Terminology Flashcards

1
Q

Describe $PATH

A

$PATH is a variable that contains a list of directories that are searched for executable files when a user enters a command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does . (dot) represent in the command line?

Don’t confuse with the dot (.) regular expression.

A

. The current directory. Its value can be requested using the pwd command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an absolute filename?

A

A filename that is complete and starts with the name of the root directory, including all directories up to the current file or directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Linux what is an access control list (ACL)?

A

In Linux permissions, a system that makes it possible to grant permissions to more than one user and more than one group. Access control lists also allow administrators to set default permissions for specific directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is anacron?

A

A service that ensures that vital cron jobs can be executed when the server is down at the moment that the job normally should be executed. Can be considered an extension to cron.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does AND mean?

A

A logical construction that can be used in scripts. In an AND construction, the second command is executed only after successful execution of the first command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an application profile?

A

A collection of packages that may be used to install a specific version of software, according to a specific installation profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an application stream?

A

A specific version of a dnf module that can be installed as such.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the at utility?

A

A service that can be used to schedule future jobs for one-time execution.

linux at command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an **attribute **?

A

A property that can be set to a file or directory and that will be enforced no matter which user with access permission accesses the file.

For instance, a file that has the immutable (i) attribute set cannot be deleted, not even by the root user. However, the root user does have the capability to change the attribute, which would allow the root user to delete the file anyway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an audit log?

A

The main log file in /var/log/audit/audit.log, which by default contains all messages that are logged by the auditd service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is auditd?

A

A service that runs by default on Red Hat Enterprise Linux and can be configured to log very detailed information about what is happening on RHEL.

Auditing is complementary to system logging and can be used for compliancy reasons. On RHEL, the auditing system takes care of logging SELinux-related messages, which makes it a relatively important system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is autofs?

A

A service that takes care of automatically mounting file systems at the moment that a specific directory is accessed.

This service is very useful to ensure the automatic mounting of home directories for users in a centralized user management system, as can be implemented by the LDAP service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is automount?

A

The process that is started by the autofs service. See autofs for more details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a background process?

A

A process that is running on a system without actively occupying a console.

Processes can be started in the background by adding a & after the command that starts the process. See also foreground process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a backup?

A

A copy of important data, which can be restored if at any point in time the original data gets lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Bash?

A

The default shell that is used on Red Hat Enterprise Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Basic Input/Output System (BIOS)?

A

The first software that is started when a computer starts on older IBM-compatible computers.

Settings in the BIOS can be changed by using the BIOS setup program.

See also Unified Extensible Firmware Interface (UEFI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is binary?

A

A numbering scheme that is based on bit values that can be on or off.

Binary numbers are 0 and 1. Because binary numbers are difficult to use, decimal, hexadecimal, or octal numbers often are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a boot loader?

A

Program that is started as the very first thing while starting a computer and that takes care of loading the operating system kernel and initramfs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is BtrFS?

A

A general-purpose Linux file system that is expected to become the default file system on Red Hat Enterprise Linux in a future release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is bzip2?

A

A compression utility that can be used as an alternative to gzip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is cache?

A

In memory management, the area of memory where recently used files are stored.

Cache is an important mechanism to speed up reads on servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does capability refer to?

A

A specific task that can be performed on Linux.

User root has access to all capabilities; normal users have access to limited sets of capabilities only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a certificate?

A

In PKI cryptography, contains the public key of the issuer of the certificate. This public key is signed with the certificate of a certificate authority, which guarantees its reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a certificate authority (CA)?

A

A commonly known organization that can be used to guarantee the reliability of PKI certificates.

The certificate authority provides a certificate that can be used to sign public key certificates. Instead of using commonly known organizations, self-signed certificates can be used for internal purposes as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is chrony?

A

The service that offers time synchronization services in Red Hat Enterprise Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is chroot?

A

An environment where a part of the file system is presented as if it were the root of the file system.

Chroot is used as a security feature that hides part of the operating system that is not required by specific services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is CIFS?

A

**Common Internet File System (CIFS) **

The standardized version of the Microsoft Server Message Block (SMB) protocol, which is used to provide access to shared printers, files, and directories in a way that is compatible with Windows servers and clients.

CIFS has become the de facto standard for file sharing in IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a conditional loop?

A

In shell scripting, a set of commands that is executed only if a specific condition has been met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a console?

A

In Linux, the primary terminal where a user works. It is also a specific device with the name /dev/console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a container?

A

A ready-to-run application that is started from an image and includes all application dependencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a container engine?

A

The code that allows containers to run on top of an operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In SELinux, what is context?

A

In SELinux, a label that is used to define the security attributes of users, processes, ports, and directories. These contexts are used in the SELinux policy to define security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

In SELinux, what is a context type?

A

In SELinux, a label that identifies the SELinux properties of users, ports, and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is CRI-o?

prounced CRY-o

A

The default container engine on RHEL 9.

Pronounced CRY-o.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a cron?

A

A service that takes care of starting services repeatedly at specific times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is **deduplication **?

A

A storage technology that analyzes data to be stored on disk and takes out duplicate patterns to allow for more efficient storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is dependency hell?

A

Situation where for package installation, other packages are needed, which by themselves could require dependencies as well. The problem of dependency hell has been fixed by the introduction of repository-based systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In rsyslog, what is a destination?

A

In rsyslog, the place where log messages should be sent by the logging system.

Destinations are often files, but can also be input modules, output modules, users, or hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is a device file?

A

A file that is created in the /dev directory and that is used to represent and interact with a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a device mapper?

A

A service that is used by the Linux kernel to communicate with storage devices.

Device mapper is used by LVM, multipath, and other devices, but not by regular hard disks. Device files that are created by device mapper can be found in the /dev/mapper directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is dmesg?

A

dmesg is a utility that can be used to read the kernel ring buffer, which contains log messages that were generated by the Linux kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is dnf?

A

dnf is the new software manager that replaces the yum utility in RHEL 9.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is Docker?

A

A common solution to run containers. Docker was the default container solution in RHEL 8 but is no longer supported and was replaced with CRI-o/podman in RHEL 9.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is dracut?

A

dracut is a utility used to generate the initramfs, an essential part of the Linux operating system that contains drivers and other vital files required to start a Linux system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

In RHEL what is enforcing mode?

A

The SELinux mode where SELinux is fully operational and applies all restrictions that have been configured for a specific system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What does the term environment mean?

A

The collection of settings that users or processes are using to do their work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is epoch time

A

In Linux, the number of seconds that have passed since epoch (corresponds to midnight on January 1, 1970). Some utilities write epoch time instead of real clock time.

Epoch time is also know as unix time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is escaping?

A

In a shell environment, using special syntax to ensure that specific characters are not interpreted by the shell.

Escaping may be necessary to show specific characters onscreen or to ensure that regular expression metacharacters are not interpreted by the bash shell first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the exec command used for?

A

Exec is a system call that replaces the current process with another one; this command does not create a new process, it just replaces the bash with the command to be executed. If the exec command is successful, it does not return to the calling process

See also fork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

In NFS what is export?

A

In NFS, a directory that is shared on an NFS server to allow access to other servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are the three Ext file system version?

A

Ext2, Ext3, and Ext4

Up to RHEL 6, Ext4 was the default file system. It is now considered inadequate for modern storage needs, which is why Ext4 in RHEL 7 was replaced by XFS as the default file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is an extended partition?

A

A solution to create more than four partitions on an MBR disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is an external command?

A

A command that exists as a file on disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

In rsyslogd what is facility?

A

facility in rsyslogd is the source where log information comes from.

A strictly limited number of facilities have been defined in rsyslogd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is FHS?

A

Filesystem Hierarchy Standard (FHS) A standard that defines which Linux directories should be used for which purpose. Read man 7 file-hierarchy for a specification of the FHS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is a file descriptor?

A

A pointer that is used by a Linux process to refer to files that are in use by the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the default management tool for firewall rules in RHEL?

A

firewalld is the modern service (replacing iptables) that is used since RHEL 7 to implement firewalling based on the Linux kernel firewalling framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is a foreground process?

A

A process that is running on a system and occupies the console it is running on.

Linux processes that are started by users can be started in the foreground or in the background. If a process has been started as a foreground process, no other processes can be started in the same terminal until it finishes or is moved to the background.

See also background process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What does fork mean when refering to processes?

A

A system call that starts a new process as a child of the current process.

This is the default way commands are executed.

See also exec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is fstab?

A

fstab a configuration file that is used on Linux to mount file systems automatically when the system starts.

An intro to /etc/fstab file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is a hard link?

A

A name associated with an inode. Inodes are used to store Linux files.

An inode contains the complete administration of the file, including the blocks in which the file is stored. A file that does not have at least one hard link is considered a deleted file. To increase file accessibility, more than one hard link can be created for an inode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is hardware time?

A

The time that is provided by computer hardware, typically the BIOS clock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is init?

A

The first process that is started once the Linux kernel and initramfs have been loaded.

From the init process, all other processes are started. As of RHEL 7, the init process has been replaced by Systemd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is initramfs?

A

The initial RAM file system. Contains drivers and other files that are needed in the first stages of booting a Linux system.

On Red Hat Enterprise Linux, the initramfs is generated during installation and can be manually re-created using the dracut utility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is inode?

A

A structure that contains the complete administration of a file.

Every Linux file has an inode, and the inode contains all properties of the file but not the filename.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

In rsyslog, what is an input module?

A

In rsyslog, an input module allows rsyslog to receive log messages from specific sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is an internal command?

A

An internal command is a part of the shell and does not exist as a file on disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is iptables used for?

A

iptables is an older solution to create firewall rules on the Linux operating system. As of RHEL 7, iptables has been replaced by firewalld.

It interfaces with the netfilter Linux kernel firewalling functionality and was the default solution to create software firewalls on earlier versions of RHEL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is journalctl?

A

The command used to manage systemd-journald.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is journald?

A

systemd-journald is the part of Systemd that takes care of logging information about events that have been happening.

The introduction of journald ensures that information about all services can be logged, regardless of how the service itself is configured to deal with information that is to be logged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is the linux kernel?

A

kernel is the central component of the operating system.

It manages I/O requests from software and translates them into data processing instructions for the hardware in the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is the kernel ring buffer?

A

The kernel ring buffer is a part of memory where messages that are generated by the kernel are stored.

The dmesg command enables you to read the contents of the kernel ring buffer.

75
Q

What is kernel space?

A

kernel space is the part of memory that is reserved for running privileged instructions.

Kernel space is typically accessible by the operating system kernel, kernel extensions, and most device drivers. Applications normally run in user space, which ensures that a faulty application cannot crash the computer system.

76
Q

What does KVM stand for?

A

Kernel-based Virtual Machine (KVM)

The Linux kernel module that acts as a hypervisor and makes it possible to run virtual machines directly on top of the Linux kernel.

77
Q

What is the kill command?

A

kill is a command that can be used to send a signal to a Linux process. Many signals are defined (see man 7 signal), but only a few are commonly used, including SIGTERM and SIGKILL, both of which are used to stop processes.

78
Q

Within the file system, what is a label?

A

A label is a name that can be assigned to a file system.

Using labels can be a good idea, because once a label is assigned, it will never be changed, which guarantees that the file system can still be mounted, even if other parameters such as the device name have changed.

However, UUIDs are considered safer than labels because the chance of having a duplicate label by accident is much higher than the chance of having a duplicate UUID. See also universally unique ID (UUID).

79
Q

In regex what is a line anchor?

A

line anchor in regular expressions is a character that refers to a specific position in a line.

80
Q

In systemd what is linger?

A

linger is the Systemd feature that is needed to start Systemd user units at system boot and not at user login.

81
Q

What is a logical extent?

A

logical extent is the building block that is used in LVM to create logical volumes.

It normally has a size of a few megabytes that corresponds to the size of the physical extents that are used.

82
Q

What is a logical partition?

A

logical partition A partition that is created in an extended partition. See also extended partition.

83
Q

What is a logical partition?

A

logical partition A partition that is created in an extended partition. See also extended partition.

84
Q

What does LVM stand for?

A

Logical Volume Manager (LVM)

The software that makes it possible to work with logical volumes.

85
Q

What is the login shell?

A

login shell

The shell that is opened directly after a user has logged in.

86
Q

What does MBR stand for?

A

Master Boot Record (MBR)

On a BIOS system, the first 512 bytes on the primary hard disk. It contains a boot loader and a partition table that give access to the different partitions on the hard disk of that computer.

87
Q

In DNF what is a module?

A

A collection of software packages that can be managed as one entity and can contain different versions of a software solution.

88
Q

What is a namespace?

A

A namespace is an isolated environment that is created by the Linux kernel and allows for running containers in complete isolation.

Namespaces exist for multiple aspects of the operating system, including mounts, processes, users, and more.

89
Q

What is a netfilter?

A

The netfilter is the part of the Linux kernel that implements firewalling.

90
Q

What does NFS stand for?

A

Network File System (NFS)

A common UNIX solution to export physical file systems to other hosts on the network. The other hosts can mount the exported NFS directory in their local file system.

91
Q

What are nftables?

A

nftables are the service that manages kernel firewalling.

It is a replacement of the older iptables service.

92
Q

What is the nice command used for?

A

The nice command lets you run a command at a priority lower than the command’s normal priority.

A negative nice value will make the process more aggressive, giving it a higher priority (which is expressed by a lower priority number); a positive nice value will make a process less eager so that it gives priority to other processes.

93
Q

What is the octal numeral system?

A

octal is numbering scheme that uses the numbers 0 through 7 only.

Used when working with Linux permissions using the umask setting or the chmod command.

94
Q

In the Linux file system what is ownership?

A

ownership In file system permissions, the basis of the effective permissions that a user has. Every file has a user owner and a group owner assigned to it.

95
Q

What is a package?

A

A package is a bundle that is used to distribute software. A package typically contains a compressed archive of files and metadata that includes instructions on how to install those files.

96
Q

What is a package group?

A

A package group is a group of packages that can be installed as such using the dnf groups install command.

97
Q

In DNF what is a package group?

A

In package group (in dnf) is a group of software packages that can be installed with a single command.

DNF or Dandified YUM

98
Q

What is a pager program?

A

pager is a program that can be used to browse page by page through a text file.
The less utility provides one of the most common Linux pagers.

99
Q

What is the parent shell?

A

The parent shell is the environment from which a shell script or program is started. Processes or child scripts will inherit settings from the parent shell.

100
Q

In SELinux what is permissive mode?

A

permissive mode is the SELinux mode where nothing is blocked but everything is logged in the audit log. This mode is typically used for troubleshooting SELinux issues.

101
Q

What is a physical extent?

A

A physical extent is the physical building block that is used when creating LVM physical volumes.

Typically, the size is multiple megabytes.

102
Q

What is a physical volume?

A

A physical volume is the foundation building block of an LVM configuration.

The physical volume typically corresponds to a partition or a complete disk device.

103
Q

What does PID stand for?

A

process identification number

104
Q

What is a pipe?

A

A pipe Is a structure that can be used to forward the output of one command to be used as input for another command.

105
Q

What is POSIX?

A

Portable Operating System Interface (POSIX)

A standard that was created to maintain compatibility between operating systems. The standard mainly applies to UNIX and guarantees that different flavors of Linux and UNIX are compatible with one another.

106
Q

What is the portmapper?

A

portmapper (Remote Procedure Call)

A Remote Procedure Call service that needs to run on systems that provide RPC services.

Portmapper uses dynamic ports that do not correspond to specific TCP or UDP ports; the service will pick a UDP or TCP port that will be used as long as the process is active.

When the process is restarted, chances are that different ports are used. They need to be mapped to fixed UDP and TCP ports in order to make it possible to open the firewall for these ports. Portmapper is still used by components of the NFS service.

107
Q

What is a primary group?

A

A primary group the group that is listed in the group membership field for a user in /etc/passwd.

Every Linux user is a member of a primary group. Apart from that, users can be made a member of secondary groups as well.

108
Q

What is the primary partition?

A

The primary partition in MBR, one of a maximum of four partitions that can be created in the Master Boot Record. See also extended partition.

109
Q

What is does priority mean in process handling?

A

priority (in process handling) Specifies the importance of a process.

Process priority is expressed with a number (which can be modified using nice). Processes with a lower priority number are serviced before processes with a higher priority number.

110
Q

What is does priority mean in rsyslog?

A

In rsyslog, priority is used to specify the severity of a logged event.
Based on the severity, specific actions can be taken.

111
Q

What is proc?

A

proc is a kernel interface that provides access to kernel information and kernel tunables. This interface is available through the /proc file system.

112
Q

What is a process?

A

A process is a task that is running on a Linux machine. Roughly, a process corresponds to a program, although one program can start multiple processes.

113
Q

What is a process identification number (PID)?

A

process identification number (PID) is a unique number that is used to identify a process running on a Linux system.

114
Q

In tuned what is a profile?

A

A profile in tuned, a collection of performance settings that can easily be applied.

Tuned is a Linux feature that monitors a system and optimizes its performance under certain workloads.

115
Q

What does PV stand for?

A

Physical volume

116
Q

What does RTC stand for?

A

real-time clock (RTC)

The hardware clock that is installed on the computer motherboard.

117
Q

What does the reboot command do?

A

reboot is the procedure of stopping the computer and starting it again.

118
Q

What does RPM stand for?

A

Red Hat Package Manager (RPM)

The name for the package format that is used on RHEL for software packages and for the Package Management software. RPM has become the standard for package management on many other Linux distributions as well.

119
Q

What is a reference clock?

A

A reference clock is a clock that is used as a time source in an NTP time configuration.

Typically, a reference clock is a highly reliable clock on the Internet, but it can be an internal clock on the computer’s motherboard as well.

120
Q

What is a regular expression?

A

A regular expression is a search pattern that allows users to search text patterns in a flexible way.

Not to be confused with shell metacharacters.

121
Q

What is a relative filename?

A

A relative filename is a filename that is relative to a directory that is not the root directory.

122
Q

What is a Remote Procedure Calls (RPC)?

A

Remote Procedure Calls (RPC)
A method for interprocess communication that allows a program to execute code in another address space. Remote Procedure Calls is an old protocol and as such is still used in the Network File System.

123
Q

What is a repository (repo)?

A

A repository is an installation source that contains installable packages and an index that contains information about the installable packages so that the installation program dnf can compare the version of packages currently installed with the version of packages available in the repository.

124
Q

What is rsyslogd?

A

rsyslogd is the generic daemon that logs messages.

125
Q

What is samba?

A

Samba is the name for the Linux service that implements the SMB protocol.

126
Q

What is the scheduler?

A

The scheduler is the part of the Linux kernel that monitors the queue of runnable processes and allocates CPU time to these processes.

127
Q

What is a secondary group?

A

The secondary group is a group that a user is a member of but which membership is not defined in the /etc/passwd file.

When new files are created, the secondary group will not automatically become the owner of those files.

128
Q

What does SSH stand for?

A

**Secure Shell (SSH) **

A solution that allows users to open a shell on a remote server where security is implemented by using public/private key cryptography.

129
Q

What SELinux?

A

SELinux is a Linux kernel security module that provides a mechanism for supporting access control security policies.

130
Q

What is a SELinux Policy?

A

SELinux Policy

The collection of rules that is used to define SELinux security.

131
Q

What does SMB stand for?

A

Server Message Block (SMB)

An application-level protocol that is used to provide shared access to files, printers, and serial ports, which on Linux is implemented in the Samba server.

132
Q

In firewalld what does service mean?

A

service (in firewalld) is a configuration of firewall settings that is used to allow access to specific processes.

133
Q

In systemd what are services?

A

in Systemd services are processes that need to be started to provide specific functionality.

134
Q

What is shebang?

A

A shebang starts with a #, which is followed by a ! and the complete pathname of the shell, such as #!/bin/bash.

The characters used in a script to indicate which shell should be used for executing the code in the shell script. If no shebang is used, the script code will be interpreted by the parent shell, which may lead to errors in some cases.

135
Q

What is the shell?

A

The shell is the environment from which commands can be executed. Bash is the default shell on Linux, but other shells exist as well.

136
Q

What are shell metacharacters?

A

shell metacharacters are characters such as `
*, ?, and [a-z]
`
that allow users to refer to characters in filenames in a flexible way.

137
Q

What is a signal?

A

A signal is an instruction that can be sent to a process.

Common signals exist, such as SIGTERM and SIGKILL, but the Linux kernel allows a total of 32 different signals to be used. To send a signal to a process, use the kill command.

138
Q

What is software time?

A

software time / system time

The time that is maintained by the operating system. When a Linux system boots, system time is set to the current hardware time, and while the operating system is running, it is often synchronized using the Network Time Protocol (NTP).

139
Q

In SELinux what is source context?

A

In SELinux source context is the context of the processes or users that initiate an action.

A context in SELinux is a label that identifies allowed operations. Everything in an SELinux environment has a context.

140
Q

What does STDERR mean?

A

standard error (STDERR) The default location where a program sends error messages.

141
Q

What does STDIN mean?

A

standard input (STDIN) The default location where a program gets its input.

142
Q

What does STDOUT?

A

standard output (STDOUT) The default location where a program sends its regular output.

143
Q

What is star?

A

star A legacy extended version of tar, which offers support for extended attributes. Currently no longer required, as all of its functionality has been integrated in tar.

144
Q

What is Stratis?

A

Stratis is the new volume managing file system that was introduced in RHEL 8.

145
Q

What is the subshell?

A

The subshell is a shell that is started from another shell. Typically, a subshell is started by running a shell script.

146
Q

What is a symbolic link?

A

symbolic link is a special type of file that contains a reference to another file or directory in the form of an absolute or relative path.

147
Q

What is sysfs?

A

sysfs is the kernel interface that is mounted on the /sys directory and which is used to provide access to parameters that can be used for managing hardware settings.

148
Q

What is a system call?

A

system call is a low-level operating system instruction.

149
Q

What is system time?

A

system time is the time that is maintained by the operating system.

When a Linux system boots, system time is set to the current hardware time, and while the operating system is running, it is often synchronized using the Network Time Protocol (NTP).

150
Q

What is systemd?

A

Systemd is the service manager on RHEL 9.

Systemd is the very first process that starts after the kernel has loaded, and it takes care of starting all other processes and services on a Linux system.

151
Q

What is systemd-journald?

A

systemd-journald is the part of Systemd that takes care of logging information about events that have been happening.

The introduction of journald ensures that information about all services can be logged, regardless of how the service itself is configured to deal with information that is to be logged.

152
Q

What is a tainted kernel

A

A tainted kernel is a kernel in which unsupported kernel modules have been loaded.

Tainted kernels

153
Q

What does tar stand for?

A

The Tape Archiver; the default Linux utility that is used to create and extract backups.

154
Q

In Systemd what is a tartget?

A

In Systemd a target, is a collection of unit files that can be managed together.

155
Q

In SELinux what is target context?

A

In SELinux, target context is the context that is set to a target object, such as a port, file, or directory.

156
Q

What is a terminal?

A

terminal

Originally, the screen that was used by a user to type commands on.

On modern Linux systems, pseudo terminals can be used as a replacement. A pseudo terminal offers a shell window from which users enter the commands that need to be executed.

157
Q

What is thin allocation?

A

thin allocation

In storage, an approach that enables the system to present more storage to the storage user than what is really available by using smart technologies to store data, like deduplication.

158
Q

What is a thread?

A

A thread is a subdivision of a process.

Many processes are single threaded, which means that process is basically one entity that needs to be serviced.

On a multicore or multi-CPU computer system, working with multithreaded processes makes sense.

That way, the different cores can be used to handle the different threads, which allows a process to benefit from multicore or multithreaded environments.

159
Q

What is time synchronization?

A

time synchronization is a system that ensures that multiple servers are using the exact same time.

To accomplish time synchronization, it is common to use an external time server, as defined in the Network Time Protocol (NTP).

160
Q

What is the timer command used for?

A

timer is a Systemd unit type that can be used as an alternative to cron jobs and run units at a specific time.

161
Q

What does TLS stand for?

A

**Transport Layer Security (TLS) **

A cryptographic protocol that is created to ensure secured communications over a computer network. In TLS, public and private keys are used, and certificates authenticate the counterparty.

TLS was formerly known as SSL.

162
Q

What is TTY?

A

TTY is a program that provides a virtual terminal on Linux.

Every terminal still has a TTY name, which is either tty1-6 for virtual TTYs or /dev/pts/0-nn for pseudo terminals.

TTY stands for “teletypewriter.

163
Q

What is tuned?

A

tuned is a service on RHEL that enables administrators to easily apply performance settings by using profiles.

164
Q

What is udev?

A

udev is a service that works with the Linux kernel to initialize hardware.

165
Q

What does UEFI stand for?

A

Unified Extensible Firmware Interface (UEFI)

A replacement of the Basic Input/Output System used on older IBM-compatible computers as the first program that runs when the computer is started. UEFI is the layer between the operating system and the computer firmware.

166
Q

What is umask?

A

umask is an octal value that defines the default permissions as a shell property.

167
Q

What does the umount command do?

A

umount is the command that is used to decouple a file system from the directory on which it is mounted.

168
Q

What is a unit?

A

unit is an item that is managed by Systemd.

Different types of units exist, including service, path, mount, and target units.

169
Q

What does UUID stand for?

A

universally unique ID (UUID) is an identification number consisting of a long random hexadecimal number that is globally unique.

170
Q

What is an unprivileged user?

A

unprivileged user is a regular non-root user account to which access restrictions apply, as applied by permissions.

171
Q

What is the definition of a user?

A

A user is an entity that is used on Linux to provide access to specific system resources.

Users can be used to represent people, but many services also have a dedicated user account, which allows the service to run with the specific permissions that are needed for that service.

172
Q

What is user space?

A

user space is the area of memory that is accessible by application software that has been started with non-root privileges.

173
Q

What does UTC stand for?

A

Coordinated Universal Time.

174
Q

What is a value?

A

value is the data that is assigned to a specific property, variable, or record.

175
Q

What is a variable?

A

variable is a label that contains a specific value that can be changed dynamically. In scripting, variables are frequently used to allow the script to be flexible.

176
Q

What is VFAT?

A

VFAT is the Linux kernel driver that is used to access FAT-based file systems.

FAT is a commonly used file system in Windows environments. The Linux VFAT driver allows usage of this file system.

177
Q

What does VG stand for?

A

volume group (VG)

The abstraction layer that in Logical Volume Manager is used to represent all available storage presented by physical volumes from which logical volumes can be created.

178
Q

In systemd what are wants?

A

want is an indication for a Systemd unit file that it is supposed to be started from a specific Systemd target.

Wants= A weaker version of Requires=. Units listed in this option will be started if the configuring unit is.

However, if the listed units fail to start or cannot be added to the transaction, this has no impact on the validity of the transaction as a whole.

179
Q

What is XFS?

A

XFS is a high-performance 64-bit file system that was created in 1993 by SGI and which in RHEL 9 is used as the default file system.

180
Q

What is Xz?

A

Xz is a compression utility that can be used as an alternative to gzip or bzip2.

181
Q

What is YUM?

A

Yellowdog Update, Modified the full name for Yum, the meta package handler that on older versions of RHEL was used to install packages from yum repositories.

Now replaced with dnf.

182
Q

What is a zombie process?

A

A zombie is a process that has lost contact with its parent and for that reason cannot be managed using regular tools.

183
Q

In firewalld what is a zone?

A

zone In firewalld, a collection of one or more network interfaces that specific firewalld rules are associated with.