Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Linux+ Certification Bible.pdf
Скачиваний:
46
Добавлен:
15.03.2015
Размер:
3.78 Mб
Скачать

Appendix C Sample Exam 617

80.A Linux administrator wants to send a file to the printer. Which of the following commands can the Linux administrator use?

A.print

B.lpq

C.lpr

D.lprm

Exam Answers

1.A. A package is the proper term used to identify sets of files. For review, see Chapter 2.

2.C. .rpm is the proper extension associated with the Red Hat Package manager. For review, see Chapter 2.

3.B. SMTP stands for Simple Mail Transfer Protocol. This protocol is the most commonly used protocol for an e-mail server. This protocol can be used for Linux e-mail servers and many others, such as UNIX or Microsoft Windows. For review, see Chapter 3.

4.B. To verify that specific hardware is compatible with the operating system, it is best to check the operating system’s HCL (hardware compatibility list). The operating system’s HCL list contains the most up-to-date information about supported hardware. For review, see Chapter 3.

5.C. Some versions of Corel Word Perfect can run on Linux systems and Microsoft Windows systems. Star Office is only specific to Linux. Netscape is a Web browser and Microsoft Office is only compatible for Microsoft Windows systems. For review, see Chapter 3.

6.C. The Microsoft Internet Explorer Web browser is only specific to Microsoft Windows and not compatible with Linux. Netscape, Opera, and Konqueror are available for Linux systems. For review, see Chapter 3.

7.B. Using the -9 argument with the kill command will send a kill signal to the process. This will stop the specific process immediately. For review, see Chapter 13.

8.B. The /etc/logs file contains the boot time messages that a technician can use to examine error messages. For review, see Chapter 13.

9.B. The ps–ef command can be used to show a list of all running processes. The ps–t command will only show processes on the specific terminal on which the command is run. The ps–r command will show only running processes, and the ps–z is not a recognized command. For review, see Chapter 13.

618 Appendixes

10.B. By default, the Inittab file is located in the /etc directory. The Inittab file describes which processes are started at boot up and during normal operations. For review, see Chapter 11.

11.C. The level 5 runlevel is assigned in the Inittab file so that the system will boot X on start-up. Level 3 is for multi-user mode with remote file sharing, processes, and daemons, level 2 is for multi-user mode, without remote file sharing, and level 0 is for halting the system. For review, see Chapter 11.

12.D. The command init 0 brings the Linux server to a halt. For review, see Chapter 11.

13.A. The Shutdown command shuts down a Linux system. Logout will log the current users out of the system, but won’t shut down the system. Unmount is a command used to disconnect devices, and Exit is the same as Logout. For review, see Chapter 13.

14.D. The only correct answer is shutdown –h 900. All the other answers will shut down the system before or after 15 minutes. For review, see Chapter 11.

15.A. halt is the only correct command to halt the system. For review, see Chapter 11.

16.A. /etc/rc.d/init.d/httpd restart is the only correct command out of the list that will restart httpd. For review, see Chapter 11.

17.B. The Printcap file contains information about every printer connected to the Linux system. For review, see Chapter 11

18.D. Lpc is used by the system administrator to control the operations of the line printer system. For each line printer configured in /ect.printcap, lpc may be used to disable or enable a printer, disable or enable a printer’s spooling queue, rearrange the order of jobs in a spooling queue, or find the status of printers and their associated spooling queues and printer daemons. For review, see Chapter 11.

19.A. lpc abort terminates an active spooling daemon on the local host immediately and then disables printing for the specified printers. For review, see Chapter 11.

20.C. The lpc stop command stops a spooling daemon after the current job completes and disables printing. For review, see Chapter 11.

21.A. The lpc command allows you to directly see what jobs are currently in a printer queue. For review, see Chapter 11.

22.C. The lprm command will let you remove print jobs from the printer queue. For review, see Chapter 11.

23.B. vi is a text editor that can be used to edit any ASCII text. It is especially useful for editing programs. For review, see Chapter 11.

24.D. The tar command is used for taking a large number of files and combining them into one single file for archival to tape. For review, see Chapter 11.

Appendix C Sample Exam 619

25.C. If the /etc/inittab file runlevel is set to 0, the system will shut down right after it has booted. This is because the 0 runlevel is used for halting the system. For review, see Chapter 11.

26.B. By default, all configurations for your services, programs, and daemons reside in the /etc directory. For review, see Chapter 15.

27.C. An Incremental backup will backup only files that have changed since the previous backup and clear the archive bit. For review, see Chapter 15.

28.C. The Son/Father rotation method is the only answer that is not a true recognized backup rotation method. Son, Grandfather/Father/Son and Father/Son are all true recognized backup rotation methods. For review, see Chapter 15.

29.B. The –c option of the tar command will tell tar to create a new archive file. The –p option will tell tar to keep permissions on files when extracted from an archive. The –f option will let you specify a filename for the archive, and the

–x option tells tar to extract files from an archive. For review, see Chapter 15.

30.D. The –x option tells tar to extract files from an archive. The –c option tells tar to create a new archive file. The –p option tells tar to keep permissions of files when extracted from an archive. The –f option well let you specify a filename for the archive. For review, see Chapter 15.

31.B. Most modern Linux installations will default to a GUI installation after you press enter from the main installation screen. If you would like a text-based installation all you need to do is type Text, then hit enter and the installation will continue in a text-based install. For review, see Chapter 4.

32.C. A text-based installation would be necessary if you did not have the proper video requirements to perform a GUI installation. For review, see Chapter 4.

33.A. Fdisk is the most common partitioning program that is available in most modern Linux Distributions. For review, see Chapter 4.

34.B. The boot loader is used to boot the operating system into the intended operating system. For review, see Chapter 4.

35.C. Before any upgrading or installation of another operating system, it is imperative to back up the current system before installing the second operating system. This way, your data is backed up in case of major problems with the new OS installation of your data. For review, see Chapter 4.

36.B. The most common term used for the root user is a super user. The super user has more powerful rights on the network then any normal user. For review, see Chapter 4.

37.D. The root user is the first account that is created by default during most modern Linux installations. After the root user has been set up, the administrator can then create regular users. For review, see Chapter 4.

620 Appendixes

38.A. XFree86 is the underlying software that is located between the hardware and graphical user interface. For review, see Chapter 4.

39.B. Only a custom installation can be used to customize what is installed during an installation. A custom installation will allow you to choose what packages you want to install and what packages you don’t want to install. For review, see Chapter 4.

40.A. The proper place for the technician to install LILO is in the first sector of the boot partition. For review, see Chapter 4.

41.C. The swapon command during a text-based installation can be used to activate a created swap partition. For review, see Chapter 5.

42.B, D. Placing your new server in an unlocked room or beside the technician’s desk is not a good place because these environments are not secure and the server can be tampered with when the technician is not present. Always place your server in a room with a locked door that has proper ventilation. For review, see Chapter 5.

43.C. The Root password or the super user password is the administrator’s password. The administrator account has all the privileges necessary to control the network properly, unlike the limited regular user accounts. For review, see Chapter 14.

44.A. The password file for Linux is located by default in the /etc/passwd location. For review, see Chapter 14.

45.B. Telnet is the only program in the list that can be used to remotely log into a Linux server. Netstat, Ping, and ifconfig do not have remote capabilities. For review, see Chapter 14.

46.C. The ftpusrs file contains a list of usernames that a Linux administrator has previously set to not allow specific users to login to the FTP server. For review, see Chapter 14.

47.A. Unlike the at command, the Cron command can be used to set scheduled recurring tasks. For review, see Chapter 12.

48.D. The /var/spool/cron is the directory where user’s crontabs are saved with a directory for each user in which all user’s cron jobs are stored. For review, see Chapter 12.

49.B. The gdb program is the only program in the list that can be used to analyze your program’s core dump files and also debug the application while it is actually running. For review, see Chapter 12.

50.A. The at –m command option will send mail to the users when the job has completed even if there was no output. at- v shows completed but not yet deleted jobs in the queue, at –f reads the job from the file rather than standard input and at –c displays the jobs listed on the command line to standard output. For review, see Chapter 12.

51.D. The default location of the configuration file for the X Window System is /etc/X11/XF86Config. For review, see Chapter 6.

Appendix C Sample Exam 621

52.C. The TCP/IP protocol suite is used extensively in the Linux environment, and most other operating systems, because it is the protocol used on the Internet. For review, see Chapter 7.

53.B. ifconfig is the proper command to examine network information on a Linux server or workstation. Ifconfig is used to configure the kernelresident network interfaces. It is used at boot-time to set up interfaces as necessary. For review, see Chapter 12.

54.A. A DHCP server runs the Dynamic Host Configuration Protocol, which assigns the network IP address to clients on the network at start-up. With this configuration, each client workstation does not need to be set up with a static IP address. When the client computer starts, it sends a request to the DHCP server, which assigns the client and IP address. For review, see Chapter 7.

55.D. The command useradd followed by the username will create a new user or update default new user information. After the new user has been added, Linux will prompt you to specify a password for the new user. For review, see Chapter 9.

56.B. To activate the swap partition, use the command mkswap /dev/ <partition>. For review, see chapter 8.

57.A. The –c option when used with the mkfs command will check the device for bad blocks before building the file system. For review, see Chapter 8.

58.D. The mkfs command is used to create the file system. linuxconf is used to configure the Linux system, and format is not a standard Linux command. cfdisk and fdisk are used to create partitions. For review, see Chapter 8.

59.B. The technician should use the env command to verify the current active shell. The other commands listed won’t perform this function. For review, see Chapter 8.

60.C. The locate command will search and quickly find the location of a file. The cat command will concatenate files and print on the standard output. The tar command is an archiving utility and the mkdir command is used to make directories. For review, see Chapter 16.

61.A. The first thing that a technician should do at the first sign of a problem is to examine the symptoms. The technician should take the time to get all the facts by asking the following questions: Is this happening to one user? Is it happening to everyone? Does the problem only happen on one particular system? Does it happen in an application, or is this a system process problem? By gathering as many facts as you can, this will help get you started in the right direction. For review, see Chapter 16.

62.D. Manual Pages, or MAN pages, is the original Unix way to look up information on specific commands and processes on your system by consulting an online manual. By using a command’s manual page, you can determine exactly what that command does, how to execute it, and all of the options that you can use with that command. For review, see Chapter 16.

622 Appendixes

63.B. Most system processes and applications keep a running log file. When examining a Linux problem, it is a good idea to check these log files first to try to define the actual problem. For review, see Chapter 16.

64.A. The > option is used to send the output of a file to another file. The “>” option will send the output to a file of your choice: cat /var/log/messages | grep error > error.log for example. For review, see Chapter 16.

65.A. The Linux Loader, or LILO, is responsible for loading the Linux kernel and system into memory. LILO can also boot the computer into different operating systems if they are running on separate partitions from the Linux system, such as in the case of a dual boot system. For review, see Chapter 17.

66.B. If only LI is present on the screen and the system does not continue to boot usually means that it cannot run the second stage of the boot loader. This happens because it cannot find the kernel image specified in the LILO configuration file, /etc/lilo.conf. For review, see Chapter 17.

67.D. The fsck utility checks your filesystem for errors and inconsistencies, and can repair them while they are running. Your filesystems can become damaged for any number of reasons. The number one reason is improper shutdown of the Linux system. For review, see Chapter 17.

68.C. The –t option used with fsck is used to specify the type of filesystem to be checked. Option –r is used to interactively repair the filesystem, -C is the option used to display completion/progress bars for those filesystem checkers, and –T is used to depress the title on startup. For review, see Chapter 17.

69.A. Use the top command to check current resource usage. This utility lets you see all on one screen how much memory and CPU usage that you are currently using, and also the resource usage by each program and process. For review, see Chapter 17.

70.D. setserial is a utility that you can use to obtain information about your serial port resource usage, such as IRQ and IO addresses. An IRQ (Interrupt Request) is used by a device to send a signal to the CPU that the device has a request that needs processing. For review, see Chapter 17.

71.A. The adduser command is used to add a new user to the network. For example: adduser <username>. To use the adduser command the Linux administrator must be logged in as root. For review, see Chapter 9.

72.B. The –U option used in conjunction with the usermod command is used to unlock a user’s password. The –U option is the opposite of the –L option, which is used to lock a user’s password. For review, see Chapter 9.

73.D. The userdel command is used to delete a user from the system. The administrator must be logged in as root to use this command. For review, see Chapter 9.

74.B. The cd command stands for Change Directory. To navigate the Linux hierarchical file system structure, use the cd command to change from one directory to another. For review, see Chapter 9.

Appendix C Sample Exam 623

75.C. To move a file from one directory to another in Linux use the cp command. To move a file to another directory, use the mv command. For review, see Chapter 9.

76.C. The mount command is a powerful tool used to mount directories and devices on a Linux system. For review, see Chapter 9.

77.A. The netstat command is used to monitor connections to a Linux system. Netstat is a perfect way to see and monitor connections (both inbound and outbound). This program can also be used to view packet statistics so you can see how many packets have been sent and received. For review, see Chapter 10.

78.C. The logout command will exit you from a login shell. After you have logged out, the system will automatically prompt you for a login username followed by the password for that account. For review, see Chapter 10.

79.A. The ping command is the most basic TCP/IP utility. To ping a server with an ip address of 192.123.12.2, the syntax would be: ping 192.123.12.2. The most common reason for using the ping utility is to find out if you can reach a host or to find out if a host is responding. For review, see Chapter 18.

80.C. The lpr command is used to send a file to a printer. lpq and lprm are commands used for examining and manipulating the print queue. For review, see Chapter 18.

Соседние файлы в предмете Операционные системы