Final Exam Flashcards

1
Q

A file system must be mounted to the root file system before it can be used

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The CGI Scripts can be used to generate HTML dynamically

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Once a background process has been launched by a terminal session the process remains attached to the terminal that launched it

A

False - Only foreground processes remain attached to the terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Once a foreground process has been launched by a terminal session it becomes unattached to the terminal until the foreground process completes

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The advantage of incremental backups is to copy those files that have a more recent time stamp since the last full backup

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The inode stores metadata like the count of hard links, the file size and file permissions

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During the bootup procedure, stored instructions are loaded from a nonvolatile memory device such as a Read Only Memory or ROM, flash memory, or non volatile RAM to be executed

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The cron utility allows user to schedule programs for periodic execution

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The file delimiter for the /etc/password file is a : not a ; The /etc/inittab file is used to define the time of day and the day of the week that a recurring process would be executed

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Inode keeps account of the number of symbolic links that reference a given file

A

False - the inode only keeps track of physical links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Shadow file contains the encrypted password and all the attributes associated with the password.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Unix like operating system kill command can be used to send different types of signals to a process

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The hard links allow a single resource to be referenced by different file names

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Unix like operating system kill command can be used by root or super user to terminate any user process on the system

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The default permissions for a file and a directory are determined by the umask variable value. The umask value is located in the $HOME/.profile

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Each mounted file system is represented by an entry in the Superblock

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What adding a new user to a Unix like system the files that are affected are the /etc/password /etc/shadow and /etc/group file

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The system administrator uses single user mode to make up dates and directions to the system without the user community accessing the system

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In Unix and Linux what does the who -r command do in all Unix like systems?

A

It provides you with the system run level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The Kernel is the central component of the Operating System. It interfaces with the shells, the applications, and other hardware devices

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The init process is considered the parent of all user processes

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The fscheck finds lost and broken files in the /temp/lost directory

A

False - Answer would be Lost and Found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When a child processes ends a sig child signal is sent to the parent process from the Kernel indicating their child exited

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The amount command is used to attach a file system to the file system hierarchy root

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Using the shutdown command is the safest and most reliable way to bring a computing system down

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In Perl the array link is determined and the arrays cannot grow dynamically during runtime

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In Perl a file handle name must be identical to the original file name

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The kill command is used to delete processes from the process table

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The array that collects up all of the command line variables in Perl is named @ARGV

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In Perl a module is imported into a program or script by using the USE declaration

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A package manager and a manual Unix or Linux Executable share a similar characteristic they both have to deal with dependencies having to do with the makefile

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

There are pieces of the initialization software that are configured into subsystems and are interdependent on each other

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The entire Kernel executes in Kernel space to maximize system performance

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Linux utilizes the values 0 - 6 to represent the different system run levels

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The getopt:: standard module provides 2 functions getopt and getopts

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The master boot record is the final step in the initialization process

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

the init process can be created by either the Master Boot Record or the Kernel during the system bootup

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

System Panic

A

An irrecoverable error that come from the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Unix system hardware configuration is determined by the XINET daemon

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The INITRD Daemon contains a set of hardware drivers that are downloaded during the system initialization

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The address space that is allocated for child process is overwritten so that a specific process can be executed using the execute exec system call

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

In Redhat enterprise 6.0 that boot up procedure is identified as the upstart

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The existence of an orphan process on a system consumes memory and CPU cycles, uses disk space and decreases system performance

A

True

44
Q

An orphan process eventually becomes a zombie process

A

False

45
Q

A zombie process can be identified by using the ps -aux command

A

Trie

46
Q

The presence of a zombie process is displayed by a Z under the stat column and under the column heading

A

True

47
Q

The asterisks * in the cron tab is used to refer to to match all values

A

True

48
Q

Both Unix and Linux operating systems apply security measures to files by assigning permissions to the file attributes like owner, group and other

A

True

49
Q

Is it true that the operating system cannot designate a different file permission to a different user

A

True

50
Q

When a child process ends the kernel sends a sync child signal to the parent. If the parent responds with a wait system call the child process is reaped from the system and all previous allocated resources are returned to the Operating System

A

True

51
Q

If an orphan process exists on a system the init process tries to become the new parent (reparenting) so that it can try to normalize the child and make it removable from the system

A

True

52
Q

An inode stores information about the file but it does not store the filename and the actual data

A

True

53
Q

The FSCHECK utility executes early during the boot process to identify broken files on the root filesystem. This is done prior to other file systems being mounted on the root file system

A

True

54
Q

The Lost + Found directory contains broken files from disk errors caused possibly by abrupt system shutdowns and power failures

A

True

55
Q

The telinit command is used to change the runlevels on Unix, Linux, and HPUX systems.

A

True

56
Q

During the boot process Redhat 6.0 references the /etc/inittab file for one purpose to access the initdefault runlevel variable. There is only one statement in that file that it is looking for

A

True

57
Q

In Unix like Operating Systems the uid determines the identity of the user after they are granted access to the system

A

True

58
Q

When a system runlevel is changed running processes are not specified for the new runlevel are killed. The unwanted processes are first sent a term signal the a kill signal

A

True

59
Q

The initdefault action entry specifies the runlevel the system will enter after the system boots

A

True - on cs.franklin.edu this is runlevel 3 in Knoppix it is runlevel 5

60
Q

A filter is a program designed to read a stream of input transform it and output this new data (translate command)

A

True

61
Q

After the init process performs its initialization functions or chores the system is ready to be accessed by the user

A

True

62
Q

The filesystem superblock is located at the beginning of each partition

A

True

63
Q

The main purpose of the filesystem is to ensure that stored data remains constant

A

True

64
Q

SELinux was developed by NASA to restrict Kernel’s functionality

A

True

65
Q

The NFS of Network File System is a file and directory sharing mechanism that is native to Unix

A

True

66
Q

SAMBA is the standard Windows interoperability suite of programs for Linux and Unix

A

True

67
Q

The physical link allows data to be referenced across different file systems with no restrictions and serve as another path to access data

A

False - A physical link is confined to a certain directory

68
Q

The /proc/filesystems file lists the filesystems support by the running kernel

A

True

69
Q

The nodev string in the first column means that a file system does not require a block device to be mounted. It is called a virtual filesystem

A

True

70
Q

EPCIDIC is an 8bit character encoding used by IBM mainframes and their AS 400s

A

True

71
Q

The role of the boot loader is to place the operating system in memory

A

True

72
Q

The umask provides the file and directory default permissions. That is the variable but there is a umask command and that command displays the directory whether it is a directory or a file default permissions

A

True

73
Q

The terminal can be either hardware terminals TY or psuedo terminals PTS. Hardware terminals are connected over some interface such as a serial port or USB or over a PC screen and keyboard TTY1. The psuedo terminals are provided a terminal emulator which is an application

A

True

74
Q

In a Linux operating system TTY ports are direct connections to the computer such as a keyboard, mouse or serial connection to a device

A

True

75
Q

When a user telnets into a system Linux sets up a pair of terminals they are a master and a slave. The terminals reside in the directory /dev/pts of the appropriate host and is named for the terminal number /dev/pts/0 Both the TTY and the PTS connections can connect to a shell which will allow you to issue commands to the computer

A

True

76
Q

The major ID identifies the general class of device and is used by the kernel to look up the appropriate driver for this type of device

A

True

77
Q

The minor ID uniquely identifies the particular device within a general class

A

True

78
Q

When a computer program makes a request of the kernel the request is called a system call

A

True

79
Q

The Unix shell maintains a complete set of environmental variables that provide information about different areas of the operating system

A

True

80
Q

The environment variables are not passed all scripts and programs that are not built in the shell but may be accessed or modified by a program

A

False

81
Q

A POSIX is a standard mandate for filesystems behaviour that is strongly influenced by the traditional Unix file systems

A

True

82
Q

The root directory is the only directory that is its own parent. It has both the . and the .. are the same in the root directory. If you go to the parent root directory you are still in the root directory

A

True

83
Q

What type of password encryption is used most among Linux Operating Systems

A

MD5

84
Q

What Unix like Operating System function is used to create a child process

A

Normal fork and execute (exec)

85
Q

File Permissions for a file are stored in which file

A

inode

86
Q

What information is stored in the inode

A
Access modes
username
group
filetype
file size
87
Q

When a user logs into a system and their local and global variables are available for use what term best describes that availability of information

A

Environment

88
Q

$#

A

Stores the number of command-line arguments that were passed to the shell program.

89
Q

$!

A

The PID of the most recently started background process

90
Q

What are some of the prefixes used in Perl?

A

$ - singular variable
% - hash
@ - array

91
Q

A child process is created by a parent process, what is the child’s PPID

A

The child’s PPID is the same as the parents PID

92
Q

What Unix, Linux or HPUX Operating system command command to troubleshoot and fix any filesystem errors

A

FSCHECK

93
Q

What directory is used for storing optional software packages

A

/OPT

94
Q

Identify the Unix Operating System security issues

A

path variables
the use of the umask variable and change mod command
The file and directory access modes
Restricted uses of the UUCP suite of commands

95
Q

during the bootup procedure the Unix kernel performs a series of tasks that helps complete the initialization process

A

determines memory size
mounts the root partition
configures the hardware devices

96
Q

What files are affected when a new user is added to the Linux system?

A

Password
Shadow
Group file

97
Q

Kernel functions can be categorized into 2 broad types

A

responsive

autonomous

98
Q

On Unix like Operating Systems the user access to the kernel is through what type of interface

A

Shell - considered as another application by the OS

99
Q

The copy on write term is best identified

A

Optimization strategy for the Operating System

100
Q

What information is stored in a Linux file system superblock?

A

a pointer to the superblock
magic number
name of the device that the file system is mounted on
basic block size of the file system

101
Q

When kernel functions such as allocation of memory and CPU are performed without being explicitly requested by a user process

A

Autonomous Process

102
Q

The Unix like file system is arranged is what type of configuration

A

inverted tree topology

103
Q

What is the function of a crond daemon

A

initiates the crontab events - executes every minute looking for something to execute

104
Q

2 pieces of information are needed when we initialize CGI scripts

A

a program and a directory to store CGI scrips

a link to an HTML page

105
Q

What Unix like command is used

A

28:55