Final Exam Flashcards
In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader.
1) /load
2) /bin
3) /boot
4) /mnt
3) /boot
In the FHS, the ____ directory is the root user’s home directory.
1) /bin
2) /home
3) /boot
4) /root
4) /root
In the FHS, the ____ directory contains most system commands and utilities.
1) /usr
2) /root
3) /bin
4) /home
1) /usr
Copying a file can be accomplished using the ____ command.
1) copy
2) mv
3) cp
4) cpy
3) cp
The ____ command takes a list of arguments specifying the absolute or relative pathnames of files to remove.
1) del
2) rm
3) remove
4) delete
2) rm
The fastest method to search for files in the Linux directory tree is to use the ____ command.
1) search
2) id
3) find
4) locate
4) locate
You can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command.
1) $
2) *
3) &
4) #
1) $
The ____ section of a filesystem is the section that contains information about the filesystem in general.
1) inode table
2) inode
3) data blocks
4) superblock
4) superblock
To create a hard link, you must use the ____ command.
1) ln
2) link
3) lnk
4) lk
1) ln
The chgrp command takes ____ argument(s) at minimum.
1) one
2) two
3) three
4) four
2) two
The section of an inode that stores permissions is called the ____ of the file.
1) tail
2) head
3) mode
4) accessor
3) mode
In a file’s mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode.
1) *
2) +
3) ?
4) -
4) -
If a user has ____ permission for a file, they can open, read, and edit the contents of a file.
1) write
2) execute
3) read
4) alter
1) write
When using the chmod command for a specific file, the ____ argument would add read permission and remove write permission for the group permissions.
1) u+r+w
2) g-r+w
3) g+r-w
4) o+r-w
3) g+r-w
When using the chmod command, the mode rwx can be represented by the number ____.
1) 0
2) 1
3) 7
4) 8
3) 7
To set all of the special permissions on a certain file or directory, you can use the command ____, where name is the name of the file or directory.
1) chmod 777 name
2) chmod 7777 name
3) chmod 6666 name
4) chmod 0000 name
2) chmod 7777 name
Each SCSI device is assigned a unique ID number known as a(n) ____.
1) device ID
2) target ID
3) SCSI number
4) SCSI controller
2) target ID
Most Parallel SCSI controllers support up to ____ devices.
1) 12
2) 13
3) 14
4) 15
4) 15
The highest priority SCSI device is given a SCSI ID of ____.
1) 1
2) 6
3) 7
4) 15
3) 7
The ____ standard support speeds of up to 80 MB/second.
1) SCSI-3 Ultra2 Wide
2) SCSI-2 Wide
3) SCSI-3 Ultra
4) SCSI-3 Ultra3 Wide
1) SCSI-3 Ultra2 Wide
RAID level ____ is often referred to as disk mirroring.
1) 1
2) 2
3) 3
4) 4
1) 1
RAID level ____ is commonly referred to as disk striping with parity.
1) 0
2) 1
3) 5
4) 6
3) 5
A Fedora 13 CD installation requires ____ CDs.
1) two
2) four
3) six
4) ten
3) six
In Fedora Linux, a ____ file is a script file that specifies the choices that you would normally choose when you install the operating system.
1) setup
2) startup
3) kickstart
4) scriptstart
3) kickstart
Any line in a kickstart file that starts with a(n) ____ symbol is a comment line and is ignored by the installation program.
1) *
2) #
3) $
4) %
2) #
If a Linux installation ends abnormally and the screen displays a “fatal signal ____” error message, it indicates an error known as a segmentation fault.
1) 0
2) 1
3) 10
4) 11
4) 11
Some installations fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders.
1) 256
2) 512
3) 1024
4) 2048
3) 1024
____ installation log file(s) is/are created by the Fedora installation program.
1) One
2) Two
3) Three
4) Four
2) Two
To verify hardware settings, you can examine the contents of the ____ directory.
1) /log
2) /root
3) /proc
4) /hw
3) /proc
To ensure that Linux has detected the correct amount of RAM in the system after installation, you can view the contents of the ____ file.
1) /proc/mem
2) /proc/cpuinfo
3) /proc/memoryinfo
4) /proc/meminfo
4) /proc/meminfo
The ____ file in the /proc directory contains a list of memory address ranges reserved for device use.
1) meminfo
2) ioports
3) iomem
4) misc
2) ioports
The ____ file in the /proc directory contains statistics on the performance of the processor.
1) cpuinfo
2) modules
3) kcore
4) loadavg
4) loadavg
Devices that transfer data in a character-by-character fashion are referred to as ____ devices.
1) text
2) block
3) character
4) binary
3) character
The ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave).
1) /dev/hdc1
2) /dev/hdb1
3) /dev/hda1
4) /dev/hdc2
2) /dev/hdb1
The ____ device file represents the second serial port on the system (COM2).
1) /dev/ttyS0
2) /dev/tty2
3) /dev/tty1
4) /dev/ttyS1
4) /dev/ttyS1
If you do not know the type, major, or minor number of a device, you can use the ____ command to re-create the device based on the common name.
1) /dev/MAKEDEV
2) mkfs
3) mknod
4) /dev/makedevice
1) /dev/MAKEDEV
The ____ filesystem is used by software programs that write to a CD-RW or DVD-RW drive.
1) ntfs
2) udf
3) ext2
4) hpfs
2) udf
The ____ filesystem contains most of the operating system files.
1) boot
2) data
3) mnt
4) root
4) root
To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.
1) -t
2) -f
3) -c
4) -o
1) -t
CD-ROMs typically use the ____ filesystem type.
1) ntfs
2) ext2
3) iso9660
4) ext3
3) iso9660
Linux requires ____ partition(s) at minimum.
1) one
2) two
3) three
4) four
2) two
Data is read off of hard disks in concentric circles called ____.
1) tracks
2) blocks
3) sectors
4) cylinders
1) tracks
To create partitions after installation, you can use the ____ command.
1) format
2) formatdisk
3) fdisk
4) partition
3) fdisk
The easiest method for monitoring free space by mounted filesystems is to use the ____ command.
1) df
2) fs
3) dfs
4) fd
1) df
Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.
1) breaks
2) corruption
3) degradation
4) failures
2) corruption
To check a filesystem for errors, you can use the ____ command, which can check filesystems of many different types.
1) fcheck
2) fsc
3) fscheck
4) fsck
4) fsck
You can edit the quotas for certain users by using the ____ command.
1) edquota
2) editquota
3) quota
4) repquota
1) edquota
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, you can simply type the ____ command.
1) mount -o
2) mount -f
3) mount -u
4) mount -a
4) mount -a
A(n) ____ is a piece of software that tells the operating system how to use a specific hardware device.
1) system service
2) graphical user interface
3) user interface
4) device driver
4) device driver
The ____ indicates the stability of a Linux kernel.
1) major number
2) production kernel
3) minor number
4) revision number
3) minor number
The concept of ____ enables software developers to read other developers’ source code, modify that source code to make the software better, and redistribute that source code to other developers who might improve it further.
1) Open Source Software
2) Linux
3) Closed Source Software
4) Freeware
1) Open Source Software
The ____ stipulates that the source code of any software published under its license must be freely available.
1) Artistic License
2) GNU General Public License
3) Free Software Foundation
4) Freeware
2) GNU General Public License
____ is software that is distributed free of charge, but the source code is not available.
1) Open source software
2) Close source software
3) Freeware
4) Shareware
3) Freeware
Consider the phrase “collaboration between several developers with a common need speeds up software creation, and when bugs in the software are found by these users, bug fixes are created very quickly” from the chapter. This statement describes which advantage of the Linux operating system?
1) Ease of customization
2) Flexibility for different hardware platforms
3) Risk reduction
4) Stability and security
4) Stability and security
HOWTO documents are centrally collected by the ____.
1) Linux Documentation Project
2) GNU project
3) Free Software Foundation
4) Linux User Groups
1) Linux Documentation Project
Which of the following is the greatest expense for companies using Linux?
1) Software upgrades
2) Additional software
3) Hiring people to maintain the Linux system
4) Operating system cost
3) Hiring people to maintain the Linux system
Solaris, HP-UX and AIX are all ____ of Unix.
1) versions
2) flavors
3) types
4) instances
2) flavors
The source code for Linux was released in ____.
1) 1987
2) 1990
3) 1991
4) 1993
3) 1991
The core component of the GUI in Linux is referred to as ____.
1) GNOME
2) KDE
3) Red Hat
4) X Windows
4) X Windows
A ____ is merely a compressed archive of files that usually contain scripts that install the software contents to the correct location on the system.
1) package manager
2) DBMS
3) tarball
4) router
3) tarball
____ Linux is the most common Linux distribution used today.
1) Red Hat
2) Debian
3) Mandrake
4) SuSE
1) Red Hat
A(n) ____ service provides an efficient method for transferring files over the Internet.
1) FTP
2) DNS
3) Web
4) Mail
1) FTP
A(n) ____ service allows users to post messages in forums.
1) FTP
2) News
3) Web
4) DNS
2) News
Companies and institutions using computers to perform extraordinarily large calculations that would be unsuitable for most computers would employ a(n) ____.
1) scientific/engineering workstation
2) application server
3) supercomputer
4) office workstation
3) supercomputer
Because you need to document so many pieces of hardware and software information, you should create a ____ that contains all important installation information as well as hardware information.
1) preinstallation checklist
2) hardware compatibility checklist
3) software components list
4) minimum hardware requirements list
1) preinstallation checklist
____ is the most common method of installing Linux.
1) Installation from a DVD
2) Installation from an NFS server across the network
3) Installation from packages located on the hard disk
4) Installation from CD-ROM media
1) Installation from a DVD
During Linux installation, you need to configure a minimum of ____ user account(s).
1) one
2) two
3) three
4) four
2) two
Hard disks can contain a maximum of ____ major partitions
1) 4
2) 8
3) 16
4) 32
1) 4
The recommended size for the /home directory is ____ per user.
1) 100 MB
2) 200 MB
3) 500 MB
4) 1000 MB
2) 200 MB
The ____ filesystem is compatible with the Windows FAT filesystem.
1) ext3
2) REISER
3) ext2
4) VFAT
4) VFAT
The ____ directory contains system commands and utilities.
1) /opt
2) /var
3) /boot
4) /usr
4) /usr
In Linux, a(n) ____ is used to accept input from the user and pass the input to the kernel for processing.
1) processor
2) user interface
3) swap memory
4) shell
4) shell
The shell that is used by default in Linux is the ____ shell.
1) BASH
2) root
3) gdm
4) command line
1) BASH
____ are specific letters that start with a dash (“-“).
1) Arguments
2) Options
3) Keywords
4) Metacharacters
2) Options
Which Linux command displays your login name?
1) who
2) whoami
3) id
4) w
2) whoami
Which Linux command gets you out of your current shell?
1) exit
2) stop
3) reset
4) clear
1) exit
The command that displays the calendar for the current month is ____.
1) date
2) cal
3) w
4) id
2) cal
The ____ metacharacter indicates background command execution.
1) @
2) ^
3) &
4) !
3) &
____ is the metacharacter for command termination.
1) \
2) &
3) ;
4) |
3) ;
To find all of the commands that have the word “list” in their name or description, you would type ____.
1) man -j list
2) man -k list
3) man -l list
4) man -m list
2) man -k list
The ____ command will confirm the system directory that you are currently in.
1) dir
2) pwd
3) whereami
4) ld
2) pwd
The ____ metacharacter can also be used to refer to the current user’s home directory.
1) ~
2) @
3) &
4) #
1) ~
To move from the /home/joe/test/data to the /home/joe directory, use the ____ command.
1) cd ..
2) cd ../..
3) /home/joe
4) cd ./..
2) cd ../..
If you type enough unique letters of a directory and press ____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information.
1) Alt
2) Tab
3) Ctrl
4) Esc
2) Tab
Most files on a Linux system that contain configuration information are ____ files.
1) system
2) directory
3) text
4) program
3) text
To view a list of files and their type, use the ____ switch to the ls command.
1) -T
2) -L
3) -F
4) -l
3) -F
The ____ symbol indicates a linked file.
1) @
2) *
3) &
4) =
1) @
The ____ command can be used to provide a long listing for each file in a certain directory.
1) ls -T
2) ls -L
3) ls -F
4) ls -l
4) ls -l
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?
1) 1-4
2) [1-4]
3) [1234]
4) [1,2,3,4]
2) [1-4]
To display the contents of a file called data, use the command ____.
1) disp data
2) ls data
3) ls -l data
4) cat data
4) cat data
The ____ command displays the last five lines of a text file.
1) end -5
2) head -5
3) stop -5
4) tail -5
4) tail -5
Which is an extended regular expression metacharacter?
1) .
2) […]
3) *
4) {}
4) {}
The ____ regular expression metacharacter matches 0 or more occurrences of the previous character.
1) *
2) ?
3) +
1) *
Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?
1) $
2) x
3) Ctrl+g
4) P
3) Ctrl+g
The ____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor.
1) Kedit editor
2) Mcedit editor
3) Emacs editor
4) Nedit editor
3) Emacs editor
The ____ editor is functionally analogous to the Windows Wordpad and Notepad editors.
1) XEmacs
2) vi
3) Emacs
4) gedit
4) gedit
The compression algorithm used by the compress utility has an average compression ratio of ____%.
1) 30-40
2) 40–50
3) 50-60
4) 60-70
2) 40–50
When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.
1) .c
2) .cmp
3) .cpz
4) .Z
4) .Z
The ____ command can be used to display the contents of a compressed file.
1) acat
2) zcat
3) cat
4) ccat
2) zcat
The average compression ratio for gzip is ____%.
1) 40-50
2) 50-60
3) 60–70
4) 70-80
3) 60–70
When used with the compress command, the ____ option can be used to compress symbolic links.
1) -f
2) -c
3) -v
4) -r
1) -f
When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.
1) -c
2) -v
3) -f
4) -r
1) -c
If no level of compression is specified, the gzip command assumes the number ____.
1) 4
2) 5
3) 6
4) 7
3) 6
The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.
1) -c
2) -f
3) -r
4) -l
4) -l
The filename extension given to files compressed with bzip2 is ____.
1) .bz
2) .bz2
3) .gz
4) .Z
2) .bz2
When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames.
1) -a
2) -b
3) -p
4) -n
3) -p
The ____ option can be used with the tar command to extract a specified archive.
1) -s
2) -e
3) -x
4) -a
3) -x
When using the cpio utility, the ____ option causes a new archive to be created.
1) -n
2) -c
3) -o
4) -a
3) -o
You can perform up to ____ different incremental backups using the dump/restore utility.
1) seven
2) eight
3) nine
4) ten
3) nine
Most Linux distributions today use ____ as their package manager.
1) RPM
2) PRM
3) MPR
4) RMP
1) RPM
The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.
1) configure
2) install
3) make install
4) make
4) make
To remove a package from the system, you can use the ____ option to the rpm command.
1) -d
2) -e
3) -r
4) -x
2) -e
You can restrict who can print to certain printers by using the ____ command.
1) lpadmin
2) lpa
3) lpr
4) admin
1) lpadmin
Log files are typically stored in the ____ directory.
1) /dev/log
2) /var/log
3) /boot/log
4) /log
2) /var/log
The ____ log file contains information and error messages regarding network access generated by daemons such as sshd and xinetd.
1) wtmp
2) messages
3) dmesg
4) secure
4) secure
To convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.
1) passwdconv
2) pwconv
3) passwd
4) pwdcv
2) pwconv
You can create user accounts on the Linux system by using the ____ command.
1) uadd
2) usercreate
3) adduser
4) useradd
4) useradd
The skeleton directory on most Linux systems is ____.
1) /etc/skel
2) /var/skel
3) /etc/skeleton
4) /var/skeleton
1) /etc/skel
To lock an account, you can use the usermod command with the ____ option.
1) -U
2) -u
3) -l
4) -L
4) -L
You can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents.
1) -r
2) -d
3) -R
4) -x
1) -r
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the \_\_\_\_ command. 1) newgroup 2) groupmod 3) newgrp 4) groupadd
3) newgrp
A system process that is not associated with a terminal is called a(n) ____ process.
1) daemon
2) user
3) parent
4) startup
1) daemon
To display an entire list of processes across all terminals and including daemons, you can add the \_\_\_\_ option to any ps command. 1) -f 2) -l 3) -a 4) -e
4) -e
In the output of the ps -l command, the \_\_\_\_ column is the most valuable to systems administrators because it indicates what the process is currently doing. 1) process state 2) process flag 3) process priority 4) PID
1) process state
The ____ option to the ps command displays all processes that do not run on terminals.
1) -f
2) x
3) a
4) -l
2) x
There are ____ different kill signals that the kill command can send to a certain process.
1) 16
2) 32
3) 64
4) 128
3) 64
The ____ kill signal stops a process and then restarts it with the same PID.
1) SIGINT
2) SIGQUIT
3) SIGHUP
4) SIGTERM
3) SIGHUP
The ____ kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory.
1) SIGINT
2) SIGQUIT
3) SIGKILL
4) SIGTERM
2) SIGQUIT
You can execute ____ main types of Linux commands.
1) two
2) three
3) four
4) five
2) three
When you append a(n) ____ to a command, the command is run in a background process.
1) &
2) $
3) #
4) %
1) &
When killing a background job with the kill command, you must prefix the background job IDs by a(n) ____.
1) &
2) #
3) $
4) %
4) %
After a background process has been started, it can be moved to the foreground by using the ____ command.
1) b2f
2) fgd
3) fg
4) fgnd
3) fg
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.
1) *
2) +
3) -
4) /
2) +
Processes are started with a nice value of ____ by default.
1) -20
2) 0
3) 1
4) 19
2) 0
To display a list of at Job IDs, you can specify the ____ option to the at command.
1) -l
2) -u
3) -a
4) -d
1) -l
The ____ field in a cron table contains the absolute pathname to the command to be executed.
1) first
2) second
3) fifth
4) sixth
4) sixth
To create or edit a user cron table, you can use the ____ option to the crontab command.
1) -u
2) -c
3) -f
4) -e
4) -e
The Linux kernel is stored in the ____ directory.
1) /
2) /boot
3) /root
4) /krnl
2) /boot
____ of the GRUB boot loader typically resides on the Master Boot Record.
1) Stage1
2) Stage1.5
3) Stage2
4) Stage2.5
1) Stage1
In the /etc/lilo.conf file, the ____ keyword specifies the absolute pathname to the Linux kernel.
1) image=
2) default=
3) install=
4) root=
1) image=
In Linux, runlevel ____ is also known as multiuser mode.
1) 1
2) 2
3) 3
4) 4
2) 2
A Linux system in runlevel ____ is a system that has no daemons active in memory and is ready to be powered off.
1) 0
2) 1
3) 6
4) 7
1) 0
After the entries in /etc/inittab have been executed, the ____ file is executed to perform tasks that must occur after system startup.
1) /etc/rc/rc.local
2) /etc/rc.d/local
3) /etc/rc.d/rc.local
4) /etc/rc/local
3) /etc/rc.d/rc.local
You can use the ____ command to start, stop, or restart any daemons listed within the /etc/rc.d/init.d directory.
1) daemon
2) manip-daemon
3) service
4) daemon-service
3) service
____ is a freely available version of X Windows used in many Linux distributions.
1) X.org
2) XFree
3) FreeX86
4) XFree86
4) XFree86
The two most common desktop environments that are used on Linux are ____ and ____.
1) KDE; kwin
2) KDE; Xfce
3) Xfce; GNOME
4) KDE; GNOME
4) KDE; GNOME
The ____ window manager is used for the GNOME desktop in Red Hat Fedora Core 2.
1) kwin
2) twm
3) metacity
4) sawfish
3) metacity
If your system uses the X.org implementation of X Windows, the mouse, keyboard, monitor, and video adapter card information is stored in the ____ file in text format.
1) /etc/X11/XF86Config
2) /etc/X11/xorg.conf
3) /etc/X11/xwin.conf
4) /etc/X11/xorg
2) /etc/X11/xorg.conf
After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility within the desktop environment.
1) xvidtune
2) xvideotune
3) xtune
4) vidtune
1) xvidtune
The file descriptor stdin is represented by the number ____.
1) 0
2) 1
3) 2
4) 3
1) 0
The file descriptor stderr is represented by the number ____.
1) 0
2) 1
3) 2
4) 3
3) 2
You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file.
1) #
2)
4) |
3) >
You can redirect a file to the standard input of a command using the ____ metacharacter.
1) >
2) #
3) |
4) <
4) <
The ____ command can be used to replace characters in a file sent via Standard Input.
1) tr
2) rt
3) ts
4) st
1) tr
You can send the standard output of one command to another command as standard input using the ____ shell metacharacter.
1) <
2) |
3) >
4) #
2) |
The ____ command counts the number of lines, words, and characters in a file.
1) pr
2) nl
3) tr
4) wc
4) wc
The ____ command can be used to extract, manipulate, and format text using pattern-action statements.
1) sed
2) grep
3) awk
4) nl
3) awk
Most configuration files on Linux systems are delimited using ____ characters.
1) tab
2) colon
3) space
4) semicolon
2) colon
To see a list of the environment variables and their current values on a system, you can use the ____ command.
1) env
2) get
3) set
4) setenv
3) set
The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.
1) ls $PWD
2) echo #PWD
3) echo $PS1
4) ls #PS1
3) echo $PS1
To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command.
1) env
2) set
3) setenv
4) getenv
1) env
The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.
1) ~/.bash_profile
2) ~/.bash_login
3) /etc/profile
4) ~/.profile
3) /etc/profile
If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.
1) read
2) write and read
3) execute
4) read and execute
4) read and execute
The ____ escape sequence represents a form feed.
1) \n
2) \f
3) /f
4) /n
2) \f
The test statement ____ would be used to determine if A is numerically greater than B.
1) [ A –g B ]
2) [ A –ge B ]
3) [ A –gt B ]
4) [ A +eq B ]
3) [ A –gt B ]