Chapter 4, 5, 6 Flashcards
To move files, you can use the mv command.
1) True
2) False
1) True
The rmdir command automatically removes a directory and all of its subdirectories and files.
1) True
2) False
2) False
You can use wildcard metacharacters with the find command.
1) True
2) False
1) True
When using the chmod command, if there is no character specifying the category of user to affect, only the group category is affected.
1) True
2) False
2) False
The SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file.
1) True
2) False
1) True
To create a subdirectory, you would use the makedir command.
1) True
2) False
2) False
When working with files, the special metacharacter “..” specifies the current directory.
1) True
2) False
2) False
When using the find command, the -size x criteria is used to search for files with a size greater than x.
1) True
2) False
2) False
The PATH variable lists directories that are searched for executable files if a relative or absolute pathname was not specified when executing a command on the command line.
1) True
2) False
1) True
The execute permission for a file allows a user the ability to execute the file in memory (if it is a program file or a script).
1) True
2) False
1) True
In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader.
1) /load
2) /bin
3) /boot
4) /mnt
3) /boot
In the FHS, the ____ directory is the root user’s home directory.
1) /bin
2) /home
3) /boot
4) /root
4) /root
In the FHS, the ____ directory contains most system commands and utilities.
1) /usr
2) /root
3) /bin
4) /home
1) /usr
Copying a file can be accomplished using the ____ command.
1) copy
2) mv
3) cp
4) cpy
3) cp
The ____ command takes a list of arguments specifying the absolute or relative pathnames of files to remove.
1) del
2) rm
3) remove
4) delete
2) rm
The fastest method to search for files in the Linux directory tree is to use the ____ command.
1) search
2) id
3) find
4) locate
4) locate
You can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command.
1) $
2) *
3) &
4) #
1) $
The ____ section of a filesystem is the section that contains information about the filesystem in general.
1) inode table
2) inode
3) data blocks
4) superblock
4) superblock
To create a hard link, you must use the ____ command.
1) ln
2) link
3) lnk
4) lk
1) ln
The chgrp command takes ____ argument(s) at minimum.
1) one
2) two
3) three
4) four
2) two
The section of an inode that stores permissions is called the ____ of the file.
1) tail
2) head
3) mode
4) accessor
3) mode
In a file’s mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode.
1) *
2) +
3) ?
4) -
4) -
If a user has ____ permission for a file, they can open, read, and edit the contents of a file.
1) write
2) execute
3) read
4) alter
1) write
When using the chmod command for a specific file, the ____ argument would add read permission and remove write permission for the group permissions.
1) u+r+w
2) g-r+w
3) g+r-w
4) o+r-w
3) g+r-w
When using the chmod command, the mode rwx can be represented by the number ____.
1) 0
2) 1
3) 7
4) 8
3) 7
To set all of the special permissions on a certain file or directory, you can use the command ____, where name is the name of the file or directory.
1) chmod 777 name
2) chmod 7777 name
3) chmod 6666 name
4) chmod 0000 name
2) chmod 7777 name
Can the mv command be used to rename files?
1) Yes
2) No
1) Yes
Does the find command use a pre-made index of files to locate a file?
1) Yes
2) No
2) No
Do symbolic links share the same inode and inode number?
1) Yes
2) No
2) No
Should most files residing in a user’s home directory be owned by that user?
1) Yes
2) No
1) Yes
Are permissions additive?
1) Yes
2) No
2) No
___________________________________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.
FHS
To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -R option
recursive
The ____________________ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.
which
To create a(n) ____________________ link, you use the -s option to the ln command.
symbolic
When a user creates a file or directory, that user’s name and ____________________ becomes the owner and group owner of the file, respectively.
primary group
Command used to quickly create an empty file.
touch
Command used to change the ownership of a file or directory.
chown
Command used to test network connectivity.
ping
Special variable on the system used to take away permissions on new files and directories immediately after they are created.
umask
Command used to change the permissions for a certain file or directory.
chmod
Command used to view your group memberships and primary group.
groups
Command used to view your current user name.
whoami
Command used to change the group owner of a file or directory.
chgrp
Command used to displays BASH shell aliases.
alias
A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator.
1) True
2) False
1) True
When you use disk imaging software to write a Linux ISO image onto a USB flash drive, the filesystem existing on the flash drive is maintained.
1) True
2) False
2) False
To perform a Linux installation over a network, you can connect to a server with the appropriate installation files via FTP.
1) True
2) False
1) True
The BIOS configurations on different computers are generally very similar or exactly the same.
1) True
2) False
2) False
You can use a small bootable Linux kernel to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers.
1) True
2) False
1) True
Up to 100,000 Serial Attached SCSI hard disks can be connected to a single SCSI controller via serial cables with small serial connectors.
1) True
2) False
2) False
RAID level 4 configurations are not fault tolerant.
1) True
2) False
2) False
RAID level 3 requires a minimum of three hard disk drives to function.
1) True
2) False
1) True
It is good form to check the installation log files after installation as well as verify settings on the system after installation to ensure that all hardware was detected with the correct values.
1) True
2) False
1) True
Normally, kickstart files are text files.
1) True
2) False
1) True
Each SCSI device is assigned a unique ID number known as a(n) ____.
1) device ID
2) target ID
3) SCSI number
4) SCSI controller
2) target ID
Most Parallel SCSI controllers support up to ____ devices.
1) 12
2) 13
3) 14
4) 15
4) 15
The highest priority SCSI device is given a SCSI ID of ____.
1) 1
2) 6
3) 7
4) 15
3) 7
The ____ standard support speeds of up to 80 MB/second.
1) SCSI-3 Ultra2 Wide
2) SCSI-2 Wide
3) SCSI-3 Ultra
4) SCSI-3 Ultra3 Wide
1) SCSI-3 Ultra2 Wide
RAID level ____ is often referred to as disk mirroring.
1) 1
2) 2
3) 3
4) 4
1) 1
RAID level ____ is commonly referred to as disk striping with parity.
1) 0
2) 1
3) 5
4) 6
3) 5
A Fedora 13 CD installation requires ____ CDs.
1) two
2) four
3) six
4) ten
3) six
In Fedora Linux, a ____ file is a script file that specifies the choices that you would normally choose when you install the operating system.
1) setup
2) startup
3) kickstart
4) scriptstart
3) kickstart
Any line in a kickstart file that starts with a(n) ____ symbol is a comment line and is ignored by the installation program.
1) *
2) #
3) $
4) %
2) #
If a Linux installation ends abnormally and the screen displays a “fatal signal ____” error message, it indicates an error known as a segmentation fault.
1) 0
2) 1
3) 10
4) 11
4) 11
Some installations fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders.
1) 256
2) 512
3) 1024
4) 2048
3) 1024
____ installation log file(s) is/are created by the Fedora installation program.
1) One
2) Two
3) Three
4) Four
2) Two
To verify hardware settings, you can examine the contents of the ____ directory.
1) /log
2) /root
3) /proc
4) /hw
3) /proc
To ensure that Linux has detected the correct amount of RAM in the system after installation, you can view the contents of the ____ file.
1) /proc/mem
2) /proc/cpuinfo
3) /proc/memoryinfo
4) /proc/meminfo
4) /proc/meminfo
The ____ file in the /proc directory contains a list of memory address ranges reserved for device use.
1) meminfo
2) ioports
3) iomem
4) misc
2) ioports
The ____ file in the /proc directory contains statistics on the performance of the processor.
1) cpuinfo
2) modules
3) kcore
4) loadavg
4) loadavg
If a hard disk fails in a RAID level 0 configuration, is all of the data lost?
1) Yes
2) No
1) Yes
Can you install Linux from ISO image files on a hard disk?
1) Yes
2) No
1) Yes
Can disk imaging software be used to perform a Linux installation?
1) Yes
2) No
1) Yes
Can you use a Kickstart Configurator to make major changes to a kickstart file?
1) Yes
2) No
1) Yes
In a laptop computer, can changes to the BIOS be retrieved if the battery dies?
1) Yes
2) No
2) No
There can be multiple device files per device.
1) True
2) False
2) False
After a typical Fedora Linux installation, over 700 different device files are in the /dev directory.
1) True
2) False
1) True
In Linux, you must use only one type of filesystem on a system.
1) True
2) False
2) False
When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD.
1) True
2) False
1) True
The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations.
1) True
2) False
1) True
Device files that represent disks, such as floppy disks, CD-ROMs, DVDs, USB flash drives, and hard disks, are typically character device files because a fast data transfer rate is preferred.
1) True
2) False
2) False
When a device is mounted, it is attached to a certain directory on the directory tree called a(n) mount point.
1) True
2) False
1) True
To check whether the /mnt/floppy directory is being used by any users, you can use the fuser command with the -u option
1) True
2) False
1) True
PATA hard disk drives typically have faster data transfer speeds, and most systems allow for the connection of more than four such hard disks.
1) True
2) False
2) False
To view the size of a directory and its contents in Kilobytes, you can use the du command.
1) True
2) False
1) True
Devices that transfer data in a character-by-character fashion are referred to as ____ devices.
1) text
2) block
3) character
4) binary
3) character
The ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave).
1) /dev/hdc1
2) /dev/hdb1
3) /dev/hda1
4) /dev/hdc2
2) /dev/hdb1
The ____ device file represents the second serial port on the system (COM2).
1) /dev/ttyS0
2) /dev/tty2
3) /dev/tty1
4) /dev/ttyS1
4) /dev/ttyS1
If you do not know the type, major, or minor number of a device, you can use the ____ command to re-create the device based on the common name.
1) /dev/MAKEDEV
2) mkfs
3) mknod
4) /dev/makedevice
1) /dev/MAKEDEV
The ____ filesystem is used by software programs that write to a CD-RW or DVD-RW drive.
1) ntfs
2) udf
3) ext2
4) hpfs
2) udf
The ____ filesystem contains most of the operating system files.
1) boot
2) data
3) mnt
4) root
4) root
To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.
1) -t
2) -f
3) -c
4) -o
1) -t
CD-ROMs typically use the ____ filesystem type.
1) ntfs
2) ext2
3) iso9660
4) ext3
3) iso9660
Linux requires ____ partition(s) at minimum.
1) one
2) two
3) three
4) four
2) two
Data is read off of hard disks in concentric circles called ____.
1) tracks
2) blocks
3) sectors
4) cylinders
1) tracks
To create partitions after installation, you can use the ____ command.
1) format
2) formatdisk
3) fdisk
4) partition
3) fdisk
The easiest method for monitoring free space by mounted filesystems is to use the ____ command.
1) df
2) fs
3) dfs
4) fd
1) df
Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.
1) breaks
2) corruption
3) degradation
4) failures
2) corruption
To check a filesystem for errors, you can use the ____ command, which can check filesystems of many different types.
1) fcheck
2) fsc
3) fscheck
4) fsck
4) fsck
You can edit the quotas for certain users by using the ____ command.
1) edquota
2) editquota
3) quota
4) repquota
1) edquota
Can several different devices share the same major number?
1) Yes
2) No
1) Yes
Is ext3 the traditional filesystem used on Linux?
1) Yes
2) No
2) No
Can any existing directory can be used as a mount point?
1) Yes
2) No
1) Yes
If a device is mounted to a directory that contains files, are those files temporarily covered up until the device is unmounted?
1) Yes
2) No
1) Yes
Can CD-ROMs be ejected from the CD-ROM drive before the CD-ROM is properly unmounted?
1) Yes
2) No
2) No
If you find a corrupted device file, or accidentally delete a device file, the ____________________ command can be used to re-create the device file if you know the type, major, and minor numbers.
mknod
Creating a filesystem on a device is commonly referred to as ____________________.
formatting
At installation, Fedora Linux creates a symbolic link called ____________________ to the correct device file for your first CD-ROM drive.
/dev/cdrom
Each track on a hard disk is divided into ____________________ of information.
sectors
An extended partition can contain many subpartitions called ____________________.
logical drives
Indicates a particular device.
minor number
File that contains a list of devices that are currently used on the system and their major numbers.
/proc/devices
File on the hard disk representing a device on a Linux system
device file
Command used to create modify filesystem parameters.
tune2fs
Directory that stores device files.
/dev
The first readable sector of a hard disk, where partition definitions are stored.
MBR
Hard disk quotas that the user can exceed for a certain period of time.
soft limits
Rigid quota limits that the user cannot exceed.
hard limits
Points to the device driver for a device in the Linux kernel.
major number
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, you can simply type the ____ command.
1) mount -o
2) mount -f
3) mount -u
4) mount -a
4) mount -a