Final Exam Flashcards
A file system must be mounted to the root file system before it can be used
True
The CGI Scripts can be used to generate HTML dynamically
True
Once a background process has been launched by a terminal session the process remains attached to the terminal that launched it
False - Only foreground processes remain attached to the terminal
Once a foreground process has been launched by a terminal session it becomes unattached to the terminal until the foreground process completes
False
The advantage of incremental backups is to copy those files that have a more recent time stamp since the last full backup
True
The inode stores metadata like the count of hard links, the file size and file permissions
True
During the bootup procedure, stored instructions are loaded from a nonvolatile memory device such as a Read Only Memory or ROM, flash memory, or non volatile RAM to be executed
True
The cron utility allows user to schedule programs for periodic execution
True
The file delimiter for the /etc/password file is a : not a ; The /etc/inittab file is used to define the time of day and the day of the week that a recurring process would be executed
False
The Inode keeps account of the number of symbolic links that reference a given file
False - the inode only keeps track of physical links
The Shadow file contains the encrypted password and all the attributes associated with the password.
True
The Unix like operating system kill command can be used to send different types of signals to a process
True
The hard links allow a single resource to be referenced by different file names
True
The Unix like operating system kill command can be used by root or super user to terminate any user process on the system
True
The default permissions for a file and a directory are determined by the umask variable value. The umask value is located in the $HOME/.profile
True
Each mounted file system is represented by an entry in the Superblock
True
What adding a new user to a Unix like system the files that are affected are the /etc/password /etc/shadow and /etc/group file
True
The system administrator uses single user mode to make up dates and directions to the system without the user community accessing the system
True
In Unix and Linux what does the who -r command do in all Unix like systems?
It provides you with the system run level
The Kernel is the central component of the Operating System. It interfaces with the shells, the applications, and other hardware devices
True
The init process is considered the parent of all user processes
True
The fscheck finds lost and broken files in the /temp/lost directory
False - Answer would be Lost and Found
When a child processes ends a sig child signal is sent to the parent process from the Kernel indicating their child exited
True
The amount command is used to attach a file system to the file system hierarchy root
True
Using the shutdown command is the safest and most reliable way to bring a computing system down
True
In Perl the array link is determined and the arrays cannot grow dynamically during runtime
False
In Perl a file handle name must be identical to the original file name
False
The kill command is used to delete processes from the process table
True
The array that collects up all of the command line variables in Perl is named @ARGV
True
In Perl a module is imported into a program or script by using the USE declaration
True
A package manager and a manual Unix or Linux Executable share a similar characteristic they both have to deal with dependencies having to do with the makefile
True
There are pieces of the initialization software that are configured into subsystems and are interdependent on each other
True
The entire Kernel executes in Kernel space to maximize system performance
True
Linux utilizes the values 0 - 6 to represent the different system run levels
True
The getopt:: standard module provides 2 functions getopt and getopts
True
The master boot record is the final step in the initialization process
False
the init process can be created by either the Master Boot Record or the Kernel during the system bootup
True
System Panic
An irrecoverable error that come from the kernel
Unix system hardware configuration is determined by the XINET daemon
False
The INITRD Daemon contains a set of hardware drivers that are downloaded during the system initialization
True
The address space that is allocated for child process is overwritten so that a specific process can be executed using the execute exec system call
True
In Redhat enterprise 6.0 that boot up procedure is identified as the upstart
True