Computer System Admin_Test 3 Flashcards

  1. For the IP address 202.33.120.142/16, what is the network that this machine belongs in?
    202.33.0.0/16
  2. What is the host ID (client id) of the machine with the IP address of 202.33.120.142/16?
    0.0.120.142
  3. What is the broadcast address for the network that contains IP address 15.12.8.5/8?
    15.255.255.255
  4. How many usable hosts can the network that contains IP address 15.12.8.5/8 have? (I don’t need the exact number, just the formula to get to the exact number)
    2^24 - 2
  5. If a class C is defined as something that could have a subnet of /24 and where the first octet is in the range 192-223, how many class C networks can be created? (I don’t need the exact number, just the formula to get to the exact number)
    32 x 256 x 256
  6. The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up?




    A) ifup eth0
  7. Which of the following can be used to graphically remotely administer a Linux machine?




    C) VNC
  8. What is the complete path and filename of the file where ports and their associated protocols are defined? ___________
    /etc/services
  9. Which of the following files does the hostnamectl command modify to set the hostname on a machine?




    A) /etc/hostname
  10. Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address?




    C) Files
  11. What is the most commonly used LAN protocol?




    A) TCP/IP
  12. Which of the following is a valid APIPA address?




    A) 169.254.38.101
  13. The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of?




    D) 48
  14. Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed?




    C) /27
  15. You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible?




    C) /etc/nsswitch.conf
  16. To decompress files that have been compressed with the compress utility, you can use the _____ command followed by the names of the files to be decompressed.
    uncompress
  17. The GNU zip utility uses which of the following filename extension by default?




    A) .gz
  18. The _____ utility uses the Burrows-Wheeler Block Sorting Huffman Coding algorithm when compressing files.
    bzip2
  19. Backup copies of files and directories on a system are called _____.
    archives
  20. True or False: The cpio utility uses relative pathnames by default when archiving.

    A) True
    B) False
    • B) False
    • It uses absolute pathnames not relative pathnames
  21. What command should be issued after ./configure when installing an application from source files?




    A) make
  22. Which compiler is typically used to compile Linux source files written in the C programming language?




    B) c++
  23. Which command should be used to remove an RPM package from a Linux system?




    B) rpm -e
  24. Which of the following describes related RPM packages that are often installed together to provide a key function?




    B) package group
  25. Which of the following options can be used with the dpkg command to display the files that comprise a specified package?




    A) -L
  26. Most source code is typically available on the Internet in tarball format or as a git repository. True or False?

    A) True
    B) False
    A) True
  27. Which dump level indicates a full backup?




    B) 0
  28. Which filename extension indicates a tarball?




    B) .tar.xz
  29. Files that have been compressed using the xz utility typically have the ______ extension.




    A) .xz
  30. The bzip2 and gzip utilities use similar compression algorithms. True or False?

    A) True
    B) False
    B) False
  31. When compiling source code into a binary program, which command does the compiling using the GNU C Compiler?




    B) make
  32. The -9 option to the gzip utility results in a higher compression ratio. True or False?

    A) True
    B) False
    A) True
  33. You have created a full backup and four incremental backups. In which order must you restore these backups?




    C) 0, 1, 2, 3, 4
  34. Which of the following commands extracts an archive?




    A) cpio –vicdu –I /dev/fd0
  35. The Debian Package Manager (DPM) is the default package manager used by Fedora 28. True or False?

    A) True
    B) False
    B) False
  36. Which of the following commands can be used to list the files contained within an installed RPM package?




    A) rpm –ql packagename
  37. Which of the following commands can be used to remove the test DPM package, including any test configuration files?




    C) apt purge test
  38. To install a new program from RPM software repositories on the Internet, you can use the dnf update programname command. True or False?

    A) True
    B) False
    B) False
  39. Which command can be used to create an image backup of a partition?




    C) dd
  40. Which of the following commands should be run following the installation of a shared library to update the /etc/ld.so.conf and /etc/ld.so.cache files?




    C) ldconfig
  41. Which option to the dpkg command can be used to list the files that comprise a package?




    B) -L
  42. Which option to the rpm command can be used to remove a package from the system?




    D) e
  43. Which of the following commands creates an archive?




    D) tar –zcvf /dev/st0 *
  44. When compiling source code into a binary program, which command performs a system check and creates the Makefile?




    B) ./configure
  45. Which of the following commands can be used to search for packages that contain the word oobla on RPM software repositories?




    A) yum search oobla
  46. Which of the following terms best describes a set of rules of communication used between computers on a network?




    C) protocol
  47. Which of the following IP address classes can be used to subnet a network? (Choose all that apply.)

    a. A
    b. B
    c. C
    d. D
    A, B, and C
  48. What command is used to test for basic connectivity between hosts?




    C) ping
  49. Which file is used to configure the name resolution order on a Linux server?




    D) nsswitch.conf
  50. To obtain registration information about any domain within the Domain Name Space, which of the following commands would be used?




    A) whois
  51. Which of the following must be used to send a packet to a destination on a different network?




    C) default gateway
  52. A common utility used to troubleshoot routing is known as which of the following?




    A) traceroute
  53. What TCP port number is used for Telnet communications?




    D) 23
  54. Which of the following can be found in ~/.ssh/known_hosts?




    D) encryption fingerprint
  55. The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False?

    A) True
    B) False
    B) False
  56. Which Windows program is often used to connect to a Linux server via SSH?




    D) Putty
  57. Standalone daemons are started on demand using xinetd. True or False?

    A) True
    B) False
    B) False
  58. Which file stores the IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the network interface?




    D) /etc/resolv.conf
  59. To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.)

    a. nslookup hostname
    b. dig hostname
    c. host hostname
    d. resolve hostname
    • nslookup hostname
    • and dig hostname
    • and host hostname
  60. Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)

    a. route
    b. ipconfig
    c. ip
    d. traceroute
    route and ip
  61. Which file holds the methods to be used and the order in which they will be applied for host name resolution?




    D) /etc/nsswitch.conf
  62. What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.)

    a. DHCP
    b. DNS
    c. /etc/hosts
    d. /etc/resolve.conf
    DNS and /etc/hosts
  63. SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

    A) True
    B) False
    A) True
  64. You want to generate SSH keys for your user account and copy them to a remote computer to simplify future SSH authentication. What two commands can you use to perform these actions? (Choose two answers.)

    a. ssh-keygen
    b. ssh-add
    c. ssh-copy-id
    d. ssh-agent
    ssh-keygen and ssh-copy-id
  65. Which of the following can be used to provide graphical remote administration? (Choose all that apply.)

    a. telnet
    b. ssh -X
    c. ssh
    d. VNC
    ssh -X and VNC
  66. The daemons associated with network services listen for network traffic associated with a particular _____.




    B) port
  67. The IP address of 127.0.0.1 is also referred to as the _____.




    C) loopback address
  68. The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?

    A) True
    B) False
    A) True
  69. Which commands can be used to display TCP/IP connections on your Linux system? (Choose all that apply.)

    a. netstat -t
    b. mtr
    c. traceroute show
    d. ss -t
    mtr
  70. Which of the following port numbers is associated with SSH?




    B) 22
  71. Which file would you modify to permanently change the IP address of a network interface on a Fedora 28 system?




    C) /etc/sysconfig/network-scripts/ifcfg-enp8s0
  72. Before a computer can use a router, what configuration information must it be provided?




    A) default gateway
  73. Which of the following are stand-alone daemons? (Choose all that apply.)

    a. Apache (httpd)
    b. Washington University FTP (in.ftpd)
    c. telnet (in.telnetd)
    d. DNS (named)
    Apache (httpd) and DNS (named)
  74. Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)

    a. ifconfig
    b. iwconfig
    c. ping
    d. nmcli
    • ifconfig and
    • iwconfig and
    • ping and
    • nmcli
  75. Which service provides IP configuration for computers on a network?




    D) DHCP
  76. The packet sent by a DHCP server that contains a potential IP configuration is known as which of the following?




    A) DHCPOFFER
  77. Which service resolves IP addresses to FQDNs?




    D) DNS
  78. Which command can be used to test name resolution?




    A) dig
  79. True or False: By default, the NTP daemon is not configured as an NTP server.

    A) True
    B) False
    A) True
  80. Which FTP command allows you to download a file using wildcard metacharacters?




    C) mget
  81. On what port number will the Apache daemon listen for HTTP requests?




    B) 80
  82. What port number is used for the e-mail service?




    D) 25
  83. Which file stores the Apache configuration in Fedora 28?




    D) /etc/httpd/conf/httpd.conf
  84. Which DNS resource record is an alias to other records?




    A) CNAME
  85. Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?




    C) testparm
  86. You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do?




    B) Run the newaliases command.
  87. Which command within the command-line FTP utility can be used to change the current directory on the local computer?




    A) lcd
  88. Which of the following must you perform to share a directory using NFS? (Choose all that apply.)

    a. Edit the /etc/exports file.
    b. Mount the directory to the /etc/exports directory using the mount command.
    c. Run the exportfs –a command.
    d. Start or restart the NFS daemons.
    • Edit the /etc/exports file.
    • and
    • Run the exportfs –a command.
    • and
    • Start or restart the NFS daemons.
  89. DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?

    A) True
    B) False
    A) True
  90. Which command can be used to connect to a remote Windows share called data on the server called fileserver?




    D) smbclient //fileserver/data
  91. The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?

    A) True
    B) False
    A) True
  92. Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?

    A) True
    B) False
    B) False
  93. What must you do to transform your computer into a DNS server? (Choose all that apply.)

    a. Create zone files.
    b. Create resource records for DNS lookups.
    c. Create NIS maps.
    d. Run the name daemon (named).
    • Create zone files.
    • and
    • Create NIS maps.
    • and
    • Run the name daemon (named).
  94. What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 18 FTP server?




    B) /srv/ftp
  95. Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?

    A) True
    B) False
    A) True
  96. Which command can you use to synchronize ntpd with an NTP time source?




    B) ntpq
  97. Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?




    C) Restart the DHCP daemon.
  98. Which command is used to switch the current user account to another account?




    B) su
  99. Which command lists the services currently running on the system?




    A) nmap
  100. Which of the following is a program that can start a network daemon and provide extra security by allowing you to restrict network services from being accessed by certain hosts?




    C) TCP wrapper
  101. Which component of the Linux kernel can be used to configure a firewall on your Linux computer?




    A) netfilter
  102. Which term refers to a series of kernel patches and utilities created by the National Security Agency (NSA) that enforce security on your system using policies that prevent applications from being used to access resources and system components in insecure ways?




    C) Security Enhanced Linux (SELinux)
  103. What should be the last step of any troubleshooting procedure?




    D) Document the solution
  104. By comparing the output of the dmesg, lshw, lsusb, and lspcicommand to the output of the ________ command, you can determine whether a driver module is missing for a hardware device in your system.




    C) lsdm
  105. Which command is used to increase the number of processes that users can start in a shell?




    A) ulimit
  106. Which term refers to the issue where a network is properly configured, but the time it takes for network services to respond to requests is very high, or users receive occasional timeout errors when attempting to connect to a network service?




    A) latency
  107. Which command is used to monitor CPU performance?




    C) free
  108. Which option to the sar command shows processor queue statistics?




    D) -q
  109. What is the most widely used performance monitoring tool on Linux?




    A) sar
  110. What utility can be used to indicate whether more physical memory is required by measuring swap performance?




    D) vmstat
  111. On which part of the maintenance cycle do Linux administrators spend the most time?




    D) monitoring
  112. Which of the following files is likely to be found in the /var/log/sa directory on a Fedora system over time?




    B) sa19
  113. Network latency issues are often caused by SELinux or AppArmor restrictions. True or False?

    A) True
    B) False
    B) False
  114. Which of the following commands can be used to display memory statistics? (Choose all that apply.)

    a) free
    b) sar
    c) vmstat
    d) iostat
    • free and
    • sar and
    • vmstat
  115. Which option can be added to the ls or ps command to view the SELinux label?




    D) -Z
  116. To set udev rules on a Linux system, you must add the appropriate line to a file within the /etc/udev/rules.d directory. True or False?

    A) True
    B) False
    A) True
  117. What type of iptables chain targets traffic that is destined for the local computer?




    D) INPUT
  118. Which of the following steps is not a common troubleshooting procedure?




    C) Delegate responsibility.
  119. Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?




    B) firewall-cmd --add-service ssh –permanent
  120. Which file contains information regarding the users, computers, and commands used by the sudo command?




    A) /etc/sudoers
  121. Which command can increase the number of filehandles that programs can open in a shell?




    D) ulimit
  122. The pam_tally2.so PAM can be used to enforce complex passwords on a Linux system. True or False?

    A) True
    B) False
    B) False
  123. Which of the following actions should you first take to secure your Linux computer against network attacks?




    B) Ensure that only necessary services are running.
  124. What will the command sar –W 3 50 do?




    D) Take 50 swap statistics every 3 seconds.
  125. Which of the following commands can be used to scan the available ports on computers within your organization?




    C) nmap
  126. Which of the following UFW commands can be used to view configured firewall rules?




    B) ufw status
  127. Which of the following technologies can encrypt files stored on a filesystem within a Linux system? (Choose all that apply.)

    a) SSL/TLS
    b) LUKS
    c) GPG
    d) L2TP
    LUKS and GPG
  128. When the fsck command cannot repair a non-root ( / ) filesystem, you should immediately restore all data from backup. True or False?

    A) True
    B) False
    B) False
  129. When performing a sar –u command, you notice that %idle is consistently 10%. Is this good or bad?




    D) Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required
  130. What are best practices for securing a local Linux server? (Choose all that apply.)

    a. Lock the server in a server closet.
    b. Ensure that you are logged in as the root user to the server at all times.
    c. Ensure that SELinux or AppArmor is used to protect key services.
    d. Use encryption for files and network traffic.
    • Lock the server in a server closet.
    • and
    • Ensure that SELinux or AppArmor is used to protect key services.
    • and
    • Use encryption for files and network traffic.
Author
dior
ID
360126
Card Set
Computer System Admin_Test 3 Flashcards
Description
Test 3 flashcards includes material after test 2 to the end of the semester(chapters 11, 12, 13,14). including end of chapter review questions, quiz questions from the book, quiz questions taken during class (quiz #6, #7).
Updated