Linux Operating System Structure Flashcards

1
Q

Responsible for interacting with system hardware

A

Hardware layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The core of the operating system. Provides system with process, memory, and task management.

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provides a connection between user space and kernel space

A

System Call Interface(SCI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Responsible for creating, stopping, and communicating with system processes

A

Process management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Responsible for memory allocation, virtual memory, and paging

A

Memory management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provides an abstraction layer for multiple filesystem types

A

Virtual File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provides protocols used in network communications

A

Network stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software used to communicate with hardware

A

Device drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

System code specific to the type of processor

A

Architecture-dependent code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application and user environment and interface

A

Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used to manage the operating system

A

Operating system software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Editors and other user applications

A

Application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which bash configuration files are used  for non-login bash shell sessions?(Choose 2)
A. /etc/profile
B. /etc/bashrc
C. ~/.bashrc
D. ~/.profile
A

B. /etc/bashrc

C. ~/.bashrc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
You need more information on the ls command. Which commands can be used to learn how to use this utility? (Choose 2)
A. ls- -help
B. help ls
C. ls -h
D. man ls
A

A. ls- -help

D. man ls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
You've opened the /var/opt/myapp/settings.txt file in the vi editor. You need to enter new text into the file. Which key should you press to switch into Insert mode from Normal or "Command" mode?
A. I
B. A
C. O
D. R
A

A.I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
YAML files used to configure network cards to use DHCP or set up static IP addressing can be found where?
A. /etc/X11
B. /etc/yum
C. /etc/yum.repos.d
D. /etc/netplan
A

D. /etc/netplan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
To create a new directory in a user's home directory named MyFiles, you use which of the following commands?
A. mkdir ~/myfiles
B. mkdir ~/MyFiles
C. md ~/myFiles
D. mkdir ~ MyFiles
A

B. mkdir ~/MyFiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
The sealert utility is used to determine that a user cannot access a file. Which command would aid in troubleshooting by showing access settings?
A. ls -s
B. ls Z
C. ls -l
D. restorecon
A

B. ls -Z

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which vi command-line mode commands can be used to save changes to the current file being edited and close the vi editor? (Choose three)
A. ZZ
B. :wq
C. :q
D. :q!
E. :x
A

A. ZZ
B. :wq
E. :x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You need to change the permissions of a file named widgets.odt such that the file owner can edit the file, but no other users on the system will be allowed to view or modify it. Which command will do this?

A

chmod 600 widgets.odt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You need to change the permissions of a file named projectx.odt such that the file owner can edit the file, users who are members of the group that owns the file can view and edit it, and users who are not owners and don’t belong to the owning group cannot view or modify it. Which command will do this?

A

chmod 660 projectx.odt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which usermod command options must be used to add user accounts as members of a secondary group? (Choose two)
A. -a
B. -s
C. -g
D. -G
A

A. -a

D. -G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Which control structure processes over and over as long as a specified condition evaluates to false?
A. while
B. until
C. for
D. case
A

B. until

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

For designing the implementation of a new Linux server in the company’s network, the server will function as an internal file and print server for the organization. Employees will save their work-related files in shared storage locations on the server, and print jobs for shared printers will be managed by the server as well. What services should be included in the specifications?

A

Samba & CUPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This process takes over and kills processes that use too much memory because they score too high under this process’s monitoring system.

A

OOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
Which tools can be used to check for open network ports? (Choose two)
A. nmap
B. lsof
B. pwconv
D. ssh
A

A. nmap

B. lsof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
To insert a new kernel module into a Linux system that has no dependencies, which tool is best to use to utilize the module?
A. dmesg
B. modinfo
C. insmod
D. depmod
A

C. insmod

28
Q
Which of the following commands is used to find the domain's mail server?
A. dig
B. ping
C. traceroute
D. route
A

A. dig

29
Q
Which command updates ever few seconds, displaying the routers that packets use to reach their destination within a GUI?
A. mtr
B. traceroute
C. tracert
D. iftop
A

A. mtr

30
Q
When local authentication is used on a Linux system, which file contains the passwords for the user accounts?
A. /etc/passwd
B. /etc/group
C. /etc/gshadow
D. /etc/shadow
A

D. /etc/shadow

31
Q
Consider the following entry from the /etc/passwd file: algreer:x:1001:100:AlbertGreer:/home/algreer:/bin/bash. What user ID (UID) has been assigned to this user account?
A. algreer
B. 1001
C. 100
D. Albert Greer
A

B. 1001

32
Q
Consider the following entry from the /etc/shadow file: kmorgan:$2a$05$KL1DbTBqpSEMiL.2FoI3ue4bdyR.eL6GMKs7MU6.nZl5SCC7/REUS:15043:1:60:7:5::. In how many days will this account be disabled after the user's password has expired?
A. one day
B. seven days
C. five days
D. null value (never)
A

C. five days

33
Q
Which of the following contains files that populate new user's home directories created with useradd?
A. /etc/login.defs
B. /etc/default/useradd
C. /etc/skel
D. /etc/default/grub
A

C. /etc/skel

34
Q

You need to create a new account for a user named Ian Mausi on a Linux system and specify a username of imausi, a full name of Ian Mausi, a default shell of /bin/bash, and that a home directory is created. What command will do this?

A

useradd -c “Ian Mausi” -m -s “/bin/bash” imausi

35
Q
Which file keeps a list of internationally untracked files that git should ignore?
A. .gitnot
B. gitnot
C. .gitignore
D. .git
A

C. .gitignore

36
Q
Command substitution, which allows a command to run within a command, is performed with which operators? (Choose two)
A. ` `
B. $( )
C. ' '
D. " "
E. $ { }
A

A. ` `

B. $ ( )

37
Q

An administrator runs mount /dev/sdb2/external and realizes they have made a mistake because a filesystem was already mounted to /external. What happened to the files that were initially mounted onto /external?

A

When the administrator runs unmount /dev/sdb2 the files will reappear unharmed

38
Q
A script that requires the end user to enter the name of their supervisor will use which of the following lines to input the user's response into a variable named SUP?
A. read SUP
B. input SUP
C. prompt SUP
D. query SUP
A

A. read SUP

39
Q

When a new user attempts to run a script while in their home directory using the ./runme.sh command from the shell prompt, they see the following error: bash: ./runme.sh: Permission denied. Which resolution will fix this issue?

A

Enter chmod u+x runme.sh at the shell prompt

40
Q

Which of the following will make for the fastest restore, and fewest number of tapes to restore, assuming the system fails shortly after the Friday backup completes?
Key: F=Full, I=Incremental,D=Differential.
A. Mon-F1, Tue-D1, Wed-I1, Thu-D2, Fri-F2
B. Mon-F1, Tue-D1, Wed-I1, Thu-D2, Fri-I2
C. Mon-F1, Tue-D1, Wed-D2, Thu-D3, Fri-D4

A

B. Mon-F1, Tue-D1, Wed-I1, Thu-D2, Fri-I2

41
Q
Which of the following commands can convert a SHELL variable to an ENVIRONMENT variable?
A. env
B. export
C. set
D. chmod
A

B. export

42
Q
Which command would an administrator run to generate a sequence of numbers that starts at 1, increments by 1, and stops at 100? (Choose all that apply)
A. seq 1 100
B. seq 100
C. seq 1 1 100
D. seq 1-100
A

A. seq 1 100
B. seq 100
C. seq 1 1 100

43
Q
Which command can uncover a remote user's login name and password when they connect using telnet or ftp?
A. dig
B. nslookup
C. tcpdump
D. ip
A

C. tcpdump

44
Q
Which protocols encrypt the network traffic? (Choose two)
A. SSH
B. FTP
C. TElnet
D. HTTPS
A

A. SSH

D. HTTPS

45
Q
Which of the following is not a single-sign-on system?
A. RADIUS
B. Kerberos
C. TACACS+
D. Circumference
A

D. Circumference

46
Q
Consider the following IP address: 172.17.8.10/22. Which subnet mask is assigned to this address?
A. 255.255.252.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.252
A

A. 255.255.252.0

47
Q

Which command would assign the ens32 interface an IP address of 172.17.8.1 with a subnet mask of 255.255.0.0 and a broadcast address of 172.17.255.255?

A

ip addr add 172.17.8.1/255.255.0.0 broadcast 172.17.255.255 dev ens32

48
Q
Which directive in /etc/sysconfig/network/ifcfg-eth0 is used to specify whether the interface is automatically enabled when the system is booted?
A. STARTMODE
B. BOOTPROTO
C. IPADDR
D. USERCONTROL
A

A. STARTMODE

49
Q
Which system keeps one NIC sleeping and awakens when another NIC fails?
A. Active-passive
B. Active-active
C. Load balancing
D. Aggregation
A

A. Active-passive

50
Q
For security reasons, a Linux system should resolve hostnames using the DNS server before trying to resolve them using the /etc/hosts file. Which file is reconfigured to change the name resolver order?
A. /etc/resolv.conf
B. /etc/sysconfig/network/ifcfg-eth0
C. /etc/nsswitch.conf
D. /etc/sysconfig/services
A

C. /etc/nsswitch.conf

51
Q
The /etc/sudoers file on your Linux system is configured by default such that users must supply the root password when using sudo. Which commands are best used to modify the /etc/sudoers file? (Choose two)
A. gedit
B. vi
C. notepad
D. sudoedit
E. visudo
A

D. sudoedit

E. visudo

52
Q
Which setting made in the proper file in the /etc/pam.d/ directory tracks login attempts and locks out users after multiple attempts?
A. pam_access.so
B. pam_loginuid.so
C. pam_limits.so
D. pam_tally2.so
A

D. pam_tally2.so

53
Q
To secure the sshd service running on a Linux system from hackers, it is decided to configure it to listen for SSH requests on a port other than the default of 22. Which directive in the /etc/ssh/sshd_config file can do this?
A. Port
B. BindAddress
C. Protocol
D. Tunnel
A

A. Port

54
Q
You want to write the stdout from the ps command to a file named myprocesses in the /tmp directory without overwriting the existing contents of that file. Which command will do this?
A. ps < /tmp/myprocesses
B. ps > /tmp/myprocesses
C. ps <> / tmp/myprocesses
D. ps >> /tmp/myprocesses
A

D. ps&raquo_space; /tmp/myprocesses

55
Q
Which Linux runlevel puts the system in multiuser mode as a network server with a command-line interface?
A. 1
B. 2
C. 3
D. 5
A

C. 3

56
Q

An administrator must configure the GRUB2 bootloader such that it will boot the first operating system in the boot menu by default unless an end-user manually selects an operating system within the timeout period. Which directive should be set within the /etc/default/grub configuration file to do this?

A

GRUB_DEFAULT=0

57
Q
Which commands will switch a Linux system from a graphical environment to a multiuser text-based environment? (Choose two)
A. systemctl isolate runlevel3.target
B. systemctl isolate rescue.target
C. systemctl isolate multi-user.target
D. systemctl isolate runlevel5.target
A

A. systemctl isolate runlevel3.target

C. systemctl isolate multi-user.target

58
Q
The systems administrator just added a third SATA hard disk to the Linux system and needs to create a GPT partition on it. Which command should they use to do this?
A. fdisk /dev/sdb
B. fdisk /dev/sdc
C. fdisk /dev/sd2
D. fdisk /dev/sd3
A

B. fdisk /dev/sdc

59
Q

On a Linux system with 16GB of RAM, two additional SATA hard disks(/dev/sdb and /dev/sdc) are added to the system and a partition is created on each one. The partitions are defined as LVM physical volumes. Which command is run to add both physical volumes to a new volume group named DATA?

A

vgcreate DATA /dev/sdb1 /dev/sdc1

60
Q

Which statements are true about logical volumes? (choose three)
A. Logical volumes may be extended and resized
B. Logical volumes and RAID are the same
C. Logical volume can span multiple block devices
D. The command lvscan will display a list of logical volumes.

A

A, C, D

61
Q

A new Linux system was installed about a week ago. Three days ago, an administrative user compiled and installed a new application from source code. Now, the Ethernet interface in the system sporadically goes offline. What command does the administrator run to see the boot messages generated by the system when it was in a pristine state shortly after being installed?

A

journalctl -b 2

62
Q
The following content is listed in what file?
# Virtual consoles
tty1
tty2
tty3
A

/etc/securetty

63
Q
After installing GIT, which two configuration properties must you define before issuing a commit?
A. Username and e-mail address
B. MAC address and project name
C. IP address and MAC address
D. Username and password
A

A. Username and e-mail address

64
Q
Which of the following is not a Linux Desktop Environment?
A. GNOME
B. VNC
C. Unity
D. Cinnamon
A

B. VNC

65
Q
You have lost the system's root password. What must you add to the kernel line in the Grub bootloader to change root's password?
A. init=1
B. systemd.unit=rescue.target
C. systemd.unit=emergency.target
D. init=/bin/sh
A

D. init=/bin/sh