LinuxAcademy Practice Test Flashcards
What is the name of the process in which a client locates a server over DHCP, in order to download the boot files over TFTP?
In the Pre-Execution Environment, or PXE boot, the client machine searches for a server machine from which to download the boot image over the trivial file transfer protocol.
What is contained in the /etc/fstab file?
The fstab ( file systems table ) file is where file system mount points are configured if the mount needs to persist past a reboot. Lesson: Mounting and Unmounting File Systems
fsck -r LABEL=BACKUP fsck from util-linux 2.23.2
Your company has an issue on one of the backup drives that are connected to a server. A junior administrator has been tasked with running the fsck utility on the suspect drive. The junior administrator ran the command shown below to initiate the fsck on the drive labeled BACKUP and sees the listed output, what is the most likely issue?
e2fsck 1.42.9
/dev/sdb2 is mounted
e2fsck: Cannot continue, aborting.
fsck cannot run on mounted drives, and it is necessary to unmount the drive prior to running the command
In the nmcli tool, what is meant by dev and what is meant by con?
nmcli dev refers to devices and their configuration.
nmcli con refers to the connections that are configured on the devices.
What is the purpose of the ldd command?
ldd prints the shared objects (shared libraries) required by each program or shared object specified on the command line.
What is located in the /var directory?
Log files are one of the things that are located in /var
What is the name of the process that directs the system to boot from an image file rather than the first bootable media?
This is the name of the process that directs a system to boot from an image file. Usually this is an ISO file.
Fill in the blank:
_ is the default package tool used on Debian-based systems.
The Advanced Package Tool (APT) is the default package manager for Debian-based systems.
What is the output of the following command?
timedatectl
This command with no switches will output the settings for the date and time on the system.
The temporary file system that is loaded at boot is called?
initrd or initial ramdisk / initial file system
What is the name of the boot process that allows a client to mount a network share as its root file system?
Boot from NFS
Which of the following are ‘pseudo’ file systems?
/proc – This is a pseudo file system, and it contains the processes that are running on the system
/sys–This is a pseudo file system that contains the system info about kernel modules and hardware.
What is the result of running the following command?
localectl list-locales
It will list all of the available languages and encoding settings that are available on the system.
What is network bonding?
This process it allows you to create redundant network interfaces, so that if one fails the others can carry the traffic.
What is the purpose of the /etc/hosts file?
This is the local DNS look up location, and by default it is checked first for DNS names.
This file contains entries such as localhost, and it is used to speed up name resolution that does not need to be done over the internet.
What is the command that is used to create a file system on a disk?
mkfs
What is the output of the ifconfig command when it is run with no arguments?
With no arguments, this command prints the current configuration of the network interfaces
What command would I use to understand how much free space I have left on my filesystem?
df
This command shows how much free space I have, and when combined with the -h flag it will present the information in a human-readable format
On modern systems, the Basic Input Output System (BIOS) has been replaced by what technology?
The Unified Extensible Firmware Interface replaced the older BIOS system.
What is the purpose of rotating the log files?
This prevents the logs from becoming too large to parse or archive, and it assists with searching the logs for entries if each log file encompasses a smaller time frame.
Fill in the blank. __ is an improved version of the grand unified bootloader
GRUB2
In networked systems, what is the name of the protocol used to dynamically assign IP addresses to network interfaces?
The Dynamic Host Configuration Protocol is used to assign addresses dynamically to network interfaces
A junior administrator in your organization has written a Bash script named logparse.sh, and has saved the file on the system. The junior admin is not able to remember where the file was saved, and is now concerned that there might be an issue with the disks as the result of running locate logparse.sh is empty. What is the most likely solution to the issue?
The command updatedb needs to be run from an authorized account so that the new file is entered into the locate database.
Which of the following is a Linux desktop environment?
KDE
GNOME
XFCE
Fill in the blanks: ___ ____ extend the functionality of the kernel.
Modules extend a kernel’s functionality.
What is the purpose of the | operator in Bash?
This is the ‘pipe’ operator. It redirects the stdout from the left into the stdin on the right.
Which of the following commands will search for the file examaple.sh in the current directory, recursively?
find . -name example.sh
This is the correct format of the find command. . is the current directory, and with no other flags it will search all subdirectories recursively for the file that is indicated by the -name flag.
Which of the following are a part of MFA (Multi-Factor Authentication)? Select three
Something you are, such as a fingerprint
Something you know, such as a password
Something you have, such as a token
Which of the following are text editors?
vi
nano
vim
What can be done to secure the bootloader so that it is not possible to simply enter single user mode from the prompt?
Apply a bootloader password.
This prevents people, who have physical access to the terminal, from subverting the bootloader process.
Which of the following are a best practice for a secure system? (Select three)
Restricting cron access – This should be done to prevent malicious scheduled jobs from running on the system.
Enabling SSL/TLS–This should be enabled wherever possible, as it keeps network traffic encrypted.
Disable the root account–This is always a best practice. Users should be required to elevate privileges each time that they need them
When issuing the userdel command, what is the function of the -r flag?
This will remove the user’s home directory in addition to removing the users account.
Which boot process is in the most correct order?
UEFI / GRUB2 / Kernel / systemd
This is the correct order: UEFI calls the bootloader, which loads the Kernel, which loads systemd as PID 1.
During the login process, I am prompted to allow a text message to be sent that contains a pin code. It is a randomly generated number that expires at a preset time. This pin number is an example of?
A one-time password, or OTP
Which command is used to view the logs collected by systemd?
journalctl
This is the command that is used to read the systemd logs, also called the systemd journal.
What is a “kernel panic”?
It is a fatal error that cannot be recovered from
This normally precedes a reboot, and the panic is discovered in the log files after the event has occurred.
The encrypted passwords for users on the system are located in what file?
/etc/shadow
This command is used to add users to the system.
useradd
What is the command that is used to create an initramfs image?
dracut
This command can be used to create the initramfs image.
In system logging via rsyslog, what is the purpose of a third-party agent?
It converts the native logging format to one that can be read on the rsyslog server.
In multi-factor authentication, what is meant by the term “biometrics”?
This is a physical characteristic that is unique to an individual, such as a fingerprint.
This could also include palm print, and voice or facial recognition.
Explain the difference between authentication and authorization.
Authentication verifies who you are, authorization verifies what you are allowed to do.
Which command is used to add a module to the kernel?
modprobe
What is the purpose of the umask value?
It is subtracted from the default permissions to determine the initial permissions for newly added file system objects.
In the /etc/sudoers file, what is the difference between wheel and %wheel?
wheel is a user and %wheel is a group.
The % denotes a group in the /etc/sudoers file, and the difference between these is that wheel is a user and %wheel is a group.
What are SHA and MD5 hashes used for, with regards to archives and files?
They are used to ensure that a file has not changed.
When the archive is taken, a file hash is calculated and then stored with the archive. This ensures that when the archive is unpacked, the hash can be checked to ensure that the files have not changed.