup? |
/etc/fstab
A system contains a file, /usr/share/important.txt. You want to create a link to this file in the
/usr/local directory, which is on another partition. Which of the following commands will
accomplish this goal? | ln -s /usr/share/important.txt /usr/local/important.txt
Each correct answer represents a complete solution. Choose two. | The rm command can remove
files.
Which of the following commands will change the modification time of a file named foo.txt? |
touch foo.txt
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-
based network. You are a root user on the Red Hat operating system. You want to grant
ownership of the foofile file to a user named John. Which of the following commands should
you use to accomplish this task? | chown John foofile
Drag the permission strings to match them with their descriptions. | rwxrwxrwx Read, write, and
execute permissions for all users.
You want to temporarily change your primary group to another group of which you are a
member. In this process, a new shell will be created, and when you exit the shell, your previous
group will be reinstated. Which of the following commands will you use to accomplish this
task? | newgrp
Each correct answer represents a complete solution. Choose two. | The file can be read by its
owner.
What is the most likely cause? | David does not have the write permission on the directory.
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-
based network. John is working as a root user on the Linux operating system. Which of the
following commands will he use to create a report of the disk quota of all users? | repquota
You want to enable group quota support on a filesystem. Which of the following options will
you add on the /etc/fstab file to accomplish the task? | grpquota
In what directory tree are you most likely to find programs compiled by the system administrator
for general use (accessible by standard user accounts)? | /usr/local
Which of the following options is used with the lilo command to test the changes made in the
LILO configuration file? | -t
How can you search for text in vi? | Type the slash key (/) followed by the text you want to find
while in command mode.
Note: You can execute the runlevel command to find the current and previous runlevels. | telinit
How do the commands shutdown -r now and shutdown -h now differ? | The first command
reboots the computer; the second halts the computer (that is, turns it off, if the motherboard and
kernel have appropriate support).
Each correct answer represents a complete solution. Choose three. | processes that start during
boot up
Which of the following commands can be used to list the installed services and their associated
runlevels? | chkconfig
Each correct answer represents a complete solution. Choose two. | 0
Which of the following commands issues a warning to logged-in users before the shutdown
process begins in a Linux server? | shutdown
Which configuration file must be edited to alter the runlevel? | /etc/inittab
Drag the systemctl commands from the bottom onto their matching functions on the top. | enable
name Configures the unit to start when a computer next boots
Which of the following commands exits vi without saving changes? | :q!
proprietary software? | Typically, open source software vulnerabilities are immediately made
public.