Linux - Reading summaries Flashcards

(63 cards)

1
Q

systemd

A

Utility for activating system resources, server daemons, and other processes at boot time and on a running system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

systemctl start [unit]

A

Start a service or other systemd unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

systemctl stop [unit]

A

Stop a service or other systemd unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

systemctl reload [unit]

A

Reload configuration of a service or other systemd unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

systemctl enable [unit]

A

Enable a service or other systemd unit to start automatically at boot time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

systemctl disable [unit]

A

Disable a service or other systemd unit from starting automatically at boot time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

systemctl status [unit]

A

Check the status of a service or other systemd unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

systemctl list-dependencies [unit]

A

List all service units that a specific service unit depends on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

systemctl mask [unit]

A

Prevent a service unit from running, even to satisfy dependencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Service units

A

Managed by systemd to control individual services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Socket units

A

Managed by systemd to control socket-based activation of services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Path units

A

Managed by systemd to activate services based on file system events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

File ownership permissions

A

Three categories: user, group, and other users. Most specific permission applies. User permissions override group permissions, and group permissions override other permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ls -l option

A

Used with the ls command to expand the file listing to include both file permissions and ownership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

chmod command

A

Changes file permissions from the command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Methods of representing permissions

A

Two methods: symbolic or octal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

chown command

A

Changes file ownership. The -R option recursively changes the ownership of a directory tree.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

umask command

A

Displays or sets the default file permissions for newly created files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Default umask values for Bash

A

Defined in /etc/login.defs and might be affected by settings in /etc/profile, /etc/bashrc, files in /etc/profile.d, or user’s shell initialization files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

suid, sgid, and sticky bits

A

Special permissions providing additional access-related features to files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Process

A

A running instance of an executable program, with states including running, sleeping, stopped, or zombie.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ps command

A

Lists processes running on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Terminal Session

A

Each terminal has its own session, with a foreground process and independent background processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

jobs command

A

Displays processes within a terminal session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Signal
A software interrupt reporting events to an executing program.
26
kill command
Sends a signal to control processes.
27
pkill command
Sends a signal to control processes based on process names.
28
killall command
Sends a signal to control processes based on process names.
29
Load Average
An estimate of how busy the system is.
30
top command
Displays dynamic real-time information about running processes and system resource usage.
31
uptime command
Displays how long the system has been running and the average system load over different time intervals.
32
w command
Displays information about currently logged-in users and what they are doing, including load average.
33
systemd
Provides a method for activating system resources, server daemons, and other processes at boot time and on a running system.
34
systemctl start/stop/reload/enable/disable [service]
Commands used with systemctl to manage services, including starting, stopping, reloading, enabling, and disabling.
35
systemd utility
Used to manage service units, socket units, and path units.
36
systemctl status [unit]
Command used to determine the status of system daemons and network services started by the systemd utility.
37
systemctl list-dependencies [unit]
Command to list all service units that a specific service unit depends on.
38
Masking a service unit
systemd feature allowing a service unit to be masked so that it does not run, even to satisfy dependencies.
39
ssh command
Allows users to securely access remote systems using the SSH protocol.
40
Known Hosts files (~/.ssh/known_hosts and /etc/ssh/ssh_known_hosts)
Files where client systems store identities of remote servers.
41
SSH authentication types
Supports both password-based and key-based authentication methods.
42
ssh-keygen command
Generates an SSH key pair for authentication.
43
ssh-copy-id command
Exports the public key to remote systems for key-based authentication.
44
sshd service
Implements the SSH protocol on Red Hat Enterprise Linux systems.
45
/etc/ssh/sshd_config file
Configuration file for advanced SSH settings.
46
Recommended SSH configurations
Disable remote logins as root and require public key authentication instead of password-based authentication.
47
TCP/IP network model
A simplified, four-layered model describing how different protocols interoperate for sending traffic over the internet.
48
IPv4
The primary network protocol used on the internet today.
49
IPv6
Intended as a replacement for IPv4 network protocol.
50
Dual-stack mode
Red Hat Enterprise Linux operates using both IPv4 and IPv6 protocols simultaneously by default.
51
Network routes
Determine the correct network interface to send packets to a particular network.
52
NetworkManager daemon
Monitors and manages network configuration.
53
nmcli command-line tool
Configures network settings with the NetworkManager daemon.
54
Network configurations directory
In Red Hat Enterprise Linux 9, the default location is /etc/NetworkManager/system-connections.
55
System's static hostname
Stored in the /etc/hostname file.
56
hostnamectl command
Modifies or views the status of the system's hostname and related settings.
57
Red Hat Subscription Management
Provides tools for entitlements, updates, and tracking support contracts and subscriptions.
58
RPM packages
Software provided in RPM format for installation, upgrading, and uninstallation on the system.
59
rpm command
Can query local database for package information and install downloaded package files.
60
dnf utility
A powerful command-line tool for installing, updating, removing, and querying software packages.
61
Application Streams
Red Hat's feature to provide a single repository hosting multiple versions of application packages and dependencies.
62
Daemon
A background process that runs continuously on a computer system, performing various tasks without direct user interaction
63