Final - Chapter 8 Flashcards

1
Q
  1. You have obtained a new utility, called watchit, to monitor security on your computer, and you decide to run the utility in the background. Normally, to start the
    utility you would enter watchit at the command line. Which of the following commands enables you to start and run this utility in the background?

a. hide watchit
b. watchit&
c. sh -h watchit
d. shh watchit

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. You’ve obtained over a hundred large graphics files to use in publications, but you want to be sure there is enough available disk space on your computer to store these files. Which of the following commands should you use?
    a. df
    b. diskfree
    c. ls –space
    d. Netstat
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Your company is launching a marketing campaign, and to start, you’ve created a file
    called promotion in normal uppercase and lowercase letters that will be used to place
    text for ads on the Internet and in newspapers. When you show the promotional text to your boss, she is curious about how it would look in all uppercase letters for emphasis.

Which of the following commands enables you to convert the text and
save the result to the file, promotion_uppercase?

a. cat -u promotion | promotion_uppercase
b. case [a-z] [A-Z] promotion&raquo_space; promotion_uppercase
c. case -u promotion > promotion_uppercase
d. dd if=promotion of=promotion_uppercase conv=ucase

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
4. Which of the following can you restore from a backup tape made via the dump
command? (Choose all that apply.)
a. a file
b. a partition of directories and files
c. a directory
d. a subdirectory
A

ALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Your network has a combination of Linux and Microsoft Windows computers.There
    is a Windows server that offers shared files for clients to access.Which of the following
    enables you to access the shared files from your Linux computer?
    a. Windows Share
    b. Network Share
    c. Samba
    d. Leopard
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. You help manage the Linux server for your department. Right now the server has no protection against power failures and there have been several power failures recently. To help make your case for a power protection device, you want to keep track of the amount of time the server has been running since the last power outage that caused it to go down. What command enables you to track how long the server has been up?

a. top
b. uptime
c. df
d. Boot

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. You’ve purchased a new program for your computer, but the computer seems to slow down when you run the program. Which of the following commands enables you to monitor the memory usage as you run the program so you can determine if the program is a memory hog?

a. free
b. memuse
c. mu
d. Test

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. You are working on a report about disk usage on your company’s server to help
    determine if it is time to purchase additional disks. Which of the following commands enables you to obtain disk usage statistics for your report?
    a. free -t
    b. dd -of
    c. top -d | more
    d. du -h | more
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. When you create a section name in a man page, such as the DESCRIPTION section, what tag should you use just before the section name?
    a. .TH
    b. .SS
    c. \SC
    d. .SH
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
10. Which of the following are levels of backups that can be made with the dump
command? (Choose all that apply.)
a. 0
b. 5
c. 15
d. 20
A

A and B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. How can you specify which device to use for a restore from a backup tape created by
    the dump command?
    a. Use the –device option.
    b. Use the parameter, output=devicename.
    c. Use the -f option.
    d. Use the -i option so that you can do the restore from the interactive mode and select the device on the fly.
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. You’ve opened your mail on the company’s server by using the mail command. Several
    messages are listed. How can you tell which ones are new or unopened
    messages?
    a. New messages begin with number 1 and unopened ones begin with the number 2.
    b. New or unopened messages begin with an N or a U.
    c. Both new and unopened messages begin with the tag,“unopened”.
    d. New and unopened messages begin with a closed folder symbol.
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. You suspect that your computer’s connection to the network is not working because
    you don’t seem to be able to connect to the Internet through the network.Which of
    the following commands can help you determine if your connection is working?
    (Choose all that apply.)
    a. ping
    b. netconnect
    c. df
    d. tr
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. You are setting up NFS to share files on the network from your Fedora Linux
    computer.Which of the following is a service that must be running to enable you to
    use NFS for sharing files?
    a. NFSstart
    b. share
    c. portmap
    d. netlink
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
15. What is the command that you can use (from root) to start the service mentioned in
Question 14?
a. service
b. start
c. init
d. go
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. In the following command, what is the purpose of -o?
    find . “( “ -name a.out -o -name core “)”
    a. It tests for the existence of files.
    b. It is the “OR” operator.
    c. It directs output to the core file.
    d. It directs output to the a.out file.
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. You have a small network in your business with just a few network devices connected along with 22 Linux computers and you want to see how efficiently your
    network is designed.Which of the following commands can you use from different computers to determine the route information takes from one computer to another?
    a. vmstat
    b. pong
    c. nettraffic
    d. traceroute
A

D

18
Q
  1. Your computer is slowing down because you’ve started a process that is taking most
    of the memory and CPU resources.Which of the following commands enables you
    to find the process id so you can stop that process?
    a. ps
    b. df
    c. du
    d. free
A

A

19
Q
19. Which of the following commands enables you to stop the process mentioned in
Question 18?
a. bye
b. kill
c. ci
d. tar
A

B

20
Q
  1. Your colleague is creating a new man page to document a manufacturing process
    used by your company. She wants to be able to quickly view the man page as she
    works on it so that she can have other people view it before copying the man page
    into production.Which of the following commands enables her and others to periodically
    review her work in a format similar to the man page format?
    a. .//
    b. show
    c. groff
    d. dd
A

C

21
Q
  1. A user on your network has received an error message that there is another computer
    on the same network using the same IP address, so the user cannot access the
    network.You send out a message to the 18 Linux users on your network to ask that
    they check the IP addresses on their computers and e-mail this information to you,
    so that you can determine who has the duplicate IP address.What utility do you tell
    users to run to determine their IP addresses?
    a. ifconfig
    b. ipquery
    c. df
    d. cmp
A

A

22
Q
  1. Name types of information that you can obtain using netstat.
A

a. Network protocol communications
b. Network connections established by the host computer
c. Network routing information
d. Information about computers remotely logged onto the host computer
e. Data and communications errors

23
Q
  1. What is the purpose of the top command and how can you use it to stop a process?
A

The top command enables the user to monitor CPU-intensive tasks. A process/task can be stopped when you enter the k command and provide the PID.

24
Q
  1. You are gathering information about the amount of disk space occupied by users’ home directories. What command enables you to view a breakdown by individual directories under the /home directory? (Provide the actual command you would run and any special considerations for running it.)
A

du

25
Q
  1. Name three files that should be modified for security when using NFS.
A

a. /etc/exports
b. /etc/hosts.allow
c. /etc/hosts.deny

26
Q
  1. Samba is a utility that uses the ____ protocol, which is also used by Windows systems for sharing folders and printers.
A

SMB

27
Q
  1. The ____ utility gathers statistics and information about IP communications on a computer.
A

netsstat

28
Q
  1. A(n) ____ enables services and software on one computer to use services and software on a different computer.
A

RPC

29
Q
  1. The ____ utility manages a firewall and packet filtering.
A

iptables

30
Q
  1. The df utility reports the number of ____-byte blocks that are allocated, used, and available; the percentage used; and the mount point-for mounted file systems.
A

1024

31
Q
  1. The ____ command displays a listing of the most CPU-intensive tasks, such as the processor state, in real time (the display is updated every five seconds by default).
A

top

32
Q
  1. Most computers store text using EBCDIC codes.(T/F)
A

False

33
Q
  1. Unlike top, the free utility runs and then automatically exits.(T/F)
A

True

34
Q
  1. The ____ option of the ispell utility is used to ignore concatenated words.
A

-C

35
Q
  1. Possessing a rich set of options that allow it to handle copies when other methods are inappropriate, the ____ command can handle conversions to and from legacy EBCDIC to ASCII
A

dd

36
Q
  1. The ____ command displays the amount of free and used memory in the system.
A

free

37
Q
  1. One use of ____ is to get a general idea of how efficiently your network is designed.
A

traceroute

38
Q
  1. An IP address uses a dotted decimal notation that consists of 16-bit binary numbers (octets) separated by periods used to identify a computer or network device and the network it is on.(T/F)
A

False

39
Q
  1. When you use restore, by default it copies back to your current working directory.
    (T/F)
A

True

40
Q
  1. The ____ option of the ping command displays only a summary of the results.
A

-q