Documente Academic
Documente Profesional
Documente Cultură
Nama : Steven
Kelas : MW-A Sore
Chapter 2
1. Which term describes the interpreter that executes commands typed as
strings?
a. Terminal
b. Console
c. Command
d. Shell
2. Which term describes the visual cue that indicates an interactive shell is
waiting for the user to type a command?
a. Option
b. Argument
c. Command
d. Prompt
3. Which term describes the name of a program to run?
a. Argument
b. Command
c. Option
d. Prompt
4. Which term describes the part of the command line that adjusts the
behavior of a command?
a. Prompt
b. Option
c. Argument
d. Command
5. Which term describes the part of the command line that specifies the target
that the command should operate on?
a. Argument
b. Prompt
c. Command
d. Option
6. Which term describes the hardware display and keyboard used to interact
with a system?
a. Physical Console
b. Virtual Console
c. Shell
d. Terminal
7. Which term describes one of multiple logical consoles that can each
support an independent login session?
a. Physical Console
b. Shell
c. Terminal
d. Virtual Console
8. Which term describes an interface that provides a display for output and a
keyboard for input to a shell session?
a. Terminal
b. Shell
c. Virtual Console
d. Console
Chapter 3
1. Which directory contains persistent, system-specific configuration data?
a. /run
b. /root
c. /etc
d. /usr
2. Which directory is the top of the system's file system hierarchy?
a. /
b. /etc
c. /root
d. /home/root
3. Which directory contains user home directories?
a. /
b. /user
c. /root
d. /home
4. Which directory contains temporary files?
a. /tmp
b. /run
c. /trash
d. /var
5. Which directory contains dynamic data, such as for databases and
websites?
a. /etc
b. /var
c. /usr
d. /run
6. Which directory is the administrative superuser's home directory?
a. /root
b. /home/root
c. /
d. /etc
7. Which directory contains regular commands and utilities?
a. /usr/sbin
a. /commands
b. /usr/bin
c. /run
8. Which directory contains non-persistent process runtime data?
a. /etc
b. /tmp
c. /var
d. /run
9. Which directory contains installed software programs and libraries?
a. /etc
b. /var
c. /usr
d. /lib
Chapter 5
1. Which answer displays output to a terminal and ignores all errors?
a. &>file
b. 1>/dev/null
c. 2>/dev/null
d. 2> &>file
2. Which answer sends output to a file and sends errors to a different file?
a. >file 2>file2
b. >file 1>file2
c. >file &2>file2
d. | tee file
6. Which answer sends output to both the screen and a file at the same time?
a. >file 2>file2
b. | < file
c. &>/dev/null
d. | tee file
Chapter 6
1. Which item represents a number that identifies the user at the most
fundamental level?
a. UID.
b. primary user
c. username
d. GID
2. Which item represents the program that provides the user's command-line
prompt?
a. primary shell
b. command name
c. home directory
d. login shell
3. Which item or file represents the location of the local group information?
a. /etc/group
b. /etc/passwd
c. home directory
d. /etc/GID
4. Which item or file represents the location of the user's personal files?
a. /etc/group
b. /etc/passwd
c. home directory
d. login shell
5. Which item represents a number that identifies the group at the most
fundamental level?
a. primary group
b. groupid
c. UID
d. GID
6. Which item or file represents the location of the local user account
information?
a. /etc/group
b. home directory
c. /etc/UID
d. /etc/passwd
Chapter 8
1. Which state represents a process that has been stopped or suspended?
a. T
b. R
c. Z
d. D
e. S
2. Which state represents a process that has released all of its resources
except its PID?
a. S
b. T
c. R
d. D
e. Z
3. Which process does a parent use to duplicate to create a new child
process?
a. reap
b. exec
c. syscall
d. fork
e. zombie
4. Which state represents a process that is sleeping until some condition is
met?
a. D
b. R
c. T
d. S
e. Z
Chapter 11
1. Which of these log files stores most syslog messages, with the exception of
those that are related to authentication, mail, scheduled jobs, and debugging?
a. /var/log/maillog
b. /var/log/messages
c. /var/log/secure
d. /var/log/boot.log
2. Which log file stores syslog messages related to security and authentication
operations in the system?
a. /var/log/boot.log.
b. /var/log/secure.
c. /var/log/messages.
d. /var/log/maillog
3. Which service sorts and organizes syslog messages into files in /var/log?
a. tuned.
b. rsyslog.
c. auditd.
d. systemd-journald
Chapter 12
1. Which number is the size, in bits, of an IPv4 address?
a. 128.
b. 4.
c. 64.
d. 16.
e. 32.
f. 8
2. Which term determines how many leading bits in the IP address contribute
to its network address?
a. netscope.
b. subnet.
c. netaddr.
d. network.
e. multicast.
f. Netmask.
6. Which term allows one system to send traffic to a special IP address that is
received by multiple systems?
h. network.
i. netmask.
j. netscope.
k. netaddr.
l. multicast.
m. subnet
Chapter 14
1. Which command is used to register a system without using a graphical
environment?
a. subscription-manager
a. rct
b. yum
c. rpm
2. Choose the device file name of the third partition on the second SATA hard
drive.
a. /dev/vda2
b. /dev/sdb3
c. /dev/sda3
d. /dev/sdb2
3. What is the name of the device file for the entire second virtio-blk disk
attached to a virtual machine?
a. /dev/vdb
b. /dev/vda2
c. /dev/sda2
d. /dev/vdb2
4. Choose the correct name of the device file for the third partition on the
second virtio-blk disk attached to a virtual machine?
a. /dev/vda3
b. /dev/vdb3
c. /dev/sda3
d. /dev/vda3
5. Which command provides an overview of the file system mount points and
the amount of free space available in SI units?
a. df -h
b. df -H
c. df
d. du -h
Chapter 16
1. In what order do the following events occur when managing a RedHat
Enterprise Linux system using RedHat Insights?
1. RedHat Insights analyzes system metadata to determine which issues
and recommendations apply.
2. The Insights client uploads system metadata to the RedHat Insights
service.
3. The administrator views the recommended actions in the RedHat Insights
customer portal.
4. RedHat Insights collects system metadata on the RedHat Enterprise
Linux system.
a. 1, 2, 3, 4
b. 4, 1, 2, 3
c. 4, 2, 1, 3
d. 4, 2, 3, 1
3. Which two pages in the RedHat Insights console allows you to display list of
rules, using filters based on the catgeory of risk? (Choose two.)
a. Overview
b. Rules z
c. Remediation
d. Inventory