each device attached to a system can be represented by multiple device files.

each device attached to a system can be represented by multiple device files.


S
Asked by 2 years ago
9.9k points

<

table class="table table-hover">

Most printers are plug and play compatible and must be manually configured when they are plugged into the system.FalseThe compress utility preserves the original ownershi, modification, and access time for each file that it compresses.TrueWhen using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.FalseWhen creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.FalseThe tar utility cannot back up device files or files with filenames longer than 255 charactersTrueClass D addresses are used for multicasting.TrueSLIP is a newer technology than PPPFalsePasswords used by the PPP daemon are stored in two files:/etc/ppp/pap-secrets and /etc/ppp/chap-secrets.TrueA route table is a list of TCP/IP networks that is stored in system memory.TrueAll DNS servers contain a DNS cache fileTrueThe very secure FTP Daemin is a stand-alone Daemon.TrueThe use of NFS is less common than the use of FTP to transfer files on public networks.TrueAlmost all hardware problems are the result of damaged hardware.FalsePerformance problems are caused by hardware, not software.FalseIf some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the SU command.FalseTo send a print job to a printer, you nust first use the ___ command and specify what to print.IpTo see a list of all printers on the system and their status, you can use the -t option to the _____ command.ipstatThe ip command uses the ___ option to specify the destination printer name.-dBy default, all print jobs have a priority of____.50The ___ option to the ipstat command causes a list of printers that are enabled to be displayed.-pYou can restrict who can print to certain by using the ____ command.IpadminLOg files are typically stored in the _____ directory./var/logThe ___ log file contains information and error messages regarding netork access generated by daemons such as sshd and xinetd.SecureAny line that starts with a(n) ___ character is a comment in the /etc/rsyslog.conf file.#The _____ priority used by the system log daemon indicates an error that should be rectified immediately, such as a corrupt system database.AlertTo Convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.pwconvYou can create user accounts on the Linux system by using the ____.useraddThe Skeleton directory on most Linux systems is ______./etc/skelTo lock an account, you can use the usermod command with the____ option.-LYou can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents.-rTo change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the _____ command.newgrpThe compression algorithm used by the compass utility has an average compression ratio of _____%40-50When using the compress utility, each file is renamed with a(n)_____ filename extension to indicate that is compressed..ZThe____ command can be used to display the contents of a compressed file.zcatThe average compression ratio for gzip is ______%60-70When used with the uncompressed command, the _____ option can be used to compress symbolic links.-fWhen used with the uncomress command, the ___ option displays the contents of the compressed file to Standard Output.-cIf no level of comression is specified, the gzip command assumes the number____.6The______ option, when used with the Gzip Command, causes the compression ratio for files that have been compressed to be listed.-IThe Filename extension given to files compressed with bzip2 is ____..bz2When used with the tar utility, the ___ option causes filenames to be stored in an archive using absolute pathnames.-pThe _____ option can be used with the tar command to extract a specified archive.-xWhen using the cpio utility, the ___ option causes a new archive to be created.-oYou can perform up to____ different incremental backups using the dump/restore utility.nineMost linux distributions today use____ as their package manager.RPMThe ____ command looks for makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for local hardware architecture.makeTo remove a package from the system, you can use the ___ option to the rpm command.-eThe most command LAN protocol used today is____.TCP/IPEach octet in an IP address represents a(n)_____ binary number.8-bitThe IP addresses___and___ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.0.0.0.0; 255.255.255.255.The subnet mask for a Class B IP address is ____.255.255.0.0The subnet mask for a Class C IP address is ____.255.255.255.0IPv6 IP addresses are delimited by the ____ character.:IPv6 IP addresses are written using eight 16-bit ____ numbers.hexadecimalThe ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.ifconfigThe ____ command sends a small TCP/IP packet to another IP address and awaits a response.pingComputer names are called ____.Host namesThe /etc/resolv.conf file can contain up to ____ DNS servers.Three(3)A common utility used to troubleshoot routing is the ____ command.tracerouteThe ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.rloginOne method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer./etc/hosts.equiv____ is a remote administration tool that encrypts information that passes across the network.Secure Shell (SSH)Remote computers can connect to a configured VNC server using the ____ command.vncviewer____ servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet.DNSThe ____ zone configuration file contains a PTR record used to identify the loopback adapter./var/named/named.localNTP uses port ____.UDP 123In NTP, stratum ____ consists of atomic devices or GPS clocks.0Apache daemon listens for HTTP requests on port ____.TCP 80The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.DirectoryIndex index.htmlThe ____ command can be used in the BASH prompt to obtain a Web page from the Apache server.curlNetBIOS names can be up to ____ characters long.15The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.mput filenameThe ____ ftp utility command runs a shell on the local computer.!Client computers can retrieve e-mail from e-mail servers via ____ or ____.POP; FTPWhen working with Sendmail, you can use the ____ command to test SMTP support.HELOWhen working with Sendmail, if you modify the /etc/aliases file, you need to run the ____ command to rebuild the aliases databasenewaliasesDatabases store information in the form of ____, each of which contains ____.records; tablesThe ____ SQL statement is used to delete a database.DROP DATABASEThe ____ PostgreSQL command-line utility backs up PostgreSQL database settings.pg_restoreAll Linux problems can be divided into ____ categories.3____ are the most common hardware component to fail on Linux systems.Hard disksTo identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.-VThe shell restricts the number of file handles that programs can open to ____ by default.1024When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.SIGHUPBy default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.tenThe ____ option for the sar command is used to display swap statistics.-BThe ____ option for the sar command is used to displays statistics for the processor queue.-qRunning background processes using the ____ command allows you to exit your command-line shell without ending any background processes.nohupThe ____ command can be used to obtain root access when you need to perform an administrative task.suTo see what network services are running on your network, you can run the ____ command.nmapA(n) ____ is a program that can start a network daemon.TCP wrapperThe ____ option to the iptables command can be used to specify the default policy for a certain chain type.-PThe ____ option to the iptables command can be used to specify the destination address of packets for a rule.-dAsymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.public ; privateIn SSH, the /etc/ssh directory stores the DSA public key in the ____ file.ssh_host_dsa_key. pubOn a CUPS printing system, to remove a print job that is in the print queue, you can use the ____________________ command followed by the print job IDs of the jobs to remove.CancelThe ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.KernIn the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.authentication_______________________________________________________ represents a text description of the user and is typically left blank.GECOS or GECOS field or General Electric Comprehensive Operating System or General Electric Comprehensive Operating System (GECOS)____________________ is used to reduce the size of a file or set of files.CompressionTo view the contents of a file that was compressed with the bzip2 utility, you must use the ____________________ command.bzcatA(n) ____________________ backup backs up only the data that has been changed since the last backup.incrementalPackages in the Red Hat Package Manager format have filenames that indicate the hardware architecture for which the software was compiled, and end with the ____________________ extension..rpmTwo or more computers that are connected with media that can exchange information are called a(n) ____________________.networkThe IP address of the network interface on the router to which you send packets is called the ____________________.default gateway____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.SubnettingThe first DNS server in a zone is called the ____________________ DNS server.master or primaryTo share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.SambaYou can use the ____________________ command to connect to both Samba and Windows servers.smbclientIn the PostgreSQL utility, the ____________________ built-in command is used to list available databases.\lViewing the output of the ____________________ command or the contents of the /var/log/boot.log and /var/log/messages log files can isolate most hardware problems.dmesgProcesses can initiate numerous connections, called ____________________, to files on the filesystem in addition to standard input, standard output, and standard error.file handlesSome peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ____________________.bus masteringWhen performance issues arise, you can compare the output of performance utilities to the ____________________ values found in the system log book.baselineThe ____________________ command is used to view the current SELinux status.sestatusTo move files, you can use the mv command. 1) True 2) False1) TrueThe rmdir command automatically removes a directory and all of its subdirectories and files. 1) True 2) False2) FalseYou can use wildcard metacharacters with the find command. 1) True 2) False1) TrueWhen using the chmod command, if there is no character specifying the category of user to affect, only the group category is affected. 1) True 2) False2) FalseThe SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file. 1) True 2) False1) TrueTo create a subdirectory, you would use the makedir command. 1) True 2) False2) FalseWhen working with files, the special metacharacter ".." specifies the current directory. 1) True 2) False2) FalseWhen using the find command, the -size x criteria is used to search for files with a size greater than x. 1) True 2) False2) FalseThe PATH variable lists directories that are searched for executable files if a relative or absolute pathname was not specified when executing a command on the command line. 1) True 2) False1) TrueThe execute permission for a file allows a user the ability to execute the file in memory (if it is a program file or a script). 1) True 2) False1) TrueIn the FHS, the ____ directory contains the Linux kernel and files used by the boot loader. 1) /load 2) /bin 3) /boot 4) /mnt3) /bootIn the FHS, the ____ directory is the root user's home directory. 1) /bin 2) /home 3) /boot 4) /root4) /rootIn the FHS, the ____ directory contains most system commands and utilities. 1) /usr 2) /root 3) /bin 4) /home1) /usrCopying a file can be accomplished using the ____ command. 1) copy 2) mv 3) cp 4) cpy3) cpThe ____ command takes a list of arguments specifying the absolute or relative pathnames of files to remove. 1) del 2) rm 3) remove 4) delete2) rmThe fastest method to search for files in the Linux directory tree is to use the ____ command. 1) search 2) id 3) find 4) locate4) locateYou can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command. 1) $ 2) * 3) & 4) #1) $The ____ section of a filesystem is the section that contains information about the filesystem in general. 1) inode table 2) inode 3) data blocks 4) superblock4) superblockTo create a hard link, you must use the ____ command. 1) ln 2) link 3) lnk 4) lk1) lnThe chgrp command takes ____ argument(s) at minimum. 1) one 2) two 3) three 4) four2) twoThe section of an inode that stores permissions is called the ____ of the file. 1) tail 2) head 3) mode 4) accessor3) modeIn a file's mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode. 1) * 2) + 3) ? 4) -4) -If a user has ____ permission for a file, they can open, read, and edit the contents of a file. 1) write 2) execute 3) read 4) alter1) writeWhen using the chmod command for a specific file, the ____ argument would add read permission and remove write permission for the group permissions. 1) u+r+w 2) g-r+w 3) g+r-w 4) o+r-w3) g+r-wWhen using the chmod command, the mode rwx can be represented by the number ____. 1) 0 2) 1 3) 7 4) 83) 7To set all of the special permissions on a certain file or directory, you can use the command ____, where name is the name of the file or directory. 1) chmod 777 name 2) chmod 7777 name 3) chmod 6666 name 4) chmod 0000 name2) chmod 7777 nameCan the mv command be used to rename files? 1) Yes 2) No1) YesDoes the find command use a pre-made index of files to locate a file? 1) Yes 2) No2) NoDo symbolic links share the same inode and inode number? 1) Yes 2) No2) NoShould most files residing in a user's home directory be owned by that user? 1) Yes 2) No1) YesAre permissions additive? 1) Yes 2) No2) No___________________________________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.FHSTo copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -R optionrecursiveThe ____________________ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.whichTo create a(n) ____________________ link, you use the -s option to the ln command.symbolicWhen a user creates a file or directory, that user's name and ____________________ becomes the owner and group owner of the file, respectively.primary groupCommand used to quickly create an empty file.touchCommand used to change the ownership of a file or directory.chownCommand used to test network connectivity.pingSpecial variable on the system used to take away permissions on new files and directories immediately after they are created.umaskCommand used to change the permissions for a certain file or directory.chmodCommand used to view your group memberships and primary group.groupsCommand used to view your current user name.whoamiCommand used to change the group owner of a file or directory.chgrpCommand used to displays BASH shell aliases.aliasA computer connected to a remote hard disk via iSCSI is referred to as an iSCSI initiator. 1) True 2) False1) TrueWhen you use disk imaging software to write a Linux ISO image onto a USB flash drive, the filesystem existing on the flash drive is maintained. 1) True 2) False2) FalseTo perform a Linux installation over a network, you can connect to a server with the appropriate installation files via FTP. 1) True 2) False1) TrueThe BIOS configurations on different computers are generally very similar or exactly the same. 1) True 2) False2) FalseYou can use a small bootable Linux kernel to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers. 1) True 2) False1) TrueUp to 100,000 Serial Attached SCSI hard disks can be connected to a single SCSI controller via serial cables with small serial connectors. 1) True 2) False2) FalseRAID level 4 configurations are not fault tolerant. 1) True 2) False2) FalseRAID level 3 requires a minimum of three hard disk drives to function. 1) True 2) False1) TrueIt is good form to check the installation log files after installation as well as verify settings on the system after installation to ensure that all hardware was detected with the correct values. 1) True 2) False1) TrueNormally, kickstart files are text files. 1) True 2) False1) TrueEach SCSI device is assigned a unique ID number known as a(n) ____. 1) device ID 2) target ID 3) SCSI number 4) SCSI controller2) target IDMost Parallel SCSI controllers support up to ____ devices. 1) 12 2) 13 3) 14 4) 154) 15The highest priority SCSI device is given a SCSI ID of ____. 1) 1 2) 6 3) 7 4) 153) 7The ____ standard support speeds of up to 80 MB/second. 1) SCSI-3 Ultra2 Wide 2) SCSI-2 Wide 3) SCSI-3 Ultra 4) SCSI-3 Ultra3 Wide1) SCSI-3 Ultra2 WideRAID level ____ is often referred to as disk mirroring. 1) 1 2) 2 3) 3 4) 41) 1RAID level ____ is commonly referred to as disk striping with parity. 1) 0 2) 1 3) 5 4) 63) 5A Fedora 13 CD installation requires ____ CDs. 1) two 2) four 3) six 4) ten3) sixIn Fedora Linux, a ____ file is a script file that specifies the choices that you would normally choose when you install the operating system. 1) setup 2) startup 3) kickstart 4) scriptstart3) kickstartAny line in a kickstart file that starts with a(n) ____ symbol is a comment line and is ignored by the installation program. 1) * 2) # 3) $ 4) %2) #If a Linux installation ends abnormally and the screen displays a "fatal signal ____" error message, it indicates an error known as a segmentation fault. 1) 0 2) 1 3) 10 4) 114) 11Some installations fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders. 1) 256 2) 512 3) 1024 4) 20483) 1024____ installation log file(s) is/are created by the Fedora installation program. 1) One 2) Two 3) Three 4) Four2) TwoTo verify hardware settings, you can examine the contents of the ____ directory. 1) /log 2) /root 3) /proc 4) /hw3) /procTo ensure that Linux has detected the correct amount of RAM in the system after installation, you can view the contents of the ____ file. 1) /proc/mem 2) /proc/cpuinfo 3) /proc/memoryinfo 4) /proc/meminfo4) /proc/meminfoThe ____ file in the /proc directory contains a list of memory address ranges reserved for device use. 1) meminfo 2) ioports 3) iomem 4) misc2) ioportsThe ____ file in the /proc directory contains statistics on the performance of the processor. 1) cpuinfo 2) modules 3) kcore 4) loadavg4) loadavgIf a hard disk fails in a RAID level 0 configuration, is all of the data lost? 1) Yes 2) No1) YesCan you install Linux from ISO image files on a hard disk? 1) Yes 2) No1) YesCan disk imaging software be used to perform a Linux installation? 1) Yes 2) No1) YesCan you use a Kickstart Configurator to make major changes to a kickstart file? 1) Yes 2) No1) YesIn a laptop computer, can changes to the BIOS be retrieved if the battery dies? 1) Yes 2) No2) NoThere can be multiple device files per device. 1) True 2) False2) FalseAfter a typical Fedora Linux installation, over 700 different device files are in the /dev directory. 1) True 2) False1) TrueIn Linux, you must use only one type of filesystem on a system. 1) True 2) False2) FalseWhen you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD. 1) True 2) False1) TrueThe more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations. 1) True 2) False1) TrueDevice files that represent disks, such as floppy disks, CD-ROMs, DVDs, USB flash drives, and hard disks, are typically character device files because a fast data transfer rate is preferred. 1) True 2) False2) FalseWhen a device is mounted, it is attached to a certain directory on the directory tree called a(n) mount point. 1) True 2) False1) TrueTo check whether the /mnt/floppy directory is being used by any users, you can use the fuser command with the -u option 1) True 2) False1) TruePATA hard disk drives typically have faster data transfer speeds, and most systems allow for the connection of more than four such hard disks. 1) True 2) False2) FalseTo view the size of a directory and its contents in Kilobytes, you can use the du command. 1) True 2) False1) TrueDevices that transfer data in a character-by-character fashion are referred to as ____ devices. 1) text 2) block 3) character 4) binary3) characterThe ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave). 1) /dev/hdc1 2) /dev/hdb1 3) /dev/hda1 4) /dev/hdc22) /dev/hdb1The ____ device file represents the second serial port on the system (COM2). 1) /dev/ttyS0 2) /dev/tty2 3) /dev/tty1 4) /dev/ttyS14) /dev/ttyS1If you do not know the type, major, or minor number of a device, you can use the ____ command to re-create the device based on the common name. 1) /dev/MAKEDEV 2) mkfs 3) mknod 4) /dev/makedevice1) /dev/MAKEDEVThe ____ filesystem is used by software programs that write to a CD-RW or DVD-RW drive. 1) ntfs 2) udf 3) ext2 4) hpfs2) udfThe ____ filesystem contains most of the operating system files. 1) boot 2) data 3) mnt 4) root4) rootTo format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command. 1) -t 2) -f 3) -c 4) -o1) -tCD-ROMs typically use the ____ filesystem type. 1) ntfs 2) ext2 3) iso9660 4) ext33) iso9660Linux requires ____ partition(s) at minimum. 1) one 2) two 3) three 4) four2) twoData is read off of hard disks in concentric circles called ____. 1) tracks 2) blocks 3) sectors 4) cylinders1) tracksTo create partitions after installation, you can use the ____ command. 1) format 2) formatdisk 3) fdisk 4) partition3) fdiskThe easiest method for monitoring free space by mounted filesystems is to use the ____ command. 1) df 2) fs 3) dfs 4) fd1) dfErrors on a filesystem are often referred to as filesystem ____ and are common on most filesystems. 1) breaks 2) corruption 3) degradation 4) failures2) corruptionTo check a filesystem for errors, you can use the ____ command, which can check filesystems of many different types. 1) fcheck 2) fsc 3) fscheck 4) fsck4) fsckYou can edit the quotas for certain users by using the ____ command. 1) edquota 2) editquota 3) quota 4) repquota1) edquotaCan several different devices share the same major number? 1) Yes 2) No1) YesIs ext3 the traditional filesystem used on Linux? 1) Yes 2) No2) NoCan any existing directory can be used as a mount point? 1) Yes 2) No1) YesIf a device is mounted to a directory that contains files, are those files temporarily covered up until the device is unmounted? 1) Yes 2) No1) YesCan CD-ROMs be ejected from the CD-ROM drive before the CD-ROM is properly unmounted? 1) Yes 2) No2) NoIf you find a corrupted device file, or accidentally delete a device file, the ____________________ command can be used to re-create the device file if you know the type, major, and minor numbers.mknodCreating a filesystem on a device is commonly referred to as ____________________.formattingAt installation, Fedora Linux creates a symbolic link called ____________________ to the correct device file for your first CD-ROM drive./dev/cdromEach track on a hard disk is divided into ____________________ of information.sectorsAn extended partition can contain many subpartitions called ____________________.logical drivesIndicates a particular device.minor numberFile that contains a list of devices that are currently used on the system and their major numbers./proc/devicesFile on the hard disk representing a device on a Linux systemdevice fileCommand used to create modify filesystem parameters.tune2fsDirectory that stores device files./devThe first readable sector of a hard disk, where partition definitions are stored.MBRHard disk quotas that the user can exceed for a certain period of time.soft limitsRigid quota limits that the user cannot exceed.hard limitsPoints to the device driver for a device in the Linux kernel.major numberTo mount all filesystems in the /etc/fstab file that are intended to mount at boot time, you can simply type the ____ command. 1) mount -o 2) mount -f 3) mount -u 4) mount -a4) mount -aDuring Linux installation, you need to configure a minimum of how many user accounts?twoFilesystem that performs journalingext3Shares password databases among Linux systemsNetwork Information Service (NIS)Program started by the BIOS that loads the Linux kernel into memory from a hard disk partition inside the computerboot loadercommand that halts the system immediately and powers down the computerpoweroffAllows you to choose the operating system upon system startupdual bootingSpecify a commands' working parametersargumentsChannel that allows a user to log interminalAlter the way a command worksoptionsTraditional filesystem still used on most Linux computersext2In Linux, what is used to accept input from the user and pass input to the kernel for processing?ShellTo find all of the commands that have the word list in their name or description, you would type what?man -k listWhat metacharacterindicates background command execution?&What is the shell that is used by default in Linux?BASHWhich Linux Command displays your login name?whoamiWhat is the most common method of installing Linux?DVD installationBecause you need to document so many pieces of hardware and software information, you should create a ______ that contains all important installation information as well as hardware information.Preinstallation checklistWhat are specific letters that start with a dash (-)?OptionsWhat directory contains system commands and utilities?/usrWhat filesystem is compatible with the Windows FAT filesystem?VFATHard disks can contain how many major partitions?4The command that displays the calendar for the current month is what?calwhat is the metacharacter for command termination?;Which Linux command gets you out of your current shell?exitThe recommended size for the /home directory is _____ per user.200 MBWhat command will confirm the system directory that you are currently in?pwdWhat metacharacter can also be used to refer to the current user's home directory?~To move from the /home/joe/test/data to the home/joe directory, what command would you use?cd../..If you type enough unique letters of a directory and press the _____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information.TabMost files on a Linux system that contain configuration information are what kind of files?text filesTo view a list of files and their type, use the ____ switch to the ls command.-FThe ____ symbol indicates a linked file.@The ____ command can be used to provide a long listing for each file in a certain directory.ls -lUsing wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?[1-4]The ____ command displays the last five lines of a text filetail -5Extended regular expression metacharacters?, +, {}, |The ____ regular expression metacharacter matches 0 or more occurrences of the previous character.*What key combination, commonly used in the vi editor command mode, displays current line statistics?ctrl + gThe ____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor.Emacs editorThe ____ editor is functionally analogous to the Windows Wordpad and Notepad editors.geditDisplays files in reverse ordertac commandDisplays lines of test that match extended regular expressionsegrep comandIdentifies a channel that passes information from one process in memory to another, and in some cases can be mediated by fiels on the hard drivenamed pipeSpecial file that serves as placeholders to organize other filesdirectoryDisplays the first ten lines of a text filehead commandA file that represents a device on the system, such as a hard disk or serial portSpecial device fileFiles that have an association with one anotherLinked filesA file that contains the most recent entries at the bottom of the filelog fileA file that allows a process on another computer to write to a file on the local computer while another process reads from that filesocket fileIn the FHS, the ____ directory contains the Linux kernel and files used by the boot loader/bootIn FHS, the ____ directory is the root user's home directory/rootIn the FHS, the ____ directory contains most system commands and utilities/usrCopying a file can be accomplished using what command?cpWhat command takes a list of arguments specifying the absolute or relative pathnames of files to remove?rmThe fastest method to search for files in the Linux Directory tree is to use what command?locate commandYou can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command$The ____ section of a filesystem is the section that contains information about the filesystem in general.superblockTo create a hard link, you must use the ____ commandlnThe section of an inode that stores permissions is called the _____ of a file.modeIn a file's mode, if a permission is unavailable, a ____ character replaces its position in the mode-If a user has _____ permission for a file, they can open. read, and edit the contents of a filewriteWhen using the chmod command for a specific file, the ______ argument would add read permissin and remove write permission for the group persmissiong+r-wWhen using the chmod command, the mode rwx can be replaced by the number____.7To set all of the special permission on a certain file or directory, you can use the command _____, where name is the name of the file or directory.chmod 7777 nameCommand used to change the permissions for a certain file or directorychmodCommand used to view you current user namewhoamiCommand used to view your group memberships and primary groupgroupsCommand used to change the group owner of a file or directorychgrpCommand used to test network connectivitypingCommand used to change the ownership of a file or directorychownCommand used to display BASH shell aliasesaliasSpecial variable on the system used to take away permissions on new files and directories immediately after they are created.umaskCommand used to quickly create an empty file.touchDevices that transfer data in a character-by-character fashion are referred to as______devices.characterThe ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave)./dev/hdb1The ____ device file represents the second serial port on the system (COM2)./dev/ttyS1The ____ filesystem is used by software programs that write to a CD-RW or DVD-RW drive.udfThe _____ filesystem contains most of the operating system files.rootTo format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.-tTo mount all filesystems in the /etc/fstab file that are intended to mount at boot time, you can simply type the ____ command.mount -aCD-ROMs typically use the _____ filesystemiso9660Linux requires how many partitions at minimum?twoData is read off of hard disks in concentric circles called what?tracksTo create partitions after installation, you can use the _____ commandfdiskThe easiest method for monitoring free space by mounted filesystems is to use the _____ commanddfErrors on a filesystem are often referred to as filesytem ____ and are common on most filesystems.corruptionTo check a filesystem for errors, you can use the _____ command, which can check filesystems of many different types.fsckYou can edit the quotas for certain users by using the _____ commandedquotaDirectory that stores devices files/devIndicates a particular deviceminor numberFile on the hard disk representing a device on a Linux systemdevice fileCommand used to create modify system parameterstune2fsThe first readable sector of a hard disk, where partition definitions are storedMBRFile that contains a list of devices that are currently used on the filesystem and their major numbers/proc/devicesRigid quota limits that the user cannot exceedhard limitsPoints to the device driver for a device in the Linux kernelmajor numberHard disk quotas that the user can exceed for a certain period of time.Soft limitsEach SCSI device is assigned a unique ID number known as a _____.target idMost Parallel SCSI controllers support up to ____ devices.15The highest priority SCSI device is given a SCSI ID of______.7The _____ standard supports speeds of up to 80 MB/s.SCSI-3 Ultra2 WideRaid level _____ is often referred to as disk mirroring.1Raid level ____ is commonly referred to as disk striping with parity5A Fedora 13 CD installation requires ___ CDs.sixIn Fedora Linux, a ____ file is a script file that speifies the choices that you would normally choose when you install the operating systemkickstartIf a Linux installaion ends abnormally and the screen displays a "fatal signal _____" error message, it indicates an error known as a segmentation fault.11Some installation fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders.1024_____ installation log files are create by the Fedora installation program.twoto verify hardware settings, you can examine the contents of the _____ directory./procThe ____ file in the /proc directory contains a list of memory address ranges reserved for device use.ioportsThe ____ in the /proc directory contains statistics on the performance of the processor.loadavgA remote disk to which a computer connects using iSCSIiSCSI targetFile that contains a lists of packages that were installed as well as a list of those that were not installed/root/install.logA type of RAID level 0 that consists of two hard disks that are seen as one large volume.spanningA unique identifier for each devie attached to any given node in a SCSI chainLogical Unit Number (LUN)File that lists all of the system events that occurred during the installation, such as the creation of user and group accounts/root/install.log.syslogA version of RAID controlled by the system BIOSfirmware RAIDA protocol that may be used to install Fedora via the network.Network File System (NFS)A type of RAID level 0 in which an individual file is divided into sections and saved concurrently on multiple disks.disk stripingThe situation in which a program has accessed an area of RAM that was not assignedsegmentation faultThe file descriptor stdin is represented by the number____.0The file descriptor stderr is represented by the number___.2You can ue the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ___ shell metacharacter followed by the absolute or relative pathname of the file>You can redirect a file to the standard input of a command using the ____ character.
each device
studybud

Your Answer

Surround your text in *italics* or **bold**, to write a math equation use, for example, $x^2+2x+1=0$ or $$\beta^2-1=0$$

Use LaTeX to type formulas and markdown to format text. See example.

Sign up or Log in

  • Answer the question above my logging into the following networks
Sign in
Sign in
Sign in

Post as a guest

  • Your email will not be shared or posted anywhere on our site
  •  

Stats
Views: 73
Asked: 2 years ago

Related