Final Exam Flashcards

1
Q

A file system must be mounted to the root file system before it can be used

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The CGI Scripts can be used to generate HTML dynamically

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Once a background process has been launched by a terminal session the process remains attached to the terminal that launched it

A

False - Only foreground processes remain attached to the terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Once a foreground process has been launched by a terminal session it becomes unattached to the terminal until the foreground process completes

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The advantage of incremental backups is to copy those files that have a more recent time stamp since the last full backup

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The inode stores metadata like the count of hard links, the file size and file permissions

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During the bootup procedure, stored instructions are loaded from a nonvolatile memory device such as a Read Only Memory or ROM, flash memory, or non volatile RAM to be executed

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The cron utility allows user to schedule programs for periodic execution

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The file delimiter for the /etc/password file is a : not a ; The /etc/inittab file is used to define the time of day and the day of the week that a recurring process would be executed

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Inode keeps account of the number of symbolic links that reference a given file

A

False - the inode only keeps track of physical links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Shadow file contains the encrypted password and all the attributes associated with the password.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Unix like operating system kill command can be used to send different types of signals to a process

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The hard links allow a single resource to be referenced by different file names

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Unix like operating system kill command can be used by root or super user to terminate any user process on the system

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The default permissions for a file and a directory are determined by the umask variable value. The umask value is located in the $HOME/.profile

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Each mounted file system is represented by an entry in the Superblock

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What adding a new user to a Unix like system the files that are affected are the /etc/password /etc/shadow and /etc/group file

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The system administrator uses single user mode to make up dates and directions to the system without the user community accessing the system

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In Unix and Linux what does the who -r command do in all Unix like systems?

A

It provides you with the system run level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The Kernel is the central component of the Operating System. It interfaces with the shells, the applications, and other hardware devices

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The init process is considered the parent of all user processes

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The fscheck finds lost and broken files in the /temp/lost directory

A

False - Answer would be Lost and Found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When a child processes ends a sig child signal is sent to the parent process from the Kernel indicating their child exited

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The amount command is used to attach a file system to the file system hierarchy root

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Using the shutdown command is the safest and most reliable way to bring a computing system down
True
26
In Perl the array link is determined and the arrays cannot grow dynamically during runtime
False
27
In Perl a file handle name must be identical to the original file name
False
28
The kill command is used to delete processes from the process table
True
29
The array that collects up all of the command line variables in Perl is named @ARGV
True
30
In Perl a module is imported into a program or script by using the USE declaration
True
31
A package manager and a manual Unix or Linux Executable share a similar characteristic they both have to deal with dependencies having to do with the makefile
True
32
There are pieces of the initialization software that are configured into subsystems and are interdependent on each other
True
33
The entire Kernel executes in Kernel space to maximize system performance
True
34
Linux utilizes the values 0 - 6 to represent the different system run levels
True
35
The getopt:: standard module provides 2 functions getopt and getopts
True
36
The master boot record is the final step in the initialization process
False
37
the init process can be created by either the Master Boot Record or the Kernel during the system bootup
True
38
System Panic
An irrecoverable error that come from the kernel
39
Unix system hardware configuration is determined by the XINET daemon
False
40
The INITRD Daemon contains a set of hardware drivers that are downloaded during the system initialization
True
41
The address space that is allocated for child process is overwritten so that a specific process can be executed using the execute exec system call
True
42
In Redhat enterprise 6.0 that boot up procedure is identified as the upstart
True
43
The existence of an orphan process on a system consumes memory and CPU cycles, uses disk space and decreases system performance
True
44
An orphan process eventually becomes a zombie process
False
45
A zombie process can be identified by using the ps -aux command
Trie
46
The presence of a zombie process is displayed by a Z under the stat column and under the column heading
True
47
The asterisks * in the cron tab is used to refer to to match all values
True
48
Both Unix and Linux operating systems apply security measures to files by assigning permissions to the file attributes like owner, group and other
True
49
Is it true that the operating system cannot designate a different file permission to a different user
True
50
When a child process ends the kernel sends a sync child signal to the parent. If the parent responds with a wait system call the child process is reaped from the system and all previous allocated resources are returned to the Operating System
True
51
If an orphan process exists on a system the init process tries to become the new parent (reparenting) so that it can try to normalize the child and make it removable from the system
True
52
An inode stores information about the file but it does not store the filename and the actual data
True
53
The FSCHECK utility executes early during the boot process to identify broken files on the root filesystem. This is done prior to other file systems being mounted on the root file system
True
54
The Lost + Found directory contains broken files from disk errors caused possibly by abrupt system shutdowns and power failures
True
55
The telinit command is used to change the runlevels on Unix, Linux, and HPUX systems.
True
56
During the boot process Redhat 6.0 references the /etc/inittab file for one purpose to access the initdefault runlevel variable. There is only one statement in that file that it is looking for
True
57
In Unix like Operating Systems the uid determines the identity of the user after they are granted access to the system
True
58
When a system runlevel is changed running processes are not specified for the new runlevel are killed. The unwanted processes are first sent a term signal the a kill signal
True
59
The initdefault action entry specifies the runlevel the system will enter after the system boots
True - on cs.franklin.edu this is runlevel 3 in Knoppix it is runlevel 5
60
A filter is a program designed to read a stream of input transform it and output this new data (translate command)
True
61
After the init process performs its initialization functions or chores the system is ready to be accessed by the user
True
62
The filesystem superblock is located at the beginning of each partition
True
63
The main purpose of the filesystem is to ensure that stored data remains constant
True
64
SELinux was developed by NASA to restrict Kernel's functionality
True
65
The NFS of Network File System is a file and directory sharing mechanism that is native to Unix
True
66
SAMBA is the standard Windows interoperability suite of programs for Linux and Unix
True
67
The physical link allows data to be referenced across different file systems with no restrictions and serve as another path to access data
False - A physical link is confined to a certain directory
68
The /proc/filesystems file lists the filesystems support by the running kernel
True
69
The nodev string in the first column means that a file system does not require a block device to be mounted. It is called a virtual filesystem
True
70
EPCIDIC is an 8bit character encoding used by IBM mainframes and their AS 400s
True
71
The role of the boot loader is to place the operating system in memory
True
72
The umask provides the file and directory default permissions. That is the variable but there is a umask command and that command displays the directory whether it is a directory or a file default permissions
True
73
The terminal can be either hardware terminals TY or psuedo terminals PTS. Hardware terminals are connected over some interface such as a serial port or USB or over a PC screen and keyboard TTY1. The psuedo terminals are provided a terminal emulator which is an application
True
74
In a Linux operating system TTY ports are direct connections to the computer such as a keyboard, mouse or serial connection to a device
True
75
When a user telnets into a system Linux sets up a pair of terminals they are a master and a slave. The terminals reside in the directory /dev/pts of the appropriate host and is named for the terminal number /dev/pts/0 Both the TTY and the PTS connections can connect to a shell which will allow you to issue commands to the computer
True
76
The major ID identifies the general class of device and is used by the kernel to look up the appropriate driver for this type of device
True
77
The minor ID uniquely identifies the particular device within a general class
True
78
When a computer program makes a request of the kernel the request is called a system call
True
79
The Unix shell maintains a complete set of environmental variables that provide information about different areas of the operating system
True
80
The environment variables are not passed all scripts and programs that are not built in the shell but may be accessed or modified by a program
False
81
A POSIX is a standard mandate for filesystems behaviour that is strongly influenced by the traditional Unix file systems
True
82
The root directory is the only directory that is its own parent. It has both the . and the .. are the same in the root directory. If you go to the parent root directory you are still in the root directory
True
83
What type of password encryption is used most among Linux Operating Systems
MD5
84
What Unix like Operating System function is used to create a child process
Normal fork and execute (exec)
85
File Permissions for a file are stored in which file
inode
86
What information is stored in the inode
``` Access modes username group filetype file size ```
87
When a user logs into a system and their local and global variables are available for use what term best describes that availability of information
Environment
88
$#
Stores the number of command-line arguments that were passed to the shell program.
89
$!
The PID of the most recently started background process
90
What are some of the prefixes used in Perl?
$ - singular variable % - hash @ - array
91
A child process is created by a parent process, what is the child's PPID
The child's PPID is the same as the parents PID
92
What Unix, Linux or HPUX Operating system command command to troubleshoot and fix any filesystem errors
FSCHECK
93
What directory is used for storing optional software packages
/OPT
94
Identify the Unix Operating System security issues
path variables the use of the umask variable and change mod command The file and directory access modes Restricted uses of the UUCP suite of commands
95
during the bootup procedure the Unix kernel performs a series of tasks that helps complete the initialization process
determines memory size mounts the root partition configures the hardware devices
96
What files are affected when a new user is added to the Linux system?
Password Shadow Group file
97
Kernel functions can be categorized into 2 broad types
responsive | autonomous
98
On Unix like Operating Systems the user access to the kernel is through what type of interface
Shell - considered as another application by the OS
99
The copy on write term is best identified
Optimization strategy for the Operating System
100
What information is stored in a Linux file system superblock?
a pointer to the superblock magic number name of the device that the file system is mounted on basic block size of the file system
101
When kernel functions such as allocation of memory and CPU are performed without being explicitly requested by a user process
Autonomous Process
102
The Unix like file system is arranged is what type of configuration
inverted tree topology
103
What is the function of a crond daemon
initiates the crontab events - executes every minute looking for something to execute
104
2 pieces of information are needed when we initialize CGI scripts
a program and a directory to store CGI scrips | a link to an HTML page
105
What Unix like command is used
28:55