Novell 050-720 - Tesp Preparation Flashcards
What command do you use to change the server runlevel?
init
shutdown
Which file would you edit to change the default runlevel for a server?
/etc/inittab
Which line would you edit in the /etc/inittab to change the default run level?
The first declaration setting of id:X:default
You have an IDE hard disk that is configured as the slave device, on the secondary channel. How would you reference this device?
/dev/hdd
Command used to partition a disk, if device was /dev/hdd
fdisk /dev/hdd
What command would you use to re-initialize the X windows environment?
rcxdm restart
Command to view current route information
ip route show
File to configure DNS servers
/etc/resolv.conf
Command to encrypt GRUB password
grub-md5-crypt
What is the service that allows you to establish RDP connections to SLED?
Nomad
Configuration file for SSH server services
/etc/ssh/sshd_config
Command to create empty files
touch filename
Command to add a secondary IP address of 201.125.2.45 and a subnet mask 255.255.0.0 for interface ngxe3
ip address add 201.125.2.45/16 dev nxge3
Command to reboot a server
init 6
reboot
shutdown -r now
Command to modify crontab file
crontab -e
Crontab syntax format
Mins Hours Days Months DaysOfWeek Command
Example to run the date command at 13:32 on January 2
32 13 2 1 /bin/date
You work as a Project Engineer for Net Perfect Inc. The company has a Linux-based
network. While working with the vi editor, you want to delete a word from the cursor position.
Which of the following commands will you use to accomplish the task?
A. esc + i
B. esc + ?word
C. esc + dw
D. esc + /word
C. esc + dw
Which of the following files is used to control the behavior of the SSH server? A. sshd_config B. ssh_cont C. sshd_cont D. ssh_config
A. sshd_config
In Linux, which of the following directories contains all the system-wide configuration files? A. /var B. /etc C. /sbin D. /tmp
B. /etc
In Linux, which of the following commands is used to specify default permissions while creating files? A. wc B. tar C. uniq D. umask
D. umask
You work as a Database Administrator for Net Perfect Inc. The company has a Linux-based network. While working in the vi editor you want to move the window one page up. Which of the following key combinations would you use to accomplish the task? A. CTRL-E B. CTRL-Y C. CTRL-F D. CTRL-B
D. CTRL-B
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process? A. killall B. getpid C. kill D. ps
D. ps
You have an online video library. You want to upload a directory of movies. Since this process will take several hours, you want to ensure that the process continues even after the terminal is shut down or session is closed. What will you do to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. Use the bg command to run the process at the background.
B. Add the nohup command in front of the process.
C. Add the nohup command at the end of the process.
D. Run the process inside a GNU Screen-style screen multiplexer.
B. Add the nohup command in front of the process.
D. Run the process inside a GNU Screen-style screen multiplexer.
You work as a Database Administrator for Net Perfect Inc. The company has a Linux -based network. You want to see the list of filenames that end with .txt extension. Which of the following commands can you use to accomplish the task?
A. ?.txt
B. #.txt
C. &.txt
D. *.txt
D. *.txt
Which of the following RPM commands is used to list all the installed packages?
A. bash$ rpm -qa | grep -i kde
B. bash$ rpm -qif /bin/ls
C. bash$ rpm -qa | less
D. bash$ rpm -qpl foobar-1.0-1.i386.rpm
C. bash$ rpm -qa | less
In Linux, which of the following commands is used for specifying the number of bytes that are to be written to the output file at a time during the dumping process?
A. dd -bs
B. dd -of
C. dd -obs
D. dd -ibs
C. dd -obs
In which of the following modes of YaST operations is a user interface provided in the ncurses environment that gives windowing capabilities?
A. Output-split mode
B. Graphics mode
C. Input-split mode
D. Text mode
D. Text mode
Fill in the blank with the appropriate term. The _________is a small disk area that contains information about the RAID device. It is allocated at the end of each RAID device and helps the kernel to safely detect RAID devices even if disks were moved between the SCSI controllers.
Persistent superblock
A Linux file system is a collection of files and directories stored. Which of the following Linux file systems stores application programs?
A. /tmp
B. /
C. /var
D. /usr
D. /usr
Which of the following commands is used to switch from one user login to another in a Linux computer?
A.»_space;
B. SWUS
C. SU
D. APROPOS
C. SU
Text editors are similar to word processors, which provide various features for writing documents.
Following is a list of three text editors that are available on Linux. Drag the names of the text editors in front of their appropriate descriptions.
vi, emacs, pico
Which of the following are built-in commands of the shell that are used to change directories?
Each correct answer represents a complete solution. Choose all that apply.
A. echo
B. chdir
C. cd
D. dirs
B. chdir
C. cd
Which of the following commands is used to archive several files into a single file?
A. MOUNT
B. TAR
C. ARP
D. PS
B. TAR
RPM is a package managing system. It is a collection of tools that are used to manage software packages. Which of the following are the features of RPM?
Each correct answer represents a complete solution. Choose all that apply.
A. It can be served as a powerful search engine to search for software.
B. During updates, RPM handles the configuration files carefully in order to save the customization.
C. It can be used to verify software packages.
D. Installing, reinstalling becomes complicated using RPM.
A. It can be served as a powerful search engine to search for software.
B. During updates, RPM handles the configuration files carefully in order to save the customization.
C. It can be used to verify software packages.
In Linux, which of the following commands is used to specify the number of bytes to be written to the output file at a time during the dumping process?
A. dd -obs
B. dd -of
C. dd -ibs
D. dd -if
A. dd -obs
In Linux, which of the following commands is used for printing the file system type?
A. df -l
B. df -i
C. df -h
D. df -T
D. df -T
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network.
Users complain that they are unable to access resources on the network. However, there was no such problem the previous day. They are receiving the following error messages regularly:
Unable to resolve host name As your primary step for resolving the issue, which of the following services will you verify whether it is running or not?
A. SAMBA
B. APACHE
C. BIND
D. SQUID
C. BIND
You work as a Product Engineer for Net Perfect Inc. The company has a Linux-based network. You want to recursively remove a directory and its contents. Which of the following Linux commands can you use to accomplish the task?
A. rmdir dir1 [dir2…]
B. rm -r dir1 [dir2…]
C. mkdir dir1 [dir2…]
D. mkdir -p dirpath
B. rm -r dir1 [dir2…]
In Linux, which of the following is the default volume group that is created during installation?
A. PP
B. VG
C. PV
D. Rootvg
D. Rootvg
You work as a Database Administrator for Net Perfect Inc. The company has a Linux-based network. You want to locate commands by keyword lookup. Which of the following commands can you use to accomplish the task?
A. find
B. whereis
C. man
D. apropos
D. apropos
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He executes the following command in the terminal:
echo $USER, $UID Which of the following will be displayed as the correct output of the above command?
A. root, 500
B. root, 0
C. John, 502
D. John, 0
B. root, 0
Which of the following terms specifies the area in a storage device that contains pointers to where the file systems are located?
A. Pointblock
B. Boot sector
C. FAT
D. Superblock
D. Superblock
Which of the following is a built-in command of the shell that is used to send a signal to a process?
A. nice
B. nohup
C. kill
D. limit
c. kill
Which of the following commands is used to uninstall an RPM package from a Linux server?
A. rpm -U
B. rpm -e
C. rpm -re
D. rpm –uninstall
B. rpm -e
Which of the following statements are true about the find command in Linux? Each correct answer represents a complete solution. Choose all that apply.
A. It can be used to specify the search location (pathname).
B. It can be used to specify how to process the files.
C. It cannot be used to specify logical operations on selections.
D. It cannot be used to specify the type of file to be searched.
E. It can be used to signify recently added files or directories on the system.
A. It can be used to specify the search location (pathname).
B. It can be used to specify how to process the files.
E. It can be used to signify recently added files or directories on the system.
Which of the following commands can a root user use to change the ownership of a file?
A. chgrp
B. chmod
C. chown
D. cat
C. chown
You work as a Network Administrator for McRoberts Inc. The company has a Linux-based network. You are troubleshooting a Linux computer. You need to know what partitions exist on local hard drives.
Which of the following commands will you use for this purpose?
A. fdisk -l
B. fsck
C. ls
D. e2fsck -y
A. fdisk -l
In Linux, which of the following commands is used to force printing of non-printable characters in the octal \ddd notation?
A. ls -a
B. ls -C
C. ls -p
D. ls -b
D. ls -b
Which of the following commands is used to uncompress a compressed file named zipped.tar.gz?
A. TAR -xzf zipped.tar.gz
B. TAR -xvf zipped.tar.gz
C. TAR -cvf zipped.tar.gz
D. TAR -czf zipped.tar.gz
A. TAR -xzf zipped.tar.gz
You work as a Network Administrator for Net World Inc. The company has a Linux-based network.
You install the GCC distribution on your Linux computer. When you run the GCC command, the computer returns the following error:
Command not found
You verify that GCC is properly installed on your computer. What is the most likely cause?
A. The GCC distribution is corrupted.
B. The RAM in your computer is too low to run the program.
C. The GCC distribution is not properly installed.
D. The $PATH environment variable is not properly configured.
D. The $PATH environment variable is not properly configured.
You work as a Database Administrator for Net Perfect Inc. The company has a Linux-based network. You want to search for files quickly and securely by looking them up in a database, which is typically updated by a nightly cron job. Which of the following commands can you use to accomplish the task?
A. find
B. which
C. grep
D. slocate
D. slocate
You work as a Technician for Net World Inc. The company has a Linux-based network. You have configured a file server on the company’s network. You want to summarize disk usage of each file in a particular directory on the file server. Which of the following commands will you use?
A. dfsck
B. df
C. fsck
D. du
D. du
You work as a Database Administrator for Net Perfect Inc. The company has a Linux-based network. You want to run the GUI command on $HOSTNAME as a $USER. Which of the following commands can you use to accomplish the task?
A. scp -p -r $USER@$HOST: file dir/
B. ssh $USER@$HOST commandname
C. ssh -g -L 8080:localhost:80 root@$HOST
D. ssh -f -Y $USER@$HOSTNAME xeyes
D. ssh -f -Y $USER@$HOSTNAME xeyes
In Linux, which of the following commands is used to view a binary file in hexadecimal, octal, and character formats?
A. grep
B. od
C. fmt
D. ps
B. od
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to sort the directories of the /root directory in increasing order of size. Which of the following commands will John use to accomplish his task?
A. sort /root
B. tac /root
C. ls -s /root | sort -n
D. ls /root
C. ls -s /root | sort -n
You work as a Network Administrator for Maverick Inc. You configure a new Linux-based intranet on the network. Users complain that they are unable to access the network. You verify that pinging the IP address of a server from a client is successful. However, trying to connect the same host using its host name generates the “unknown host” error message. Which of the following tools will you install on the network to resolve the issue?
A. SQUID
B. APACHE
C. BIND
D. SAMBA
C. BIND
Which of the following commands is used to search the Whatis database and display the short descriptions of the system commands?
A. MAN
B. APROPOS
C. GREP
D. MAN2HTML
B. APACHE
You work as a Database Administrator for Net Perfect Inc. The company has a Linux-based network.
You want to view the full listing (all files) of the current directory along with the hidden files. Which of the following commands can you use to accomplish the task?
A. ls /home/username
B. ls
C. ls -a
D. ls -l
C. ls -a
You work as a Database Administrator for Net Perfect Inc. The company has a Linux -based network. You want to copy the salary file from the current directory and store it in the employeeaccount directory. Which of the following commands can you use to accomplish the task?
A. $ cp salary employeeaccount
B. $ cp salary salary.bak
C. $ copy salary employeeaccount
D. $ cp salary employeedetail
A. $ cp salary employeeaccount
Which of the following commands is used to format a floppy disk in the second floppy disk drive?
A. mkfs /dev/fd0
B. mount /dev/fd1
C. mount /dev/fd0
D. mkfs /dev/fd1
D. mkfs /dev/fd1
Fill in the blank with the command to complete the statement below. Do not enter the full path of the command. The command is used to set up a Linux swap area on a device or in a file.
mkswap
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He has recently backed up his entire Linux hard drive into the my_backup.tgz file. The size of the my_backup.tgz file is 800MB. Now, he wants to break this file into two files in which the size of the first file named my_backup.tgz.aa should be 600MB and that of the second file named my_backup.tgz.ab should be 200MB. Which of the following commands will John use to accomplish his task?
A. split –verbose -b 600m my_backup.tgz my_backup.tgz
B. split –verbose -b 200m my_backup.tgz my_backup.tgz
C. split –verbose -b 600m my_backup.tgz my_backup.tgz.
D. split –verbose -b 200m my_backup.tgz my_backup.tgz.
C. split –verbose -b 600m my_backup.tgz my_backup.tgz.
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He has stored all user names in the file named users.txt. Now, he wants to search for such user names that does not contain D.
Which of the following commands will john use to accomplish his task?
A. grep “~ ‘^ *D’” users.txt
B. grep “!~ ‘^D’ or ~ ‘^[^D]’” users.txt
C. grep “~ ‘^ ?D’” users.txt
D. grep “!~ ‘D’” users.txt
D. grep “!~ ‘D’” users.txt
Which of the following statements are true about PorZilla?
Each correct answer represents a complete solution. Choose all that apply.
A. It is a download accelerator program.
B. It usually increases the speed by about 20% to 30%.
C. It does not support file download resuming.
D. It opens multiple connections to a server, and each connection downloads a part of the file.
A. It is a download accelerator program.
D. It opens multiple connections to a server, and each connection downloads a part of the file.
You work as a Database Administrator for Net Perfect Inc. The company has a Linux-based network. You want to flush the filesystem buffers. Which of the following commands can you use to accomplish the task?
A. tar
B. rsync
C. tee
D. sync
D. sync
You work as a System Administrator for Perfect Solution Inc. The company has a Linux-based network. You observe that a computer is running very slow because a batch process is consuming all the CPU resources. What will you do to solve this problem without losing any data?
A. Renice the process.
B. Kill the process.
C. Log off the computer and log in again.
D. Restart the computer.
A. Renice the process.
You work as a Network Administrator for Mac World Inc. The company has a Linux-based network.
Your Linux computer turns off because of power outage. The UPS was unable to provide backup power. Which of the following utilities will run automatically during the next boot to scan the hard disk for the possibility of file system damage?
A. mkfs
B. fsck
C. mount
D. scanfs
B. fsck
You want to redirect standard input for apropos to command1 file. Which of the following commands can you use to accomplish the task?
A. $ apropos shells»_space; command1
B. $ apropos command1
D. $ apropos bash shell shells | less
B. $ apropos
Which of the following is a security threat if included in the search path of a computer?
A. /sbin
B. .
C. /usr
D. /usr/bin
B. .
In Linux, which of the following is the root directory that contains all other directories and files?
A. /rootdir
B. /root
C. /
D. /home
C. /
You work as a Database Administrator for Net Perfect Inc. The company has a Linux- based network. You want to search a file in your system but you do not know the full name of the file.
Which of the following commands can you use to accomplish the task?
A. ff -p
B. ff
C. find /etc -name ‘*.conf’
D. grep string filename(s)
A. ff -p
Which of the following statements are true about the Grand Unified Bootloader (GRUB)? Each correct answer represents a complete solution. Choose all that apply.
A. It operates similar to LILO.
B. It is only compatible with Unix/Linux operating systems.
C. It is referred to as a multiboot boot loader.
D. It is the default boot loader because of its varied distributions.
A. It operates similar to LILO.
C. It is referred to as a multiboot boot loader.
D. It is the default boot loader because of its varied distributions.
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to run the cc process at runlevel three. If the order of execution of cc command is 43, which of the following commands will John use to accomplish his task?
A. ln -s /etc/rc.d/init.d/cc /etc/rc.d/rc3.d/S43cc
B. ln -s /etc/rc.d/init.d/cc /etc/rc.d/rc3.d/K43cc
C. ln -s /etc/init.d/cc /etc/rc.d/rc3.d/K43cc
D. ln -s /etc/rc.d/cc /etc/rc.d/rc3.d/s43cc
A. ln -s /etc/rc.d/init.d/cc /etc/rc.d/rc3.d/S43cc
Uuencoding is a form of binary-to-text encoding that originated in the Unix program uuencode.
Which of the following features are supported by uuencoding?
Each correct answer represents a complete solution. Choose all that apply.
A. A file in uuencoded format starts with a header line of the form: begin
B. It encodes binary data for transmission over the uucp mail system.
C. When restated, uuencoding takes 8 bytes and produces 16 printable 7-bit characters.
D. The program uudecode reverses the effect of uuencode, recreating the original binary file exactly.
A. A file in uuencoded format starts with a header line of the form: begin
B. It encodes binary data for transmission over the uucp mail system.
D. The program uudecode reverses the effect of uuencode, recreating the original binary file exactly.
Which of the following commands is used to enforce checking of a file system even if the file system seems to be clean?
A. e2fsck -p
B. e2fsck -f
C. e2fsck -c
D. e2fsck -b
B. e2fsck -f
Which of the following statements are true about logical volume management? Each correct answer represents a complete solution. Choose all that apply.
A. Logical volume management is the method used for providing a higher level-view of the disk storage on a computer than the traditional view of disks and partitions.
B. Due to its rigidity, it is used by the system administrators for allocating storage to applications and users.
C. It helps the system administrators to deal with sensibly named volume groups rather than physical disk names.
D. The logical volume manager also facilitates in the management of storage volumes in user-defined groups.
A. Logical volume management is the method used for providing a higher level-view of the disk storage on a computer than the traditional view of disks and partitions.
C. It helps the system administrators to deal with sensibly named volume groups rather than physical disk names.
D. The logical volume manager also facilitates in the management of storage volumes in user-defined groups.
In Linux, which of the following commands is used to display active processes?
A. top [options]
B. ps [options]
C. kill [options] processID
D. free [options]
B. ps [options]
D. free [options]
In a Linux system, which of the following directories contains site-specific data which is served by the system?
A. /sbin/
B. /mnt/
C. /opt/
D. /srv/
D. /srv/
In Linux, which of the following commands can be used to remove or delete files?
A. mv [options] source destination
B. rm [options] filenamelist
C. cp [options] source destination
D. rmdir [options] directoryname
B. rm [options] filenamelist
You want to install an rpm package in your Linux operating system. Since the package is very bulky and it takes too much time to install, you want to display the hash (#) mark during the installation so that you can get the package installation progress. Which of the following commands will you use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
A. rpm -Fvh
B. rpm Uvh
C. rpm –freshen -vh
D. rpm ivh
B. rpm Uvh
D. rpm ivh
You work as a Database Administrator for Net Perfect Inc. The company has a Linux -based network. In your Linux system, you want to go to the previous directory. Which of the following commands can you use to accomplish the task?
A. pushd
B. cd
C. cd dir && commandname
D. cd-
D. cd-
In Linux, which of the following commands is used to report the process group ID and working directory of the jobs?
A. jobs -p
B. jobs -l
C. jobs -n
D. jobs -t
B. jobs -l
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to stop the background processes. Which of the following commands will John use to accomplish his task?
A. kill -s SIGCONT %1
B. kill -s SIGTSTP %1
C. kill -9 -1
D. kill kill -0
B. kill -s SIGTSTP %1
Which of the following commands is used to enforce checking of a file system even if the file system seems to be clean?
A. e2fsck -p
B. e2fsck -f
C. e2fsck -b
D. e2fsck -c
B. e2fsck -f
In Linux, the ls command displays files in a bare format whenever it is used without options. Which of the following options can be used with the ls command to show the sizes of files and directories in a human readable format?
A. -t
B. -R
C. -h
D. -d
C. -h
In Linux, which of the following commands is used to show information about free disk space on filesystems?
A. df
B. du
C. ps
D. who
A. df
In Linux, which of the following commands is used to obtain/print the name of the current/working directory?
A. ls [options] directoryname
B. pwd [options]
C. cd [options] [directoryname | ~ | ./ | ../ | - ]
D. mkdir [options] directoryname
B. pwd [options]
In Linux, which of the following directories contains essential command binaries that need to be available in single user mode; for all users?
A. /etc/
B. /bin/
C. /dev/
D. /lib/
B. /bin/
Ex is a line editor that serves as the foundation for the screen editor vi. Which of the following ex commands facilitates structured insertion of text by setting up auto indention?
A. :set ic
B. :set wrapmargin=2
C. :set nu
D. :set ai
D. :set ai
You are novice user of Linux. You forgot your password. Which of the following commands will you use to change your password?
A. password
B. chown
C. passwd
D. chmod
C. passwd
Which of the following is a built-in command of the shell that exchanges the top two elements of the directory stack?
A. pushd
B. notify
C. onintr
D. popd
A. pushd
In Linux, which of the following commands is used to list files ordered by date?
A. ls -ltr
B. ls -lSr
C. ls -i
D. ls -d
A. ls -ltr
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged.
Which of the following commands will you use to resolve the issue?
A. mount
B. e2fsck
C. mkfs
D. fsck
B. e2fsck
Which of the following commands is used to create a partition on a new hard disk of a Linux computer?
A. crpar
B. mount
C. fdisk
D. fsck
C. fdisk
Which of the following file extensions is used with a single file that is created by the TAR command?
A. .ARC
B. .TAR
C. .TR
D. .AR
B. .TAR
Which of the following extensions is used by the packages created through the DEB utility?
A. .deb
B. .de
C. .gz
D. .rpm
A. .deb
In Linux, which of the following directories contains architecture-independent data?
A. /usr/bin/
B. /usr/sbin/
C. /usr/share/
D. /usr/local/
C. /usr/share/
Which of the following commands is used to append the list of files in the /tmp directory to an existing file named deletelater.txt?
A. ls /tmp»_space; deletelater.txt
B. ls /tmp deletelater.txt
C. ls /tmp > deletelater.txt
D. ls deletelater.txt /tmp
A. ls /tmp»_space; deletelater.txt
You work as Database Administrator for Net Perfect Inc. The Company has a Linux-based network. You have created a new database file and have applied permissions on it using the following command:
chmod “file” o - rw
What will be the effect of this command on the file?
A. It would deny owner, group and others the read, write and execute privileges for the file.
B. It denies others the read and write privileges for the file.
C. It grants the write permission for the file to all (user, group, and others).
D. It grants the execute permission for the file to group and others.
B. It denies others the read and write privileges for the file.
87
87