Computer Science > QUESTIONS & ANSWERS > Quiz_ ITN 170 Linux Admin Summer 2020 Final Study Guide (All)

Quiz_ ITN 170 Linux Admin Summer 2020 Final Study Guide

Document Content and Description Below

1/15 ITN 170 Linux Admin Summer 2020 Final Study Guide Started: Aug 9 at 4:23pm Quiz Instructions Twenty of these questions will be on the final exam. Since the final exam is timed (you will have ... an hour and a half to complete it) you are strongly urged to determine your answers beforehand. Question 1 0 pts directory process service user A(n) ____ is associated with every running program. Question 2 0 pts HTTP FTP UDP TCP/IP The suite of protocols used in Linux for networking is ____. Question 3 0 pts 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 2/15 /dir /lsh /bin /dev Which directory typically contains all Linux command shells? Question 4 0 pts Processes and memory Processes and files Files and applications Users and tasks Which two major resources does the Linux kernel manage? Question 5 0 pts Direct Demand Distinct Deamon Which type of paging makes it possible to load only needed sections of a program into RAM? 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 3/15 Question 6 0 pts underscore (_) period(.) slash (/) h Hidden files have names that always start with a(n) ____. Question 7 0 pts directory inode hard link symbolic link The benefit of creating a(n) ____ is that you can link files that are on separate partitions or even different computers. Question 8 0 pts directory inode hard link A(n) ____ is a data structure that stores all information (such as file permissions, ownership, and file type) about a file except the actual data and filename. 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 4/15 symbolic link Question 9 0 pts /etc/group /bin/group /etc/bin/group /bin/etc/group In Linux, the group database configuration file is ____. Question 10 0 pts zero one 100 1000 The root UID is ____. Question 11 0 pts gunzip unzip To uncompress a file compressed with the gzip utility, you use the ____ command. bunzip gunzip2 Question 12 0 pts What IP address is the local host for every computer? Question 13 0 pts ifconfig niconfig ping config What command is used to configure NICs? Question 14 0 pts cat /etc/group | grep 100 Which command allows you to find out which group has a GID of 100? 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 6/15 tar /etc/group | grep 100 id gid=100(users) id uid=100(users) Question 15 0 pts 221 664 110 441 What is the corresponding numeric notation for a file with rw-rw-r-- permissions? Question 16 0 pts env scode echo $? dis code sh # Which command will display the exit status code on the screen? Question 17 0 pts File systems can be mounted with the ____ command. 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 7/15 mount fsck fdisk mkfs Question 18 0 pts mount fsck fdisk mkfs Which command-line tool can create and modify the partition table provided by Linux? Question 19 0 pts mount fsck dumpe2fs file You can use the ____ command to find file system information. Question 20 0 pts 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 8/15 p 15 words Which command is used to display a list of all environment variables and their stored values? If you wanted to add or modify an environment variable, how would you do this for 1) yourself, 2) for everyone using the system. The most used commands to displays the environment variables and their stored values are env. </> Question 21 0 pts Given the following rpcinfo -p command sample output, describe the purpose of each column. program vers proto port service 100000 4 tcp 111 portmapper 100005 1 udp 41254 mountd 100021 1 udp 4650 nlockmgr 100003 2 tcp 2049 nfs 100227 3 tcp 204 nfs_acl 100024 1 tcp 47205 status I didn't understand this quesঞon. 12pt Paragraph 12pt Paragraph 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 9/15 p 5 words </> Question 22 0 pts p 76 words Explain how the traceroute command works. What other command(s) could be used to obtain the same information. Append a copy of this operation to your answer. The traceroute command maps the journey that a packet of informaঞon undertakes from its source to its desঞnaঞon. One use for traceroute is to locate when data loss occurs throughout a network, which could signify a node that's down. Because each hop in the record reflects a new server or router between the originaঞng PC and the intended target, reviewing the results of a traceroute scan idenঞfies slow points that may adversely affect your network traffic. </> Question 23 0 pts What is the purpose of the sudo command and how is it used? Include in your submitted sudoers file the instructions to let a junior administrator named "george" add and delete users. The sudo command allows you to run programs with the security privileges of 10pt Preformatted 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 10/15 pre 92 words another user (by default, as the superuser). It prompts you for your personal password and confirms your request to execute a command by checking a file, called sudoers, which the system administrator configures. The Sudo command can be used to run a command as any other user. For example, if you are logged in as user "john" and you want to run the command as "terry," then you'd run the Sudo command in the following way: sudo -u terry </> Question 24 0 pts p 44 words Set up a cron job to run on the 5th, 10th, 15th, 20th, and 25th of each month at 3:00 am. Your cron job should create a tarball of the contents of your home directory. Show your crontab file and your crontab script. a cron is a process or task that runs periodically on a Unix system. Some examples of crons include syncing the ঞme and date via the Internet every ten minutes, sending an e-mail noঞce once a week, or backing up certain directories every month. </> Question 25 1 pts 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 11/15 ul li p 161 words You have decided to use public/private keys to authenticate admins John, Paul, George, and Ringo to your system, and regular passwords for all other users. Describe how you would do this. Include in your answer a copy of one of your private keys. Note: you are to do this on your local machine, e.g. in virtualbox, and not in AWS. Password authenঞcaঞon is the default method most SSH (Secure Shell) clients use to authenঞcate with remote servers, but it suffers from potenঞal security vulnerabiliঞes, like brute-force login a‚empts. An alternaঞve to password authenঞcaঞon is public key authenࢼcaࢼon, in which you generate and store on your computer a pair of cryptographic keys and then configure your server to recognize and accept your keys. Using key-based authenঞcaঞon offers a range of benefits: Key-based login is not a major target for brute-force hacking a‚acks. If a server that uses SSH keys is compromised by a hacker, no authorizaঞon credenঞals are at risk of being exposed. Because a password isn’t required at login, you are able to able to log in to servers from within scripts or automaঞon tools that you need to run una‚ended. For example, you can set up periodic updates for your servers with a configuraঞon management tool like Ansible, and you can run those updates without having to be physically present. </> Question 26 0 pts 12pt Paragraph 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 12/15 p span 83 words What is the logrotate utility and how is it used? Describe how you could use tail to monitor logs in real time. The logrotate uঞlity is designed to simplify the administraঞon of log files on a system that generates a lot of log files. Logrotate allows for the automaঞc rotaঞon compression, removal, and mailing of log files. It is used to regularly cycle (or rotate) log files by removing the oldest ones from your system and creaঞng new log files. It may be used to rotate based on the age of the file or the file’s size, and usually runs automaঞcally through the cron uঞlity. </> Question 27 0 pts Describe how you would divide a hard disk into four partitions, one primary, one swap, and the remaining two into extended. Format the partitions for ext4 and swap as appropriate. $ sudo -l User <user> may run the following commands on <host>: (ALL : ALL) ALL #mkswap /dev/sdc1 $ lsblk -f 10pt Preformatted 12pt Paragraph 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 13/15 pre 39 words NAME FSTYPE LABEL UUID MOUNTPOINT sda ├─sda1 sdb </> Question 28 0 pts What is a repository in Linux? Describe how you would set up one for an installation of the browser "Opera" on your system. 1. For Linux, a repository is a collecon of soware for a parcular distribuon that is hosted on a remote server The Standard Repository is one that is already that is hosted on a remote server. The Standard Repository is one that is already configured on your machine. All soware found on the Standard Repository can be installed out of the box. 1 . Open your terminal and import the Opera repository’s GPG key using the following $wget -qO- hps://deb.opera.com/archive.key | sudo apt-key add 2. Next, add the Opera APT repository to your system’s soware repository list: echo deb hps://deb.opera.com/opera-stable/ stable non-free | sudo tee /etc/apt/sources.list.d/opera.list 3. Once the repository is enabled, update the packages list and install the operastable package: $sudo apt update $sudo apt install opera-stable That’s it. Opera has been installed on your Ubuntu desktop 12pt Paragraph 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 14/15 p 147 words </> Question 29 0 pts p 23 words A user has asked you to configure her monitor so that she can view and interact with four running processes simultaneously. How would you go about doing this? We can use Debian package but for a newer version Ubuntu we need to make sure the Xorg enabled otherwise it won't work. </> 12pt Paragraph Question 30 0 pts 8/9/2020 Quiz: ITN 170 Linux Admin Summer 2020 Final Study Guide 15/15 Quiz saved at 5:12pm p 11 words You have a gut feeling that your system has been compromised. Discuss the approach or method you would take to detect and remove the threat. This is a zero day attack, so there is no "commercial" solution. You are on your own. I will factory reset my computer and reinstall all the progarms. </> Submit Quiz 12pt Paragraph [Show More]

Last updated: 2 years ago

Preview 1 out of 15 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$8.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

147
0

Document information


Connected school, study & course


About the document


Uploaded On

Apr 09, 2021

Number of pages

15

Written in

Seller


seller-icon
QuizMaster

Member since 5 years

1186 Documents Sold

Reviews Received
185
56
29
11
17
Additional information

This document has been written for:

Uploaded

Apr 09, 2021

Downloads

 0

Views

 147

Document Keyword Tags


$8.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·