• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/160

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

160 Cards in this Set

  • Front
  • Back

Most log files on the system are found in which directory?

/var/log

The process of sending print jobs from the pring b queue to the printer is called?

Printing

What command can you use to view journal log entries on a system that uses systemd?

Journalctl

What is the name of the file that contains a listing of all users on the system and their home directories?

/etc/passwd

What is the name of the utility used to rotate log files?

Logrotate

What is the name used to describe a user providing a user name and password to log into a system?

Authentication

When a printer is disabled, __________________________________

The print queue does accept jobs and holds them there until the printer is enabled again.

When a printer is rejecting requests, ______________________________________.

The print queue does not accept jobs and sends a message to the user noting that the printer is unavailable.

When refering to the


/etc/rsyslog.conf file, ________ specifies info from a certain area of the system, where as _________ is the level of importance of that information.

Facility, priority

Which command can be used to alter the primary group associated with a given user temporarily?

newgrp

Which commands can be used to send a print job to the default printer named printer1?

lp file


lp -d printer1 file

Which command can you use to lock a user account?

usermod -L username

Which command is used to delete a user account?

userdel username

Which command would you use to unlock a user account?

usermod -U username

Which file contains information such as UID And GID ranges and minimum password length to be used at user creation?

/etc/login.defs

You use lpstat and determine that a user named user one has place to large print jobs in the queue for printer one that have yet to start printing. They have print job ids of printer 1-17 and printer 1-21 respectively. Which command would you use to remove these two jobs from the print queue?

cancel printer 1-17 printer 1-21

UID and GID are unique to the system and once you can never be real true or false?

False

You can clear a log file simply by redirecting nothing into it. True or false?

True

You can lock a user account by changing the default login shell to an invalid show in /etc/passwd. True or false?

True.

Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry true or false?

False

Files that have been compressed using the compress utility typically have the _____ extension.

.Z

When compiling source code into a binary program, which command does the compiling using the GNU C compiler?

Make

When compiling source code into binary program, which command performs a system check and create the Makefile?

./configure

Which of the following commands can be used to list the files contained within an installed RPM package?

rpm -ql packagename

Which command can be use to remove the test DPM package, including any test configuration files?

apt-get purge test

Which dump level indicates a full backup?

0

Which file contains full and incremental backup information for use with the dump / restore utility?

/etc/dumpdates

Which file name extension indicates a tarball that is not using a compression utility?

.tar

Which of the following commands can be used to search for packages that contain the word oobla on rpm software repositories?

yum search oobla

Which of the following commands creates an archive?

tar -zcvf /dev/st0 *

Which of the following commands extracts an archive?

cpio -vicdu -I /dev/fd0

which of the following represents the first non rewinding SCSI tape device on a system?

/dev/nst0

Which option to the dpkg command can be used to list the files that comprise a package?

-L

Which option to the rpm command can be used to remove a package from the system?

-e

You have created a full backup and for incremental backups. In which order must you restore these backups?

0-4

Most source code is available on the Internet in tarball format true or false?

True

The -9 option to the gzip utility result in a higher compression ratio. True or false?

True

The bzip2 and gzip utilities use similar compression algorithms. True or false?

False

The Debian package manager (dpm) is the default package manager used by Fedora 20 true or false?

False

To install a new program from rpm software repositories on the internet, you can use the yum update programname command true or false

False.

Which command would be used to activate the Nic alias as eth0?

ifup eth0

Before a computer can use a router, what configuration information must be provided?

Default gateway

Which file would you modify to permanently changed the TCP / IP address of the first wired NIC on a fedora 20 system?

/etc/sysconfig/network-scripts/ifcfg-eth0

The line that configures the hostname for the computer at boot time can be found in the


/etc/sysconfig/network. True or false?

True

Which of the following utilities can be used to check tcp/ip configuration and network conectivity?

Ifconfig


ping


netstat -i

Standalone demons are started on demand using inetd or xinetd. True or false?

False

Which two commands can be used to modify the route table on a Linux computer

route


ip

SSH encrypts all traffic that passes across the network whereas telnet does not true or false

True

A subnet mask is used to differentiate the host portion from the network portion in a TCP / IP address true or false

True

To test DNS configuration by resolving a host name to IP address, which command or commands can you use?

nslookup hostname


host hostname


dig hostname


Which file stores the TCP / IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC?

/etc/resolv.conf

Which of the following are standalone daemons?

Apache (httpd)


DNS (named)

What are two means available to resolve a hostname to the appropriate TCP / IP address?

DNS


/etc/hosts

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

What devices are used to transfer information from one network to another?

Routers

The TCP / IP address of 127.0.0.1 is also referred to as the blank

loopback address

Which of the following port numbers is associated with telnet?

23

Which Windows program is often used to connect to a Linux server via SSH?

Putty

The demons associated with network services listen for network traffic associated with a particular blank

Port

Which of the following are graphical remote administration technologies?

ssh-X


VNC

Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP Damon does not seem to recognize the new changes. What should she do?

Restart the DHCP daemon

What directory are you placed in when you log in as the anonymous user to an ubuntu server 14.04 FTP server

/srv/ftp

What must you do in order to become a DNS server?

Create zone files.


Create resource records for DNS lookups.


Run the name Damon (named)

Which command can be used to connect to a remote Windows share called data on the server called fileserver

smbclient //fileserver/data

Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?

testparm

Which command can you use to synchronize ntpd with an NTP time source?

ntpq

Which command within the command line FTP utility can be used to change the current directory on the local computer?

lcd

Which DNS resource record is an alias to other records?

CNAME

Which file stores the Apache configuration in Fedora 20?

/etc/httpd/conf/httpd.conf

Which of the following can be used to create a database within PostgreSQL?

The createdb command


The CREATE DATABASE statement within the PostgreSQL utility.

Which of the following must you perform to share a directory using NFS?

Run the exportfs -a command


Edit the /etc/exports file


Start or restart the NFS Daemons.

Which SQL statement keyword can be used to delete a record within a table?

DELETE

You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it can not be delivered. What should you do?

Run the newaliases command

You have open a telnet session on port 25 with your email server. What command can you type within your telnet session to start an email session?

HELO


EHLO


Chronyd is an NTP Damon that offers a faster response time compared to the ntpd daemon true or false

True

DHCP clients send a DHCPREQUEST packet when they need to renew their i_p configuration packet when they need to renew their IP configuration. T or f

True

NFS can be used to share files natively with computers running the Microsoft Windows operating system true or false

False

NIS clients use NIS records to access their configuration information true or false

False

Stratum 1 NTP servers do not obtain time information from other NTP servers. True or false?

False

The lines within the Apache configuration files that modify the functionality of the Apache are called directives true or false

True

Log files are typically stored in the blank directory

/var/log

You can restrict who can print to certain printers by using the blank command

lpadmin

You can specify the blank option to the userdel command to remove the home directory for the user and all of its contents

-r

To change the primary group temporarily to another group that is listed in the output of the groups and ID commands, you can use the blank command

newgrp

To see a list of all printers on the system and their status, you can use the -t option to the blank command

lpstat

Which of the following are two logging Daemon's used on Linux systems

rsyslogd, journald

The skeleton directory on most Linux systems is blank

/etc/skel

To lock an account, you can use the usermod command with the blank option

-L

You can create user accounts on the Linux system by using the blank command

useradd

To send a print job to a printer, you must first used the blank command and specify what to print.

lp

The blank command looks for a makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture

make

The blank utility is one of the oldest and most widely used to backup utilities

Tar

The blank command is used to execute the Configure command without using the PATH variable

./configure

The gzip utility does not he give you the ability to control the level of compression. True or false?

False

To remove a package from the system, you can use the blank option with the rpm command

-e

The dump / restore utility can only work with the files on ext 2, ext3, and ext4 file systems. True or false?

True

The filename extension given two files compressed with gzip is blank

.gz

The filename extension given two files compressed with bzip2 is blank

.bz2

You can use the blank command to search internet software repositories for rpm packages in automatically install or upgrade those packages on your system

Yum

The blank option can be used with the tar command to extract a specified archive

-x

The blank Lenox command can be used to assign a TCP / IP configuration to a nice as well as view the configuration of all network interfaces in the computer

ifconfig

Blank is a remote administration tool that encrypts information that passes across the network

Secure shell (SSH)

The simplest method for mapping host names to IP addresses is by placing entries into the /etc/hosts file. True or false?

True

The most common media access method used to send TCP / IP packets onto network media is called token ring. True or false?

False

Computer names are called what

Hostnames

The demons associated with network services listen for network traffic associated with a particular what

Port

The most common LAN protocol suite used today is what

TCP/IP

The /etc/resolv.conf file can contain up to how many DNS servers

3

The Blank command send a small TCP / IP packet to another IP address and await a response

Ping

The utility used to troubleshoot routing is the what command

traceroute

Apache daemon listens for HTTP requests on which port?

TCP 80

Network interfaces can be configured automatically using what

DHCP

When working with Postfix, you can use the blank command to test SMTP Support

HELO

Blank servers results fully qualified domain names to IP addresses for a certain namespace on the Internet

DNS

The blank httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document

Directoryindex index.html

What daemon is used to emulate the SMB protocol

Samba

DNS zone files contain what

Resource records

Client computers can retrieve email from email servers via what or what

POP; IMAP

The Blank command can be used in the bash prompt to obtain a web page from the Apache server

curl

When working with postfix, if you modify the /etc/aliases file, you need to run the blank command to rebuild the aliases database

newaliases

What is the act of verifying a user's identity by comparing a username and password to a system database

Authentication

What is the damon responsible for printing in the CUPS printing system

CUPS daemon

What command is used to change the GECOS for a user

chfn command

What is the process of accepting a print job into a print queue

Spooling

A group of CUPS printers that are treated as a single unit for the purposes of printing and management

Printer class

The command used to remove print jobs from the print queue in the cups print system

cancel command

The area of the system from which information is gathered when loging system events

Facility

The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user

Primary group

A unique number assigned to each user account

User identifier, UID

The command used to modify the name or GID of a group on the system

groupmod command

A utility that can be used to manage DPM packages using a graphical interface

Aptitude

A command used to decompress files compressed by the bzip2 command

bunzip2 command

A gzip compressed archive

tarball

A command used to view the contents of an archive created with compress or gzip to standard output in a page by page fashion

zmore command

A command used to extract archives created with the dump

Restore command

The process whereby files are copied to an archive

System backup

A group of RPM packages that are commonly installed to provide a specific function on the system

Package group

A calculated value that is unique to a file size and contents

Checksum

A command used to decompress files compressed by the gzip command

gunzip command

The amount of compression that occurred during compression algorithm

Compression ratio

A table of information used to indicate which networks are connected to network interfaces

Route table

A set of rules of communication used between computers on a network

Protocol

A user friendly name assigned to a computer

Hostname

A series of four 8-bit numbers that represent a computer on a network

Internet Protocol IP address

The TCP / IP communication destined for a certain group of computers

Multicast

The tcp/ip communication destined for all computers on a network

Broadcast

The portion of an ipv6 address that refers to a unique computer. It is analogus to the host portion of an ipv4 address

Link local

A notation that is often used to represent an IP address and its subnet mask

Classless inter-domain routing CIDR notation

A portion of an IP address that represents a binary bit

Octet

The most common version of IP used on the internet that uses a 32-bit addressing scheme organized into different classes

IP version four ipv4

A file that contains the IP addresses of top level DNS servers

DNS cache file

The process of copying resource records for a zone from a master to a slave DNS server

Zone transfer

A DNS name resolution request where buy an IP address is resolved the FQDN

Reverse lookup

A computer nis domain that receives its configuration from an Nis master server or nis slave server

NIS client

If protocol use my windows computers a unique 15 character name to file and printer sharing traffic

NetBios

The difference in time between two computers that use the NTP protocol

Offset

The most common Linux daemon used to provide ipv4 and ipv6 addresses to other computers on the network

Dhcpd daemon

The standard that all DNS servers and configuration files adhere too

Berkeley internet name domain (BIND)

The difference between time measurements from several different NTP servers

Jitter

The most common protocol used to transfer files across networks such as the Internet

File Transfer Protocol FTP