Name:
Class:
Date:
TEST BANK Test Bank For for Linux+ and LPIC-1 Guide to Linux Linux+ and LPIC-1 Guide to Linux Certification 6th Edition Jason Eckert Certification 6th Edition by Jason Eckert Chapter 1-14 Mod 01 Introduction to Linux Multiple Choice 1. The United States Air Force was able to install Linux on a popular gaming console and then connect over
1,700 of these systems together to work as one big supercomputer. Which of the following types of technologies did they implement? a. herding b. cloud computing c. group computing d. clustering ANSWER: RATIONALE:
d
When multiple, or many, computers are joined together to work as one, it is called a cluster.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today. TOPICS: 1.5 Common Uses of Linux KEYWORDS: Bloom's: Understand DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 2. Which of the following terms describes a type of useful and legitimate software that is distributed by a
developer at no charge and with no source code? a. shareware b. freeware c. malware d. tryware ANSWER: RATIONALE:
b
Freeware is a type of software that is distributed for free by a software developer, but the source code is not distributed along with it. Shareware is similar to freeware but requires payment after a period of time, malware is malicious software, and tryware does not exist.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system. Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Class:
Date:
1.2 The Linux Operating System Bloom's: Remember 5/1/2023 2:45 PM 5/1/2023 2:45 PM
3. What term refers to a person that manages the Linux components that allow developers to push new versions
of their software to the cloud? a. orchestrator b. build automator c. integration specialist d. DevOp ANSWER: RATIONALE:
d
The people who manage the workflow whereby software is added to a cloud environment are called DevOps because they are system operators (ops) that support web app development (dev).
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.6 - Describe how Linux is used in the cloud. ACCREDITING STANDARDS: Eckert.XK0-005.24.3.4 - Summarize common infrastructure as code technologies. TOPICS: 1.6 Linux in the Cloud KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 4. Which of the following types of cloud delivery models would a containerized web app be considered? a. SaaS b. PaaS c. IaaS d. MaaS ANSWER: RATIONALE:
b
Web apps that are hosted within containers are delivered using a container runtime on an underlying operating system platform and referred to as Platform as a Service, or PaaS.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.6 - Describe how Linux is used in the cloud. TOPICS: 1.6 Linux in the Cloud KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
DATE MODIFIED:
Class:
Date:
5/1/2023 2:45 PM
5. Which of the following services does an MTA provide? a. web b. mail c. DNS d. certificate ANSWER: RATIONALE:
b
Mail Transfer Agents (MTAs) provide email routing on Linux systems.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.3 - Mail Transfer Agent (MTA) basics. TOPICS: 1.5 Common Uses of Linux KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 6. What term is used to refer to a specific variety of UNIX? a. distribution b. version c. flavor d. platform ANSWER: RATIONALE:
c
Each UNIX operating system is called a unique flavor of UNIX. For example, FreeBSD and macOS are two different flavors of UNIX.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.3 - Describe the origins of the Linux operating system. TOPICS: 1.3 The History of Linux KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 7. Which of the following types of servers can be used to cache requested Internet resources so that they can be
more quickly delivered to users requesting the same resource while at the same time reducing the burden on the external network connection to the Internet for an organization? a. file server Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
b. DNS server c. proxy server d. DHCP server ANSWER: RATIONALE:
c
A proxy server requests Internet resources on a user's behalf and can be configured to cache results so that multiple users requesting the same content don't require contacting the resource individually.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today. TOPICS: 1.5 Common Uses of Linux KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 8. Which of the following types of encryption uses a pair of keys known as public and private? a. symmetric b. asymmetric c. SHA1 hashing d. message digest ANSWER: RATIONALE:
b
Asymmetric encryption uses a public/private key pair. Symmetric encryption uses a single key for encryption and decryption, while SHA1 hashing (also called a message digest) does not use keys and is used to provide data validation only.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today. ACCREDITING STANDARDS: Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a Linux environment. TOPICS: 1.5 Common Uses of Linux KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 9. When viewing the version number for a modern Linux kernel, what number indicates that it is a development
kernel? a. major number b. revision number c. minor number Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
d. release candidate number ANSWER: RATIONALE:
d
A modern development kernel has a release candidate number appended to it. For example, 5.19-rc8 is release candidate 8 of the 5.19 kernel.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system. TOPICS: 1.2 The Linux Operating System KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 10. Which of the following is the greatest expense for companies using Linux? a. additional software b. operating system cost c. hiring people to maintain the Linux system d. software upgrades ANSWER: RATIONALE:
c
Outside of computer hardware costs, the hiring of staff to maintain the Linux system is the greatest expense for companies using Linux. This is because Linux and most Linux software are free and open source.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system. TOPICS: 1.2 The Linux Operating System KEYWORDS: Bloom's: Understand DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 11. In Linux, the core component of the GUI is known as: a. GNOME b. KDE c. X Windows d. Red Hat ANSWER: RATIONALE:
c
POINTS:
1
X Windows is the core component that provides GUI functionality on Linux systems. Desktop environments, such as GNOME and KDE, run on top of X Windows to provide a specific look and feel.
Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system. TOPICS: 1.4 Linux Distributions KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 12. An archive of files that usually contains source code or scripts that can be used to install software is referred
to as a: a. router b. package manager c. DBMS d. tarball ANSWER: RATIONALE:
d
Tarball is a compressed archive of files, very similar to WinZip or RAR files. It is used for distributions or backup purposes.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.4 - Identify the characteristics of various Linux distributions and where to find them. TOPICS: 1.4 Linux Distributions KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 13. From what common Linux distribution is the Fedora Linux distribution derived? a. Mandrake b. SuSE c. Debian d. Red Hat ANSWER: RATIONALE:
d
Red Hat is one of the earliest and most common Linux distributions. Today, it is available as Red Hat Enterprise Linux (RHEL) and Fedora.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.4 - Identify the characteristics of various Linux distributions and where to find them. TOPICS: 1.4 Linux Distributions KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
DATE CREATED: DATE MODIFIED:
Class:
Date:
5/1/2023 2:45 PM 5/1/2023 2:45 PM
14. What service provides a method for the efficient transfer of files over the Internet? a. FTP b. HTML c. SMTP d. Telnet ANSWER: RATIONALE:
a
The File Transfer Protocol (FTP) is the service that transfers files over the Internet. A newer protocol that focuses on secure file transfer is called SFTP based on FTP.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today. TOPICS: 1.5 Common Uses of Linux KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 15. The iptables and nftables software on Linux is an example of what kind of software? a. routing b. anti-virus c. firewall d. proxy ANSWER: RATIONALE:
c
Both iptables and nftables are used to configure a set of rules necessary to make a firewall.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today. TOPICS: 1.5 Common Uses of Linux KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 16. What piece of software tells the operating system how to use a specific hardware device? a. graphical user interface b. system service c. device driver Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
d. user interface ANSWER: RATIONALE:
c
The device driver is responsible for communicating with the operating system on how to establish communication with specific devices.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.1 - Explain the purpose of an operating system. TOPICS: 1.1 Operating Systems KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 17. What type of software license does Linux adhere to? a. permissive b. freeware c. closed source d. copyleft ANSWER: RATIONALE:
d
Linux is licensed under the GNU General Public License (GPL), which is a type of copyleft open source license.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system. TOPICS: 1.2 The Linux Operating System KEYWORDS: Bloom's: Understand DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 18. What are services running on a Linux server called? a. daemons b. service apps c. containers d. threads ANSWER: RATIONALE:
a
POINTS: QUESTION TYPE:
1 Multiple Choice
On Linux systems, services are commonly referred to as daemons. Containers provide application and operating system virtualization, threads are execution units for a process, and the term service app is not used.
Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today. TOPICS: 1.5 Common Uses of Linux KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 19. What Linux distribution is commonly used by cybersecurity professionals because it is packaged with
several security-related tools? a. Kali b. Arch c. Ubuntu d. Gentoo ANSWER: RATIONALE:
a
Kali Linux is a security-focused Linux distribution often used by cybersecurity professionals. While Ubuntu, Arch, and Gentoo Linux may also be used by cybersecurity professionals, the security-related tools that are normally packaged with Kali Linux will need to be installed manually after installation on these distributions.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.4 - Identify the characteristics of various Linux distributions and where to find them. TOPICS: 1.4 Linux Distributions KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 20. What culture led to the development of free and open source software, from which Linux is derived? a. hacker b. UNIX c. free software d. cracker ANSWER: RATIONALE:
a
The hacker culture led to the development of free and open source software, from which Linux is derived.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.3 - Describe the origins of the Linux operating system. TOPICS: 1.3 The History of Linux KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
DATE CREATED: DATE MODIFIED:
Class:
Date:
5/1/2023 2:45 PM 5/1/2023 2:45 PM
21. What common software component do all Linux distributions share at minimum? a. compiler b. kernel c. package manager d. X Windows ANSWER: RATIONALE:
b
While Linux distributions may use different interfaces and software packages, they all share the same Linux kernel.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.4 - Identify the characteristics of various Linux distributions and where to find them. TOPICS: 1.4 Linux Distributions KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 22. Amir is unfamiliar with Linux and would like to obtain physical help installing Linux on his laptop
computer. What resource would best suit Amir's needs? a. online forum b. LUG c. Linux information website d. social media website ANSWER: RATIONALE:
b
Linux User Groups (LUGs) are groups of Linux users who meet regularly to discuss Linux-related issues and problems. Amir could bring his laptop computer to a LUG to obtain help installing Linux from other LUG members.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system. TOPICS: 1.2 The Linux Operating System KEYWORDS: Bloom's: Apply DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 23. Which of the following job roles are most likely to use Linux on their workstation computer? Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
a. software developers b. accountants c. graphic artists d. Windows server administrators ANSWER: RATIONALE:
a
The rich set of open source development tools and frameworks available for Linux also makes Linux the preferred choice for software development workstations.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today. TOPICS: 1.5 Common Uses of Linux KEYWORDS: Bloom's: Understand DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 24. Web app developers must regularly push new versions of their containerized web apps to the cloud. What is
this process called? a. CI b. build automation c. orchestration d. CD ANSWER: RATIONALE:
d
The process whereby developers push new web apps to the cloud is called continuous deployment (CD).
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.6 - Describe how Linux is used in the cloud. ACCREDITING STANDARDS: Eckert.XK0-005.24.3.4 - Summarize common infrastructure as code technologies. TOPICS: 1.6 Linux in the Cloud KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM Multiple Response 25. Which of the following are features of open source software (OSS)? (Choose all that apply.) a. Software is developed through widespread collaboration. b. Software bugs are fixed quickly. c. Software features evolve based on users' needs. Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
d. The cost of the software is based on the number of software packages installed. ANSWER: RATIONALE:
a, b, c
Because open source software (OSS) is developed collaboratively, bugs are fixed quickly and the software evolves based on users' needs. Linux and most software that runs on Linux are open source and free of cost as a result.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system. TOPICS: 1.2 The Linux Operating System KEYWORDS: Bloom's: Understand DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 26. Which of the following types of hardware are supported by the Linux operating system? (Choose all that
apply.) a. IoT devices b. supercomputers c. Internet servers d. personal workstations ANSWER: RATIONALE:
a, b, c, d
Linux is available for nearly every hardware platform and type, including workstations, servers, supercomputers, mobile, IoT, and custom hardware devices.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system. TOPICS: 1.2 The Linux Operating System KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 27. What two Linux distributions utilize the Debian package manager by default? a. Red Hat b. openSUSE c. Linux Mint d. Ubuntu ANSWER: RATIONALE:
c, d
POINTS:
1
Linux Mint is a Debian-based distribution, focused on providing desktop and mobile user capabilities. Ubuntu is a Debian-based distribution that is widely used in all environments.
Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.4 - Identify the characteristics of various Linux distributions and where to find them. TOPICS: 1.4 Linux Distributions KEYWORDS: Bloom's: Remember DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM 28. Which of the following software terms are equivalent? (Choose all that apply.) a. MIT b. FOSS c. OSS d. FLOSS ANSWER: RATIONALE:
b, c, d
Open source software (OSS) is also called free and open source software (FOSS) or free/libre and open source software (FLOSS). MIT is a specific open source license.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system. TOPICS: 1.2 The Linux Operating System KEYWORDS: Bloom's: Understand DATE CREATED: 5/1/2023 2:45 PM DATE MODIFIED: 5/1/2023 2:45 PM
Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 02 Linux Installation and Usage 1. Sandra needs to obtain the latest image of Fedora so that she can install it as a virtual machine on her
Windows workstation. Which of the following file formats is Sandra likely to find available for download from Fedora's website that would allow her to use the file as the source for booting and installing Linux as a virtual machine? a. .zip b. .tar.gz c. .iso d. .tgz ANSWER: RATIONALE:
c
This is a disk image that is commonly available to download from Linux distribution sites and is meant to be burned to an optical disc, written to a USB flash drive, or used as installation media for virtual machines.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 2.1 Installing Linux KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 2. Dillon wants to install Fedora Linux on a workstation computer by booting from live installation media and
has already downloaded the live media ISO image for Fedora. What software can Dillon use on his Windows PC to create a bootable USB flash drive from the live media ISO image? (Choose all that apply.) a. Fedora Media Writer b. disc burning software c. Windows Explorer d. balenaEtcher ANSWER: RATIONALE:
a, d
To write a live media ISO image to a USB flash drive, you can use the Fedora Media Writer or balenaEtcher programs. Disc burning software is used to write a live media ISO to a DVD.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 2.1 Installing Linux KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 02 Linux Installation and Usage DATE CREATED: DATE MODIFIED:
5/2/2023 10:00 PM 5/2/2023 10:00 PM
3. Andre uses an Apple laptop and wishes to install Linux within a virtual machine on macOS. Which of the
following hypervisors can he install on macOS to create a Linux virtual machine? (Choose all that apply.) a. Hyper-V b. UTM c. KVM d. Parallels Desktop ANSWER: RATIONALE:
b, d
The Universal Turing Machine (UTM) and Parallels Desktop hypervisors are available for macOS. Hyper-V is only available for Windows Systems and KVM is only available on Linux systems.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices. TOPICS: 2.1 Installing Linux KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 4. Which storage device name refers to the third partition on the second SAS SSD in a system? a. sdc3 b. sdb2 c. sdb3 d. sdc2 ANSWER: RATIONALE:
c
The first Serial Attached SCSI (SAS) SSD in the system is called sda, while the second SAS SSD is called sdb. Partitions are numbered starting from 1 on each storage device. Thus, the third partition on the second SAS SSD is sdb3.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices. TOPICS: 2.1 Installing Linux KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 5. Which two partitions (and associated filesystems) must be created on a storage device at minimum during a Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 02 Linux Installation and Usage
Linux installation? (Choose two.) a. / b. swap c. /boot d. /home ANSWER: RATIONALE:
a, c
At minimum, a Linux system needs a /boot partition to store boot loader files and the Linux kernel, as well as a / (root) partition to store the remainder of the operating system files. A swap partition is not necessary since a Linux system can use zswap or a swap file instead.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 2.1 Installing Linux KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 6. What stores the partition configuration on storage devices that are larger than 2TB in size? a. GUID b. GPT c. MBR d. QEMU ANSWER: RATIONALE:
b
Storage devices that are larger than 2TB must use a GUID Partition Table (GPT) to store partition configuration. GPTs allow for the creation of up to 128 partitions.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 2.1 Installing Linux KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 7. Alexis is installing Linux on a new server system that will be used as a print server. Which directory should Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 02 Linux Installation and Usage
Alexis choose to create as a separate filesystem during the installation to ensure that the print server cannot use space on the / filesystem? a. /var b. /usr c. /home d. /opt ANSWER: RATIONALE:
a
Because the /var directory contains print spools, it should be created as its own filesystem during Linux installation to prevent printing services from using space on the / filesystem.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 2.1 Installing Linux KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 8. Sumbul has installed a new Fedora Linux system and configured a user account for herself. What command
can she run to set a password for the root user? a. passwd b. set-root c. passwd --set-root d. sudo passwd root ANSWER: RATIONALE:
d
The sudo passwd root command can be run following installation to set the root user password.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 2.1 Installing Linux KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 9. During a Fedora Linux installation, Harvey notices that the system has automatically configured a small Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 02 Linux Installation and Usage
nvme0n1p1 partition with a vfat filesystem. Why did the system create this partition? a. The computer has a UEFI BIOS. b. The NVMe storage device uses an MBR. c. The NVMe storage device uses a GPT. d. The computer has a standard BIOS. ANSWER: RATIONALE:
d
On systems that have a UEFI BIOS, the Linux installation program will create a small UEFI System Partition formatted with the vfat filesystem to store operating system boot files.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system. Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 2.1 Installing Linux KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 10. Which of the following can be used for virtual memory on a Linux system? (Choose all that apply.) a. swap partition b. swap disk c. swap file d. zswap ANSWER: RATIONALE:
a, c, d
Virtual memory (or swap) can be created from a partition, file, or a compressed area of RAM using the zswap kernel feature.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 2.1 Installing Linux KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 11. What BASH shell prompt does the root user receive? a. ? Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 02 Linux Installation and Usage b. % c. # d. $ ANSWER: RATIONALE:
c
The BASH shell provides regular users with a $ prompt and the root with a # prompt.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.2 - Outline the structure of the Linux interface. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 12. What key combination can a local Linux user use to switch to the tty5 terminal? a. Ctrl+5 b. F5 c. Ctrl+Alt+F5 d. \5 ANSWER: RATIONALE:
c
You can use Ctrl+Alt+F# to switch to another terminal, where # is the number of the terminal. Thus, Ctrl+Alt+F5 will switch to tty5 (local terminal 5).
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.2 - Outline the structure of the Linux interface. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 13. Jayme is currently using a command-line terminal on a Linux server that does not have a GUI installed. He
would like to run commands within separate BASH shells in the terminal and observe the output of all commands on the same screen. What program could Jayme use to obtain and view multiple BASH shells simultaneously within his current terminal? a. tmux b. terminfo c. screen Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 02 Linux Installation and Usage d. termx ANSWER: RATIONALE:
a
While you can use the screen or tmux commands to obtain and use multiple shells within a single terminal, only the tmux command displays all shells (and the associated command output) simultaneously on the terminal screen.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.2 - Outline the structure of the Linux interface. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 14. Which of the following are true of the echo command? a. When used to display text, quotation marks are optional. b. It can be used to display shell variables by including a $ sign in front of the variable name. c. Including a semicolon at the end of the line will not affect the text being displayed. d. All of the other options are true. ANSWER: RATIONALE:
d
All of the options are true. The echo command can be used to display text whether the text is surrounded by quotation marks or not. It will display shell variables by using the $ sign in front of the variable name. It will also execute the command with a semicolon at the end and not affect the text. This is because you can run multiple commands at the command line by separating them with semicolons, but if there is only one command, it just stops after that command.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 15. Dustin runs a command at the command line trying to find out what kernel version the system is running.
However, it doesn't give him the information he needs. He knows there is an option that can be used to display the kernel version. How can he find out which option to use? Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 02 Linux Installation and Usage a. ver --help b. help version c. man uname d. lsproc -? ANSWER: RATIONALE:
c
The man command will display the manual pages for a command. The uname command will display system information. To display just the kernel version, he would be able to run the command and option combination of uname -v.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 16. When using command-line terminal, specific letters that start with a dash ("-") and appear after command
names are considered to be: a. arguments b. options c. POSIX options d. metacharacters ANSWER: RATIONALE:
b
Options are specific letters that start with a dash and are specific to the command. The meaning of each letter depends on the task that needs to be performed and whoever developed the command, determined which option would be used. Options that start with two dashes are called POSIX options and are followed by a word that indicates the task to be performed.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM
Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 02 Linux Installation and Usage 17. Which Linux command can be utilized to display your current login name? a. who b. whoami c. id d. w ANSWER: RATIONALE:
b
The whoami command displays the user's login name.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 18. In order to perform a series of commands as the root user, Parth would like to switch from his user account
to the root user account in his current terminal. What commands can Parth execute to achieve this? (Choose all that apply.) a. su b. su c. su - root d. su root ANSWER: RATIONALE:
a, b, c, d
The su command is used to switch to a new user account, and the - option can optionally be used to load the target user's environment variables. If no target user name is specified as an argument, the root user is assumed. Thus, all four options will allow Parth to switch to the root user account.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 19. After a shell is no longer needed, what command can be given to exit the shell? Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 02 Linux Installation and Usage a. exit b. stop c. reset d. quit ANSWER: RATIONALE:
a
The exit command allows you to exit out of your current shell.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 20. A calendar for the current month can be shown on the command line by issuing which command? a. date b. cal c. w d. id ANSWER: RATIONALE:
b
The cal command displays the calendar for the current month. The cal command accepts different options that allow you to display the calendar according to the options you choose.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 21. What metacharacter is used to perform command substitution? a. @ b. ^ c. & d. ` Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 02 Linux Installation and Usage ANSWER: RATIONALE:
d
The backquote (`) metacharacter is used to perform command substitution.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 22. Louise has accidentally added an unnecessary metacharacter to a command that she executed and receives a
secondary prompt that requires additional input. What can Louise do to cancel her command and return to a regular BASH shell prompt? a. press Ctrl+c b. execute the reset command c. execute the exit command d. execute the clear command ANSWER: RATIONALE:
a
Because Louise does not have access to a BASH shell prompt, she cannot execute other commands. However, she can use the Ctrl+c key combination to cancel her previous command and obtain a new BASH shell prompt.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 23. The apropos list command produces the same results as which command below? a. man -j list b. man -k list c. man -l list d. man -m list ANSWER:
b
Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 02 Linux Installation and Usage RATIONALE:
The command man -k is equivalent to apropos. Both commands will give the exact same output on the terminal screen.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 24. To learn more about the syntax of the logrotate file, Tristan executes the man logrotate command. However,
the manual page for the logrotate command is displayed instead. What command can Tristan use to view the manual page for the logrotate file? a. man -k logrotate b. man 8 logrotate c. man -f logrotate d. man 5 logrotate ANSWER: RATIONALE:
d
File formats are listed in section 5 of the manual pages. However, the man command searches starting from section 1 (user commands) by default. To search the manual pages starting from section 5 for logrotate, Tristan can supply 5 as the first argument to the man command.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 25. After installing a new Linux system, Joel attempts to search the manual pages by keyword but no results are
displayed. What command should Joel run to remedy the issue? a. makewhatis b. mandb c. info d. man -k Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 02 Linux Installation and Usage ANSWER: RATIONALE:
b
Immediately following a Linux installation, the manual pages may not be indexed yet, and keyword searches will be unavailable. To index the manual pages, you can use the mandb command.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 26. Which of the following commands can be used to display help for the exit shell function? a. man exit b. help exit c. info exit d. exit -h ANSWER: RATIONALE:
b
The help command is used to display usage information for shell functions.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 27. Which of the following commands can be used to immediately power off a Linux system? (Choose all that
apply.) a. shutdown -H now b. poweroff c. shutdown -h now d. halt ANSWER: RATIONALE:
b, c
The poweroff and shutdown -h now commands will power off a system
Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 02 Linux Installation and Usage
immediately. The halt and shutdown -h now commands will halt the operating system, but not call the BIOS ACPI function to power off the system. POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.4 - Properly shut down the Linux operating system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM 28. Ayushi needs to reboot a Linux system in 10 minutes. She wants to first warn any logged on users to save
their work and log off prior to the reboot. What command can Ayushi use? a. echo b. uname c. wall d. apb ANSWER: RATIONALE:
c
The wall (warn all) command can be used to send a message to all users on the system.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.4 - Properly shut down the Linux operating system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system. TOPICS: 2.2 Basic Linux Usage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:00 PM DATE MODIFIED: 5/2/2023 10:00 PM
Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems 1. Kate wants to compare two text files to identify what might have been changed from one version to another.
Which of the following commands can she use to do this? a. match document1.txt document2.txt b. version --compare document1.txt document2.txt c. compare document1.txt document2.txt d. diff document1.txt document2.txt ANSWER: RATIONALE:
d
The diff command will compare the contents of two text files.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.5 - Display the contents of text files and binary files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.3 Displaying the Contents of Text Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 2. Mike has changed his current directory several times and has lost track of his location in the directory tree.
Which of the following commands can he use to tell him the full path to the current directory he is in? a. cd b. pwd c. cwd d. ls -dir ANSWER: RATIONALE:
b
The pwd command prints the absolute pathname of the current directory to the terminal screen.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.3.1 - Navigate the Linux directory structure using relative and absolute pathnames. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.1 The Linux Directory Structure KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 3. Which of the following commands will not interpret regular expressions, which translates into faster results Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems
being returned? (Choose all that apply.) a. grep b. grep -F c. egrep d. fgrep ANSWER: RATIONALE:
b, d
The grep -F command is the same as the fgrep command that is used to match fixed strings rather than a pattern using regular expressions. The fgrep command is the same as the grep -F command that is used to match fixed strings rather than a pattern using regular expressions.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.6 - Search text files for regular expressions using grep. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 3.5 Searching for Text Within Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 4. Jo has received a text file that contains multiple instances of his name spelled correctly as well as multiple
instances spelled as Joe. Which of the following commands would search a text file for any occurrences of either spelling and display them out to the terminal? (Choose three.) a. grep "Joe?" document1.txt b. grep -E "Joe?" document1.txt c. grep "Joe*" document1.txt d. grep -E "Joe*" document1.txt ANSWER: RATIONALE:
b, c, d
The grep -E command interprets patterns as extended regular expressions. The question mark is used to substitute any single letter, number, or character. The asterisk will return instances where zero or more instances of "e". Answer a is not valid because -E must be specified when using the "?" symbol.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.6 - Search text files for regular expressions using grep. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 3.5 Searching for Text Within Files Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems KEYWORDS: DATE CREATED: DATE MODIFIED:
Bloom's: Apply 5/2/2023 10:01 PM 5/2/2023 10:01 PM
5. Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and
display them out to the terminal. Which of the following commands could Garrett use to perform this search? a. grep -E "(John|Bob)" salesemployees.csv b. grep (John|Bob) salesemployees.csv c. grep -E (John|Bob) salesemployees.csv d. egrep (John|Bob) salesemployees.csv ANSWER: RATIONALE:
a
The grep command has a -E option that specifies that it should use extended regular expressions. When used inside parentheses, the pipe symbol can match lines that contain either John or Bob, but the pipe symbol and parentheses must be protected from shell interpretation using single or double quotes. The pipe symbol is commonly used as an OR operator.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.6 - Search text files for regular expressions using grep. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 3.5 Searching for Text Within Files KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 6. Chase is trying to extract records for employees 423 through 428 out of a comma separated values file that
starts with the employee number. Which of the following commands would accomplish this? (Choose all that apply.) a. grep 423,424,425,426,427,428 employees.csv b. grep "^42[3-8]" employees.csv c. grep "423-428" employees.csv d. grep "[423-428]" employees.csv ANSWER: RATIONALE:
b
The first argument of the grep command accepts a regular expression, and the second argument accepts the filename. The ^ regular expression matches a word at the beginning of a line, while the square brackets match a single character. Thus, ^42[3-8] would match lines that start with 42 followed by a single character from 3 to 8. The ^ metacharacter must also be protected from shell interpretation using either single quotes, double quotes, or a backslash character.
Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.6 - Search text files for regular expressions using grep. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 3.5 Searching for Text Within Files KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 7. When using the vi text editor, which of the following keys, when in command mode, will change to insert
mode and place the cursor at the end of the current line? a. i b. a c. I d. A ANSWER: RATIONALE:
d
A capital A will change to insert mode and move to the end of the current line to append new text.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.7 - Use the vi editor to manipulate text files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.8 - Basic file editing. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.6 Editing Text Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 8. When using the vi text editor, which of the following keys, when in command mode, will move to the last
line in the document? a. G b. L c. P d. W ANSWER: RATIONALE:
a
POINTS:
1
A capital G will move the cursor to the last line in the document.
Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.7 - Use the vi editor to manipulate text files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.8 - Basic file editing. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.6 Editing Text Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 9. What commands can be used to view a large text file interactively, page-by-page? (Choose all that apply.) a. more b. cat c. page d. less ANSWER: RATIONALE:
a, d
The more and less commands display a text file interactively. Both can be used to view a text file page-by-page and line-by-line, while the less command also allows cursor key scrolling.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.5 - Display the contents of text files and binary files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.3 Displaying the Contents of Text Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 10. In order to move from the /home/joe/test/data directory to the /home/joe directory, what command should be
issued? a. cd .. b. cd ../.. c. /home/joe d. cd ./.. ANSWER: RATIONALE:
b
POINTS:
1
The cd ../.. command allows you to move two parent directories closer to the root from the current directory. This command will move you to the /home/joe directory.
Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
Multiple Choice False Eckert.Linux+6e.24.3.1 - Navigate the Linux directory structure using relative and absolute pathnames. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.1 The Linux Directory Structure KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 11. If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH
shell's completion feature? a. Alt b. Tab c. Ctrl d. Esc ANSWER: RATIONALE:
b
The Tab key provides the auto completion feature. If there are multiple files or commands that match with the auto completion feature, the terminal provides available options for the user to choose from when auto completing the remainder of the command.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.3.1 - Navigate the Linux directory structure using relative and absolute pathnames. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.1 The Linux Directory Structure KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 12. When issuing the ls -F command, what special character appended to the filename indicates that the file is a
shortcut to another file? a. @ b. * c. & d. = ANSWER: RATIONALE:
a
The @ symbol appended to the filename in the output of ls -F indicates that the
Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems
file is a symbolically linked (shortcut) file. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.2 Viewing Files and Directories KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 13. Select the command that can be used to provide a long listing for each file in a directory: a. ls -t b. ls -L c. ls -F d. ls -l ANSWER: RATIONALE:
d
The ls -l is used to provide a detailed (or long) listing for each file in a certain directory. This listing includes type, mode, link count, ownership, modification date and size information.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.2 Viewing Files and Directories KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 14. What command can be used to display the last five lines of a text file? a. end -5 b. head -5 c. cat -n 5 d. tail -5 ANSWER: RATIONALE:
d
The tail command by default retrieves the last 10 lines on a file. However, by specifying a number after the dash (-), the user has the capability to customize the number of lines to retrieve. In this example, -5 is used to display the last five lines
Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems
on the file. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.5 - Display the contents of text files and binary files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.3 Displaying the Contents of Text Files KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 15. Select the regular expression metacharacter that matches 0 or more occurrences of the previous character. a. * b. ? c. + d. ^ ANSWER: RATIONALE:
a
While using regular expressions, the * permits you to match 0 or more occurrences of the previous character.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.6 - Search text files for regular expressions using grep. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 3.5 Searching for Text Within Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 16. Which of the following key combinations, commonly used in the vi editor command mode, displays current
line statistics? a. Alt+s b. Alt+x c. Ctrl+g d. Ctrl+P ANSWER: RATIONALE:
c
Ctrl+g displays current line statistics, including the filename, current line number, total lines in a file, and the percentage (%) of file location.
Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.7 - Use the vi editor to manipulate text files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.8 - Basic file editing. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.6 Editing Text Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 17. To display a text file in reverse order, what command should be used? a. cat b. tac c. tee d. sed ANSWER: RATIONALE:
b
The tac command (tac is cat spelled backwards) is used to display a file in reverse order.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.5 - Display the contents of text files and binary files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.3 Displaying the Contents of Text Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 18. What command is most effective at identifying different types of files? a. ls -F b. ls -l c. ll d. file ANSWER: RATIONALE:
d
POINTS: QUESTION TYPE:
1 Multiple Choice
The file command provides information about a file's type by examining the file contents. As a result, it can differentiate between different types of text, data, and binary files.
Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.2 Viewing Files and Directories KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 19. At the vi command mode prompt, what key combination will force a quit from the vi editor without saving
changes? a. :q b. :q! c. :exit d. :! ANSWER: RATIONALE:
b
The :q! quits vi regardless of whether the last changes have been saved for the current vi execution.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.7 - Use the vi editor to manipulate text files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.8 - Basic file editing. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.6 Editing Text Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 20. Wayne is using the command line and is in his home directory. Which of the following will display a list of
all files and their sizes from his home directory? (Choose two.) a. ls -ax b. ls -al ~ c. ls -ax ~ d. ls -al /home/wayne ANSWER: RATIONALE:
b, d
POINTS: QUESTION TYPE:
1 Multiple Response
The -a option will list all files and the -l option will list extra information about them, including file sizes. The tilde is a shortcut way of referencing a user's home directory.
Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.2 Viewing Files and Directories KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 21. Which of the following text editors is easy to use and favored by new Linux users as a result? a. vi b. emacs c. vim d. nano ANSWER: RATIONALE:
d
The nano editor is often used by new Linux users because of its low learning curve.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.8 - Identify common alternatives to the vi editor. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.8 - Basic file editing. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.6 Editing Text Files KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 22. Which of the following are valid file types in Linux? (Choose all that apply.) a. named pipes b. directories c. linked files d. special device files ANSWER: RATIONALE:
a, b, c, d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.3.2 - Describe the various types of Linux files.
Text files, binary data files, executable program files, linked files, special device files, named pipes, and sockets are all valid file types in Linux. Directories are also files on Linux systems that function to organize other files.
Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.2 Viewing Files and Directories KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 23. Which of the following information does the stat command display about a file? (Choose all that apply.) a. The time a file was created b. The file size c. The last time a file was accessed d. The last time the contents of a file were modified ANSWER: RATIONALE:
a, b, c, d
The stat command displays detailed information about a file, including the size, creation, modification, access timestamps.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.2 Viewing Files and Directories KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 24. Which of the following will display a list of files and directories under the /bin directory? (Choose all that
apply.) a. file /bin b. ls -R /bin c. tree /bin d. tree -d /bin ANSWER: RATIONALE:
b, c
The -R option to the ls command, as well as the tree command (without arguments) displays files and subdirectories recursively.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
3.2 Viewing Files and Directories Bloom's: Apply 5/2/2023 10:01 PM 5/2/2023 10:01 PM
25. Abdul wishes to view the contents of a binary data file in his home directory to learn more about what
program was used to create it. Which of the following commands would allow Abdul to safely view the contents of this file? a. strings b. file c. grep d. cat ANSWER: RATIONALE:
a
The strings command is safe to use on any file type and will print any text strings that are present within the file contents.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.5 - Display the contents of text files and binary files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.4 Displaying the Contents of Binary Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 26. Which of the following commands change the current directory using an absolute pathname? (Choose all
that apply.) a. cd / b. cd .. c. cd Desktop d. cd /etc ANSWER: RATIONALE:
a, d
Absolute pathnames start from the root directory and must begin with /.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.3.1 - Navigate the Linux directory structure using relative and absolute pathnames. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
3.1 The Linux Directory Structure Bloom's: Understand 5/2/2023 10:01 PM 5/2/2023 10:01 PM
27. The current directory contains eight project files named project1.txt through project8.txt. Which of the
following commands will display the file type for all project files in the current directory except for project2.txt and project7.txt? a. file project1,3-6,8* b. file project[&27]* c. file project(1,3-6,8)* d. file project[!27]* ANSWER: RATIONALE:
d
The square bracket wildcard metacharacters are used to match a single character, and a ! character within these square brackets reverses the match condition. Thus [!27] would match any character except 2 or 7.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.4 - Use shell wildcards to specify multiple filenames. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.2 Viewing Files and Directories KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 28. Which of the following commands will display lines that start with Label in all .conf files in the /etc/selinux
directory? a. grep "^Label" /etc/selinux/*.conf b. grep "^Label" /etc/selinux/conf$ c. grep 'Label$' /etc/selinux/*.conf d. grep 'Label$' /etc/selinux/conf$ ANSWER: RATIONALE:
a
POINTS:
1
When searching for text, you must use regular expressions, and when searching for filenames, you must use wildcard metacharacters. Thus, the first argument of the grep command accepts a regular expression, and the second argument accepts wildcard metacharacters. The ^ regular expression matches a word at the beginning of a line, while the * wildcard matches zero or more characters in a filename. The ^ metacharacter must also be protected from shell interpretation using either single quotes, double quotes, or a backslash character.
Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 03 Exploring Linux Filesystems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.4 - Use shell wildcards to specify multiple filenames. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 3.2 Viewing Files and Directories KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM
Copyright Cengage Learning. Powered by Cognero.
Page 15
Name:
Class:
Date:
Mod 04 Linux Filesystem Management 1. Lynn runs the locate command and the results include many files from a directory that she doesn't want to
include in her search. Which of the following files could Lynn modify so that the locate command no longer includes those results? a. /etc/locate.d/updatedb.conf b. /etc/locate.conf c. /etc/updatedb.conf d. /etc/locatedb.conf ANSWER: RATIONALE:
c
The locate command uses the configuration file located at /etc/updatedb.conf.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.1 - Find files and directories on the filesystem. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.3 Finding Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 2. Which of the following commands will return the absolute path on the filesystem to the grep binary
executable? (Choose all that apply.) a. which grep b. whereis grep c. type grep d. find grep ANSWER: RATIONALE:
a, b
The which grep command will return the alias and location of only the grep executable. The whereis grep command will return the location of the grep executable and its manual page. The type grep command will return either the alias (if it exists) or location of the grep executable only. Because grep is normally aliased on Linux systems, the type command will only display the alias and not the location of the grep executable.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.1 - Find files and directories on the filesystem. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.3 Finding Files KEYWORDS: Bloom's: Understand Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 04 Linux Filesystem Management DATE CREATED: DATE MODIFIED:
5/2/2023 10:01 PM 5/2/2023 10:01 PM
3. Mindy wants to create a new subdirectory at ~/2023projects/projectx/projectplans to start storing the initial
project plans for projectx. However, this is the first project she has worked on in 2023 and the 2023projects directory does not exist yet. Which of the following commands will create the higher level directories if they do not already exist? a. mkdir -r ~/2023projects/project/projectplans b. mkdir -p ~/2023projects project/projectplans c. mkdir --all ~/2023projects/project/projectplans d. mkdir -v ~/2023projects/project/projectplans ANSWER: RATIONALE:
b
The -p option will create parent directories when they do not already exist. To learn available options to Linux commands, recall that you can consult the manual pages. For this question, the man mkdir command will provide the information necessary.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.4 - Use standard Linux commands to manage files and directories. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.2 Managing Files and Directories KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 4. Which of the following commands can be used to update the last modified timestamp on a file, or if the file
specified does not exist will create the file? a. update file.txt b. updatets file.txt c. touch file.txt d. stamp file.txt ANSWER: RATIONALE:
c
The touch command will update the last modified date on a file when used on a file that exists. When used on a file that does not exist, it will create a blank file.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.4 - Use standard Linux commands to manage files and directories. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 04 Linux Filesystem Management TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
4.5 File and Directory Permissions Bloom's: Remember 5/2/2023 10:01 PM 5/2/2023 10:01 PM
5. Which of the following commands can be used to ensure that no user on the system, including the root user,
can modify the contents of the securedata.bin file? a. chmod 000 securedata.bin b. setfacl -b securedata.bin c. chattr +i securedata.bin d. chown nobody:nobody securedata.bin ANSWER: RATIONALE:
c
The immutable attribute can be set using the chattr +i command to prevent any user from modifying or deleting a file. Modifying permissions will not satisfy the requirements as the root user can supersede all permissions on a system.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.10 - View and set filesystem attributes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 6. Which of the following commands will delete a directory and all of the files contained within it? a. rm olddir b. rmdir olddir c. rm -rf olddir d. rmdir -rf olddir ANSWER: RATIONALE:
c
The -r option for the rm command will recursively delete directories as well as any subdirectories contained within them, as well as files contained in any of those directories or subdirectories. The -f option is to force delete them without asking for confirmation on each file or subdirectory.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.4 - Use standard Linux commands to manage files and directories. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 04 Linux Filesystem Management
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. 4.2 Managing Files and Directories Bloom's: Remember 5/2/2023 10:01 PM 5/2/2023 10:01 PM
7. Jim wants to rename a directory for a project that he has been working on. Which of the following commands
can he use to perform that action? a. mv projectx projecty b. rn projectx projecty c. ren projectx projecty d. move projectx projecty ANSWER: RATIONALE:
a
The mv command can be used to move a directory from one location to another. If the target location does not exist, the mv command renames the directory the target name.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.4 - Use standard Linux commands to manage files and directories. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.2 Managing Files and Directories KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 8. Which of these commands will set the following permissions on file1.txt?
User = Read, Write, Execute Group = Read, Execute Others = Read a. chmod o=rwx,g=rx,u=r file1.txt b. chmod u=rwx,g=rx,u=r file1.txt c. chmod 754 file1.txt d. chmod 321 file2.txt ANSWER: RATIONALE:
b, c
The chmod command can be used to set permissions by specifying the exact permissions (r, w, and/or x) for users (u), group (g), and others (o) followed by the filename they are to be set for. The chmod command can be used to set permissions by specifying them in octal format. Read has a value of 4, write has a value of 2, and execute has a value of 1. They are in the order of user, group, and then other. You just have to add up the values of each of the permissions for each
Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 04 Linux Filesystem Management
of the places. Read (4) + Write (2) + Execute (1) for the user gives us 7 as the first character. Read (4) + Execute (1) gives us 5 for the group. Read (4) only is set for all other users. The full result is 754. The syntax is important so after the chmod comes the permissions to be set followed by the filename(s). POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.6 - Define and change Linux file and directory permissions. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 9. Which of the following umask settings will result in new files receiving the default permissions rw-------? a. 177 b. 600 c. 188 d. 688 ANSWER: RATIONALE:
a
New files receive rw-rw-rw- (666) from the system, minus those removed by the umask. If the x (1) for user, rwx (7) for group, and rwx (7) for others in the umask, the default permissions should be rw-------.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.7 - Identify the default permissions created on files and directories. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 10. Which of the following are valid permissions for a directory where the command chmod 1777 has been used
to set the permissions on it? a. rwxrwxrwt b. rwxrwxrwx c. rwsrwsrwt d. rwxrwxrwT Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 04 Linux Filesystem Management ANSWER: RATIONALE:
a
The chmod 1777 command will set all permissions for user, group, and other categories on the directory as well as the sticky bit permission. This results in a lowercase t being shown instead of an x in the other permission category (an uppercase T would indicate the absence of an underlying x permission for other). The sticky bit will allow all users to add files to the directory, but only remove files they have added.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.8 - Apply special file and directory permissions. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 11. What would be the result of running the command chown :root file1.txt? a. This would set the owner of file1.txt to root. b. This would set the group ownership of file1 to root. c. This would set the owner and group ownership of file1 to root. d. This would keep the current ownership of the file, and add root as a second owner of the file. ANSWER: RATIONALE:
b
The full syntax is chown user:group filename. The user and group are both individually optional. You can specify one, the other, or both.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.5 - Modify file and directory ownership. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 12. Which of the following options will change the ownership of files and directories recursively within a
directory? (Choose all that apply.) a. -a b. -R c. --recursive Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 04 Linux Filesystem Management d. --all ANSWER: RATIONALE:
b, c
The -R option will recursively change ownership on files and subdirectories within a directory. The --recursive option is the POSIX version of the -R option.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.5 - Modify file and directory ownership. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 13. Which of the following indicate a symbolic link when displayed with the ls -l command? a. -rw-r--r-b. srwxrwxrwx c. lrwxrwxrwx d. srw-r--r-ANSWER: RATIONALE:
c
A symbolic link will have the first letter as a lowercase l with the read, write, and execute bits set for user, group, and others.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.2 - Describe and create linked files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.6 - Create and change hard and symbolic links. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.4 Linking Files KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 14. If a hard link is created to a file and then the original file is deleted, which of the following is true? a. Both the original file and the hard link are removed. b. An error message will be displayed preventing the deletion of the original file. c. The original file will be removed while the hard link remains, though the content will not be
accessible. d. The original file will be removed while the hard link remains usable to access the contents of the file. ANSWER:
d
Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 04 Linux Filesystem Management RATIONALE:
When the original file is deleted, since the hard link points to the same inode, the contents of the inode are still accessible via the hard link.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.2 - Describe and create linked files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.6 - Create and change hard and symbolic links. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.4 Linking Files KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 15. Which of the following commands will create a symbolic link named foo.txt to an original file named
bar.txt? a. ln bar.txt foo.txt b. ln foo.txt bar.txt c. ln -s bar.txt foo.txt d. ln -h foo.txt bar.txt ANSWER: RATIONALE:
c
The ln command requires the -s option to be used in order to create a symbolic link. The ln command should be followed by the name of the original file and then the name of the link to create.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.2 - Describe and create linked files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.6 - Create and change hard and symbolic links. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.4 Linking Files KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 16. Jamie has created a hard link to another file within the same directory. Which of the following commands
can he use to verify that the hard link was created correctly? (Choose all that apply.) a. ls -il b. ls -i c. ls -l d. ls -al ANSWER:
a, b
Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 04 Linux Filesystem Management RATIONALE:
The -i option will display the inode of the file while the -l will show extra details about the file. A hard link and the original file will have the same inode number.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.2 - Describe and create linked files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.6 - Create and change hard and symbolic links. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.4 Linking Files KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 17. Jean installs a distribution of Linux on a workstation and attempts to run the locate command to find a
certain file. Instead of returning the results she expected, an error message is displayed that it cannot find the plocate.db file in its default location. Which of the following commands should Jean run in an attempt to resolve this problem? a. apt upgrade plocate b. updatedb c. locate --update d. mlocate --update ANSWER: RATIONALE:
b
The updatedb command is usually run daily by cron to update the default database. However, until it is run for the first time, the locate command will be unable to search an index of the files on the system. This means that it may be necessary to run the updatedb command manually before the locate command can be used for the first time.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.1 - Find files and directories on the filesystem. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.3 Finding Files KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 18. Julian notices a + symbol following the mode of a file when running the ls -l command. What command
should Julian run next to view the information provided by the + symbol? a. getfacl b. chlist Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 04 Linux Filesystem Management c. lsattr d. ls -Fa ANSWER: RATIONALE:
a
The + symbol following the mode indicates that there are additional entries in the ACL of the file. You can use the getfacl command to view those additional entries.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.9 - Modify the default access control list (ACL). ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership. Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file permissions. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 19. Which of the following commands can be used to recursively search through the directory tree in search of a
file that meets a set of given criteria instead of using an indexed database? a. locate b. mlocate c. find d. where ANSWER: RATIONALE:
c
The find command can be used to recursively search the directory tree instead of using an indexed database of files. This means that it is a slower alternative when looking for files.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.1 - Find files and directories on the filesystem. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.3 Finding Files KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 20. Which of the following commands will display all files and directories within the /var/log directory or its
subdirectories that are owned by the root user? a. find /var/log -user root Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 04 Linux Filesystem Management b. find -uid root -print /var/log c. find -user root -print /var/log d. find -start /var/log -user root ANSWER: RATIONALE:
a
After the find command, you should specify the base directory or subdirectory where you want to limit the search to (including any subdirectories contained within), and then the user option can narrow the list of files returned to only those owned by a particular username.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.1 - Find files and directories on the filesystem. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.3 Finding Files KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 21. The Filesystem Hierarchy Standard specifies what directory as the root user's home directory? a. /bin b. /home/root c. /boot d. /root ANSWER: RATIONALE:
d
The root user's home directory is /root.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.3 - Explain the function of the Filesystem Hierarchy Standard. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location. Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 4.1 The Filesystem Hierarchy Standard KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 22. What argument can be used with the chmod command to add read permission and remove write permission
for the group owner of a file? a. u+r+w b. g-r+w Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 04 Linux Filesystem Management c. g+r-w d. o+r-w ANSWER: RATIONALE:
c
Group owners are indicated by the g symbol. The plus (+) symbol adds permission. The minus (-) symbol removes permission.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.6 - Define and change Linux file and directory permissions. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 23. In order to set all of the special permissions on a certain file or directory, which command should be used on
a file named filename? a. chmod 777 filename b. chmod 7777 filename c. chmod 6666 filename d. chmod 0000 filename ANSWER: RATIONALE:
b
In the chmod 7777 command, the first number represents the SUID(4), SGID(2), and sticky bit(1) permissions. Combined, these are indicated by a first number of 7 (4+2+1=7).
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.8 - Apply special file and directory permissions. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 24. Nicholas wants to identify the other files that are hard linked to a particular file. He issues the ls -li
command and notes that the file has a link count of 4 and inode number of 3456. Which of the following commands could he use to locate the other hard linked files on the system? a. ls -h 4 Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 04 Linux Filesystem Management b. ls -h 3456 c. find / -inum 4 d. find / -inum 3456 ANSWER: RATIONALE:
d
Hard links share the same inode number. As a result, you can use the -inum search option to the find command to locate them on the system. To locate all files starting from the / directory that have inode number 3456, you can use the find / -inum 3456 command.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.2 - Describe and create linked files. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.6 - Create and change hard and symbolic links. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 4.4 Linking Files KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 25. Jan needs to set permissions on a file so that the owner has read, write, and execute permissions. The group
should have read permissions only, and everyone else should have no access. Which of the following parameters, when used with the chmod command, would set the permissions described? a. 047 b. 740 c. 026 d. 620 ANSWER: RATIONALE:
b
The permissions are set from left to right for owner (user), group, and everyone else (other). Read = 4, Write = 2, and Execute = 1. A 7 in the user placeholder is equal to 4 + 2 + 1, or Read + Write + Execute. A 4 in the group placeholder means only the read bit is turned on. A 0 in the other placeholder means that none of the permissions are set.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.6 - Define and change Linux file and directory permissions. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 04 Linux Filesystem Management 26. Jose needs to ensure that members of the newly created acctg group have read and write permissions on the
project.csv file. However, he cannot modify the existing group owner on the file, and other users cannot be allowed access to the file via the other category in the mode. Which of the following commands can Jose use to achieve his goal? a. chmod 2660 project.csv b. setfacl -m g:acctg:rw project.csv c. chmod 1660 project.csv d. setfacl -a acctg -p rw project.csv ANSWER: RATIONALE:
b
The setfacl -m command can be used to add additional user and group categories to the mode of a file.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.9 - Modify the default access control list (ACL). ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 27. Nashina is logged in as the root user account on a production Linux server but is unable to modify a
particular configuration file. What command can be used to verify whether the configuration file is read-only? a. ls -li b. getfacl c. lsattr d. chmod --list ANSWER: RATIONALE:
c
The lsattr command can be used to list file attributes, including the immutable attribute that sets a file read-only for all users (including root).
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.10 - View and set filesystem attributes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file permissions. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 04 Linux Filesystem Management DATE MODIFIED:
5/2/2023 10:01 PM
28. Jillian performs a long listing on a directory and notices that a file called securedata.xml has an owner of
bparsons, group owner of ctlgroup, and mode of rw-r-----. What permissions does the root user have to this file? a. rwx b. rw c. r d. no permissions ANSWER: RATIONALE:
a
The owner (bparsons) has rw- to the file, the group owner (ctlgroup) has r-permissions to the file, and other users have --- (no permissions) to the file. However, the root user can supersede all permissions and hence has all permissions (rwx) to the file.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.6 - Define and change Linux file and directory permissions. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership. Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file permissions. TOPICS: 4.5 File and Directory Permissions KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM
Copyright Cengage Learning. Powered by Cognero.
Page 15
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration 1. Which of the following commands can be used to display the filesystem and partition UUIDs on a Linux
system? a. e2label b. blkid c. fatlabel d. showpart ANSWER: RATIONALE:
b
The blkid command can be used to display the filesystem and partition UUIDs on a Linux system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and removable media storage devices. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.3 Working with USB Flash Drives KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 2. Jackson wants to automatically mount a secondary internal hard drive when his Linux workstation boots up.
In which of the following files should he configure an entry for the partition on the drive that he wants to mount? a. /etc/ftab b. /etc/crontab c. /etc/mtab d. /etc/fstab ANSWER: RATIONALE:
d
Partitions that should be mounted at boot time are normally configured in the /etc/fstab file.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.5.3 - Mount and unmount filesystems to and from the Linux directory tree. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.3 Working with USB Flash Drives KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration DATE CREATED: DATE MODIFIED:
5/2/2023 10:01 PM 5/2/2023 10:01 PM
3. Which of the following can be used to show the block devices on a Linux system? (Choose two.) a. ls /sys/block b. cat /proc/block c. lsblk d. ls /etc/block ANSWER: RATIONALE:
a, c
The /sys/block directory contains the block devices on a Linux system.nd repair quota files. The lsblk command will not only show the block devices on a Linux system, but will also show information such as their major and minor numbers, size, and whether it is readonly.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and removable media storage devices. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.3 Working with USB Flash Drives KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 4. Aria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk
command indicates that the new partition information must be manually reloaded. Which of the following should she do next? (Choose two. Either answer is independently correct.) a. Run the parted command. b. Run the partprobe command. c. Run the cfdisk program. d. Reboot the system. ANSWER: RATIONALE:
b, d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and removable media storage devices.
The partprobe command will reload the partition information from the MBR or GPT into memory. Rebooting the system is the most reliable way of making sure the partition information is reloaded into memory.
Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.6 Working with Hard Disk Drives and SSDs KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 5. Which of the following would be the device file for the third partition on the second SATA drive on a Linux
system? a. /dev/hdb3 b. /dev/hdc2 c. /dev/sdb3 d. /dev/sdc2 ANSWER: RATIONALE:
c
SATA devices start with sd. The second SATA drive is sdb, which should be followed by the partition number of 3 for /dev/sdb3.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.5.1 - Identify the structure and types of device files in the /dev directory. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings. Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 5.6 Working with Hard Disk Drives and SSDs KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 6. Sharon has inserted a USB flash drive into her Linux workstation while using the GNOME desktop
environment. After opening a Terminal app, what directory can she change to in order to access the contents of the filesystem on the USB flash drive if the drive is labeled as BACKUPS? a. /media/BACKUPS b. /mnt/BACKUPS c. /home/sharon/BACKUPS d. /run/media/sharon/BACKUPS ANSWER: RATIONALE:
d
POINTS: QUESTION TYPE: HAS VARIABLES:
1 Multiple Choice False
The automounter daemon within a desktop environment automatically mounts removeable media under the /run/media/username/label directory.
Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration LEARNING OBJECTIVES:
Eckert.Linux+6e.24.5.3 - Mount and unmount filesystems to and from the Linux directory tree. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.5 Working with Removeable Media within a Desktop Environment KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 7. Which of the following is required as a separate partition in order to use LVM? a. /var b. /boot c. /tmp d. /home ANSWER: RATIONALE:
b
The /boot directory is a required separate partition in order to use LVM on the Linux operating system as the kernel in the /boot directory must first be loaded in order for the system to process logical volumes.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.6 - Use the LVM to create and manage logical volumes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.1 - Design hard disk layout. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.6 Working with Hard Disk Drives and SSDs KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 8. If the mkfs command is executed to create a filesystem and only the block device name is specified, which of
the following filesystems will be created? a. exFAT b. ext2 c. ext3 d. ext4 ANSWER: RATIONALE:
b
POINTS: QUESTION TYPE:
1 Multiple Choice
If the −t option is not specified to indicate the type of file system, the default ext2 filesystem is used.
Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration HAS VARIABLES: LEARNING OBJECTIVES:
False Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and removable media storage devices. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.3 Working with USB Flash Drives KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 9. Which of the following commands can be used to create an exFAT filesystem on a USB thumb drive that is
recognized as /dev/sdb? (Choose all that apply.) a. mkfs.exfat /dev/sdb1 b. mkfs exfat /dev/sdb1 c. mkexfatfs /dev/sdb1 d. mke2fs.exfat /dev/sdb1 ANSWER: RATIONALE:
a, c
The mkfs.exfat and mkexfatfs commands can create an exFAT filesystem. The mkfs command would need the −t option to specify exfat.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and removable media storage devices. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.3 Working with USB Flash Drives KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 10. Clint has run the command parted /dev/sdb and wants to display a list of the existing partitions that exist on
that drive. Which of the following commands can he use to display the existing partitions? a. disp b. list c. print d. display ANSWER: RATIONALE:
c
The print command while in the parted utility will display a list of existing partitions on a hard drive.
Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and removable media storage devices. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.6 Working with Hard Disk Drives and SSDs KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 11. Which of the following commands can be used to create and activate a swap partition on a Linux system?
(Each answer represents part of the whole.) a. mkswap /dev/sda6 b. mke2swap /dev/sda6 c. mkswap −on /dev/sda6 d. swapon /dev/sda6 ANSWER: RATIONALE:
a, d
The mkswap command is the first part of the two commands necessary to create the swap partition. After it is created, you must run the swapon command. The swapon command is the second part of the two commands necessary and will activate the partition created by the mkswap command.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and removable media storage devices. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems. Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 5.6 Working with Hard Disk Drives and SSDs KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 12. Which of the following commands will prompt to convert an MBR partition to GPT, thus destroying all
existing MBR partitions on a disk? a. gdisk b. cfdisk c. gfdisk Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration d. iconv ANSWER: RATIONALE:
a
The gdisk command, when used on an MBR partition, will prompt to convert to GPT. If you choose to allow it to do this, it will destroy all existing MBR partitions on a disk.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and removable media storage devices. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.6 Working with Hard Disk Drives and SSDs KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 13. Callie wants to make sure that a filesystem is checked every 20 days. Which of the following options, when
used with the tune2fs command, would set a full filesystem check to run every 14 days? a. −i 14 b. −i 14d c. −d 14 d. −i 336 ANSWER: RATIONALE:
b
To set the interval to 14 days, you need to use the −i option and specify 14d as the interval.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.8 - Check filesystems for errors. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.7 Monitoring Filesystems KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 14. Archie wants to optimize an XFS filesystem and minimize the chance of future corruption. Which of the
following commands will compact or otherwise improve the layout of the contiguous blocks of file data for an XFS filesystem? Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration a. defrag b. xfs_fsr c. fsck d. xfs_db ANSWER: RATIONALE:
b
The xfs_fsr command will compact or otherwise improve the layout of the extents, or contiguous blocks of data, for an XFS filesystem.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.8 - Check filesystems for errors. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.7 Monitoring Filesystems KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 15. Which of the following commands produce many pages of results when run from the "/" directory? a. fdisk --list b. ls -al c. df d. du ANSWER: RATIONALE:
d
The du, or directory usage, command lists file space usage and includes all of the recursive directories contained within whatever directory the command is run from.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.7 - Monitor free space on mounted filesystems. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.7 Monitoring Filesystems KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 16. Which of the following commands can be used to show the block devices, including their major and minor
numbers, on a system which are located in the /sys/block directory? Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration a. lsblk b. cat /sys/block c. ls -al /sys/block d. lsblock ANSWER: RATIONALE:
a
The lsblk command can be used to display block devices on a system, including their major and minor numbers.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.5.1 - Identify the structure and types of device files in the /dev directory. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.3 Working with USB Flash Drives KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 17. Which of the following can be used to specify a filesystem to mount in /etc/fstab? (Choose all that apply.) a. A device path such as /dev/sdb2 b. A filesystem UUID c. A filesystem label d. A filesystem nickname configured in /etc/mtab ANSWER: RATIONALE:
a, b, c
A device path such as /dev/sdb2 can be used to mount a filesystem. A filesystem UUID can be used to mount a filesystem. A filesystem label can be used to mount a filesystem.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.5.3 - Mount and unmount filesystems to and from the Linux directory tree. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.3 Working with USB Flash Drives KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration 18. Elijah is done working with an external USB hard drive and wants to properly disconnect it. Which of the
following commands should he use before unplugging the USB cable? a. unmount b. disable c. umount d. mount --eject ANSWER: RATIONALE:
c
The umount command can be used to unmount a filesystem.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.5.3 - Mount and unmount filesystems to and from the Linux directory tree. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.3 Working with USB Flash Drives KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 19. Which two commands can be used to add the /dev/nvme3n1p1 partition to the existing storage1 volume
group? (Choose two.) a. pvcreate /dev/nvme3n1p1 b. vgcreate /dev/nvme3n1p1 c. vgextend storage1 /dev/nvme3n1p1 d. lvextend storage1 /dev/nvme3n1p1 ANSWER: RATIONALE:
a, c
The pvcreate command adds the partition to the LVM (assigning it as a physical volume), while the vgextend command can be used to allocate the storage in the physical volume to an existing volume group. Following this, logical volumes can be created or extended from the addition volume group capacity.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.6 - Use the LVM to create and manage logical volumes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.6 Working with Hard Disk Drives and SSDs KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration DATE MODIFIED:
5/2/2023 10:01 PM
20. Which command can be used to create a logical volume called data1 from 80TB of available space within
the storage1 volume group? a. lvcreate −L 80TB −n storage1 data1 b. lvextend +80TB storage1 data1 c. lvcreate −L 80TB −n data1 storage1 d. lvextend +80TB data1 storage1 ANSWER: RATIONALE:
c
The lvcreate command can be used to create a new logical volume. The −L option to this command specifies the size, the −n option specifies the logical volume name, and the final argument is the volume group to obtain storage from.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.6 - Use the LVM to create and manage logical volumes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.6 Working with Hard Disk Drives and SSDs KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 21. Which of the following commands can be used to scan a filesystem for disk usage, as well as create, check,
and repair quota files? a. quota b. edquota c. chkquota d. quotacheck ANSWER: RATIONALE:
d
The quotacheck command can be used to scan a filesystem for disk usage, as well as create, check, and repair quota files.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.9 - Use disk quotas to limit user space usage. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file permissions. TOPICS: 5.8 Disk Quotas KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration DATE CREATED: DATE MODIFIED:
5/2/2023 10:01 PM 5/2/2023 10:01 PM
22. Which of the following directories is created by default when an ext2, ext3, or ext4 filesystem is created on a
device? a. crash b. tmp c. lost+found d. proc ANSWER: RATIONALE:
c
The lost+found directory is created by default when an ext2, ext3, or ext4 filesystem is created on a device. It is used by the fsck utility to store files that cannot be repaired.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.8 - Check filesystems for errors. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.7 Monitoring Filesystems KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 23. After using the DVD drive on his Linux computer, John pushes the eject button on the front of the drive but
it doesn't eject the DVD. Which of the following commands should he run? (Choose all that apply.) a. unmount /dev/sr0 b. umount /dev/sr0 c. eject /dev/sr0 d. detach /dev/sr0 ANSWER: RATIONALE:
b, c
The umount command along with device can be used to unmount the DVD and allow the user to eject the disc. The eject command along with device can be used to unmount the DVD and then sends the command to the drive to eject the disc.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.5.3 - Mount and unmount filesystems to and from the Linux directory tree. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
appropriate tools. 5.4 Working with CDs, DVDs, and ISO Images Bloom's: Remember 5/2/2023 10:01 PM 5/2/2023 10:01 PM
24. The quotas for certain users can be edited by using which command? a. edquota b. chquota c. usrquota d. repquota ANSWER: RATIONALE:
a
The edquota command allows system administrators to edit the quotas for certain users.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.9 - Use disk quotas to limit user space usage. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 5.8 Disk Quotas KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 25. Which of the following commands can be used to create an ISO image from the contents of the /backups
directory? a. mkfs −t iso9660 −n image.iso /backups/* b. mkfs −t udf −n image.iso /backups/* c. mkisofs −RJ −o image.iso /backups/* d. isoimage --create image.iso /backups/* ANSWER: RATIONALE:
c
The mkisofs command can be used to create an ISO image.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.5 - Create and use ISO images. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
5.4 Working with CDs, DVDs, and ISO Images Bloom's: Remember 5/2/2023 10:01 PM 5/2/2023 10:01 PM
26. Which of the following commands can be used to list detailed information for a hardware device on the
system? a. lsblk /dev/sdb1 b. udevadm info /dev/sdb1 c. blkid /dev/sdb1 d. cat /dev/sdb1 ANSWER: RATIONALE:
b
The udevadm info command can be used to list detailed information for a device on the system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.5.1 - Identify the structure and types of device files in the /dev directory. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings. Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues. TOPICS: 5.1 The /dev Directory KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM 27. Which of the following filesystems would most likely be used for the root filesystem on a modern Linux
system? (Choose all that apply.) a. xfs b. exfat c. ext4 d. ext2 ANSWER: RATIONALE:
a, c
Both xfs and ext4 are fast, feature-rich filesystems that are often used on modern Linux systems. The exfat filesystem is designed for removable storage devices, and the legacy ext2 filesystems do not provide journaling capability.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.2 - Identify common filesystem types and their features. ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.1 - Design hard disk layout. Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 05 Linux Filesystem Administration
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. 5.2 Filesystems Bloom's: Understand 5/2/2023 10:01 PM 5/2/2023 10:01 PM
28. Which of the following are block device files? (Choose all that apply.) a. /dev/nvme0 b. /dev/zero c. /dev/tty1 d. /dev/zram0 ANSWER: RATIONALE:
a, d
Block device files normally contain a filesystem and are written to block-byblock. Both NVMe and zram are block devices, as are virtual hard disk, SATA, SCSI, SAS, PATA, CD and DVD devices.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.5.1 - Identify the structure and types of device files in the /dev directory. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings. Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 5.1 The /dev Directory KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:01 PM DATE MODIFIED: 5/2/2023 10:01 PM
Copyright Cengage Learning. Powered by Cognero.
Page 15
Name:
Class:
Date:
Mod 06 Linux Server Deployment 1. Which command should you run after installing a new kernel module to update the module dependency
database? a. insmod b. modprobe c. lsmod d. depmod ANSWER: RATIONALE:
d
The depmod command can be used to update the module dependency database. The depmod command generates a list of dependency description of kernel modules and its associated map files. The mapping is used to search and find the correct module when a unit of hardware requests it.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver support. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 6.4 Installing a Linux Server Distribution KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 2. Leonard wants to find detailed information about the Bluetooth kernel module. Which of the following
commands can he use to display this information? a. modstatus bluetooth b. lsmod bluetooth c. modinfo bluetooth d. modstat bluetooth ANSWER: RATIONALE:
c
The modinfo command can be used to display detailed information about a kernel module. In this case, by specifying bluetooth as the parameter, it will display information about the Bluetooth module.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver support. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 6.4 Installing a Linux Server Distribution KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 06 Linux Server Deployment DATE CREATED: DATE MODIFIED:
5/2/2023 10:02 PM 5/2/2023 10:02 PM
3. Which of the following commands can be used to create and manage a software RAID configuration after
installation? a. mdadm b. raidadm c. dmadm d. madam ANSWER: RATIONALE:
a
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.6.4 - Explain the different levels of RAID and types of RAID configurations.
The mdadm command can be used to create and manage a software RAID configuration after installation.
ACCREDITING STANDARDS:
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. 6.3 Configuring Server Storage Bloom's: Remember 5/2/2023 10:02 PM 5/2/2023 10:02 PM
4. In order to create and manage KVM or QEMU virtual machines, a Linux system must have which of the
following software libraries installed? a. libvm b. virsh c. vmlib d. libvirt ANSWER: RATIONALE:
d
The libvert virtualization libraries must be installed in order to create and manage KVM or QEMU virtual machines.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.2 - Outline different Linux server virtualization options. TOPICS: 6.2 Understanding Server Virtualization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 06 Linux Server Deployment 5. Which of the following can be used to create and manage KVM/QEMU virtual machines on a Linux system?
(Choose all that apply.) a. Virtual Machine Manager b. virsh c. SPICE d. Boxes ANSWER: RATIONALE:
a, b, d
You can use the virsh command or the Virtual Machine Manager or Boxes tools within a desktop environment to create and manage KVM/QEMU virtual machines. SPICE is a protocol that desktop virtualization tools (e.g., Boxes) can use to interact graphically with virtual machines.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.2 - Outline different Linux server virtualization options. TOPICS: 6.2 Understanding Server Virtualization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 6. Which of the following commands will list messages that were displayed during the boot sequence by the
kernel? (Choose all that apply.) a. journalctl -k b. logger --boot c. cat /var/log/boot d. dmesg ANSWER: RATIONALE:
a, d
The dmesg and journalctl -k commands will list messages that were displayed by the kernel during the previous system boot.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.7 - Troubleshoot the Linux server installation process. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system. Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 6.4 Installing a Linux Server Distribution KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM
Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 06 Linux Server Deployment 7. Which of the following commands can be used to display general hardware information for the entire system? a. lshw b. lscpu c. hwdisp d. hware ANSWER: RATIONALE:
a
Without options or arguments, the lshw command displays general hardware information for all hardware categories on the system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver support. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings. Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 6.4 Installing a Linux Server Distribution KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 8. Which of the following commands will display detailed CPU information, including CPU features such as
virtualization extensions? (Choose all that apply.) a. lshw -class cpu b. cat /proc/cpuinfo c. lscpu d. hwinfo --cpu ANSWER: RATIONALE:
a, b, c, d
The lshw, lscpu, and hwinfo commands can be used to display detailed CPU information. This information is obtained from the kernel exported data in the /proc/cpuinfo file.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver support. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings. Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 6.4 Installing a Linux Server Distribution KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 06 Linux Server Deployment DATE MODIFIED:
5/2/2023 10:02 PM
9. A government office wants to secure a few of its Linux systems so that they can only use certain USB
devices. After plugging in a USB device, which of the following commands could be used to detect certain identifying information that can be used to only allow that type of USB device? a. usbdetect b. modusb c. lspci d. lsusb ANSWER: RATIONALE:
d
The lsusb command will display individual USB device information that can be used to limit the USB devices allowed on a Linux system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver support. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings. Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 6.4 Installing a Linux Server Distribution KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 10. What type of hypervisor is KVM? a. Type 1 b. Type 2 c. Type 3 d. Type 4 ANSWER: RATIONALE:
a
Since KVM is part of the Linux kernel and runs guest operating systems directly on server hardware, it is considered a Type 1 hypervisor and suitable for hosting large numbers of virtual machines within a datacenter environment.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.2 - Outline different Linux server virtualization options. TOPICS: 6.2 Understanding Server Virtualization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 06 Linux Server Deployment DATE MODIFIED:
5/2/2023 10:02 PM
11. When running Linux within a Microsoft Hyper-V virtual machine, which of the following modules would
you expect to see as part of the output of the lsmod command that provide the necessary drivers for virtualized hardware? a. hv_ b. virtio c. vmw d. hyperv_ ANSWER: RATIONALE:
a
Drivers for Hyper-V are provided as modules that start with hv_.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver support. ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.6 - Linux as a virtualization guest. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 6.4 Installing a Linux Server Distribution KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 12. What type of storage configuration provides faster access to the underlying storage devices than what they
support by default? a. RAID level 0 b. RAID level 1 c. RAID level 5 d. JBOD ANSWER: RATIONALE:
c
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.6.4 - Explain the different levels of RAID and types of RAID configurations.
ACCREDITING STANDARDS: TOPICS: KEYWORDS:
RAID level 5 provides striping with parity to spread data across multiple storage devices for faster data access. Because it writes parity information to each storage device, all data will still be accessible in the event a single storage device fails.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. 6.3 Configuring Server Storage Bloom's: Understand
Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 06 Linux Server Deployment DATE CREATED: DATE MODIFIED:
5/2/2023 10:02 PM 5/2/2023 10:02 PM
13. Each SCSI device attached to a system must be assigned an ID number. What is this ID number called? a. device ID b. target ID c. SCSI number d. SCSI controller ANSWER: RATIONALE:
b
The target ID or SCSI ID is a unique ID number associated with each SCSI controller and hard disk.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.3 - Describe the configuration of SCSI devices and SANs. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 6.3 Configuring Server Storage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 14. If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has
occurred? a. page fault b. IRQ fault c. segmentation fault d. RAM failure ANSWER: RATIONALE:
c
The segmentation fault indicates an error when a program accesses an unassigned area in the RAM.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.7 - Troubleshoot the Linux server installation process. ACCREDITING STANDARDS: Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 6.4 Installing a Linux Server Distribution KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 06 Linux Server Deployment DATE MODIFIED:
5/2/2023 10:02 PM
15. Which of the following commands can you use on a Linux server to configure a connection to an iSCSI
target following installation? a. iscsiadm b. fcstat c. mpathconf d. multipath ANSWER: RATIONALE:
a
The iscsiadm command can be used to detect and configure a connection to an iSCSI target to provide access to an iSCSI SAN.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.3 - Describe the configuration of SCSI devices and SANs. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 6.3 Configuring Server Storage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 16. Your system currently contains a single SAS storage device that hosts the root filesystem. After installing
the correct module for your Fibre Channel HBA, what device file can you use to access your Fibre Channel SAN storage? a. /dev/fc0 b. /dev/fc/0 c. /dev/sda d. /dev/sdb ANSWER: RATIONALE:
b
Both iSCSI and Fibre Channel SAN devices implement the SCSI protocol and are identified as SCSI storage devices in Linux. Because the system already has a single SAS storage device (/dev/sda), the Fibre Channel SAN will be identified as /dev/sdb.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.3 - Describe the configuration of SCSI devices and SANs. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 06 Linux Server Deployment TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
6.3 Configuring Server Storage Bloom's: Understand 5/2/2023 10:02 PM 5/2/2023 10:02 PM
17. Lou has configured multiple SAN connections on his Linux system and would like to implement DM-
MPIO. What command can Lou run to automatically detect the SAN connections and create a default MPIO configuration? a. fcstat b. mpathconf c. iscsiadm d. multipath ANSWER: RATIONALE:
b
The mpathconf command can be used to easily detect and create a DM-MPIO configuration.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.3 - Describe the configuration of SCSI devices and SANs. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 6.3 Configuring Server Storage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 18. Select the command that can be used to change the root filesystem to a different directory, such as when you
are in a rescue environment. a. change_root b. chroot c. set_root d. croot ANSWER: RATIONALE:
b
The chroot command allows you to change the root of the live OS to the /mnt directory, which is actually the root filesystem on the local disk.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.9 - Access an installed system using system rescue. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 06 Linux Server Deployment TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
6.5 System Rescue Bloom's: Remember 5/2/2023 10:02 PM 5/2/2023 10:02 PM
19. What command is used to create a ZFS volume from one or more storage devices? a. mkfs b. mkfs.zfs c. zfs d. zpool ANSWER: RATIONALE:
d
The zpool command is used to create a ZFS volume and associated ZFS filesystem from one or more storage devices on the system. The zfs command is used to manage ZFS settings on an existing ZFS volume or dataset.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.5 - Configure the ZFS and BTRFS filesystems. TOPICS: 6.3 Configuring Server Storage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 20. What is the term for a subdirectory on a ZFS volume that is treated as a separate ZFS filesystem? a. ZFS store b. ZFS vault c. ZFS dataset d. ZFS data lake ANSWER: RATIONALE:
c
Zettabyte File Systems (ZFS) datasets are ZFS filesystems that are created within existing ZFS volumes. You associate a ZFS dataset to a subdirectory on a ZFS volume. The ZFS volume itself can also be referred to as a ZFS dataset that includes other ZFS datasets.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.5 - Configure the ZFS and BTRFS filesystems. TOPICS: 6.3 Configuring Server Storage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 06 Linux Server Deployment 21. What command can be used to check a BTRFS filesystem for errors? (Choose all that apply.) a. btrfsck b. fsck.btrfs c. btrfs fsck d. btrfs check ANSWER: RATIONALE:
a, d
The btrfsck and btrfs check commands can be used to check and repair BTRFS filesystems.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.5 - Configure the ZFS and BTRFS filesystems. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems. Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 6.3 Configuring Server Storage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 22. Valentina suspects that there is corruption on the root filesystem of one of her Linux servers, but is unable to
unmount the filesystem to perform a filesystem check and repair using fsck. What should Valentina do in order to perform a filesystem check on the root filesystem? a. Run the fsck command with the --force option. b. Run the fsck command after booting the system from live installation media. c. Run fsck from single user mode. d. Stop all processes that are writing to the root filesystem and then run the fsck command. ANSWER: RATIONALE:
b
By booting the system from live media to perform system rescue, Valentina can safely use the fsck command to check the root filesystem on her Linux server as the filesystem is not actively mounted by the Linux system running from the live installation media.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.9 - Access an installed system using system rescue. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems. Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues. TOPICS: 6.5 System Rescue KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 06 Linux Server Deployment DATE MODIFIED:
5/2/2023 10:02 PM
23. Which directory contains installation log files following a Fedora Linux installation? a. /sys/install b. /var/log/installer c. /etc/installer d. /var/log/anaconda ANSWER: RATIONALE:
d
Fedora systems write detailed installation logs to the /var/log/anaconda directory. Anaconda is the name of the Fedora installation program.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.7 - Troubleshoot the Linux server installation process. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 6.4 Installing a Linux Server Distribution KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 24. Which of the following are you least likely to be prompted to configure during the installation process for a
Linux server distribution? a. host name b. IP configuration c. desktop environment d. root user password ANSWER: RATIONALE:
c
Linux server distributions do not contain a desktop environment by default.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.6 - Install a Linux server distribution. TOPICS: 6.4 Installing a Linux Server Distribution KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 25. During the creation of a BTRFS filesystem, you can provide different levels of fault tolerance for the inode
table and data blocks on a filesystem. What BTRFS term is used to describe the inode table? a. system Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 06 Linux Server Deployment b. metadata c. inum d. data ANSWER: RATIONALE:
b
BTRFS refers to the inode table as metadata. Thus, the -m (metadata) option of the mkfs.btrfs command can be used to specify the fault tolerance level for the inode table.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.5 - Configure the ZFS and BTRFS filesystems. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. TOPICS: 6.3 Configuring Server Storage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 26. Which of the following RAID configurations would be best to provide fault tolerance for the storage devices
that hold the root filesystem within a server system? a. Fibre Channel or iSCSI SAN b. firmware, hardware, software, or ZFS RAID level 5 c. firmware, hardware, software, or ZFS RAID level 6 d. firmware, hardware, software, or BTRFS RAID level 1 ANSWER: RATIONALE:
d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.6.4 - Explain the different levels of RAID and types of RAID configurations.
ACCREDITING STANDARDS:
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Since the root filesystem should not contain most data, it is reasonable to assume that most server systems will contain the minimum of two local storage devices to provide RAID level 1 fault tolerance for the root filesystem. All other data is typically stored on other storage devices or SANs with higher RAID levels for speed and fault tolerance.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. 6.3 Configuring Server Storage Bloom's: Evaluate 5/2/2023 10:02 PM 5/2/2023 10:02 PM
Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 06 Linux Server Deployment 27. Which of the following refers to the minimum height of a rackmount server? a. 1U b. R0 c. CAT1 d. L1 ANSWER: RATIONALE:
a
1U is 1.75 inches and corresponds to the minimum height of a rackmount server system. Other heights are represented in multiples of 1U.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.1 - Identify the types of hardware present in most server systems. TOPICS: 6.1 Understanding Server Hardware KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 28. Which of the following statements about ZFS is false? a. There is no command to check a ZFS filesystem for errors. b. ZFS filesystems are automatically mounted at boot time to /volumename. c. ZFS can be used to provide triple parity fault tolerance for data. d. ZFS is bundled with most Linux distributions. ANSWER: RATIONALE:
d
ZFS filesystems are automatically detected and mounted on the system by the zfs module and do not get corrupted. Additionally, raidz3 can be specified when creating a ZFS volume to provide triple parity. However, ZFS does not use a GPL-compatible license and is not bundled with most Linux distributions. Instead, it is often installed afterwards from a software repository.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.5 - Configure the ZFS and BTRFS filesystems. TOPICS: 6.3 Configuring Server Storage KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM
Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 07 Working with the Shell 1. When writing shell scripts and using a case statement to determine whether a set of code should be executed,
what is the proper syntax to end the case construct? a. endcase b. esac c. /case d. done ANSWER: RATIONALE:
b
To end a case statement, you must use the esac keyword, which is case spelled in reverse.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.3 Shell Scripts KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 2. Using the syntax below, what command will create directories named one, two, and three?
echo one two three | ___________ mkdir a. uniq b. tr c. where d. xargs ANSWER: RATIONALE:
d
The xargs command turns standard input into arguments that are passed to a command specified as an argument. In this case, one two three are turned into three arguments that were passed to the mkdir command.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.1 - Redirect the input and output of a command. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.4 - Use streams, pipes and redirects. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.1 Command Input and Output KEYWORDS: Bloom's: Apply Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 07 Working with the Shell DATE CREATED: DATE MODIFIED:
5/2/2023 10:02 PM 5/2/2023 10:02 PM
3. Which of the following will take output from a command and append it to the end of a file? a. < b. << c. > d. >> ANSWER: RATIONALE:
d
Two greater than signs will append the output of a command to whatever file is specified after the greater than signs. If the file does not exist, it will create the file.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.1 - Redirect the input and output of a command. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.4 - Use streams, pipes and redirects. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.1 Command Input and Output KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 4. Which of the following commands will display the exit status of the last command used in the BASH shell? a. echo $status b. echo $exit c. echo $? d. echo $! ANSWER: RATIONALE:
c
The $? shell variable can display the exit status of the previous command used in the BASH shell.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.2 - Identify and manipulate common shell environment variables. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.2 Shell Variables KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 07 Working with the Shell DATE CREATED: DATE MODIFIED:
5/2/2023 10:02 PM 5/2/2023 10:02 PM
5. Which of the following characters can be entered at the beginning of a line in a shell script to ensure that line
is recognized as a comment line only? a. $ b. > c. % d. # ANSWER: RATIONALE:
d
Entering a pound sign-#-at the beginning of a line will ensure that line is recognized as a comment and will prevent the system from trying to execute it.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.3 Shell Scripts KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 6. Which of the following is the common escape sequence to display a horizontal tab using the echo command? a. \tab b. ?tab c. \t d. %tab ANSWER: RATIONALE:
c
The \t escape sequence will display a horizontal tab using the echo command.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.1 Command Input and Output KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 07 Working with the Shell DATE MODIFIED:
5/2/2023 10:02 PM
7. Which of the following can be used for comparing values within an if statement? (Choose two.) a. -lt b. -neq c. = d. -grt ANSWER: RATIONALE:
a, c
The -lt statement can be used to determine whether one value is less than another. The = symbol can be used to determine whether two strings are equal.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.3 Shell Scripts KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 8. Which command can be used to download an updated copy of the main branch from the original Git
repository? a. git pull origin main b. git pull original main c. git pull main original d. git pull main origin ANSWER: RATIONALE:
a
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.7.8 - Use Git to perform version control for shell scripts and other files.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED:
The git pull origin main command can be used to download an updated copy of the main branch from the original Git repository.
Eckert.XK0-005.24.3.3 - Given a scenario, perform basic version control using Git. 7.4 Version Control Using Git Bloom's: Understand 5/2/2023 10:02 PM
Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 07 Working with the Shell DATE MODIFIED:
5/2/2023 10:02 PM
9. Which of the following files can you add filenames to so that the git add * command will not stage them? a. .gitignore b. .gitnopush c. .ignore d. .nopush ANSWER: RATIONALE:
a
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.7.8 - Use Git to perform version control for shell scripts and other files.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
You can add filenames to the .gitignore file so that they do not get staged.
Eckert.XK0-005.24.3.3 - Given a scenario, perform basic version control using Git. 7.4 Version Control Using Git Bloom's: Understand 5/2/2023 10:02 PM 5/2/2023 10:02 PM
10. Which of the following commands should you use to specify that you want to use Git for version tracking on
them? a. git version b. git track c. git add d. git new ANSWER: RATIONALE:
c
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.7.8 - Use Git to perform version control for shell scripts and other files.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
The git add command will start using git for version tracking on the files specified by adding them to the staging area.
Eckert.XK0-005.24.3.3 - Given a scenario, perform basic version control using Git. 7.4 Version Control Using Git Bloom's: Understand 5/2/2023 10:02 PM 5/2/2023 10:02 PM
Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 07 Working with the Shell 11. Marisa executes a shell script using the following syntax: ./script1.sh dog cat rabbit. What line can be used
within the script to print the value "cat"? a. echo $1 b. echo $2 c. echo $arg1 d. echo $arg2 ANSWER: RATIONALE:
b
Arguments provided to a shell script are called positional parameters and placed into variables starting from 1. Thus, echo $2 will print the contents of the second argument.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.3 Shell Scripts KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 12. Which of the following commands will count the number of lines in a file named data.csv? a. lc data.csv b. wc -l data.csv c. lines data.csv d. count -l data.csv ANSWER: RATIONALE:
b
The wc command can be used to count characters, words, or lines. When no options are specified, it will return all three. If the -l option is specified, it will return only the number of lines.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.1 Command Input and Output KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 07 Working with the Shell DATE MODIFIED:
5/2/2023 10:02 PM
13. Which of the following commands will display the output of a file while also displaying a line number at the
left side of each line for the /etc/passwd file? a. numbers /etc/passwd b. wc -l /etc/passwd c. nl /etc/passwd d. ln /etc/passwd ANSWER: RATIONALE:
c
The nl (number lines) command will display the contents of a file along with a line number to the left side of each line within the file.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.1 Command Input and Output KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 14. Which of the following commands will display the contents of the /etc/passwd file in alphanumerical order? a. cat --sort /etc/passwd b. cat -s /etc/passwd c. sed /etc/passwd d. sort /etc/passwd ANSWER: RATIONALE:
d
The sort command will display the contents of a file in alphanumerical order.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.1 Command Input and Output KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 07 Working with the Shell 15. Which of the following commands will send the output of the cat command to the grep command to be
filtered? a. cat /etc/passwd | grep jsmith b. cat /etc/passwd > grep jsmith c. cat /etc/passwd >> grep jsmith d. cat /etc/passwd @ grep jsmith ANSWER: RATIONALE:
a
The | (pipe) symbol will send the standard output of one command to become the standard input of another command.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.1 - Redirect the input and output of a command. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.4 - Use streams, pipes and redirects. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.1 Command Input and Output KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 16. Which of the following will look at the /etc/passwd file for any lines containing the word root and display
them out to the screen while simultaneously writing the results to a file? a. cat /etc/passwd | grep root | merge ~/root.txt b. cat /etc/passwd | grep root >> ~/root.txt c. grep root /etc/passwd | tee ~/root.txt d. grep root /etc/passwd | split ~/root.txt ANSWER: RATIONALE:
c
The output of the grep command is sent to the tee command, which displays the output to the screen while simultaneously writing it to a file.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.1 - Redirect the input and output of a command. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.4 - Use streams, pipes and redirects. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.1 Command Input and Output KEYWORDS: Bloom's: Create DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 07 Working with the Shell 17. Which of the following represents stderr at the command line when used for redirection? a. 0 b. 1 c. 2 d. 3 ANSWER: RATIONALE:
c
The number 2 represents stderr at the command line when used for redirection.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.1 - Redirect the input and output of a command. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.4 - Use streams, pipes and redirects. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.1 Command Input and Output KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 18. Which command can be used to create a new command that will monitor the contents of auth.log as they get
added to the file? a. create showauth='tail -f /var/log/auth.log' b. alias showauth='tail -f /var/log/auth.log' c. new showauth as ‘cat -f /var/log/auth.log' d. ln showauth='tail -f /var/log/auth.log' ANSWER: RATIONALE:
b
The alias command will create a new command for the command line as shown to show the last lines of the auth.log file and leave the stream open so that any new entries also are displayed.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.3 - Create and export new shell variables. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.2 Shell Variables KEYWORDS: Bloom's: Create DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM
Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 07 Working with the Shell 19. An alias has previously been created named showauth. Which of the following commands can be used to
remove that alias? a. alias -d showauth b. ualias shoauth c. noalias showauth d. unalias showauth ANSWER: RATIONALE:
d
The unalias command can be used along with the name of the alias to remove an alias from a system.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.3 - Create and export new shell variables. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.2 Shell Variables KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 20. Which of the following commands can be used to create a BASH variable named CREATOR with the value
of Torvalds? a. export CREATOR=Torvalds b. set $CREATOR = Torvalds c. export CREATOR = Torvalds d. var CREATOR as Torvalds ANSWER: RATIONALE:
a
The name of the variable should be followed by an equal sign. The export command ensures that the variable is made available to subshells.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.3 - Create and export new shell variables. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.2 Shell Variables KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 07 Working with the Shell 21. Which of the following is a valid method of running a script named myscript.sh that gives the current user
execute permission? (Choose all that apply.) a. source myscript.sh b. bash myscript.sh c. run myscript.sh d. ./myscript.sh ANSWER: RATIONALE:
a, b, d
The source command will execute a script in the current shell, whereas the bash command will start a new BASH shell to execute the script. A ./ in front of a script filename that has execute permission will also run the file as a script.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.3 Shell Scripts KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 22. Which of the following constructs can be used in a shell script to determine whether two values are equal
and if so run another set of commands? a. when b. where c. if d. comp ANSWER: RATIONALE:
c
The if construct can be used in a shell script to determine whether two values are equal and if so run another set of commands.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.3 Shell Scripts KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 07 Working with the Shell DATE MODIFIED:
5/2/2023 10:02 PM
23. Which of the following results would be created by the command sequence?
echo ‘apple banana carrot dog elephant' | while read a b c; do echo result: $c $b $a; done a. elephant dog carrot b. apple banana carrot dog elephant c. carrot dog elephant banana apple d. carrot dog elephant apple banana ANSWER: RATIONALE:
c
The read command will read apple into a, banana into b, and then the rest will be read into c. When echo result $c $b $a is executed, c is displayed first, then b, then a.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.3 Shell Scripts KEYWORDS: Bloom's: Analyze DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 24. Which of the following would be the results of running the command seq 7? a. 6 through 0 being displayed one number per line. b. 7 through 1 being displayed one number per line. c. 1 through 7 being displayed one number per line. d. 0 through 6 being displayed one number per line. ANSWER: RATIONALE:
c
When only one parameter is given to the seq command, the command will start counting from 1 until it reaches the number specified after the seq command.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.3 Shell Scripts Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 07 Working with the Shell KEYWORDS: DATE CREATED: DATE MODIFIED:
Bloom's: Understand 5/2/2023 10:02 PM 5/2/2023 10:02 PM
25. Levi wants to run 5 commands sequentially but does not want to create a shell script. He knows that each
command is going to take approximately 20 minutes to run individually. However, he would like to go to lunch 15 minutes from now. He knows that he can type all of the commands on the same line and separate them with a certain character to run them sequentially. What can he type after each command to have them run one after the next without requiring further input from him, as well as ensure that if one of the commands encounters an error, the remaining commands are not run? a. a pipe (|) b. a colon (:) c. a semicolon (;) d. two ampersands (&&) ANSWER: RATIONALE:
d
Levi can separate the commands with two ampersands between commands to have them run sequentially and ensure that the next command is only run if the previous command didn't encounter any errors.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.5 - Describe the purpose and nature of shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.3 Shell Scripts KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 26. Which of the following BASH environment files is executed first when a user opens a new terminal? a. /etc/profile b. ~/.bashrc c. ~/.bash_profile d. ~/.profile ANSWER: RATIONALE:
a
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.7.4 - Edit environment files to create variables upon shell startup.
The first environment file processed by a new BASH shell is /etc/profile.
Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 07 Working with the Shell ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 7.2 Shell Variables KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 27. Scott has recently set the Z shell as his current shell and wishes to enable some additional Z shell options.
What command should Scott run to do this? a. zmodload b. autoload c. vi ~/.zshrc d. setoption ANSWER: RATIONALE:
c
To enable Z shell options, you can use the setopt command. To ensure that these options are loaded each time Scott opens a Z shell, he must add the appropriate setopt line to his ~/.zshrc file.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.7.9 - Compare and contrast BASH and Z shell features and configuration. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 7.5 The Z Shell KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 28. How many times will the following loop execute as part of a script:
#!/bin/bash COUNTER=0 while [ $COUNTER -lt 7 ] do echo "hello world" done a. 0 b. 1 c. 7 d. until Ctrl+c is used to terminate it ANSWER: RATIONALE:
d
The script is missing a line to increment the counter after echoing hello world,
Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 07 Working with the Shell
which means the counter will remain at 0 in an infinite loop until it is terminated. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.5 - Describe the purpose and nature of shell scripts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts. Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate common tasks. TOPICS: 7.3 Shell Scripts KEYWORDS: Bloom's: Analyze DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM
Copyright Cengage Learning. Powered by Cognero.
Page 15
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization 1. Which of the following will invalid entries in the GRUB2 configuration cause? a. kernel warning automatically skipping invalid entries b. kernel panic and halt the system c. kernel error with confirmation to skip invalid entries d. no error, automatically skipping invalid entries until a valid entry is found ANSWER: RATIONALE:
b
Invalid entries in the GRUB2 configuration file will cause a kernel panic and halt the system.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.2 - Outline the configuration of the GRUB boot loader. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system. Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 8.2 Boot Loaders KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 2. What UEFI option allows for a boot loader to be verified using a digital signature? a. Netboot b. Secure boot c. PXE d. initialization validation ANSWER: RATIONALE:
b
Secure boot can be enabled in a UEFI BIOS to provide digital signature validation of the boot loader stored in the UEFI System Partition.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.1 - Summarize the major steps necessary to boot a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system. Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a Linux environment. TOPICS: 8.1 The Boot Process KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 3. Which of the following files is used to set the default runlevel on Linux systems that use SysV init? a. /etc/inittab Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization b. /etc/init.d/init c. /etc/rc.d/init.conf d. /etc/rc.d/init.d/init.conf ANSWER: RATIONALE:
a
On Linux systems that use SysV init, the default runlevel is set in the /etc/inittab file.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.5 - Configure the system to start and stop daemons upon entering certain runlevels and targets. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 4. Which of the following system variables can you modify to override the default system timezone within your
current shell? a. TZ b. TIME c. LOCALE d. LC_TZ ANSWER: RATIONALE:
a
You can override the default system time zone within your current shell by modifying the contents of the TZ variable.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.3 - Localization and internationalization. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 8.5 Localization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 5. Which of the following commands can be used to display the current locale of a system? (Choose two.) a. locale Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization b. localectl c. localed d. syslocale ANSWER: RATIONALE:
a, b
The locale command can be used to display the locale of a system. The localectl command can be used without any options to display the locale of a system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.3 - Localization and internationalization. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 8.5 Localization KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 6. The Linux kernel stores time in the number of seconds since which date? a. the number of days since January 1, 1900 b. the number of minutes since January 1, 1900 c. the number of seconds since January 1, 1970 d. the number of milliseconds since January 1, 1980 ANSWER: RATIONALE:
c
Linux keeps track of the number of seconds since January 1, 1970, as the epoch date. January 1, 1970, is considered the birth date of UNIX.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 8.5 Localization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 7. Which of the following commands will show the current runlevel along with the previous runlevel? a. init b. telinit Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization c. runlevel d. echo $RUNLEVEL ANSWER: RATIONALE:
c
The runlevel command will show the current and previous runlevels.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.3 - Detail the UNIX SysV and Systemd system initialization processes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 8. Which of the following commands will display a list of Systemd units sorted by the time they took to load? a. systemd-analyze blame b. systemd --listload c. systemctl --listload d. systemctl-analyze --blame ANSWER: RATIONALE:
a
The system-analyze blame command will display a list of Systemd units sorted by the time they took to load.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.3 - Detail the UNIX SysV and Systemd system initialization processes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system. Eckert.XK0-005.24.4.5 - Given a scenario, use systemd to diagnose and resolve common problems with a Linux system. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 9. Which of the following is a tiling window manager that can be used with Wayland? a. i3 b. LXDE Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization c. Mutter d. Sway ANSWER: RATIONALE:
d
The Sway tiling window manager is available as a Wayland compositor.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.6 - Explain the purpose of the major Linux GUI components. ACCREDITING STANDARDS: Eckert.LPIC-1.24.106.2 - Graphical desktops. Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 8.4 The X Windows System KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 10. Which of the following commands can configure the time zone on a Linux system? a. timedatectl set-time b. timedatectl set-timezone c. tzselect d. date --timezone ANSWER: RATIONALE:
b
The timedatectl set-timezone command followed by the desired time zone will configure the system with that time zone.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 8.5 Localization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 11. Which of the following does Systemd use to denote runlevels? a. service units b. target units c. mount units d. timer units ANSWER:
b
Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization RATIONALE:
Systemd uses target units (or targets) to represent system states and runlevels on the system. For example, graphical.target and runlevel5.target are equivalent to runlevel 5 in SysV init.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.3 - Detail the UNIX SysV and Systemd system initialization processes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 12. Which of the following commands will shut down a Linux system? (Choose all that apply.) a. init 6 b. telinit 0 c. systemctl isolate poweroff.target d. systemctl isolate runlevel6.target ANSWER: RATIONALE:
b, c
You can enter runlevel 0 or poweroff.target to shut down a Linux system. This can be performed with either the init 0 or telinit 0 command, or via the systemctl isolate poweroff.target command on a system that uses Systemd.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.4 - Start, stop, and restart daemons. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 13. Which of the following commands will set the default runlevel of a Linux system that uses Systemd? a. systemctl --set-default runlevel5.target b. systemctl set-default runlevel5.target c. systemctl --default runlevel5.target d. systemctl set-init runlevel5.target Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization ANSWER: RATIONALE:
b
The set-default option can be used for the systemctl command to set the default runlevel.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.5 - Configure the system to start and stop daemons upon entering certain runlevels and targets. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 14. Which command can be used to configure a daemon to start upon entering a specific runlevel on a Linux
system that uses SysV init? a. systemctl b. service c. chkconfig d. update-rc.d ANSWER: RATIONALE:
c
The chkconfig command can be used to configure a daemon to start in a particular runlevel on a SysV init system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.5 - Configure the system to start and stop daemons upon entering certain runlevels and targets. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 15. After modifying the /etc/default/grub file, what must you do for your changes to be reflected by GRUB on
the next boot? a. run the grub2-install command b. run the grub2-mkconfig command Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization c. copy the file to the /boot/grub directory d. run the dracut command ANSWER: RATIONALE:
b
After modifying the options in /etc/default/grub, you must rebuild the GRUB configuration file. This can be done by executing the grub2-mkconfig command.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.2 - Outline the configuration of the GRUB boot loader. ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.2 - Install a boot manager. Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 8.2 Boot Loaders KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 16. Where can you find the boot entries displayed by GRUB at boot time on a Fedora Linux system that uses the
BootLoaderSpec module? a. /boot/grub/grub.cfg b. /boot/efi/EFI/fedora/grub.cfg c. /boot/loader/entries/* d. /boot/grub/entries.conf ANSWER: RATIONALE:
c
If the BootLoaderSpec (blscfg) module is used, information for each kernel line loaded by GRUB is stored within a UUID-kernel.conf file under the /boot/loader/entries directory, where UUID is the UUID of the root filesystem, and kernel is the version of the Linux kernel.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.2 - Outline the configuration of the GRUB boot loader. ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.2 - Install a boot manager. Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 8.2 Boot Loaders KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 17. Which of the following is considered a lightweight desktop environment suitable for low memory systems? a. GNOME b. XFCE Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization c. Cinnamon d. MATE ANSWER: RATIONALE:
b
XFCE is a popular lightweight desktop environment used by many different Linux distributions today, including Kali Linux.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.7 - Configure X Windows settings and accessibility options. ACCREDITING STANDARDS: Eckert.LPIC-1.24.106.2 - Graphical desktops. TOPICS: 8.4 The X Windows System KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 18. If incompatible X Windows settings are configured, where will the errors that are generated be written to? a. ~/.xsession-errors b. ~/.xerror c. ~/.xwin-error d. /var/log/xwindows.error ANSWER: RATIONALE:
a
If incompatible X Windows settings are configured, the errors that are generated are written to ~/.xsession-errors.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.7 - Configure X Windows settings and accessibility options. ACCREDITING STANDARDS: Eckert.LPIC-1.24.106.1 - Install and configure X11. TOPICS: 8.4 The X Windows System KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 19. Which command can be used to start the SSH daemon on a Linux server that uses SysV init? a. service sshd start b. systemctl start sshd.service c. /etc/rc.d/sshd start d. start sshd ANSWER:
a
Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization RATIONALE:
The service command can be used to start, stop, restart, reload, and view daemons on a system that uses SysV init.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.4 - Start, stop, and restart daemons. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 20. Which command can be used to restart the DHCP daemon on a Linux server that uses Systemd? a. service restart dhcpd b. /etc/rc.d/init.d/restart --service dhcpd c. /etc/rc.d/dhcpd restart d. systemctl restart dhcpd.service ANSWER: RATIONALE:
d
The systemctl command can be used to start, stop, restart, reload, and view daemons on a system that uses Systemd.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.4 - Start, stop, and restart daemons. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 21. Mufasa has created a Systemd mount unit called /etc/systemd/system/backups.mount that mounts a
filesystem UUID to the /backups directory upon entering graphical.target. After rebooting the system and entering graphical.target, he notices that the filesystem is not mounted. What should Mufasa do to remedy the issue? a. enable the mount unit using the systemctl command b. copy the mount unit to the /lib/systemd/system directory c. ensure that the mount unit gives execute permission to the other category d. ensure that the mount unit is owned by the systemd group Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization ANSWER: RATIONALE:
a
After creating the backups.mount unit file, it must be enabled using the systemctl enable backups.mount command.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.3 - Detail the UNIX SysV and Systemd system initialization processes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems. Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Analyze DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 22. Which of the following accessibility features simulates simultaneous key presses when two keys are pressed
in sequence? a. Bounce keys b. Repeat Keys c. Sticky keys d. Slow keys ANSWER: RATIONALE:
c
Turning on Sticky keys will simulate simultaneous key presses when two keys are pressed in sequence.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.7 - Configure X Windows settings and accessibility options. ACCREDITING STANDARDS: Eckert.LPIC-1.24.106.3 - Accessibility. TOPICS: 8.4 The X Windows System KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 23. Which of the following does Click Assist do? a. Simulates a right click by holding down the left mouse button. b. Simulates a right click by holding down the Ctrl key on the keyboard. c. Simulates a left click by holding down the left shift key or a right click by holding down the right
shift key. d. Reads the text for buttons on the screen so the user knows what they may be clicking on. ANSWER:
a
Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization RATIONALE:
Click Assist simulates a right click by holding down the left mouse button.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.7 - Configure X Windows settings and accessibility options. ACCREDITING STANDARDS: Eckert.LPIC-1.24.106.3 - Accessibility. TOPICS: 8.4 The X Windows System KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 24. Which of the following commands can be used to configure the Postfix daemon to start in the default
runlevel on a Linux system that uses Systemd? a. chkconfig postfix on b. systemctl enable postfix.service c. service postfix start d. systemctl start postfix.service ANSWER: RATIONALE:
b
The systemctl enable command can be used to enable a daemon to start in the default runlevel.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.5 - Configure the system to start and stop daemons upon entering certain runlevels and targets. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 25. Which of the following commands will prompt you to answer a series of questions to help determine which
time zone file you should use? a. zones b. timezones c. zoneselect d. tzselect ANSWER: RATIONALE:
d
The tzselect command will prompt you to answer a series of questions to help
Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization
determine which time zone file you should use. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.3 - Localization and internationalization. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 8.5 Localization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 26. Which of the following files is a binary file that contains the rules for calculating the time based on your
time zone relative to epoch time? a. /usr/local/bin/timecalc b. /etc/localtime c. /sbin/tickadj d. /sbin/timeadj ANSWER: RATIONALE:
b
The /etc/localtime file is a binary file that contains the rules for calculating the time based on your time zone relative to epoch time.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 8.5 Localization KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 27. Which runlevel and target are used to load just enough daemons to perform system maintenance as the root
user? (Choose two.) a. runlevel 2 b. runlevel 1 c. rescue.target d. maintenance.target ANSWER:
b, c
Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 08 System Initialization, X Windows, and Localization RATIONALE:
Both runlevel 1 and rescue.target represent Single User Mode, which allows the root user to perform system maintenance without other users logged onto the system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.8.3 - Detail the UNIX SysV and Systemd system initialization processes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 8.3 Linux Initialization KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM 28. Which of the following can be used to write the current system time to the hardware clock in the system
BIOS? a. systohc b. date --hw2sys c. date +%s d. hwclock -w ANSWER: RATIONALE:
d
The hwclock -w command can be used to write the currently configured time on the Linux system to the hardware clock in the BIOS.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 8.5 Localization KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:02 PM DATE MODIFIED: 5/2/2023 10:02 PM
Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 09 Managing Linux Processes 1. You have run the top command successfully, but realize that the q key on the keyboard has suddenly stopped
working. What is another way that you can exit out of the top program? a. Ctrl+c b. Ctrl+q c. Ctrl+w d. Ctrl+x ANSWER: RATIONALE:
a
The Ctrl+c key combination sends the SIGINT kill signal and will exit out of the top program.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.3 - Explain the difference between common kill signals. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.3 Killing Processes KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 2. Which of the following commands will send a process's resources to /dev/null to kill the process for process
ID 1357? a. sigkill 1357 b. killall 1357 c. kill -15 1357 d. kill -9 1357 ANSWER: RATIONALE:
d
The kill command can be used with a -9 to send the SIGKILL signal, which will send the process's resources to /dev/null.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.3 - Explain the difference between common kill signals. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.3 Killing Processes KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 09 Managing Linux Processes 3. Which of the following commands will show the cron jobs that have been created for the currently logged in
user? a. cronjobs --list b. cron --list c. cron -l d. crontab -l ANSWER: RATIONALE:
d
The crontab -l command can be used by a user to show that user's cron jobs.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.9.8 - Schedule commands to execute repetitively using the cron daemon. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.7 Scheduling Commands KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 4. Which of the following states describe a process that is waiting for a parent process to release its PID? a. wait b. suspended c. zombie d. dead ANSWER: RATIONALE:
c
A process that is waiting for a parent process to release its PID is said to be a zombie process.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.1 - Categorize the different types of processes on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 9.2 Viewing Processes KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 5. If a process is currently in an uninterruptible sleep state, which letter will show in the output of the ps Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 09 Managing Linux Processes
command? a. S b. U c. N d. D ANSWER: RATIONALE:
d
A process is in uninterruptible sleep if it is waiting for disk access and will be indicated with the letter D.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.2 Viewing Processes KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 6. Which of the following commands can be used to see files that are currently being used by a specific process
ID (PID)? a. psfiles b. lsof c. pstatus d. pids ANSWER: RATIONALE:
b
The lsof (list open files) command can be used to show files that are currently being used by a specific process ID (PID).
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.3 Killing Processes KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM
Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 09 Managing Linux Processes 7. Which of the following commands can be used to schedule very frequent recurring tasks, such as running
once every minute? a. at b. watch c. do d. while ANSWER: RATIONALE:
b
The watch command can be used to schedule very frequent recurring tasks, such as running once every minute.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.9.7 - Schedule commands to execute in the future using the at daemon. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.7 Scheduling Commands KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 8. Which of the following can be used preceding a command to prevent a process from terminating when the
parent process terminates? a. bg b. runat c. & d. nohup ANSWER: RATIONALE:
d
The nohup, or no hangup, command can be used preceding a command to prevent it from terminating when the parent process terminates.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.4 - Describe how binary programs and shell scripts are executed. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.3 Killing Processes KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 09 Managing Linux Processes DATE MODIFIED:
5/2/2023 10:03 PM
9. Which of the following commands can be used to display the background processes started by the current
user? a. bg b. jobs c. fg --bg d. ps --bg ANSWER: RATIONALE:
b
The jobs command will show background processes.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.5 - Create and manipulate background processes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.5 Running Processes in the Background KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 10. You have started a process in the background that you want to now bring to the foreground. The process has
PID 3456 and background job ID 5. Which of the following commands can be used to move this process to the foreground? a. fg %3456 b. fg %5 c. bg --fg %3456 d. bg --fg %5 ANSWER: RATIONALE:
b
The fg command can be used to take a job running in the background (that is specified by %jobID) and move it to the foreground where it will display the output to the terminal screen.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.5 - Create and manipulate background processes. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.5 Running Processes in the Background KEYWORDS: Bloom's: Apply Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 09 Managing Linux Processes DATE CREATED: DATE MODIFIED:
5/2/2023 10:03 PM 5/2/2023 10:03 PM
11. Which of the following commands can be used to terminate a process by the process name? (Choose all that
apply.) a. kill b. pkill c. stop d. killall ANSWER: RATIONALE:
b, d
The pskill and killall command can be used to terminate a process by using the process name. The kill command can only be used to terminate a process by PID.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.3 - Explain the difference between common kill signals. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.3 Killing Processes KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 12. Which of the following commands will show a list of process names along with their process ID (PID)?
(Choose two.) a. ps b. proc c. htop d. jobs ANSWER: RATIONALE:
a, c
The ps command will show a list of process names along with their process ID. The htop command will show a list of process names along with their process ID in addition to a number of other pieces of information about the processes, and general system performance statistics.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 09 Managing Linux Processes TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
9.2 Viewing Processes Bloom's: Remember 5/2/2023 10:03 PM 5/2/2023 10:03 PM
13. Which of the following nice values will result in the lowest priority for a process? a. -20 b. 19 c. 10 d. 0 ANSWER: RATIONALE:
b
The highest value for niceness is 19, which would result in the greatest chance of a lower priority. The lowest value for niceness is -20, which would result in the greatest chance of a higher priority.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.6 - Use standard Linux utilities to modify the priority of a process. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.6 - Modify process execution priorities. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.6 Process Priorities KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 14. Which of the following cron table lines would execute the /bin/myscript.sh shell script every Friday at 11:30
PM? a. 11 30 5 * * /bin/myscript.sh b. 30 23 * * 5 /bin/myscript.sh c. 11 30 * 5 * /bin/myscript.sh d. 30 23 * 5 * /bin/myscript.sh ANSWER: RATIONALE:
b
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.9.8 - Schedule commands to execute repetitively using the cron daemon.
Cron tables lines have six fields: minute, hour (24-hour format), day of month, month of year, day of week (1 = Monday, 5 = Friday, 7 = Sunday), and command or script.
Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 09 Managing Linux Processes ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.7 Scheduling Commands KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 15. In which directory would a system administrator store scripts that should be run monthly by the cron
daemon? a. /var/cron/monthly b. /etc/crontab/monthly c. /var/crontab/monthly d. /etc/cron.monthly ANSWER: RATIONALE:
d
Any scripts placed in the /etc/cron.monthly directory will be executed once every month.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.9.8 - Schedule commands to execute repetitively using the cron daemon. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.7 Scheduling Commands KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 16. A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically
prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs? a. /etc/cron.deny b. /etc/cron.d/cron.deny c. /etc/cron.allow d. /etc/cron.d/cron.allow ANSWER: RATIONALE:
a
POINTS: QUESTION TYPE:
1 Multiple Choice
The users that should not be able to run cron jobs should be configured in the /etc/cron.deny file.
Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 09 Managing Linux Processes HAS VARIABLES: LEARNING OBJECTIVES:
False Eckert.Linux+6e.24.9.8 - Schedule commands to execute repetitively using the cron daemon. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.7 Scheduling Commands KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 17. A system administrator wants to schedule a task to run at midnight but knows that they will not be in the
office at that time. Which of the following commands can they use to schedule this task to run that night while they are at home? a. exec -t 00:00 b. run -t 00:00 c. at midnight d. crontab -e 00:00 ANSWER: RATIONALE:
c
The at command can be used to schedule a task to run at a specified time. It allows for multiple friendly time formats to be specified, such as now, midnight, teatime, and noon.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.9.7 - Schedule commands to execute in the future using the at daemon. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.7 Scheduling Commands KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 18. Which of the following command can be used to remove at job 5 from the list of pending jobs? (Choose all
that apply.) a. at -remove %5 b. atrm 5 c. at -d %5 d. at -d 5 ANSWER:
b, d
Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 09 Managing Linux Processes RATIONALE:
The atrm command will remove a job from the list of pending jobs. The -d option to the at command is equivalent to the atrm command. The % symbol is used to identify background jobs only.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.9.7 - Schedule commands to execute in the future using the at daemon. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.7 Scheduling Commands KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 19. Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.) a. at -l b. atq c. atls d. at -j ANSWER: RATIONALE:
a, b
The atq command is equivalent to the at -l command and will display a list of pending jobs to be run.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.9.7 - Schedule commands to execute in the future using the at daemon. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.7 Scheduling Commands KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 20. What character under the TTY column in the output of the ps command likely indicates that the process is a
daemon process? a. D b. d c. ? Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 09 Managing Linux Processes d. N ANSWER: RATIONALE:
c
Daemons are not associated with a terminal. As a result, the TTY column will list ? for daemon processes.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.2 Viewing Processes KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 21. Cicero wishes to schedule a shell script called /bin/report.sh at 9:00 PM on the first day of each month on his
Linux server. The report.sh script displays a summary of storage usage statistics to stdout. What cron table entry can he create? a. 0 21 * * * /bin/report.sh >/etc/currentreport.txt b. 0 9 * * * /bin/report.sh >/etc/currentreport.txt c. 0 9 * * * /bin/report.sh d. 0 21 * * * /bin/report.sh ANSWER: RATIONALE:
a
Cron tables lines have six fields: minute, hour (24-hour format), day of month, month of year, day of week (1 = Monday, 5 = Friday, 7 = Sunday), and command or script. Thus, 9:00 PM (21:00) would any day, month, or week would be represented by 0 21 * * *. To ensure that the stdout is captured, you must redirect the output of the script to a file, otherwise it will be mailed to the user (if a mail daemon is installed and configured).
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.9.8 - Schedule commands to execute repetitively using the cron daemon. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.7 Scheduling Commands KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 09 Managing Linux Processes 22. What option can be used with the ps command to display an entire list of processes across all terminals,
including daemons? a. -a b. -f c. -e d. -l ANSWER: RATIONALE:
c
The -e option displays all processes running on terminals as well as processes that do not run on a terminal (daemons).
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.2 Viewing Processes KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 23. Which kill signal terminates a process by taking the process information in memory and saving it to a file
called core on the hard disk in the current working directory? a. SIGINT b. SIGKILL c. SIGQUIT d. SIGTERM ANSWER: RATIONALE:
c
The SIGQUIT signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.3 - Explain the difference between common kill signals. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.3 Killing Processes KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 09 Managing Linux Processes DATE MODIFIED:
5/2/2023 10:03 PM
24. What command is used to display the lineage of a process by tracing its PPIDs until the init daemon? a. ps -f b. pstree c. ps -R d. ps aux ANSWER: RATIONALE:
b
The pstree command displays the lineage of a process by tracing its PPIDs until the init daemon.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.2 Viewing Processes KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 25. What kill command can be used to restart the Systemd or Sys V init daemon? a. kill -1 1 b. kill -SIGHUP 0 c. pkill --restart 0 d. kill -1 0 ANSWER: RATIONALE:
a
The Systemd or SysV init daemon always has a PID of 1, and the kill signal that can restart a process is 1 (SIGHUP). Thus, running the kill -1 command on the PID of 1 would restart the Systemd or Sys V init daemon.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.3 - Explain the difference between common kill signals. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.3 Killing Processes KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 09 Managing Linux Processes DATE MODIFIED:
5/2/2023 10:03 PM
26. Which of the following statements is false regarding commands and shell scripts that are executed within a
shell? a. They are executed within a separate subshell by default. b. The shell waits until the command has completed before providing another prompt to the user. c. Background processes provide another shell prompt to the user immediately after execution. d. They are executed within the current shell unless they are run in the background. ANSWER: RATIONALE:
d
By default, commands and shell scripts are executed in a subshell using the fork() function. During execution, the parent shell waits for the command or shell script to complete before providing another user prompt, unless the command or shell script was run in the background using the & symbol. You must use the source, dot (.), or exec commands to run a command or shell script in the current shell.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.4 - Describe how binary programs and shell scripts are executed. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts. Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes and services. TOPICS: 9.4 Process Execution KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 27. Which of the following commands can be used to change the priority of a running process? a. nice b. nohup c. renice d. psgrep ANSWER: RATIONALE:
c
The nice command can only be used to start a process with a different priority. To alter the priority of an already running process, you must use the renice command.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.6 - Use standard Linux utilities to modify the priority of a process. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.6 - Modify process execution priorities. Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 9.6 Process Priorities Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 09 Managing Linux Processes KEYWORDS: DATE CREATED: DATE MODIFIED:
Bloom's: Understand 5/2/2023 10:03 PM 5/2/2023 10:03 PM
28. Which of the following commands can be used to identify rogue processes? (Choose all that apply.) a. top b. ps aux c. ps -ef d. htop ANSWER: RATIONALE:
a, d
The top and htop commands sort processes by CPU and RAM usage at the top of their output, which makes them suitable for identifying rogue processes that use high amounts of CPU.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 9.2 Viewing Processes KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM
Copyright Cengage Learning. Powered by Cognero.
Page 15
Name:
Class:
Date:
Mod 10 Common Administrative Tasks 1. Kisha manages a Linux file server that contains user accounts for all of the users in her organization. She
would like to ensure that when new user accounts are created, an introduction.txt file is automatically copied to their home directory. In which of the following directories can Kisha place the introduction.txt such that it will be copied to new user home directories? a. /etc/rc.d b. /etc/skel c. /etc/login.defs.d/template d. /etc/default/useradd ANSWER: RATIONALE:
b
When a new user is created, they receive files in their home directory copied from the /etc/skel directory.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 10.3 Administering Users and Groups KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 2. Which of the following commands can be used to delete a user account? a. deluser b. rmuser c. userdel d. expireuser ANSWER: RATIONALE:
c
The userdel command can be used to delete a user from the Linux operating system.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 10.3 Administering Users and Groups KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 10 Common Administrative Tasks 3. Which of the following commands can be used to set the number of days until user account jsmith with an
expired password is disabled? a. usermod -f 15 jsmith b. usermod -d 15 jsmith c. usermod -x 15 jsmith d. usermod -e 15 jsmith ANSWER: RATIONALE:
a
The -f option for the usermod command allows you to specify the number of days until a user account with an expired password is disabled.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 10.3 Administering Users and Groups KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 4. Which of the following will show account aging information for a user such as the date of the last password
change, when the password expires, and the number of days of warning before the password expires? a. usermod --expiry jsmith b. chage -u jsmith c. chage -l jsmith d. lsuser jsmith ANSWER: RATIONALE:
c
The -l option for the chage command will list account aging information.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 10.3 Administering Users and Groups KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 5. Which of the following is a special group that provides its members with the ability to run commands as the
root user via the sudo command on Fedora Linux systems? Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 10 Common Administrative Tasks a. sudoers b. adm c. wheel d. sys ANSWER: RATIONALE:
c
The wheel group is a special group whose purpose is to provide its members with the ability to run the sudo command to execute other commands as the root user via an entry in the /etc/sudoers file. It is used for this purpose on most Linux distributions, including Fedora. However, on Ubuntu systems the sudo group is used in place of the wheel group.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 10.3 Administering Users and Groups KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 6. Which of the following will allow the root user to display the contents of the /etc/shadow file? (Choose all
that apply.) a. cat /etc/shadow b. getent shadow c. shadowls d. sudocat /etc/shadow ANSWER: RATIONALE:
a, b
The cat command will display the contents of a file, such as the /etc/shadow file. The getent command will show the contents of system databases such as passwd, shadow, group, and gshadow.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 10.3 Administering Users and Groups KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 10 Common Administrative Tasks 7. Laverne has recently been assigned to manage a Linux server in her organization that uses the System Log
Daemon. She wishes to learn more about where events are logged. In which locations should Laverne look? (Choose all that apply.) a. /etc/rsyslog.conf b. /etc/syslog.conf c. /etc/rsyslog.d/* d. /etc/rsyslog.rules ANSWER: RATIONALE:
a, b, c
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are administered.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Rules for logging on modern systems that use the System Log Daemon can be configured in the /etc/rsyslog.conf file or in files under the /etc/rsyslog.d directory. On legacy systems, the System Log Daemon used rules in the /etc/syslog.conf file.
Eckert.LPIC-1.24.108.2 - System logging. 10.2 Log File Administration Bloom's: Understand 5/2/2023 10:03 PM 5/2/2023 10:03 PM
8. Yasir has been tasked with setting up a new Linux print server in his organization. He has installed CUPS and
would like to access the CUPS web administration tool to complete the configuration. What URL should Yasir use within a web browser to access this tool? a. http://servername b. http://servername/cups c. http://servername:631 d. http://servername/ipp ANSWER: RATIONALE:
c
The CUPS web administration tool listens to port 631 using HTTP. Thus, you must use the URL http://servername:631 to access it.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.4 - Manage printers and printing. TOPICS: 10.1 Printer Administration KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 10 Common Administrative Tasks DATE CREATED: DATE MODIFIED:
5/2/2023 10:03 PM 5/2/2023 10:03 PM
9. Which of the following files stores information about failed logins on a Linux system? a. /var/log/btmp b. /var/log/wtmp c. /var/log/nolo d. /var/log/failed ANSWER: RATIONALE:
a
The /var/log/btmp log file shows the last failed logins on a Linux operating system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are administered. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file permissions. TOPICS: 10.2 Log File Administration KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 10. Which of the following log files contains information and error messages generated by the Linux kernel? a. /var/log/wtmp b. /var/log/dmesg c. /var/log/kern.log d. /var/log/secure ANSWER: RATIONALE:
c
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are administered.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED:
The kern.log log file contains information and error messages generated by the kernel.
Eckert.LPIC-1.24.108.2 - System logging. 10.2 Log File Administration Bloom's: Remember 5/2/2023 10:03 PM
Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 10 Common Administrative Tasks DATE MODIFIED:
5/2/2023 10:03 PM
11. Which command can be used to display messages from the MySQL daemon between 10:00 am and 10:15
am today? (Choose all that apply.) a. journalctl --range "10:00-10:15" mysqld.service b. journalctl _COMM=mysqld --since "10:00" --until "10:15" c. journalctl --unit mysqld.service --range "10:00-10:15" d. journalctl --unit mysqld.service --since "10:00" --until "10:15" ANSWER: RATIONALE:
b, d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are administered.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
The journalctl command can query events based on command (_COMM) and service unit (--unit), as well as narrow down time ranges using the --since and -until options. Command must be specified as they are displayed using the Tab key (name only) while service units must be specified using their Systemd syntax (name.service).
Eckert.LPIC-1.24.108.2 - System logging. 10.2 Log File Administration Bloom's: Apply 5/2/2023 10:03 PM 5/2/2023 10:03 PM
12. Which of the following log files under the /var/log directory contain security-related events? (Choose all that
apply.) a. btmp b. secure c. auth.log d. yum.log ANSWER: RATIONALE:
a, b, c
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are administered.
Failed logins (btmp), network access requests (secure), and user/daemon authentication (auth.log) can be considered security-related events as they pertain to system access. The yum.log contains events related to RPM package installation only.
Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 10 Common Administrative Tasks ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.2 - System logging. Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file permissions. TOPICS: 10.2 Log File Administration KEYWORDS: Bloom's: Evaluate DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 13. Which of the following commands can be used to remove a group from a Linux system? a. rmgroup b. rmg c. groupdel d. groups ANSWER: RATIONALE:
c
The groupdel command can be used to remove a group from a Linux system.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 10.3 Administering Users and Groups KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 14. Which of the following is the first field of the /etc/passwd file? a. UID b. username c. GECOS d. GID ANSWER: RATIONALE:
b
The username is the first field in the /etc/passwd file.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 10.3 Administering Users and Groups KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 10 Common Administrative Tasks DATE CREATED: DATE MODIFIED:
5/2/2023 10:03 PM 5/2/2023 10:03 PM
15. Teresa is troubleshooting a printing issue on a Linux workstation and wishes to view the file contents of the
print queue to ensure that they match what is shown using the lpstat command. In which directory should Teresa look? a. /var/cups/jobs b. /tmp/printers/cups/jobs c. /etc/cups/jobs d. /var/spool/cups ANSWER: RATIONALE:
c
CUPS stores print jobs in the /var/spool/cups directory.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.4 - Manage printers and printing. TOPICS: 10.1 Printer Administration KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 16. Which of the following options can be used with the usermod command to change the description of the user
account that is stored in the GECOS field? a. -g b. -d c. -c d. -s ANSWER: RATIONALE:
c
The -c option specifies a new description for the GECOS, or description, for the user account.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 10.3 Administering Users and Groups KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 10 Common Administrative Tasks DATE MODIFIED:
5/2/2023 10:03 PM
17. Which of the following two commands can be used to add custom log file entries to the journald database?
(Choose two.) a. logentry b. mklog c. systemd-cat d. logger e. systemd-make ANSWER: RATIONALE:
c, d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are administered.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
The systemd-cat command can be used to add custom log file entries to the journald database. The logger command can be used to add custom log file entries to the journald database or a System Log Daemon log file.
Eckert.LPIC-1.24.108.2 - System logging. 10.2 Log File Administration Bloom's: Remember 5/2/2023 10:03 PM 5/2/2023 10:03 PM
18. The System Log Daemon, rsyslogd, creates a socket for other system processes to write to. What is the path
to this socket? a. /tmp/log b. /var/log.sock c. /etc/rsyslog.socket d. /dev/log ANSWER: RATIONALE:
d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are administered.
ACCREDITING STANDARDS: TOPICS:
The System Log Daemon, rsyslogd, creates a socket at /dev/log that other system processes can write to.
Eckert.LPIC-1.24.108.2 - System logging. 10.2 Log File Administration
Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 10 Common Administrative Tasks KEYWORDS: DATE CREATED: DATE MODIFIED:
Bloom's: Remember 5/2/2023 10:03 PM 5/2/2023 10:03 PM
19. You want to limit the size of the journald database, overwriting events as needed. What file must you
modify to specify a maximum database size? a. /etc/systemd/journald.conf b. /etc/journald/journald.conf c. /etc/rsyslogd/journald.conf d. /etc/rsyslog/journald.conf ANSWER: RATIONALE:
a
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are administered.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
The journald.conf file is located in the /etc/systemd directory.
Eckert.LPIC-1.24.108.2 - System logging. 10.2 Log File Administration Bloom's: Remember 5/2/2023 10:03 PM 5/2/2023 10:03 PM
20. Which of the following entries could be added to the rsyslog.conf configuration file to ensure that network
login events of warning priority and more serious are logged immediately to the /var/log/logins file? a. auth.warn -/var/log/logins b. authpriv.warn -/var/log/logins c. authpriv.=warning /var/log/logins d. auth.=warn /var/log/logins ANSWER: RATIONALE:
b
The format of lines in rsyslog.conf file are: facility.priority logfile. Network logins use a facility of authpriv, and the priority of warn or warning (without the = sign) ensure that warnings and more serious are matched. The - before the log file ensures that events are logged immediately rather than waiting for the next I/O cycle.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are administered. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.2 - System logging. Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 10 Common Administrative Tasks
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file permissions. 10.2 Log File Administration Bloom's: Apply 5/2/2023 10:03 PM 5/2/2023 10:03 PM
21. Which of the following commands can be used to set the default printer to printer1 for all users on a Linux
system? a. lp -d printer1 b. lpoptions -d printer1 c. lpd -d printer1 d. lpq --set-default printer1 ANSWER: RATIONALE:
b
The -d option for the lptions command sets the default printer on a Linux system.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.4 - Manage printers and printing. TOPICS: 10.1 Printer Administration KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 22. Julius would like to ensure that his default printer is different than the system default printer. Which line can
he add to his ~/.bash_profile to set his default printer to printer5? (Choose two.) a. export PRINT=printer5 b. export PRINTER=printer5 c. export LPDEFAULT=printer5 d. export LPDEST=printer5 ANSWER: RATIONALE:
b, d
The PRINTER or LPDEST environment variables can be changed to set the default printer on a Linux system.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment. TOPICS: 10.1 Printer Administration Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 10 Common Administrative Tasks KEYWORDS: DATE CREATED: DATE MODIFIED:
Bloom's: Understand 5/2/2023 10:03 PM 5/2/2023 10:03 PM
23. Which of the following commands will display the print jobs in the print queue for printer1 only? a. lpstat -o printer1 b. lpq -d printer1 c. lpq -p printer1 d. lp -j printer1 ANSWER: RATIONALE:
a
The -o option can be used with the lpstat command to show the jobs in the print queue for printer1 only.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.4 - Manage printers and printing. TOPICS: 10.1 Printer Administration KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 24. Which of the following commands can be used to prevent a printer named Printer1 from sending print jobs
in the print queue to the printer? a. cupsreject -p Printer1 b. cupsdisable -c Printer1 c. cupsreject Printer1 d. cupsdisable Printer1 ANSWER: RATIONALE:
d
The cupsdisable command can be used to temporarily pause printing of jobs in a print queue.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.4 - Manage printers and printing. TOPICS: 10.1 Printer Administration KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 10 Common Administrative Tasks DATE MODIFIED:
5/2/2023 10:03 PM
25. Emily accidentally created a new user account named bparsons on the wrong server. Which of the following
commands could she use to delete the account she created as well as the associated home directory? (Choose all that apply.) a. userdel bparsons ; rm -rf /home/bparsons b. userdel bparsons c. userdel -h bparsons d. userdel -r bparsons ANSWER: RATIONALE:
a, d
The userdel -r command can be used to remove a home directory as well as the associated home directory. Alternatively, the user and home directory can be removed separately using the userdel and rm -rf commands.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts. ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 10.3 Administering Users and Groups KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 26. Which of the following commands can you use to send a print job to printer1? (Choose all that apply.) a. lp -d printer1 mydocument.txt b. lpr -d printer1 mydocument.txt c. lpr -P printer1 mydocument.txt d. lp -p printer1 mydocument.txt ANSWER: RATIONALE:
a, c
The lp command, as part of the CUPS printing system, can use the -d option to set the destination printer as printer1 followed by the filename that you want to print. The lpr command, as part of the legacy printing system, has a -P option to specify the printer.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.4 - Manage printers and printing. TOPICS: 10.1 Printer Administration KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 10 Common Administrative Tasks DATE CREATED: DATE MODIFIED:
5/2/2023 10:03 PM 5/2/2023 10:03 PM
27. Uli administers a Linux print server on the network. The printer named printer5 on the print server has
experienced a hardware failure and Uli wants to let users immediately know that the printer is unavailable should they attempt to submit a print job. What command should Uli run? a. cupsreject -r "Unavailable. Please submit your job to another printer" printer5 b. cupsdisable -r "Unavailable. Please submit your job to another printer" printer5 c. cupsreject -m "Unavailable. Please submit your job to another printer" printer5 d. cupsdisable -m "Unavailable. Please submit your job to another printer" printer5 ANSWER: RATIONALE:
a
The cupsreject command can be used to prevent print jobs from being accepted into the print queue, and the -r option can optionally be used to provide a message to users that attempt to submit print jobs to the printer.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.4 - Manage printers and printing. TOPICS: 10.1 Printer Administration KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 28. Which protocol does CUPS use to share printers to client computers on the network by default? a. SMB b. IPP c. LPD d. LPR ANSWER: RATIONALE:
b
CUPS uses the HTTP-based Internet Printing Protocol (IPP) by default to share print resources on networks such as the Internet.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.4 - Manage printers and printing. TOPICS: 10.1 Printer Administration KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 10 Common Administrative Tasks DATE MODIFIED:
5/2/2023 10:03 PM
Copyright Cengage Learning. Powered by Cognero.
Page 15
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation 1. After compiling source code, which command still needs to be run in order to copy the newly compiled
binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem? a. make install b. make c. make image d. make clean ANSWER: RATIONALE:
a
The make install command will copy the newly compiled binaries as well as the supporting files to the appropriate location on the filesystem.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.7 - Compile and install software packages from source code. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 2. When using the compress command to archive a file, which of the following options will display the
compression ratio of the new compressed file? a. -c b. -v c. -s d. -a ANSWER: RATIONALE:
b
The -v option displays a message of the percentage of reduction for each file compressed.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.2 - Compress and decompress files using common compression utilities. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 11.1 Compression KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation 3. Which of the following can be used at the command line to download a source code tarball using the HTTP
protocol? (Choose two.) a. GET b. wget c. curl d. wwwretr ANSWER: RATIONALE:
b, c
The wget and curl commands can be used at the command line to download files via HTTP.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.7 - Compile and install software packages from source code. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 4. Which of the following commands will install a package using the Red Hat Package Manager, showing all
information, while printing pound signs to show the progress of installation? a. rpm -iah packagename.rpm b. rpm -iap packagename.rpm c. rpm -ivh packagename.rpm d. rpm -ivp packagename.rpm ANSWER: RATIONALE:
c
The -i option to the rpm command will install, the -v option will display messages in a verbose manner, and the -h option will display hash marks to indicate the progress of the installation.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation 5. Which of the following file extensions are used by the Debian Package Manager? a. .dpm b. .deb c. .dpkg d. .d ANSWER: RATIONALE:
b
Debian Package Manager software packages use the .deb file extension.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 6. You have downloaded an AppImage file from the Internet. What command can be used to verify the SHA-
256 checksum that is listed on the website from which you downloaded the file? a. checksum --sha256 b. md5sum --sha256 c. sha256sum d. shasum --level 256 ANSWER: RATIONALE:
c
The sha256sum command can be used to verify a SHA-256 checksum on a Linux system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.10 - Install and manage Snap, Flatpak, and AppImage applications. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 7. Which of the following options for the tar command will create an archive that is also gzipped while Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation
displaying all of the work in progress to the terminal screen? a. tar -zcvf archive.tar.gz b. tar -cfza archive.tar.gz c. tar -czvf archive.tar.gz * d. tar -nzaf archive.tar.gz ANSWER: RATIONALE:
c
The -c option to tar is used to create, the z option is used to gzip, the -v option is used for verbose output, and the -f option specifies the filename to create (the -f option must precede the filename argument). The final argument of the tar command must specify the files or directory to be added to the archive (* indicates all files in the current directory will be added to the archive.tar.gz file).
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.3 - Perform system backups using the tar, cpio, dump, and dd commands. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 11.2 System Backup KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 8. Meredith is a software developer that is planning to install Visual Studio Code on her Linux workstation. She
regularly adds and removes packages to and from her workstation and wants to ensure that Visual Studio Code always remains stable. In what software format should she obtain Visual Studio Code? a. Source code b. Package (DPM or RPM) c. Sandbox (Flatpak, Snap, or AppImage) d. Software as a Service (SaaS) ANSWER: RATIONALE:
c
Sandboxed applications contain all required dependency applications and will remain stable regardless of whether other software is added to or removed from the system.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.6 - Describe common types of Linux software. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Understand Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation DATE CREATED: DATE MODIFIED:
5/2/2023 10:03 PM 5/2/2023 10:03 PM
9. Which of the following commands can be used to back up files in case of system failure, supports long
filenames, and can also back up special files? a. dd b. dump c. cpio d. tar ANSWER: RATIONALE:
c
The cpio command can be used to back up files in the case of system failure, supports long filenames, and unlike other backup utilities, can also back up special files.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.3 - Perform system backups using the tar, cpio, dump, and dd commands. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 11.2 System Backup KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 10. Which of the following files contains the list of shared libraries? a. /etc/ld.so.conf b. /etc/ld.so.cache c. /lib/shared.conf d. /lib/ld.so.conf ANSWER: RATIONALE:
b
The /etc/ld/so.cache file contains the list of shared libraries.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.9 - Identify and support shared libraries used by software. ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.3 - Manage shared libraries. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation DATE MODIFIED:
5/2/2023 10:03 PM
11. Which of the following commands will list missing libraries as not found if a necessary library is not
installed? a. ldd b. ldconfig c. ldso d. ldchk ANSWER: RATIONALE:
a
The ldd command will list missing libraries as not found if a necessary library is not installed.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.9 - Identify and support shared libraries used by software. ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.3 - Manage shared libraries. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 12. Ruprect needs to add a third-party repository to the Debian Package Manager in order to install the correct
driver for a Fibre Channel HBA. The HBA manufacturer has supplied him with a file that contains the necessary repository location. To which directory can Ruprect copy this file to ensure that it will be used the next time he runs an apt update command? a. /etc/dpm/repolist b. /etc/apt c. /etc/dpm d. /etc/apt/sources.list.d ANSWER: RATIONALE:
d
Debian Package Manager repositories are configured from entries in the /etc/apt/sources.list file and files under the /etc/apt/sources.list.d directory.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Understand Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation DATE CREATED: DATE MODIFIED:
5/2/2023 10:03 PM 5/2/2023 10:03 PM
13. Which of the following commands can be used to modify installation configuration options for DPM
packages after they have been installed? a. dpkg-configure b. dpkg-reconfigure c. dpkg-update d. apt-cache ANSWER: RATIONALE:
b
The dpkg-reconfigure command can be used to modify configuration options for DPM packages once they have been installed.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 14. Which of the following commands can you use to search available packages on a DPM software repository?
(Choose two.) a. apt-cache b. apt-query c. apt query d. apt search ANSWER: RATIONALE:
a, d
The apt-cache command can be used to search available packages from a DPM software repository. Alternatively, you can use apt command with the search option to perform the same task.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation KEYWORDS: DATE CREATED: DATE MODIFIED:
Bloom's: Remember 5/2/2023 10:03 PM 5/2/2023 10:03 PM
15. Which of the following commands can be used to install the latest versions of all packages currently
installed on the system from the sources configured in sources.list? a. apt upgrade b. apt upgrade all c. apt update d. apt-upgrade ANSWER: RATIONALE:
a
The apt upgrade command will upgrade all currently installed packages that were installed on the system from the sources configured in sources.list.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 16. Which of the following commands can be used to install sandboxed applications? (Choose all that apply.) a. appimage b. apt c. snap d. flatpak ANSWER: RATIONALE:
c, d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.11.10 - Install and manage Snap, Flatpak, and AppImage applications.
ACCREDITING STANDARDS:
Snap and Flatpak are package managers for their own sandboxed application formats and use the snap and flatpak commands to install applications, respectively. AppImage is a sandboxed package format only and not a package manager or command, while apt installs non-sandboxed DPM packages.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
11.3 Software Installation Bloom's: Understand 5/2/2023 10:03 PM 5/2/2023 10:03 PM
17. Which of the following commands will install an RPM package while ignoring any other packages that it
may be dependent upon for proper operation? a. rpm -ivh --nodeps package.rpm b. rpm -ivhn package.rpm c. rpm -i --ignoredeps package.rpm d. rpm -in package.rpm ANSWER: RATIONALE:
a
The -i option to rpm will install an RPM package, the -v option will print verbose output while doing so, and the -h option will display hash marks as the installation progresses. The --nodeps option will ignore any dependencies and install the package anyways if any dependencies are found that are not installed.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 18. Which of the following RPM options will update a software package to the newest version, or install the
package if it does not already exist on a system? a. -i b. -U c. -u d. -F ANSWER: RATIONALE:
b
POINTS: QUESTION TYPE: HAS VARIABLES:
1 Multiple Choice False
The -U (capitalized) option is the same as --upgrade, which will update a software package to the newest version if an older version exists on a system, or will install the package if it does not currently exist.
Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation LEARNING OBJECTIVES:
Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 19. Which of the following tools can search Internet software repositories for RPM packages that map to your
system's architecture, and automatically install or upgrade those packages on your system? (Choose all that apply.) a. apt b. apt-get c. dnf d. yum ANSWER: RATIONALE:
c, d
The yum (Yellowdog Updater Modified) and dnf (Dandified YUM) tools can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 20. Which of the following Red Hat Package Manager commands will install the newest versions of all
packages that are currently installed on a system? a. apt-get update b. dnf upgrade c. apt-get upgrade all d. dnf update-all ANSWER: RATIONALE:
b
The dnf upgrade option will upgrade all RPM packages installed on a system to the newest versions.
Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 21. The SUSE and openSUSE Linux distributions use an alternative to yum but that provides the same
functionality. What is the name of the command they use? a. apt b. rpm c. zypper d. dnf ANSWER: RATIONALE:
c
The SUSE and openSUSE distributions of Linux make use of a zypper utility as an alternative to yum, but that still provides the same functionality for downloading and installing RPM packages.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 22. What command can be used to display the contents of a file that was compressed with the compress utility? a. acat b. zcat c. cat d. ccat ANSWER: RATIONALE:
b
The zcat command can be used to display the contents of a file that was
Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation
compressed with the compress utility. You can also use the zgrep command to search the contents of a compressed file. POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.2 - Compress and decompress files using common compression utilities. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 11.1 Compression KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 23. What command looks for a Makefile and uses the information within it to compile the source code into
binary programs using the appropriate compiler program for the local hardware architecture? a. configure b. install c. make install d. make ANSWER: RATIONALE:
d
The make command looks for the Makefile file and uses the information in it to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.7 - Compile and install software packages from source code. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 24. What option can be added to the dpkg command to remove a specified package from the system, including
any configuration files used by the package? a. -d b. -P c. -D d. -r ANSWER:
b
Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation RATIONALE:
The dpkg -P command removes everything, including configuration files used by the package.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat Package Manager (RPM) and Debian Package Manager (DPM). ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management. Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. TOPICS: 11.3 Software Installation KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 25. If no level of compression is specified, the gzip command assumes what compression level? a. 4 b. 5 c. 6 d. 7 ANSWER: RATIONALE:
c
If no level of compression is specified, the gzip command assumes the -6 option.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.1 - Outline the features of common compression utilities. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 11.1 Compression KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 26. Which of the following is a common CD and DVD disc burning software package available for Linux
systems? a. mkisofs b. Brasero c. Nautilus d. Mopheus ANSWER: RATIONALE:
b
Brasero is a common disc burning software package that is installed by default on many Linux distributions.
Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.5 - Use burning software to back up files to CD and DVD. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 11.2 System Backup KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM 27. After downloading a sample.appimage file from AppImageHub.com, how can you run it? a. Run the fuse sample.appimage command. b. Run the fuse --run sample.appimage command. c. Double-click on the sample.appimage file within a desktop environment to start the installation
program. d. Modify the file permissions to grant execute permission and execute it like any other program binary. ANSWER: RATIONALE:
d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.11.10 - Install and manage Snap, Flatpak, and AppImage applications.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
AppImage files are self-contained filesystems that can be executed like any other program binary once they are granted execute permission.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software. 11.3 Software Installation Bloom's: Understand 5/2/2023 10:03 PM 5/2/2023 10:03 PM
28. Which of the following will extract the contents of the archive.tar.gz file? a. tar -ztvf archive.tar.gz b. tar -zxa archive.tar.gz c. tar -zrvf archive.tar.gz d. tar -zxf archive.tar.gz ANSWER: RATIONALE:
d
POINTS:
1
The -x option to tar is used to extract, the z option is used to gunzip, and the -f option specifies the filename to extract (the -f option must precede the filename argument).
Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 11 Compression, System Backup, and Software Installation QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
Multiple Choice False Eckert.Linux+6e.24.11.4 - View and extract archives using the tar, cpio, restore, and dd commands. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 11.2 System Backup KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:03 PM DATE MODIFIED: 5/2/2023 10:03 PM
Copyright Cengage Learning. Powered by Cognero.
Page 15
Name:
Class:
Date:
Mod 12 Network Configuration 1. When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint
for the target computer. In which file is this fingerprint stored? a. ~/.ssh/options b. ~/.ssh/rsa.pub c. ~/.ssh/known_hosts d. ~/.ssh/rsa ANSWER: RATIONALE:
c
The encryption fingerprint for each remote host is stored within a paragraph for each host in the ~/.ssh/known_hosts file.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote administration. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.3 - Securing data with encryption. Eckert.XK0-005.24.2.4 - Given a scenario, configure and execute remote connectivity for system management. TOPICS: 12.8 Remote Administration KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 2. What file lists ports and their associated protocols? a. /etc/services b. /etc/ports.conf c. /etc/hosts d. /etc/nsswitch.conf ANSWER: RATIONALE:
a
The /etc/services file lists known ports and protocol combinations alongside their service description.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.7 - Identify common network services. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.1 - Fundamentals of internet protocols. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.7 Network Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 12 Network Configuration 3. Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to
determine the round trip time it takes a packet to travel? a. ping -4 server1 b. ping server1 c. ping -c 4 server1 d. ping -n 4 server1 ANSWER: RATIONALE:
c
The -c 4 option for the ping command will send a count of 4 ICMP echo requests.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.3 - Configure a network interface to use IP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.3 - Basic network troubleshooting. Eckert.XK0-005.24.4.2 - Given a scenario, analyze and troubleshoot network resource issues. TOPICS: 12.3 Configuring a Network Interface KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 4. Which of the following commands will display detailed information for a wired network interface? a. lsnet b. hwdisp --network c. lshw --net d. ethtool ANSWER: RATIONALE:
d
The ethtool command can be used to display detailed information for a wired network interface.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.3 - Configure a network interface to use IP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.3 - Basic network troubleshooting. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.3 Configuring a Network Interface KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 5. You run the command hostname server1 and then issue the reboot command. You notice that the host name Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 12 Network Configuration
has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead? a. ifconfig server1 b. host server1 c. hostnamectl set-hostname server1 d. set hostname="server1" ANSWER: RATIONALE:
c
The hostnamectl command will change a Linux system's host name so that it persists across reboots. It does this by also adding the host name to the /etc/hostname file.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.12.5 - Describe the purpose of host names and how they are resolved to IP addresses. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration. Eckert.XK0-005.24.4.5 - Given a scenario, use systemd to diagnose and resolve common problems with a Linux system. TOPICS: 12.5 Name Resolution KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 6. Which of the following are available network renderer services on Linux systems? a. Systemd-networkd b. Netplan c. NetworkManager d. Cloud-init ANSWER: RATIONALE:
b, c
Systemd-networkd is a network renderer service that is part of Systemd and commonly used on Linux server distributions, whereas NetworkManager is a network renderer service that is bundled with most desktop environments and used on Linux workstations.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.3 - Configure a network interface to use IP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.3 Configuring a Network Interface KEYWORDS: Bloom's: Remember Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 12 Network Configuration DATE CREATED: DATE MODIFIED:
5/2/2023 10:04 PM 5/2/2023 10:04 PM
7. Which of the following can only be used to remotely administer a Linux machine graphically? a. SSH b. Telnet c. FTP d. VNC ANSWER: RATIONALE:
d
VNC is Virtual Network Computing and is a cross-platform method of graphically connecting to a remote system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote administration. ACCREDITING STANDARDS: Eckert.LPIC-1.24.106.2 - Graphical desktops. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.8 Remote Administration KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 8. Which of the following commands can be used to trace an IPv6 route? (Choose two.) a. trace6 b. traceroute6 c. tracert6 d. tracepath6 ANSWER: RATIONALE:
b, d
The traceroute6 command can be used to trace an IPv6 route. The tracepath6 command can be used similar to traceroute6 to trace an IPv6 route.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.6 - Configure IP routing. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.3 - Basic network troubleshooting. Eckert.XK0-005.24.4.2 - Given a scenario, analyze and troubleshoot network resource issues. TOPICS: 12.6 Routing KEYWORDS: Bloom's: Understand Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 12 Network Configuration DATE CREATED: DATE MODIFIED:
5/2/2023 10:04 PM 5/2/2023 10:04 PM
9. Which of the following ports would be used to resolve a domain name to an IP address? a. 443 b. 23 c. 53 d. 69 ANSWER: RATIONALE:
c
Port 53 is used by DNS, or the Domain Name System.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.7 - Identify common network services. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.4 - Configure client side DNS. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.7 Network Services KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 10. Which of the following is a media access method? a. TCP/IP b. UDP/IP c. ICMP d. Ethernet ANSWER: RATIONALE:
d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.12.1 - Describe the purpose and types of networks, protocols, and media access methods.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Ethernet is a protocol that is used to directly access network media.
Eckert.LPIC-1.24.109.1 - Fundamentals of internet protocols. 12.1 Networks Bloom's: Understand 5/2/2023 10:04 PM 5/2/2023 10:04 PM
11. Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 12 Network Configuration
notation listed as 255.255.255.224. How would this be represented by the ip addr command using CIDR notation? a. /23 b. /24 c. /27 d. /28 ANSWER: RATIONALE:
c
255.255.255.224 in dotted decimal notation is the same as /27 (27 bits within the subnet mask) in CIDR notation.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.2 - Explain the basic configuration of IP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.1 - Fundamentals of internet protocols. TOPICS: 12.2 The IP Protocol KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 12. Which of the following IPv4 addresses can only be used behind a proxy server or NAT router? a. 3.0.2.7 b. 10.4.9.2 c. 192.139.188.42 d. 100.1.1.1 ANSWER: RATIONALE:
b
Certain IP address ranges are reserved for use behind proxy/NAT devices. These include the entire 10.0.0.0 Class A network (10.0.0.0/8), the 172.16 through 172.31 Class B networks (172.16-31.0.0/16), and the 192.168 Class C networks (192.168.0-255.0/24).
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.2 - Explain the basic configuration of IP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.1 - Fundamentals of internet protocols. TOPICS: 12.2 The IP Protocol KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 13. The system administrator has shut Ethernet interface eth0 down while making some changes to the system. Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 12 Network Configuration
Which of the following commands can they use to bring the network connection back up? (Choose all that apply.) a. ifconfig eth0 up b. activate eth0 c. int eth0 up d. ip link set eth0 up ANSWER: RATIONALE:
a, d
The ifconfig eth0 up command can be used to bring ethernet interface eth0 back up on a system with the net-tools package installed. On a system with the iproute/iproute2 package installed, the ip link set eth0 up command can instead be used.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.3 - Configure a network interface to use IP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.3 Configuring a Network Interface KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 14. On a system running NetworkManager, which of the following commands can be used to view or modify
connection information? a. netman b. nm c. netctonf d. nmcli ANSWER: RATIONALE:
d
The nmcli command can be used to view or modify connection information on systems running NetworkManager.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.3 - Configure a network interface to use IP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.3 Configuring a Network Interface KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 12 Network Configuration DATE MODIFIED:
5/2/2023 10:04 PM
15. Which of the following files does the hostnamectl command modify to set the hostname on a machine? a. /etc/hostname b. /etc/host.conf c. /etc/hosts.conf d. /etc/hostname.conf ANSWER: RATIONALE:
a
The /etc/hostname file stores the hostname of the system.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.12.5 - Describe the purpose of host names and how they are resolved to IP addresses. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.5 Name Resolution KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 16. You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS
server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible? a. /etc/hosts b. /etc/nsswitch.conf c. /etc/resolv.conf d. /etc/named.conf ANSWER: RATIONALE:
b
The /etc/nsswitch.conf file will specify which order a Linux machine will use in order to resolve names to IP addresses.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.12.5 - Describe the purpose of host names and how they are resolved to IP addresses. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.4 - Configure client side DNS. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.5 Name Resolution KEYWORDS: Bloom's: Understand Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 12 Network Configuration DATE CREATED: DATE MODIFIED:
5/2/2023 10:04 PM 5/2/2023 10:04 PM
17. Which of the following commands can be used to display TCP connections on a Linux system? (Choose all
that apply.) a. sockstat b. ss -t c. netstat -t d. sstat ANSWER: RATIONALE:
b, c
The ss or netstat command alongside the -t option will display TCP connections (sockets) on the system.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.7 - Identify common network services. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.3 - Basic network troubleshooting. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.7 Network Services KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 18. Which of the following commands copy the /etc/hosts file on server5 to the root directory on the local
system using SSH? (Choose all that apply.) a. scp root@server5:/etc/hosts / b. scp root@server5:/etc/hosts >/hosts c. ssh root@server5:/etc/hosts | ssh &> / d. ssh root@server5 cat /etc/hosts > /hosts ANSWER: RATIONALE:
a, d
You can use the ssh or scp commands to copy files from remote systems. The syntax for ssh is: ssh user@server:remotefile > localfile. The syntax for scp is: scp user@server:remotefile localdirectory.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote administration. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.3 - Securing data with encryption. Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories. TOPICS: 12.8 Remote Administration Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 12 Network Configuration KEYWORDS: DATE CREATED: DATE MODIFIED:
Bloom's: Apply 5/2/2023 10:04 PM 5/2/2023 10:04 PM
19. Which of the following is a valid APIPA address? a. 127.0.0.1 b. 169.254.38.101 c. 10.11.12.13 d. 192.168.1.17 ANSWER: RATIONALE:
b
The 169.254.0.0 through 169.254.255.255 range of IP addresses has been designated for use by the Automatic Private IP Address (APIPA) method of assigning IP addresses when a DHCP server is unavailable and an address has not been statically assigned.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.2 - Explain the basic configuration of IP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.1 - Fundamentals of internet protocols. TOPICS: 12.3 Configuring a Network Interface KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 20. Houston is an IT support specialist who needs to modify the IP address configuration on a Fedora
Workstation on the network remotely via an SSH connection. What configuration file should he modify once he has connected to the remote system? a. /etc/NetworkManager/system-connections/eth0.nmconnection b. /etc/netplan/00-installer-config.yaml c. /etc/networks/eth0.conf d. /etc/sysconfig/network-services/eth0 ANSWER: RATIONALE:
a
Fedora Workstation uses the NetworkManager network renderer service, which stores IP configuration in files under the /etc/NetworkManager/systemconnections directory.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.2 - Explain the basic configuration of IP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 12 Network Configuration
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
configuration files. 12.3 Configuring a Network Interface Bloom's: Remember 5/2/2023 10:04 PM 5/2/2023 10:04 PM
21. Which of the following is a valid DNS server definition in the /etc/resolv.conf file? a. dns 1.1.1.1 b. order hosts, bind c. 10.1.15.60 server10 d. nameserver 8.8.8.8 ANSWER: RATIONALE:
d
Lines in /etc/resolv.conf have the format: nameserver IP.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.12.5 - Describe the purpose of host names and how they are resolved to IP addresses. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.4 - Configure client side DNS. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.5 Name Resolution KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 22. Doug notices that the DNS server IP address listed in /etc/resolv.conf is 127.0.0.53. What does this indicate? a. DNS name resolution is disabled on the system. b. Name resolution requests will be forwarded to Systemd-resolved. c. The local system is running a DNS server service. d. The system will only use DNS servers listed in /etc/hosts. ANSWER: RATIONALE:
b
On modern Linux systems that use Systemd, /etc/resolv.conf may be configured to redirect requests to Systemd-resolved, which listens on the IP address 127.0.0.53.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.12.5 - Describe the purpose of host names and how they are resolved to IP addresses. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.4 - Configure client side DNS. Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 12 Network Configuration
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. 12.5 Name Resolution Bloom's: Understand 5/2/2023 10:04 PM 5/2/2023 10:04 PM
23. What command can be run within a desktop environment to configure a DSL connection on a system that
uses NetworkManager? a. modem-manager-gui b. nm-connection-editor c. dslconf d. pppoeconf ANSWER: RATIONALE:
b
The nm-connection-editor command starts the graphical Network Connections utility, which can configure a wide range of network connections and technologies, including DSL.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.4 - Configure a PPP interface. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.4 Configuring a PPP Interface KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 24. Seema needs to modify the static IP address configuration on an Ubuntu Server system on the network.
What configuration file should she modify? a. /etc/networks/eth0.conf b. /etc/netplan/00-installer-config.yaml c. /etc/NetworkManager/system-connections/eth0.nmconnection d. /etc/sysconfig/network-services/eth0 ANSWER: RATIONALE:
b
POINTS: QUESTION TYPE: HAS VARIABLES:
1 Multiple Choice False
Ubuntu Server uses the NetPlan subsystem to provide IP configuration to Systemd-networkd. The default file used to provide NetPlan configuration on Ubuntu is /etc/netplan/00-installer-config.yaml.
Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 12 Network Configuration LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.2 - Explain the basic configuration of IP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.3 Configuring a Network Interface KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 25. What command can be used to connect to server5 using SSH as the user eschmidt? (Choose all that apply.) a. ssh -l eschmidt server5 b. ssh //server5/eschmidt c. ssh eschmidt@server5 d. ssh -u eschmidt@server5 ANSWER: RATIONALE:
a, c
The ssh command accepts the syntax username@server or the syntax -l user server.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote administration. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.3 - Securing data with encryption. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.8 Remote Administration KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 26. You would like to configure the connection options allowed for the SSH daemon. What file should you edit? a. /etc/ssh/ssh.conf b. /etc/ssh/sshd.conf c. ~/.ssh/sshd d. ~/.ssh/options ANSWER: RATIONALE:
b
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote administration.
The SSH daemon configuration file is /etc/ssh/sshd.conf.
Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 12 Network Configuration ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.3 - Securing data with encryption. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 12.8 Remote Administration KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 27. Which of the following commands will add a route to the route table on a Linux router to the
192.139.188.0/24 network via the router 15.2.199.6? a. route add -net 192.139.188.0 netmask 255.255.255.0 gw 15.2.199.6 b. route add -target 192.139.188.0/24 -source 15.2.199.6 c. ip route add 192.139.188.0/24 gw 15.2.199.6 d. ip route add 192.139.188.0/24 via 15.2.199.6 ANSWER: RATIONALE:
a, d
The route and ip commands can be used to add routes to the route table. The syntax for the route command is: route add -net networkIP netmask subnetmask gw routerIP. The syntax for the ip command is: ip route add networkCIDR via routerIP.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.6 - Configure IP routing. ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.3 - Basic network troubleshooting. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.6 Routing KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 28. Ricky has configured a VNC server on his Linux workstation that listens on the second X Windows display.
What port must he allow on his network firewall in order to access his VNC server from a remote system? a. 23 b. 6100 c. 5902 d. 22 ANSWER: RATIONALE:
c
POINTS: QUESTION TYPE: HAS VARIABLES:
1 Multiple Choice False
VNC listens on port 5900 + display#. For display 2, VNC would listen on port 5902.
Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 12 Network Configuration LEARNING OBJECTIVES:
Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote administration. ACCREDITING STANDARDS: Eckert.LPIC-1.24.106.2 - Graphical desktops. Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 12.8 Remote Administration KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM
Copyright Cengage Learning. Powered by Cognero.
Page 15
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies 1. Which of the following files contain the path and filename where zone definitions should be configured on a
DNS server? a. /etc/nsswitch.conf b. /etc/named.conf c. /etc/named.conf d. /etc/hosts ANSWER: RATIONALE:
c
The /etc/named.conf file is where you would define the zones that a DNS server should use.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS, and NTP. TOPICS: 13.1 Infrastructure Services KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 2. Which of the following commands can be used to run a persistent container called webapp1 based on the
wopr image created by arfa on DockerHub, as well as map port 46000 on the underlying platform to port 8080 in the container? a. docker run -d -p 46000:8080 --name webapp1 arfa/wopr b. docker run -d -p 8080:46000 --name webapp1 arfa/wopr c. docker run -d -p 46000:8080 --name webapp1 wopr/arfa d. docker run -d -p 8080:46000 --name webapp1 wopr/arfa ANSWER: RATIONALE:
c
The docker run -d command will run a container persistently. The -p option is used to map a port in the format platform:container, the --name option specifies the container name, and the final argument specifies the container image in the format organization/image.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.7 - Create and run containers using Docker. ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.6 - Linux as a virtualization guest. Eckert.XK0-005.24.3.2 - Given a scenario, perform basic container operations. TOPICS: 13.6 Working with Cloud Technologies KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies 3. Ryu would like to connect to the webapp5 container that is running on his Linux server to modify the
configuration of the application run within. What command can he use to obtain an interactive shell in this container? a. docker ps /bin/sh webapp5 b. docker run -s /bin/sh webapp5 c. docker exec -it webapp5 sh d. docker shell webapp5 ANSWER: RATIONALE:
c
The docker exec command can be used to connect to a shell within a running container.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.7 - Create and run containers using Docker. ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.6 - Linux as a virtualization guest. Eckert.XK0-005.24.3.2 - Given a scenario, perform basic container operations. TOPICS: 13.6 Working with Cloud Technologies KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 4. Gordon administers a Kubernetes cluster that runs a microservice-based web app comprised of several
containers. Currently, these microservices are configured to communicate directly with one another. What could Gordon implement to provide additional logging and security for information that is passed between these microservices? a. service mesh b. ambassador container c. sidecar container d. ingress controller ANSWER: RATIONALE:
a
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.13.6 - Describe how virtual machines and containers are created and used within cloud environments.
ACCREDITING STANDARDS: TOPICS: KEYWORDS:
Microservices running in different containers can be configured to communicate among each other via a special proxy service called a service mesh that provides additional security and monitoring capabilities.
Eckert.XK0-005.24.3.5 - Summarize container, cloud, and orchestration concepts. 13.6 Working with Cloud Technologies Bloom's: Understand
Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies DATE CREATED: DATE MODIFIED:
5/2/2023 10:04 PM 5/2/2023 10:04 PM
5. Which of the following is a valid SQL statement for adding a new row of data to a SQL database table? a. INSERT INTO users (firstname, lastname) values (‘George', ‘Washington'); b. INSERT (‘George', ‘Washington') INTO users (firstname, lastname); c. ALTER TABLE users SET firstname = ‘George', lastname = ‘Washington'; d. UPDATE users SET firstname = ‘George', lastname = ‘Washington'; ANSWER: RATIONALE:
a
The correct syntax to add a new row of data is to use the INSERT INTO statement.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.5 - Configure database services using PostgreSQL. TOPICS: 13.5 Database Services KEYWORDS: Bloom's: Analyze DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 6. Victoria has created a Kubernetes deployment and service for a new microservice-based web app. What can
she configure to ensure that this web app can be accessed from outside of the Kubernetes cluster? (Choose all that apply.) a. an ingress controller b. a pod controller c. a load balancer service d. an ambassador container ANSWER: RATIONALE:
a, c
A service can be exposed outside of a Kubernetes cluster by configuring either an ingress controller or a load balancer service.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.8 - Configure Kubernetes to run containers. ACCREDITING STANDARDS: Eckert.XK0-005.24.3.5 - Summarize container, cloud, and orchestration concepts. TOPICS: 13.6 Working with Cloud Technologies KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 7. Which of the following storage types can be accessed using HTTP or HTTPS and is often used by web apps Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies
that need to store many documents, pictures, and videos? a. block b. object c. database d. persistent ANSWER: RATIONALE:
b
Object storage is accessed using HTTP or HTTPS. Because of its relatively low cost and persistence needs, it is well suited for storing large numbers of user files.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.13.6 - Describe how virtual machines and containers are created and used within cloud environments. ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.6 - Linux as a virtualization guest. Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals. TOPICS: 13.6 Working with Cloud Technologies KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 8. Which of the following can be run within the psql utility to list the tables within the current database? a. \l b. \d c. \c d. \b ANSWER: RATIONALE:
d
The \d command within the psql utility displays the tables within the current database.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.5 - Configure database services using PostgreSQL. TOPICS: 13.5 Database Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 9. Which of the following commands can be used to display any email messages awaiting delivery alongside the
reason that they were not delivered? a. mailqueue Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies b. mailq c. mail --queue d. mail -q ANSWER: RATIONALE:
b
The mailq command can be used to display any email messages awaiting delivery alongside the reason that they were not delivered.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.4 - Configure email services using Postfix. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.3 - Mail Transfer Agent (MTA) basics. TOPICS: 13.4 Email Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 10. Hadeel's organization creates new virtual machines on a public cloud provider several times a month from
virtual machine templates supplied by the cloud provider. Each of these systems must use one of three standard software and system configuration that the organization has defined. What software can Hadeel use to simplify the configuration of new virtual machines that he creates in the future? a. orchestration b. OVF c. CM d. IaT ANSWER: RATIONALE:
c
Configuration Management (CM) software can be used to automatically apply standard configurations to multiple systems. These configurations can be specified in declarative format and stored in YAML files to provide a series of templates that can be reused. This practice is called Infrastructure as Code (IaC).
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.13.6 - Describe how virtual machines and containers are created and used within cloud environments. ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.6 - Linux as a virtualization guest. Eckert.XK0-005.24.3.4 - Summarize common infrastructure as code technologies. TOPICS: 13.6 Working with Cloud Technologies KEYWORDS: Bloom's: Analyze DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 11. What ftp command uploads the filename from the current directory on the local computer to the current Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies
directory on the remote computer and allows the use of wildcard metacharacters to specify the filename? a. upload filename b. mput filename c. put filename d. get filename ANSWER: RATIONALE:
b
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and FTP.
ACCREDITING STANDARDS:
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
The mput filename is a common FTP command that uploads the given filename from the current directory on the local computer to the current directory on the remote computer and allows the use of wildcard metacharacters to specify multiple files.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. 13.3 File Sharing Services Bloom's: Remember 5/2/2023 10:04 PM 5/2/2023 10:04 PM
12. Darius would like to prevent the user jwhitley from logging into the FTP service running on his Linux
server. Which file must Darius configure to provide for this restriction? a. /etc/vsftpd.conf b. /etc/ftpusers c. /etc/ftplist d. /etc/hosts.deny ANSWER: RATIONALE:
b
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and FTP.
ACCREDITING STANDARDS:
TOPICS: KEYWORDS: DATE CREATED:
Denied FTP users are listed in the /etc/ftpusers and /etc/user_list files.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. 13.3 File Sharing Services Bloom's: Remember 5/2/2023 10:04 PM
Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies DATE MODIFIED:
5/2/2023 10:04 PM
13. After modifying the /etc/aliases file, what command must be run in order to rebuild the email aliases
database? a. alias b. newaliases c. sendmail d. mail ANSWER: RATIONALE:
b
The newaliases command is used in order to rebuild the aliases database that is located within /etc/aliases.db based on the entries in the /etc/aliases file.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.4 - Configure email services using Postfix. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.3 - Mail Transfer Agent (MTA) basics. TOPICS: 13.4 Email Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 14. What PostgreSQL command-line utility backs up PostgreSQL database settings? a. pg_dumpall b. pg_dump c. pg_restore d. pg_backup ANSWER: RATIONALE:
b
The pg_dump command backs up PostgreSQL database settings.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.5 - Configure database services using PostgreSQL. TOPICS: 13.5 Database Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 15. What DNS resource record type is used to provide an alias for another resource record? a. NS Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies b. MX c. SOA d. CNAME ANSWER: RATIONALE:
d
The CNAME record specifies another name for an existing A or AAAA resource record for a zone.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS, and NTP. TOPICS: 13.1 Infrastructure Services KEYWORDS: Bloom's: Understand DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 16. What line in the /etc/chrony.conf file would allow systems on the 10.3.0.0/16 network to obtain time
information from the NTP server? a. allow 10.3.0.0 255.0.0.0 -iburst b. restrict 10.3.0.0 255.0.0.0 -iburst c. allow 10.3/16 d. restrict 10.3/16 ANSWER: RATIONALE:
c
The allow line in /etc/chrony.conf specifies the hosts and networks allowed to query time information from the NTP server. For networks, it accepts shortened CIDR notation, such as 10.3/16 for the 10.3.0.0/16 network.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS, and NTP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 13.1 Infrastructure Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 17. Yassir has been tasked with adding a new SMB share definition to Linux server. What file should he modify
to add the share definition? a. /etc/samba/smb.conf Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies b. /etc/exports c. /etc/samba/shares d. /etc/smb/shares ANSWER: RATIONALE:
a
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and FTP.
SMB share definitions are defined in /etc/samba/smb.conf for use with the Samba daemons.
ACCREDITING STANDARDS:
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. 13.3 File Sharing Services Bloom's: Remember 5/2/2023 10:04 PM 5/2/2023 10:04 PM
18. What zone configuration file contains a PTR record used to identify the loopback adapter? a. /var/named/named.ca b. /etc/named.conf c. /var/named/named.local d. /etc/named.loop ANSWER: RATIONALE:
c
The file used to identify the loopback adapter is at /var/named/named.local or /var/named/named.localhost or /var/named/named.loopback.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS, and NTP. TOPICS: 13.1 Infrastructure Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 19. Which command can be used to test the performance of an Apache web server? a. apachectl b. ab c. curl Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies d. testparm ANSWER: RATIONALE:
b
The ab (Apache benchmark) command can be used to send multiple requests to an Apache web server to measure performance.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.2 - Configure web services using the Apache web server. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 13.2 Web Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 20. Where is the default document root directory for the Apache Web server? a. /usr/local/html b. /var/www/html c. /usr/share/local/html d. /var/html ANSWER: RATIONALE:
b
The /var/www/html directory typically contains the default website that is used on the server and is called the document root directory.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.2 - Configure web services using the Apache web server. TOPICS: 13.2 Web Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 21. After making several changes to the Apache configuration file on his web server and restarting the Apache
daemon, Tung notices that the Apache web server fails to start. What command can Tung use to determine whether a syntax error in the Apache configuration file is to blame? a. testparm b. apachectl configtest c. ab d. curl ANSWER:
b
Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies RATIONALE:
The apachectl configtest command prints any syntax errors it finds in the Apache configuration files on the system.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.2 - Configure web services using the Apache web server. ACCREDITING STANDARDS: Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or configuration files. TOPICS: 13.2 Web Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 22. Jinu has installed the DHCP daemon on one of her Linux servers and wishes to configure it to provide IPv4
and IPv6 addressing for systems on the network. What two files must she modify? (Choose two.) a. /etc/dhcp/dhcpd.conf b. /etc/dhcp/ip4.conf c. /etc/dhcp/ip6.conf d. /etc/dhcp/dhcpd6.conf ANSWER: RATIONALE:
a, d
The /etc/dhcp/dhcpd.conf file stores IPv4 configuration, while the /etc/dhcp/dhcpd6.conf file stores IPv6 configuration.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS, and NTP. TOPICS: 13.1 Infrastructure Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 23. The systems on your network obtain IPv4 configuration from a Linux DHCP server. When monitoring
network traffic from your router, which of the following DHCP packets would you expect to see large numbers of if the Linux DHCP server is offline? a. DHCPDISCOVER b. DHCPOFFER c. DHCPREQUEST d. DHCPACK ANSWER: RATIONALE:
a
The first packet in a DHCP negotiation for IPv4 is DHCPDISCOVER. If a DHCP
Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies
server is offline, systems will continue to send these packets on the network, but no subsequent DHCP packets (DHCPOFFER, DHCPREQUEST, or DHCPACK) will be transmitted. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS, and NTP. TOPICS: 13.1 Infrastructure Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 24. What command can you run on a Linux system that uses the NTP daemon (ntpd) to view the available time
sources? a. chronyc -u b. ntpdate -u c. ntpq -p d. chronyc sources -v ANSWER: RATIONALE:
c
On a system that uses ntpd, the ntpq -p command will print the current time sources. On a system that uses chronyd, the chronyc sources -v command will print the current time sources.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS, and NTP. ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time. Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations. TOPICS: 13.1 Infrastructure Services KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 25. What syntax can be used from the File Explorer app on a Windows workstation to access the SMB share
called data on the server called garamas? a. //garamas/data b. \\garamas\data c. garamas:/data d. smb://garamas/data ANSWER:
b
Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies RATIONALE:
Windows clients can use the format \\servername\sharename format to access SMB shares on a Linux server running Samba.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and FTP.
ACCREDITING STANDARDS:
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. 13.3 File Sharing Services Bloom's: Remember 5/2/2023 10:04 PM 5/2/2023 10:04 PM
26. Which of the following lines in the /etc/exports file will share the /data directory to all hosts using NFS
while preventing privileged write access? a. [data] path=/data options=rw,all,noroot b. /data *(rw) --noroot c. /data hosts=all options=rw,root_squash d. /data *(rw,root_squash) ANSWER: RATIONALE:
d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and FTP.
ACCREDITING STANDARDS:
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Lines in the /etc/exports file use the format: directory hosts(options).
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. 13.3 File Sharing Services Bloom's: Apply 5/2/2023 10:04 PM 5/2/2023 10:04 PM
27. Billy would like to mount the remote /data directory on server5 to the /mnt directory on his local system
using NFS. Which command can he use? a. mount -t nfs server5:/data /mnt b. mount -t nfs //server5/data /mnt c. mount -t nfs \\server5\data /mnt d. mount -t nfs data@server5 /mnt Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 13 Configuring Network Services and Cloud Technologies ANSWER: RATIONALE:
a
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and FTP.
ACCREDITING STANDARDS:
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
NFS shares are mounted using the mount command, but use the syntax server:directory instead of a device file.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the appropriate tools. 13.3 File Sharing Services Bloom's: Remember 5/2/2023 10:04 PM 5/2/2023 10:04 PM
28. Which of the following commands can be used to configure a Kubernetes cluster? a. k3s b. podman c. k8s d. kubectl ANSWER: RATIONALE:
d
The kubectl command is used to configure Kubernetes clusters.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.8 - Configure Kubernetes to run containers. ACCREDITING STANDARDS: Eckert.XK0-005.24.3.5 - Summarize container, cloud, and orchestration concepts. TOPICS: 13.6 Working with Cloud Technologies KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM
Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance 1. Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the
following should she do? a. Configure /etc/crypttab to open the volume and then /etc/fstab to mount it. b. Configure /etc/fstab to mount the partition. c. Configure /etc/crypttab to mount the partition. d. Configure /etc/crypttab to open the volume and then /etc/mtab to mount it. ANSWER: RATIONALE:
a
The /etc/crypttab file should be configured to open the encrypted partition and then the /etc/fstab should be configured to mount it.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.3 - Securing data with encryption. Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a Linux environment. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 2. Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules
directory? a. udevadm reload b. udevadm apply c. udevadm --reload d. udevadm control -R ANSWER: RATIONALE:
d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.14.4 - Effectively troubleshoot common hardware, application, filesystem, and network problems.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
The udevadm control -R command will force udev to reload new rules from the /etc/udev/rules directory.
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues. 14.3 Resolving Common System Problems Bloom's: Remember 5/2/2023 10:04 PM 5/2/2023 10:04 PM
Copyright Cengage Learning. Powered by Cognero.
Page 1
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance 3. Which of the following is not a valid AppArmor command? a. aa-enforce b. aa-trust c. aa-unconfined d. aa-complain ANSWER: RATIONALE:
b
There is not an aa-trust command for AppArmor. The aa-enforce command sets an AppArmor profile to enforce mode, the aa-complain command sets an AppArmor profile to complain mode, and the aa-unconfined command displays services and components that do not have an associated AppArmor profile.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 4. Which of the following commands will change the SELinux security context of a file? a. sechange b. secontext c. chcon d. scont ANSWER: RATIONALE:
c
The chcon command can change the SELinux security context of a file.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 5. Which of the following daemons should be installed in order to join a Linux server to Microsoft's Active
Directory? (Choose all that apply.) Copyright Cengage Learning. Powered by Cognero.
Page 2
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance a. realmd b. kerberosd c. sssd d. add ANSWER: RATIONALE:
a, c
The System Security Services Daemon (sssd) on the Linux system provides for LDAP and Kerberos connectivity, while the Realm Daemon (realmd) is used to discover and join an Active Directory domain.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a Linux environment. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 6. Which of the following are examples of devices that provide for multifactor authentication when used in
combination with a username and password? (Choose all that apply.) a. lock screen b. fingerprint reader c. YubiKey token device d. user certificate ANSWER: RATIONALE:
b, c, d
Multifactor authentication uses two or more separate authentication mechanisms to validate a user's identity. Fingerprint readers, token devices, and user certificates are common mechanisms that users can use to provide validation in addition to a username and password, but a lock screen merely prompts for your username and password.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.1 - Describe the different facets of Linux security. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a Linux environment. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM Copyright Cengage Learning. Powered by Cognero.
Page 3
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance DATE MODIFIED:
5/2/2023 10:04 PM
7. Which of the following can you use to configure firewall rules for IPv6 on a Linux system? (Choose all that
apply.) a. ip6tables b. ufw c. firewall-cmd d. nftables ANSWER: RATIONALE:
a, b, c
The ip6tables, ufw, firewall-cmd, and nft commands can configure firewall rules for IPv6.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.3 - Given a scenario, implement and configure firewalls. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 8. Which of the following commands can be used to allow a firewalld exception for SSH traffic during system
initialization? a. firewall-cmd --add-port=22/udp b. firewall-cmd --add-port=53/tcp --permanent c. firewall-cmd --add-port=23/tcp d. firewall-cmd --add-port=22/tcp --permanent ANSWER: RATIONALE:
d
SSH uses TCP port 22. To ensure that the rule is loaded at system initialization, the --permanent option must be supplied to firewall-cmd.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.3 - Given a scenario, implement and configure firewalls. TOPICS: 14.1 Security KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM Copyright Cengage Learning. Powered by Cognero.
Page 4
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance 9. Which of the following commands can be used to view the attack surface of a Linux server by examining the
services that the server is responding to? a. nmap b. tshark c. ss -u d. tripwire ANSWER: RATIONALE:
a
The nmap command scans one or more systems and displays the open ports and associated services running on the system.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.2 - Setup host security. Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a Linux environment. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 10. Which of the following utilities will allow you to view information about virtual memory usage on a Linux
system? (Choose all that apply.) a. free b. sar -W 1 5 c. top d. vmstat ANSWER: RATIONALE:
a, b, c, d
The free, vmstat, and top commands display virtual memory statistics, as will the -W option to the sar command.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.5 - Monitor system performance. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 14.4 Performance Monitoring KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM Copyright Cengage Learning. Powered by Cognero.
Page 5
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance 11. When looking at the password-auth file on a Fedora system, you notice part of the syntax that says
dcredit=3. What is the significance of this part of the configuration? a. The minimum password length has to be at least 3 characters long. b. There must be at least 3 characters that are different from their previous password. c. Users must use at least 3 characters as numbers in their passwords. d. Users cannot re-use their last 3 passwords. ANSWER: RATIONALE:
c
The dcredit=3 signifies that the password must have at least 3 numbers in it.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a Linux environment. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 12. Which of the following commands can you use to list users who have been locked out by pam_faillock.so? a. faillock b. pam_faillock c. pam_tally2 d. locklist ANSWER: RATIONALE:
a
The faillock command will list users who have been locked out by pam_faillock.so.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 13. Which of the following commands will display a friendly summary of recent SELinux violations and the
commands that can be used to allow them? Copyright Cengage Learning. Powered by Cognero.
Page 6
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance a. semanage --list b. restorecon --violations c. chcon --violations d. audit2why < /var/log/audit/audit.log ANSWER: RATIONALE:
d
The audit2why command can be used to interpret the entries in the SELinux audit.log and display summary information and remediation commands.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 14. If the /dev/sdb device on a Linux server experiences poor IOPS performance, which of the following could
you try to improve performance? a. modify the default scheduler listed in /sys/block/sdb/queue/scheduler b. run the echo "- - -" > /sys/class/scsi_host/host0/scan command c. create a udev rule that limits unnecessary writes to /dev/sdb d. recreate the block device file with a higher major number using the mknod command ANSWER: RATIONALE:
a
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.14.4 - Effectively troubleshoot common hardware, application, filesystem, and network problems.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
The Linux kernel offers different storage schedulers for I/O. If performance issues persist for a storage device, you can try using different schedulers to see if it solves the issue. To use a different scheduler, you must first view the available schedulers in the /sys/block/sdb/queue/scheduler file, and then echo the appropriate one to the file.
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues. 14.3 Resolving Common System Problems Bloom's: Remember 5/2/2023 10:04 PM 5/2/2023 10:04 PM
Copyright Cengage Learning. Powered by Cognero.
Page 7
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance 15. When experiencing a network issue, you want to determine where the source of the problem is. Which of the
three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take? (Choose all that apply.) a. mtr b. traceroute c. tracert d. tracepath ANSWER: RATIONALE:
a, b, d
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.14.4 - Effectively troubleshoot common hardware, application, filesystem, and network problems.
ACCREDITING STANDARDS:
TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
The mtr command combines the functionality of the traceroute and ping commands and is also known as My Traceroute. The traceroute command on Linux is fully written out and prints the route packets take to a network host. The tracepath command traces a path to a network host, discovering the MTU along this path.
Eckert.XK0-005.24.4.2 - Given a scenario, analyze and troubleshoot network resource issues. 14.3 Resolving Common System Problems Bloom's: Remember 5/2/2023 10:04 PM 5/2/2023 10:04 PM
16. Which of the following are important to keep in mind when troubleshooting issues on a Linux server?
(Choose all that apply.) a. Prioritize problems. b. Limit the time you spend on each individual problem. c. Try to locate the root cause of issues. d. Solve the easiest problems first. ANSWER: RATIONALE:
a, c
Prioritizing problems will help you solve the most important issues in a timely way, while looking for the root cause of an issue will save you time solving multiple problems that are the result of a common misconfiguration or failure.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.3 - Describe and outline good troubleshooting practices. ACCREDITING STANDARDS: Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file permissions. Copyright Cengage Learning. Powered by Cognero.
Page 8
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
14.2 Troubleshooting Methodology Bloom's: Remember 5/2/2023 10:04 PM 5/2/2023 10:04 PM
17. Which of the following commands allows a standard user to execute a single command as root without
obtaining a root shell? (Choose all that apply.) a. su -c b. sudo c. su d. sudoedit ANSWER: RATIONALE:
a, b
The sudo and su -c commands allow a standard user to execute a single command as root without obtaining a root shell. The sudo command requires the user be granted the rights to execute the command in /etc/sudoers, while the su -c "command" prompts the user for root user credentials.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file permissions. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 18. Which of the following ports should you disable so that their corresponding services no longer respond to
network requests on a Linux system due to a lack of encryption? (Choose all that apply.) a. 21 b. 22 c. 23 d. 80 ANSWER: RATIONALE:
a, c, d
POINTS: QUESTION TYPE:
1 Multiple Response
FTP, running on ports 20 and 21, should be disabled and discarded in favor of SFTP or some other secure method of transferring files. Telnet runs on port 23 and does not use encryption. It is a best practice to disable telnet on most systems. HTTP runs on port 80 and should be disabled in favor of HTTPS on port 443 where possible.
Copyright Cengage Learning. Powered by Cognero.
Page 9
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.2 - Setup host security. Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a Linux environment. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 19. Kevin has tried to run the fsck command on a damaged /data filesystem, but the filesystem was unable to be
repaired. What should his next course of action be? a. Restore a recent backup of the /data filesystem. b. Recreate the /data filesystem using mkfs. c. Run the fsck command on the /data filesystem from system rescue. d. Run the badblocks command on the /data filesystem. ANSWER: RATIONALE:
b
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Choice False Eckert.Linux+6e.24.14.4 - Effectively troubleshoot common hardware, application, filesystem, and network problems.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
If a filesystem cannot be repaired, you should recreate the filesystem with mkfs and then restore a recent backup of the data. It is important that you recreate the filesystem as you should not restore a data backup onto a damaged filesystem.
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues. 14.3 Resolving Common System Problems Bloom's: Remember 5/2/2023 10:04 PM 5/2/2023 10:04 PM
20. Walter's Linux workstation is experiencing slow network performance. He suspects that one of the software
applications running on the workstation is consuming a large amount of network bandwidth. What tool can Walter use to confirm this? a. iperf b. ss c. nmap d. iftop ANSWER: RATIONALE:
d
Because the iftop command lists statistics for each network session to other systems, it can be used to identify a connection to a particular destination
Copyright Cengage Learning. Powered by Cognero.
Page 10
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance
(website, host, IP). This information can then be used to determine which software application is communicating to that destination. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.6 - Identify and fix common performance problems. ACCREDITING STANDARDS: Eckert.XK0-005.24.4.2 - Given a scenario, analyze and troubleshoot network resource issues. TOPICS: 14.3 Resolving Common System Problems KEYWORDS: Bloom's: Evaluate DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 21. Which of the following permissions should a standard user have on the /etc/shadow file? a. read b. read and write c. read, write, and execute d. no permissions ANSWER: RATIONALE:
d
If the user had read permissions on the /etc/shadow file, they could read the encrypted version of all user passwords and then attempt to crack them through brute force, a dictionary attack, or some other method.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.1 - Describe the different facets of Linux security. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.2 - Setup host security. Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 22. Which of the following files does a TCP wrapper check before starting a network daemon? a. /etc/tcp.allow and /etc/tcp.deny b. /etc/hosts.allow and /etc/hosts.deny c. /etc/wrapper.allow and /etc/wrapper.deny d. /etc/daemon.allow and /etc/daemon.deny ANSWER: RATIONALE:
b
The TCP wrapper should check the /etc/hosts.allow and /etc/hosts.deny files
Copyright Cengage Learning. Powered by Cognero.
Page 11
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance
before starting a network daemon. POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.2 - Setup host security. Eckert.XK0-005.24.4.2 - Given a scenario, analyze and troubleshoot network resource issues. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 23. Teresa notices that %usr is consistently higher than %sys in the output of the sar -u command on her system.
What should she do to improve the performance of her system? a. Add additional RAM to the system. b. Use the top command to look for memory leaks. c. Upgrade the CPU to a faster model. d. Nothing. ANSWER: RATIONALE:
d
On a healthy system, %usr should always be higher than %sys. Thus, there is no performance issue on Teresa's system.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.6 - Identify and fix common performance problems. ACCREDITING STANDARDS: Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 14.4 Performance Monitoring KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 24. If someone tries to log into a system using a daemon account, but the daemon account does not have a valid
shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login? a. /etc/deny.login b. /etc/banner.conf c. /etc/nologin.txt d. /etc/warning.txt ANSWER:
c
Copyright Cengage Learning. Powered by Cognero.
Page 12
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance RATIONALE:
You can configure a message to be displayed upon denying login via a daemon account without a shell in the /etc/nologin.txt file.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer. ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks. Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a Linux environment. TOPICS: 14.1 Security KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 25. Which of the following commands would display processor queue statistics from the eleventh day of the
month? a. sar -q -f /var/log/sa/sa11 b. sar -u -f /var/log/sa/11 c. sar -q -f /var/log/sa/11 d. sar -u -f /var/log/sa/sar11 ANSWER: RATIONALE:
c
The sar -q command displays processor queue statistics. The -f option specifies a historical performance file. A Systemd timer unit or cron job is normally configured to take performance statistics each day that are saved in the file /var/log/sa/sa# where # is the day of the month.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.5 - Monitor system performance. ACCREDITING STANDARDS: Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 14.4 Performance Monitoring KEYWORDS: Bloom's: Apply DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 26. Which of the following performance utilities display system load averages? (Choose all that apply.) a. tload b. uptime c. top d. w Copyright Cengage Learning. Powered by Cognero.
Page 13
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance ANSWER: RATIONALE:
a, b, c, d
The tload, uptime, top, and w commands all display system load averages.
POINTS: 1 QUESTION TYPE: Multiple Response HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.5 - Monitor system performance. ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes. Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 14.4 Performance Monitoring KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 27. When should you take baseline performance measurements on a production Linux server? a. immediately following installation b. during periods of regular usage (e.g., business hours) c. at times when the system is less than 50% utilized d. during peak usage times ANSWER: RATIONALE:
c
Baseline performance measurements represent normal system activity and should be taken when the system is experiencing regular usage.
POINTS: 1 QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.5 - Monitor system performance. ACCREDITING STANDARDS: Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing unit (CPU) and memory issues. TOPICS: 14.4 Performance Monitoring KEYWORDS: Bloom's: Remember DATE CREATED: 5/2/2023 10:04 PM DATE MODIFIED: 5/2/2023 10:04 PM 28. Xavier receives an error message stating that he cannot copy files to a filesystem that has plenty of free
space. What are the probable causes of this issue? a. Xavier has exceeded the hard limit of a user or group quota. b. The filesystem is corrupted. c. The inode table on the filesystem has been exhausted. d. Xavier does not have sufficient permissions to the directory he is trying to copy files. ANSWER:
a, c, d
Copyright Cengage Learning. Powered by Cognero.
Page 14
Name:
Class:
Date:
Mod 14 Security, Troubleshooting, and Performance RATIONALE:
Quota limits, insufficient permissions to the target directory, and target filesystem inode exhaustion are common reasons why a file could not be copied (and created) in a folder on a new filesystem. If the target filesystem was corrupted, the file copy would proceed but the copied file may have corrupted contents following the copy operation.
POINTS: QUESTION TYPE: HAS VARIABLES: LEARNING OBJECTIVES:
1 Multiple Response False Eckert.Linux+6e.24.14.4 - Effectively troubleshoot common hardware, application, filesystem, and network problems.
ACCREDITING STANDARDS: TOPICS: KEYWORDS: DATE CREATED: DATE MODIFIED:
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues. 14.3 Resolving Common System Problems Bloom's: Evaluate 5/2/2023 10:04 PM 5/2/2023 10:04 PM
Copyright Cengage Learning. Powered by Cognero.
Page 15