Linux - Reading summaries Flashcards

1
Q

systemd

A

Utility for activating system resources, server daemons, and other processes at boot time and on a running system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

systemctl start [unit]

A

Start a service or other systemd unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

systemctl stop [unit]

A

Stop a service or other systemd unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

systemctl reload [unit]

A

Reload configuration of a service or other systemd unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

systemctl enable [unit]

A

Enable a service or other systemd unit to start automatically at boot time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

systemctl disable [unit]

A

Disable a service or other systemd unit from starting automatically at boot time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

systemctl status [unit]

A

Check the status of a service or other systemd unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

systemctl list-dependencies [unit]

A

List all service units that a specific service unit depends on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

systemctl mask [unit]

A

Prevent a service unit from running, even to satisfy dependencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Service units

A

Managed by systemd to control individual services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Socket units

A

Managed by systemd to control socket-based activation of services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Path units

A

Managed by systemd to activate services based on file system events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

File ownership permissions

A

Three categories: user, group, and other users. Most specific permission applies. User permissions override group permissions, and group permissions override other permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ls -l option

A

Used with the ls command to expand the file listing to include both file permissions and ownership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

chmod command

A

Changes file permissions from the command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Methods of representing permissions

A

Two methods: symbolic or octal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

chown command

A

Changes file ownership. The -R option recursively changes the ownership of a directory tree.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

umask command

A

Displays or sets the default file permissions for newly created files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Default umask values for Bash

A

Defined in /etc/login.defs and might be affected by settings in /etc/profile, /etc/bashrc, files in /etc/profile.d, or user’s shell initialization files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

suid, sgid, and sticky bits

A

Special permissions providing additional access-related features to files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Process

A

A running instance of an executable program, with states including running, sleeping, stopped, or zombie.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ps command

A

Lists processes running on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Terminal Session

A

Each terminal has its own session, with a foreground process and independent background processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

jobs command

A

Displays processes within a terminal session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Signal

A

A software interrupt reporting events to an executing program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

kill command

A

Sends a signal to control processes.

27
Q

pkill command

A

Sends a signal to control processes based on process names.

28
Q

killall command

A

Sends a signal to control processes based on process names.

29
Q

Load Average

A

An estimate of how busy the system is.

30
Q

top command

A

Displays dynamic real-time information about running processes and system resource usage.

31
Q

uptime command

A

Displays how long the system has been running and the average system load over different time intervals.

32
Q

w command

A

Displays information about currently logged-in users and what they are doing, including load average.

33
Q

systemd

A

Provides a method for activating system resources, server daemons, and other processes at boot time and on a running system.

34
Q

systemctl start/stop/reload/enable/disable [service]

A

Commands used with systemctl to manage services, including starting, stopping, reloading, enabling, and disabling.

35
Q

systemd utility

A

Used to manage service units, socket units, and path units.

36
Q

systemctl status [unit]

A

Command used to determine the status of system daemons and network services started by the systemd utility.

37
Q

systemctl list-dependencies [unit]

A

Command to list all service units that a specific service unit depends on.

38
Q

Masking a service unit

A

systemd feature allowing a service unit to be masked so that it does not run, even to satisfy dependencies.

39
Q

ssh command

A

Allows users to securely access remote systems using the SSH protocol.

40
Q

Known Hosts files (~/.ssh/known_hosts and /etc/ssh/ssh_known_hosts)

A

Files where client systems store identities of remote servers.

41
Q

SSH authentication types

A

Supports both password-based and key-based authentication methods.

42
Q

ssh-keygen command

A

Generates an SSH key pair for authentication.

43
Q

ssh-copy-id command

A

Exports the public key to remote systems for key-based authentication.

44
Q

sshd service

A

Implements the SSH protocol on Red Hat Enterprise Linux systems.

45
Q

/etc/ssh/sshd_config file

A

Configuration file for advanced SSH settings.

46
Q

Recommended SSH configurations

A

Disable remote logins as root and require public key authentication instead of password-based authentication.

47
Q

TCP/IP network model

A

A simplified, four-layered model describing how different protocols interoperate for sending traffic over the internet.

48
Q

IPv4

A

The primary network protocol used on the internet today.

49
Q

IPv6

A

Intended as a replacement for IPv4 network protocol.

50
Q

Dual-stack mode

A

Red Hat Enterprise Linux operates using both IPv4 and IPv6 protocols simultaneously by default.

51
Q

Network routes

A

Determine the correct network interface to send packets to a particular network.

52
Q

NetworkManager daemon

A

Monitors and manages network configuration.

53
Q

nmcli command-line tool

A

Configures network settings with the NetworkManager daemon.

54
Q

Network configurations directory

A

In Red Hat Enterprise Linux 9, the default location is /etc/NetworkManager/system-connections.

55
Q

System’s static hostname

A

Stored in the /etc/hostname file.

56
Q

hostnamectl command

A

Modifies or views the status of the system’s hostname and related settings.

57
Q

Red Hat Subscription Management

A

Provides tools for entitlements, updates, and tracking support contracts and subscriptions.

58
Q

RPM packages

A

Software provided in RPM format for installation, upgrading, and uninstallation on the system.

59
Q

rpm command

A

Can query local database for package information and install downloaded package files.

60
Q

dnf utility

A

A powerful command-line tool for installing, updating, removing, and querying software packages.

61
Q

Application Streams

A

Red Hat’s feature to provide a single repository hosting multiple versions of application packages and dependencies.

62
Q

Daemon

A

A background process that runs continuously on a computer system, performing various tasks without direct user interaction