Chapter 4, 5, 6 Flashcards

1
Q

To move files, you can use the mv command.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The rmdir command automatically removes a directory and all of its subdirectories and files.

1) True
2) False

A

2) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You can use wildcard metacharacters with the find command.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When using the chmod command, if there is no character specifying the category of user to affect, only the group category is affected.

1) True
2) False

A

2) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To create a subdirectory, you would use the makedir command.

1) True
2) False

A

2) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When working with files, the special metacharacter “..” specifies the current directory.

1) True
2) False

A

2) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When using the find command, the -size x criteria is used to search for files with a size greater than x.

1) True
2) False

A

2) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The PATH variable lists directories that are searched for executable files if a relative or absolute pathname was not specified when executing a command on the command line.

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The execute permission for a file allows a user the ability to execute the file in memory (if it is a program file or a script).

1) True
2) False

A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader.

1) /load
2) /bin
3) /boot
4) /mnt

A

3) /boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the FHS, the ____ directory is the root user’s home directory.

1) /bin
2) /home
3) /boot
4) /root

A

4) /root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the FHS, the ____ directory contains most system commands and utilities.

1) /usr
2) /root
3) /bin
4) /home

A

1) /usr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Copying a file can be accomplished using the ____ command.

1) copy
2) mv
3) cp
4) cpy

A

3) cp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ____ command takes a list of arguments specifying the absolute or relative pathnames of files to remove.

1) del
2) rm
3) remove
4) delete

A

2) rm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The fastest method to search for files in the Linux directory tree is to use the ____ command.

1) search
2) id
3) find
4) locate

A

4) locate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command.

1) $
2) *
3) &
4) #

A

1) $

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ____ section of a filesystem is the section that contains information about the filesystem in general.

1) inode table
2) inode
3) data blocks
4) superblock

A

4) superblock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

To create a hard link, you must use the ____ command.

1) ln
2) link
3) lnk
4) lk

A

1) ln

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The chgrp command takes ____ argument(s) at minimum.

1) one
2) two
3) three
4) four

A

2) two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The section of an inode that stores permissions is called the ____ of the file.

1) tail
2) head
3) mode
4) accessor

A

3) mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In a file’s mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode.

1) *
2) +
3) ?
4) -

A

4) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

If a user has ____ permission for a file, they can open, read, and edit the contents of a file.

1) write
2) execute
3) read
4) alter

A

1) write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When using the chmod command for a specific file, the ____ argument would add read permission and remove write permission for the group permissions.

1) u+r+w
2) g-r+w
3) g+r-w
4) o+r-w

A

3) g+r-w

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
When using the chmod command, the mode rwx can be represented by the number ____. 1) 0 2) 1 3) 7 4) 8
3) 7
26
To set all of the special permissions on a certain file or directory, you can use the command ____, where name is the name of the file or directory. 1) chmod 777 name 2) chmod 7777 name 3) chmod 6666 name 4) chmod 0000 name
2) chmod 7777 name
27
Can the mv command be used to rename files? 1) Yes 2) No
1) Yes
28
Does the find command use a pre-made index of files to locate a file? 1) Yes 2) No
2) No
29
Do symbolic links share the same inode and inode number? 1) Yes 2) No
2) No
30
Should most files residing in a user’s home directory be owned by that user? 1) Yes 2) No
1) Yes
31
Are permissions additive? 1) Yes 2) No
2) No
32
___________________________________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.
FHS
33
To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -R option
recursive
34
The ____________________ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.
which
35
To create a(n) ____________________ link, you use the -s option to the ln command.
symbolic
36
When a user creates a file or directory, that user’s name and ____________________ becomes the owner and group owner of the file, respectively.
primary group
37
Command used to quickly create an empty file.
touch
38
Command used to change the ownership of a file or directory.
chown
39
Command used to test network connectivity.
ping
40
Special variable on the system used to take away permissions on new files and directories immediately after they are created.
umask
41
Command used to change the permissions for a certain file or directory.
chmod
42
Command used to view your group memberships and primary group.
groups
43
Command used to view your current user name.
whoami
44
Command used to change the group owner of a file or directory.
chgrp
45
Command used to displays BASH shell aliases.
alias
46
A computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator. 1) True 2) False
1) True
47
When you use disk imaging software to write a Linux ISO image onto a USB flash drive, the filesystem existing on the flash drive is maintained. 1) True 2) False
2) False
48
To perform a Linux installation over a network, you can connect to a server with the appropriate installation files via FTP. 1) True 2) False
1) True
49
The BIOS configurations on different computers are generally very similar or exactly the same. 1) True 2) False
2) False
50
You can use a small bootable Linux kernel to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers. 1) True 2) False
1) True
51
Up to 100,000 Serial Attached SCSI hard disks can be connected to a single SCSI controller via serial cables with small serial connectors. 1) True 2) False
2) False
52
RAID level 4 configurations are not fault tolerant. 1) True 2) False
2) False
53
RAID level 3 requires a minimum of three hard disk drives to function. 1) True 2) False
1) True
54
It is good form to check the installation log files after installation as well as verify settings on the system after installation to ensure that all hardware was detected with the correct values. 1) True 2) False
1) True
55
Normally, kickstart files are text files. 1) True 2) False
1) True
56
Each SCSI device is assigned a unique ID number known as a(n) ____. 1) device ID 2) target ID 3) SCSI number 4) SCSI controller
2) target ID
57
Most Parallel SCSI controllers support up to ____ devices. 1) 12 2) 13 3) 14 4) 15
4) 15
58
The highest priority SCSI device is given a SCSI ID of ____. 1) 1 2) 6 3) 7 4) 15
3) 7
59
The ____ standard support speeds of up to 80 MB/second. 1) SCSI-3 Ultra2 Wide 2) SCSI-2 Wide 3) SCSI-3 Ultra 4) SCSI-3 Ultra3 Wide
1) SCSI-3 Ultra2 Wide
60
RAID level ____ is often referred to as disk mirroring. 1) 1 2) 2 3) 3 4) 4
1) 1
61
RAID level ____ is commonly referred to as disk striping with parity. 1) 0 2) 1 3) 5 4) 6
3) 5
62
A Fedora 13 CD installation requires ____ CDs. 1) two 2) four 3) six 4) ten
3) six
63
In Fedora Linux, a ____ file is a script file that specifies the choices that you would normally choose when you install the operating system. 1) setup 2) startup 3) kickstart 4) scriptstart
3) kickstart
64
Any line in a kickstart file that starts with a(n) ____ symbol is a comment line and is ignored by the installation program. 1) * 2) # 3) $ 4) %
2) #
65
If a Linux installation ends abnormally and the screen displays a “fatal signal ____” error message, it indicates an error known as a segmentation fault. 1) 0 2) 1 3) 10 4) 11
4) 11
66
Some installations fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders. 1) 256 2) 512 3) 1024 4) 2048
3) 1024
67
____ installation log file(s) is/are created by the Fedora installation program. 1) One 2) Two 3) Three 4) Four
2) Two
68
To verify hardware settings, you can examine the contents of the ____ directory. 1) /log 2) /root 3) /proc 4) /hw
3) /proc
69
To ensure that Linux has detected the correct amount of RAM in the system after installation, you can view the contents of the ____ file. 1) /proc/mem 2) /proc/cpuinfo 3) /proc/memoryinfo 4) /proc/meminfo
4) /proc/meminfo
70
The ____ file in the /proc directory contains a list of memory address ranges reserved for device use. 1) meminfo 2) ioports 3) iomem 4) misc
2) ioports
71
The ____ file in the /proc directory contains statistics on the performance of the processor. 1) cpuinfo 2) modules 3) kcore 4) loadavg
4) loadavg
72
If a hard disk fails in a RAID level 0 configuration, is all of the data lost? 1) Yes 2) No
1) Yes
73
Can you install Linux from ISO image files on a hard disk? 1) Yes 2) No
1) Yes
74
Can disk imaging software be used to perform a Linux installation? 1) Yes 2) No
1) Yes
75
Can you use a Kickstart Configurator to make major changes to a kickstart file? 1) Yes 2) No
1) Yes
76
In a laptop computer, can changes to the BIOS be retrieved if the battery dies? 1) Yes 2) No
2) No
77
There can be multiple device files per device. 1) True 2) False
2) False
78
After a typical Fedora Linux installation, over 700 different device files are in the /dev directory. 1) True 2) False
1) True
79
In Linux, you must use only one type of filesystem on a system. 1) True 2) False
2) False
80
When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD. 1) True 2) False
1) True
81
The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations. 1) True 2) False
1) True
82
Device files that represent disks, such as floppy disks, CD-ROMs, DVDs, USB flash drives, and hard disks, are typically character device files because a fast data transfer rate is preferred. 1) True 2) False
2) False
83
When a device is mounted, it is attached to a certain directory on the directory tree called a(n) mount point. 1) True 2) False
1) True
84
To check whether the /mnt/floppy directory is being used by any users, you can use the fuser command with the -u option 1) True 2) False
1) True
85
PATA hard disk drives typically have faster data transfer speeds, and most systems allow for the connection of more than four such hard disks. 1) True 2) False
2) False
86
To view the size of a directory and its contents in Kilobytes, you can use the du command. 1) True 2) False
1) True
87
Devices that transfer data in a character-by-character fashion are referred to as ____ devices. 1) text 2) block 3) character 4) binary
3) character
88
The ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave). 1) /dev/hdc1 2) /dev/hdb1 3) /dev/hda1 4) /dev/hdc2
2) /dev/hdb1
89
The ____ device file represents the second serial port on the system (COM2). 1) /dev/ttyS0 2) /dev/tty2 3) /dev/tty1 4) /dev/ttyS1
4) /dev/ttyS1
90
If you do not know the type, major, or minor number of a device, you can use the ____ command to re-create the device based on the common name. 1) /dev/MAKEDEV 2) mkfs 3) mknod 4) /dev/makedevice
1) /dev/MAKEDEV
91
The ____ filesystem is used by software programs that write to a CD-RW or DVD-RW drive. 1) ntfs 2) udf 3) ext2 4) hpfs
2) udf
92
The ____ filesystem contains most of the operating system files. 1) boot 2) data 3) mnt 4) root
4) root
93
To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command. 1) -t 2) -f 3) -c 4) -o
1) -t
94
CD-ROMs typically use the ____ filesystem type. 1) ntfs 2) ext2 3) iso9660 4) ext3
3) iso9660
95
Linux requires ____ partition(s) at minimum. 1) one 2) two 3) three 4) four
2) two
96
Data is read off of hard disks in concentric circles called ____. 1) tracks 2) blocks 3) sectors 4) cylinders
1) tracks
97
To create partitions after installation, you can use the ____ command. 1) format 2) formatdisk 3) fdisk 4) partition
3) fdisk
98
The easiest method for monitoring free space by mounted filesystems is to use the ____ command. 1) df 2) fs 3) dfs 4) fd
1) df
99
Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems. 1) breaks 2) corruption 3) degradation 4) failures
2) corruption
100
To check a filesystem for errors, you can use the ____ command, which can check filesystems of many different types. 1) fcheck 2) fsc 3) fscheck 4) fsck
4) fsck
101
You can edit the quotas for certain users by using the ____ command. 1) edquota 2) editquota 3) quota 4) repquota
1) edquota
102
Can several different devices share the same major number? 1) Yes 2) No
1) Yes
103
Is ext3 the traditional filesystem used on Linux? 1) Yes 2) No
2) No
104
Can any existing directory can be used as a mount point? 1) Yes 2) No
1) Yes
105
If a device is mounted to a directory that contains files, are those files temporarily covered up until the device is unmounted? 1) Yes 2) No
1) Yes
106
Can CD-ROMs be ejected from the CD-ROM drive before the CD-ROM is properly unmounted? 1) Yes 2) No
2) No
107
If you find a corrupted device file, or accidentally delete a device file, the ____________________ command can be used to re-create the device file if you know the type, major, and minor numbers.
mknod
108
Creating a filesystem on a device is commonly referred to as ____________________.
formatting
109
At installation, Fedora Linux creates a symbolic link called ____________________ to the correct device file for your first CD-ROM drive.
/dev/cdrom
110
Each track on a hard disk is divided into ____________________ of information.
sectors
111
An extended partition can contain many subpartitions called ____________________.
logical drives
112
Indicates a particular device.
minor number
113
File that contains a list of devices that are currently used on the system and their major numbers.
/proc/devices
114
File on the hard disk representing a device on a Linux system
device file
115
Command used to create modify filesystem parameters.
tune2fs
116
Directory that stores device files.
/dev
117
The first readable sector of a hard disk, where partition definitions are stored.
MBR
118
Hard disk quotas that the user can exceed for a certain period of time.
soft limits
119
Rigid quota limits that the user cannot exceed.
hard limits
120
Points to the device driver for a device in the Linux kernel.
major number
121
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, you can simply type the ____ command. 1) mount -o 2) mount -f 3) mount -u 4) mount -a
4) mount -a