CompTIA Linux+ Exam Study Guide Flashcards

1
Q

What are the stages of the Boot Process?

A

1) BIOS/UEFI POST
2) Boot Loader
3) Kernel Initializations
4) Start the System Initialization Processes (says or systemd)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BIOS / UEFI

A

This is the Basic Input Output System, a firmware that is on the mainboard that is used to initialize the hardware on the system. The process is called the Power On Self Test (POST) and it ensures that all of the connected devices are initialized and responding before passing over control to the bootloader. Most recently, the BIOS system has been replaced by the Unified Extensible Firmware Interface that performs the same tasks as the BIOS, but it has additional capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Boot Loader

A

This is the program that loads the operating system for the computer. It takes over once the POST has completed. On Linux, the most common bootloaders are GRUB (the GRand Unified Bootloader, also called legacy GRUB), and its updated replacement GRUB2, now simply referred to as GRUB. The bootloader is configured with the location of the desired operating system kernel which it loads into memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kernel Initialization

A

The loaded Kernel will extract itself from a compressed image that is located in the /boot directory and then load the system initialization daemon. On older systems this was sysv-init , but on modern systems this is systemd . Once the kernel and the system initialization daemon are running, the system can start.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe System Initialization

A

The system initialization daemon mounts the devices located in fstab , and proceeds to boot the system into the default run level. Once the process has completed the system is considered booted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Boot Options

A
  • Boot from ISO: This process uses a ISO image, that is mounted as a drive, to load the kernel.
  • PXE: The Pre-EXacutable environment is a client environment that searches for an appropriate server on the network from which to acquire a boot image. Once this image has been located, it is downloaded using the trivial file transfer protocol (tftp)
  • Boot from HTTP/HTPS: This process allows the image to be loaded using standard networking protocols.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe Boot File Locations

A

Most configuration files for the boot process are in the /boot directory. Exceptions to this can be the GRUB files that can be located in different places, depending on the BIOS / UEFI specifications of the system. Most often they are found in one of the following:
• /etc/grub/
• /etc/grub2.cfg
• /boot/grub or /boot/grub2 • /boot/efi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe mkinitrd

A

This command will create the initial ramdisk is used by the kernel to preload block devices that are needed to access the root filesystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

dracut

A

This command is similar to mkinitrd and results in an initial ramdisk the kernel can use to load block devices that are needed to access the root filesystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

grub2-install

A

This command is used to install the GRUB2 boot loader onto a device, which includes necessary images as well as creating the boot sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

grub2-mkconfig

A

This command is used for creating a configuratuion file for use by GRUB2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

initramfs

A

This is a complete set of root file system directories, bundled into a cpio archive and compressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

efi files

A

These files are used by the UEFI bootloader and comprise the efi partition. They are normally located at /boot/efi/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

vmlinuz

A

This is the name of the Linux kernel executable. It is a compressed kernel that is capable of loading the operating system into memory (Virtual Memory LINUX gZip)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

vmlinux

A

This is a statically-linked executable file that contains the Linux kernel. It can be used in debugging. In contrast to vmlinu(z), this file is not compressed (Virtual Memory LINUX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe Kernel Panic

A

A Kernel Panic is a situation where the kernel discovers an unrecoverable error and it is not able to recover from that error without risk of data loss. This normally results in a bug check error being printed to the screen, followed by a memory dump prior to either waiting for a manual reboot or automatically rebooting once the memory dump is completed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the lsmod command used for?

A

lsmod lists the currently loaded modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

insmod

A

Inserts a module into the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

modprobe

A

Loads or removes a loadable kernel module to or from the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

modinfo

A

Extracts information about a kernel module that is provided to the command on the command line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

dmesg

A

Prints the message buffer of the kernel:

–This output usually contains messages from device drivers and kernel modules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

rmmod

A

Removes modules from the kernel, but not modules that are in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

depmod

A

Creates a list of module dependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

/usr/lib/modules/[kernelversion]

A

This is location of the kernel modules specific to a release of the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

/usr/lib/modules

A

This is the parent location for module storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

/etc/modprobe.conf

A

This is the file that contains the options that can be configured for modprobe. It is
scheduled to be deprecated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

/etc/modprobe.d/

A

This is the location of the modprobe configuration files. It is the replacement for /etc/
modprobe.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

ping

A

Leverages the ICMP protocol to get an echo response from a host that is passed to it on the command line, either as a hostname or an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

netstat

A

Used to print network connections, routing tables, and many other pieces of information about the network status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

nslookup

A

Queries the DNS system to resolve a domain name to an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

dig

A

Short for Domain Information Groper, use for interrogating DNS name servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

host

A

Simple tool for DNS lookups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

route

A

Manipulates the kernel’s routing table, and can be used to set static routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ethtool

A

Used to configure and manipulate network device drivers and connections
- It is mostly used for wired connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

ss

A

Dumps socket statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

iwconfig

A

Configures and displays information about wireless network interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

nmcli

A

Command line tool used for controlling NetworkManager and getting its status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

brctl

A

Manages ethernet bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

nmtui

A

Similar to mncli, and provides a text interface that shows options for the tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Where is the location of the network interface configuration scripts used to manipulate the network interfaces

A

/etc/sysconfig/network-scripts/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

/etc/sysconfig/network/

A

This is the location of more general network configurations that are not specific to an interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

This is the file that is the store for local DNS resolution

A

/etc/hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

This is the location of the network configuration files

A

/etc/network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

This is the file that is used to determine the sources from which to obtain name-
service information

A

/etc/nsswitch.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

This is the file that contains the list of external DNS servers

A

/etc/resolv.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

This is the location of files that can be used to configure networking on newer systems.

A

/etc/netplan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

This file is used to override default kernel parameter values

A

/etc/sysctl.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

This file is used to configure the DHCP client

A

/etc/dhcp/dhclient.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Aggregation

A

This is the process of combining several network connections in parallel, to increase network throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Active/Passive

A

This is a type of load balancing in which one side is the active side. The other side is passive and is held in reserve, in the event of the active side experiencing a failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Load balancing

A

This is the process of distributing network traffic across multiple resources, to ensure that no single resource experiences resource exhaustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Basic Partitions in Linux

A

There are several types of partitions in Linux, These are different than file systems, and partitioning a device is simply dividing it. A partition can span the entire device, or be smaller pieces of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is a raw device?

A

A raw device is a special type of logical device. It is associated with a character device file that allows it to be accessed directly, without using the operating systems buffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Describe GPT

A

Short for GUID Partition Table, this type of partition table allows a device to be divided into a nearly unlimited number of partitions, depending on the operating system. GPT also allows for much larger drives, again limited by the operating system and the file system that will be used in the partition. GPT also stores multiple copies of its partition table in several locations on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Describe MBR

A

The Master Boot Record is a partition table that stores its partition data in a special boot sector, and has a 2TB limit in total drive size. MBR only supports 4 primary partitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is a real file system?

A

A real file system is a type of file system that exists on a device. It is physically mounted to the machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is a virtual file system?

A

A virtual file system exists in memory and does not actually physically exist on a device. Once the computer is powered off, the virtual file system no longer exists. One example of this would be /proc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Describe a relative path

A

A relative path is one that is dependent on the directory that you are currently in, such as ./example , where this means the object example in the current directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Describe an Absolute Path

A

An absolute path is one that is not dependent on the current directory, such as /home/user/example . This is the absolute location of the file example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is a device mapper?

A

The Device Mapper is a framework in Linux that allows the mapping of physical devices to logical file volumes. It provides the following services

A logical volume is a volume that can be made up of multiple physical partitions. The Logical Volume Manager (LVM) is used to mange these Volumes.

mdadm is a command line tool that allows the management of Redundant Array of Independant Disks (RAID) that are created using the device mapper.

Multipath is a storage technology that lets us use more than one method of accessing storage devices. This allows for load balancing and high availability of the storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Describe a logical volume

A

A logical volume is a volume that can be made up of multiple physical partitions. The Logical Volume Manager (LVM) is used to mange these Volumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Describe mdadm

A

mdadm is a command line tool that allows the management of Redundant Array of Independant Disks (RAID) that are created using the device mapper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Describe Multi-path

A

Multipath is a storage technology that lets us use more than one method of accessing storage devices. This allows for load balancing and high availability of the storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Describe File System Types

A

ext3 : The 3rd extended file system was introduced in 2001 and it included journaling. It is limited by individual file size of 2TB and an overall system size of 32TB
ext4 : The 4th extended file system was introduced in 2008. It includes journaling too, but also allows for huge file sizes. Individual files can be up to 16TB and system size can be up to 1EB (exabyte).
xfs : This file system was ported to Linux in 2014, it is a 64 bit, journaling file system that has excellent support for parallel I/O loads.
nfs : The Network File System is a client/server file system that allows file access across networks as if they were local files.
smb : Server Message Block is a network protocol allowing network access to files and other network resources.
cifs : This is a version of smb and it stands for Common Internet File System.
ntfs : This is a proprietary journaling file system developed by Microsoft, and is the default file system on
modern versions of the Windows operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

ext3

A

The 3rd extended file system was introduced in 2001 and it included journaling. It is limited by individual file size of 2TB and an overall system size of 32TB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

ext4

A

The 4th extended file system was introduced in 2008. It includes journaling too, but also allows for huge file sizes. Individual files can be up to 16TB and system size can be up to 1EB (exabyte)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

xfs

A

This file system was ported to Linux in 2014, it is a 64 bit, journaling file system that has excellent support for parallel I/O loads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

nfs

A

The Network File System is a client/server file system that allows file access across networks as if they were local files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

smb

A

Server Message Block is a network protocol allowing network access to files and other network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

cifs

A

This is a version of smb and it stands for Common Internet File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

ntfs

A

This is a proprietary journaling file system developed by Microsoft, and is the default file system on
modern versions of the Windows operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

This is the location of the File System TABle, and it contains the information necessary to allow automatic mounting of devices

A

/etc/fstab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

This is the location of the information for encrypted devices that are set up during system boot

A

/etc/crypttab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

This contains the special device files for all the devices on the system

A

/dev/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

This contains a listing of the Logical Volumes managed by LVM

A

/dev/mapper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

/dev/disk/by-

A

/dev/disk/by-

id : This contains a mapping of the devices based on the serial number.
uuid : This contains a mapping of the devices based on the UUID. This is how the devices are listed in fstab by
default.
path : This is a mapping of the devices based on the shortest physical path according to sysfs and contains
the bus name (pci,ata, etc.).
multipath : If this exists, it contains the path mappings for the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

This contains a list of the currently mounted file systems according to the mount command

A

/etc/mtab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

This contains symlinks to each of the block devices on the system

A

/sys/block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

This contains the major and minor numbers of the partitioned devices

A

/proc/partitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

This is similar to mtab but it is maintained by the kernel.

A

/proc/mounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

mdadm

A

Device mapper administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

fdisk

A

CLI program for managing device partitions does not work with partitions larger than 2TB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

parted

A

CLI program for managing device partitions does not have the partition size limit of fdisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

mkfs

A

MaKe File System, used to build a file system on a partitioned device (normally a disk drive)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

iostat

A

Reports CPU and device I/O stats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

df

A

Disk Free, reports the free space on the file system that is passed to it:

  1. Using no arguments lists the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

du

A

Disk Usage, reports the size of the file that is passed to it:
1. With no arguments, it lists the file size of all files on the system each on one line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

mount

A

Attaches a file system to a mount point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

umount

A

Removes a file system attachment from a mount point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

lsblk

A

LiSt BLocK devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

blkid

A

Locate and print block device attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

dumpe2fs

A

Prints the superblock block group info for a filesystem on a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

resize2fs

A

Used for resizing a filesystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

fsck

A

File System ChecK, used to detect errors on a filesystem and can be instructed to attempt to correct
issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

tune2fs

A

Allows adjustment of tunable file system parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

e2label

A

Displays or changes filesystem labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Describe Templates

A

A VM template is what describes a virtual machine, and it is used to create the machine resources. There are several different types of templates, depending on how the virtual machine was created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Describe an OVA Template

A

An OVA template is an archive if a machine that is a single file, made up of several other files that describe the virtual machine

99
Q

Describe an OVF

A

An OVF, which is made up of several files that comprise the virtual machine template. The files are contained inside of an OVA archive. OVA and OVF templates are seen in VMware virtualization

100
Q

Describe JSON

A

Virtual machines can also be described in Java Script Object Notation (JSON). This type of template is used in places such as AWS cloud formation.

101
Q

Yet Another Markup Language (YAML)

A

Yet Another Markup Language (YAML) can also be used to describe a virtual machine as well as many other deployment types. A container image is different than a VM template. It contains the files that are used by the container, while a VM template describes the configuration

102
Q

What is Bootstrapping?

A

The bootstrapping process refers to the methods that are used to instantiate a Virtual Machine. Machines that are created on cloud providers can use technologies such as Cloud-Init

103
Q

What is Cloud-Init

A

This technique uses identical starting images, and then configures those images for their specific role

104
Q

What is Anaconda?

A

Anaconda is the system installer used in RedHat Linux. The Anaconda configuration can be used to create identical machines via a process called Kickstart, which allows unattended installation

105
Q

What is Thick Provisioning

A

Thick provisioning is when the entire amount of storage is allocated when the storage is instantiated

106
Q

What is Thin Provisioning

A

Thin provisioning is where the limit of the disk is created but the actual storage is not allocated until it is used

107
Q

Describe a Persistent Volume

A

A Persistent Volume is one that is independent of a virtual machine, and exists even if the machine does not. These types of volumes are attached to machines, as opposed to ephemeral storage that only exists if the machine exists

108
Q

Describe Blob storage

A

Blob storage is Binary Large Object storage and differs from Block storage. It stores objects, and is not a block device like a traditional hard disk

109
Q

Describe Block Storage

A

Block storage is tied to a virtual machine instance, and can contain a file system. Blob storage is normally remote storage and is accessed to retrieve objects but does not contain addressable blocks, or a file system that can be used for an operating system

110
Q

Networking

A

Virtual Machines use the same network of the host system. It can be accomplished in several ways

111
Q

What is Bridging

A

Bridging is a method in which the host network is simply bridged to the virtual machines. The virtual machines then exist on the host network

112
Q

What is an overlay network?

A

An overlay network is an entire network segment that is created for the virtual machines independent of the host network. Ingress/egress methods must be created for network traffic to and from this overlay

113
Q

What is Network Address Translation (NAT)

A

Network Address Translation (NAT) is a technique in which internal IP addresses are mapped to an external IP address, making it appear as if all of the network traffic is coming from the same single IP on the host

114
Q

What is a local network?

A

A local network is one in which the virtual machines are only able to communicate with one another and their host system

115
Q

Describe Dual Homed Networks

A

Dual-homed networks provide high availability by incorporating two or more network interfaces. One is live and the others are hot standbys in case the primary fails

116
Q

What is a Hypervisor?

A

The hypervisor is the layer that exists between a virtual machine and its underlying host’s system. This can be any one of several that are used, such as KVM, Virtualbox, VMware, etc

a management tool us used to start and stop the virtual machine,s as well as change settings and configurations. Some of the more common tools are libvirt, virsh, and vmm

117
Q

Describe Localization inside Linux

A

Time is one of the most important components, as it affects every system operation. In addition, the language that the system used and the way that time is displayed should be considered. This is referred to as localization. The files used for this can be located in:
• /etc/timezone
• /usr/share/zoneinfo

118
Q

localectl

A

Used to change the keyboard layout and location settings

119
Q

timedatectl

A

Sets the system clock

120
Q

date

A

Displays the current time in a specific format

121
Q

LC_*

A

Refers to all of the categories that exist for the Local such as time, messages etc

122
Q

LC_ALL

A

Overrides all settings, normally used by applications to output in a known format

123
Q

LANG

A

Refers to the language that the system is using

124
Q

TZ

A

The time zone that is used for clock correction from UTC

125
Q

Software Packages come in several types

A

.rpm : Used in RedHat based distributions
.deb : Debian-based system package type
.tar : Archive file that contains the software files
.tgz : Compressed archive of the software files
.gz : Another type of compression used to package the software files

126
Q

Used in RedHat based distributions

A

.rpm

127
Q

Debian-based system package type

A

.deb

128
Q

Archive file that contains the software files

A

.tar

129
Q

Compressed archive of the software files

A

.tgz

130
Q

Another type of compression used to package the software files

A

.gz

131
Q

rpm

A

Installs .rpm packages

132
Q

dpkg

A

Installs .deb packages

133
Q

apt

A

Package manager for Debian-based distributions

134
Q

yum

A

Package manager for RedHat-based distributions

135
Q

dnf

A

Package manager for Fedora, and is a derivative of the YUM package manager

136
Q

zypper

A

Package manager for OpenSUSE

137
Q

What are the commands make and make install used for?

A

The commands make and make install are used to build software from source

138
Q

What is the command used to check for dependencies in software?

A

The command used to check for dependencies in software is ldd

139
Q

What is a compiler?

A

Compiler converts the readable code into machine code. Shared Libraries are pieces of code that are used more than once, and the library is included to prevent repetition in the code.

140
Q

Describe a repository

A

A repository is a place where the code can be stored and accessed by development teams. The repositories can be created locally and then configured for remote access. As files are modified they can be synced to the repository. Commands such as wget or curl can download code to the local machine

141
Q

What is the command used for adding a new user?

A

useradd

142
Q

What is the command used to add users to a group?

A

groupadd

143
Q

If a user already exist, it may be necessary to change properties of the user. What command can be used to do so?

A

usermod

144
Q

What command is used for group modification?

A

groupmod

145
Q

What command is used to create user passwords?

A

passwd

146
Q

What command is used for password aging?

A

chage

147
Q

User and Group Removal

A

User and Group removal is done with the userdel or groupdel commands

148
Q

Where are global bash profile settings located?

A

Global bash profile settings are located in the /etc directory

149
Q

Where are user and group management files found?

A

/etc/passwd and /etc/group list and configure the users and groups, respectively, in combination with the /etc/shadow file that contains encrypted users passwords

150
Q

What are some commands that are associated with users?

A
Some commands that are used with users:
• id : Show the users' IDs
• whoami : Show the current user
• who : Shows logged in users
• w : Shows detailed information about logged in users
• last : Shows historical user logins
151
Q

What is the ‘id’ command used for?

A

shows the users id

152
Q

What is the ‘whoami’ command used for?

A

shows the current user

153
Q

What is the ‘who’ command used for?

A

Shows logged in users

154
Q

What is the ‘w’ command used for?

A

Shows detailed information about logged in users

155
Q

What is the ‘last’ command used for?

A

Shows historical user logins

156
Q

Name two common text editors

A

vi and nano are common text editors on the Linux OS

157
Q

What is grep used for?

A

Grep prints lines matching a pattern

158
Q

What is cat used for?

A

cat is used to print the contents of the file

159
Q

What is the tail command used for?

A

tail prints the last lines of the file

160
Q

What is the head command used for?

A

head prints the first lines of the file

161
Q

What is the less command used for?

A

less reads the whole file and paginates the output

162
Q

What is the more command used for?

A

More is similar to the less command which reads the whole file and paginates the output

163
Q

What is the stream editor command?

A

sed or awk

164
Q

How do you copy files on a system?

A

You can copy files on a system by using the cp command

165
Q

How do you move files on the system?

A

To move files on the system use the mv command

166
Q

What is the command ‘locate’ used for?

A

The locate command is used for searching for files in the systems file database. You can update the database by using the updatedb command

167
Q

What are the two service management systems that are the most common on Linux systems?

A

sysVinit (older)

systemd(newer)

168
Q

Describe Server Roles

A

Servers can be configured to provide a specific service or role

169
Q

Describe NTP

A

Using the Network Time Protocol, these servers provide time services so that clocks can be synced across the network

170
Q

Describe WEB

A

These servers serve web pages

171
Q

What is a CA?

A

A Certificate Authority, these servers provide certificate validation

172
Q

What is a Name Server?

A

These provide DNS services on the network.

173
Q

DHCP

A

Dynamic Host Configuration Protocol, These servers issue IP addresses

174
Q

File Servers

A

These provide network storage

175
Q

Monitoring

A

These servers are usually part of an agent server pair and provide real time performance
information about monitored servers

176
Q

Authentication server

A

These provide centralized authentication and can be part of a single sign on (SSO)
infrastructure

177
Q

Database

A

These servers provide data services

178
Q

Load balancer

A

These servers route traffic, based on load numbers, to servers that are behind them in the
network.

179
Q

What is the command to list installed hardware?

A

lsdev

180
Q

What is the command to list used devices?

A

lsusb

181
Q

What is the command to list PCI connected devices?

A

lspci

182
Q

What is the command to list block devices (hard disks)?

A

lsblk

183
Q

What is the command used to examine the kernel ring buffer?

A

dmesg

184
Q

What is the command used to print a file?

A

lpr

185
Q

How do you show the print queue?

A

lpq

186
Q

Where are devices mostly listed in the systems virtual file systems?

A

/proc
/sys
/dev

187
Q

What are the three types of user permissions?

A

User permissions come in three types Read write and execute.

In standard notation these are listed as User group and other

188
Q

What is Octal Notation?

A

Linux permissions listed as numbers, such as 755 or 644, are known as octal notation

read = 4 write = 2 and execute = 1

When permissions are added together, 6 = read and write and 7 = read write execute

189
Q

What is the highest permission?

A

0777 is the highest permission

which means everybody (all users and groups) can read, write, and execute

190
Q

Describe default permissions

A

Default permissions are set using a umask.

A umask is subtracted from the highest permission.

For example a umask of 0022 would result in a default permission of 0755 (0777 - 0022 = 0755)

191
Q

What is the purpose of the sticky bit?

A

If the sticky bit is set, only the owner of the file or directory, and root , can delete or rename the file

192
Q

Describe inheritance

A

Inheritance is the process by which files and directories obtain their permission settings from their parent

193
Q

What is the command used to change the permissions on a file or directory?

A

chmod

194
Q

What is the command used to change the owner of a file or a directory?

A

chown

195
Q

What is the command used to change the group ownership?

A

chgrp

196
Q

What is the command that’s displays the File Access Control List (FACL)?

A

getfacl

197
Q

What is the command used to modify the FACL?

A

setfacl

198
Q

What is the command used to list files and directories?

A

ls

199
Q

Where can you find users with escalated privileges?

A

Users with escalated privileges are listed in the sudoers file.

To edit this file use the visudo command which checks the file syntax so permissions are not broken

200
Q

What are the commands used to elevate permissions?

A

su(switch user)

sudo(super user do)

201
Q

Describe members of the wheel group

A

Members of the wheel group are normally system administrators, and are allowed to elevate privileges to root by default

202
Q

What are context based permissions?

A

Context-based permissions are based on extended attributes of objects

203
Q

What is SELinux?

A
SELinux, or Security Enhanced Linux, is the default context-based permissions kernel module on RedHat-based
distributions
204
Q

What are the three states SELinux can be in?

A

SELinux can be in one of three states:
• Disabled: Permissions are not applied and are not logged.
• Permissive: Permissions are not applied, but permission violations are logged. This is useful for
troubleshooting.
• Enforcing: Permissions are applied and violations are logged

205
Q

SELinux

The policy that is applied is one of two by default

A

Targeted: Only objects that are listed in the targeted policy are evaluated. Unconfined objects are not evaluated.
• Strict: All objects are evaluated and confined objects are restricted

206
Q

What is the command used to get the current state of SELinux?

A

getenforce

207
Q

What is the command used to set the state of SELinux?

A

setenforce

208
Q

What is the command used to list the status of SELinux including the state and policy

A

sestatus

209
Q

What is the command used to change the context for an object

A

chcon

210
Q

What is the command used to restore the context for an object to its default

A

restorecon

211
Q

What is the command used to list the context for the objects in the directory passed?

A

ls -Z

212
Q

What is the command used to list the context for the processes?

A

ps -Z

213
Q

What is AppArmor?

A

AppArmor is the default context-based permissions kernel module on Debian-based distributions

214
Q

How do you disable an AppArmor profile?

A

aa-disable

215
Q

What is the command used for setting enforcement mode on a profile?

A

aa-complain

216
Q

What is the command used to list network processes that do not have an AppArmor profile loaded?

A

aa-unconfined

217
Q

What is Pluggable Authentication Method (PAM)

A

On Linux, authentication is handled by Pluggable Authentication Modules (PAM). This provides an interface that applications can leverage, and creates a standardized method for authenticating users

218
Q

What is PAM responsible for?

A

PAM is responsible for:
• Password Policies: Complex passwords as well as password histories
• LDAP integration: Lightweight Directory Access Protocol, used for centralized authentication • User lockouts: Failed logins resulting in lockout after a configured number of failures

219
Q

Describe Modules in PAM

A

Modules in PAM an be required (the module must have a positive return),

optional (the module is not required to have a positive result),

sufficient (the module is the only one necessary to have a positive result).

220
Q

What is SSH?

A

SSH, or secure shell, is a method of accessing a server and receiving a shell prompt. This access can be limited to only certain users (User-specific access) or limited to connections from certain hosts using TCP Wrappers

221
Q

Some files used with SSH: known_hosts

A

A list of trusted connections with the fingerprint for the server

222
Q

Some files used with SSH: authorized_keys

A

A key store for the keys of users that are allowed to access the server with no password

223
Q

Some files used with SSH: config

A

The local configuration for the SSH users

224
Q

Some files used with SSH: id_rsa

A

The private SSH key

225
Q

Some files used with SSH: id_rsa.pub

A

The public SSH key

226
Q

PKI

A

PKI is an infrastructure providing services that can be used to validate hosts. This consists of private keys and public keys, as well as certificates issued by certificate authorities. In addition, these services can be used to generate Digital signatures

227
Q

What is an incremental backup?

A

An incremental backup is one that contains the changes since the last incremental backup

228
Q

What is a full backup?

A

A full backup contains the entire file set that was intended to be backed up

229
Q

What is a differential backup?

A

A differential backup contains the changes since the last full backup

230
Q

Describe File Hashing

A

File hashing is the process of generating a hash value based on the file’s contents, and can be used to validate that the backup file has not changed on disk

231
Q

Give some characteristics of shells

A
  • Environment is the workspace, and the shell is an instance.
  • The children inherit from the parent Environment.
  • Shell variables are set on each child independently.
  • Shell variables are not passed to children.
232
Q

Describe Variables

A
  • Are used to store data
  • Can be changed
  • Can be local or global
233
Q

Describe Scripts

A
  • Used for automating repetitive tasks
  • Used for configuring a task
  • Can be on the command line (CLI) or in files (.sh).
  • Need to be executable.
  • Need to start with #!/bin/bash
234
Q

What is the command used to create a Git repository?

A

git init

235
Q

What is the command used to copy a repository?

A

git clone

236
Q

What is the command used to push to a remote repository?

A

git push

237
Q

Git Branches

A

Git repositories can be checked out into branches so that code can be worked on, reviewed, and committed without disrupting the main body of code

238
Q

What is central configuration?

A

Central Configuration is the process of managing servers via code. It is a system of automation that allows for provisioning, monitoring, and patching resources within an infrastructure. This could be virtualized infrastructure, or bare-metal

239
Q

What is an agent system?

A

An Agent system is one that uses software installed on target machines. The software typically reports back to a management server

240
Q

What is agentless?

A

Conversely, a management system that does not require software agents to be installed on the managed systems is referred to as Agentless

241
Q

What is Inventory Management?

A

Inventory management is the process of recording the specifications of systems in the infrastructure. This is important as it can affect the commands that are used to manage the systems, as well as assisting with life cycles and patch management

242
Q

nfrastructure as Code

A

Infrastructure as Code is a way to describe the deployed resources so that they can be reproduced from that code. an example of this is a Kickstart file or a cloud-init file. This leverages build automation as well as automated configuraiton management to ensure that instantiated resources are tagged and configured correctly

243
Q

What is Ansible?

A

Ansible is an example of an agentless system

244
Q

What is Puppet?

A

Puppet is a system that uses an agent