C. ? topic
D. info topic
E. hint topic
25. A computer's hardware clock keeps track of the time while the computer is powered off. In what formats may this time be stored on an x86 Linux system? (Select two.)
A. Coordinated Universal Time (UTC)
B. Internet Time
C. Local time
D. 12-hour time
E. Mars time
26. You want to know what kernel modules are currently loaded. What command would you type to learn this information?
A. insmod
B. depmod
C. modprobe
D. lsmod
E. modinfo
27. You want to enable all members of the music
group to read the instruments.txt
file, which currently has 0640 (-rw-r–
) permissions, ownership by root
, and group ownership by root
. How might you accomplish this goal? (Select two.)
A. Type chown music instruments.txt in the file's directory.
B. Type chgrp music instruments.txt in the file's directory.
C. Type chgroup music instruments.txt in the file's directory.
D. Type chmod 0600 instruments.txt in the file's directory.
E. Type chown :music instruments.txt in the file's directory.
28. You want to create a link to the /usr/local/bin
directory in another location. Which of the following statements is true?
A. You can do this only if /usr/local/bin
is on a journaling filesystem.
B. You must own /usr/local/bin
to create the link.
C. You can create the link only if the link's location is on the same filesystem as the original directory.
D. Only the system administrator can do this.
E. The link will probably have to be a symbolic link.
29. Which of the following, when typed in vi's command mode, saves a file and quits the program? (Select two.)
A. :rq
B. :wq
C. :re
D. :we
E. ZZ
30. A user's home directory includes a file called ∼/.forward
that consists of one line: |∼/junkme
. What is the effect of this configuration?
A. The user's incoming mail is forwarded to the junkme
user on the same system.
B. The user's incoming mail is stored in the ∼/junkme
file.
C. The user's incoming mail is sent through the ∼/junkme
program file.
D. The user's incoming mail is flagged as spam and deleted.
E. The user's incoming mail is forwarded to the same user on the junkme
computer.
Answers to the Assessment Test
1. B. The Monitor section defines the monitor options and settings but doesn't combine it with the video card, so option A is incorrect. The Modeline line defines the available video modes in the Monitor section, but it doesn't define video cards, so option C is incorrect. Option D, the Device section, is also incorrect; it defines the video card but doesn't match it with a monitor on the system. Option E is incorrect because the Module section defines which X server modules (or drivers) are loaded but it doesn't match monitors and video cards. Option B, the Screen section, tells the X server about the combination of video cards and monitors that you're using, so it's the correct answer. For more information, see Chapter 6, “Configuring the X Window System, Localization, and Printing.”
2. A, C. Examining a process listing (obtained from ps
) for signs of the super server is the most reliable way to determine which one is actually running, so option A is correct. The presence of the super server's configuration file or files (as in option C) is also a good diagnostic, although some older systems that have been upgraded may have both sets of configuration files. There is no standard superserver
utility to report on which one is used, so option B is incorrect. Most distributions launch the super server through a SysV startup script; the /etc/inittab
file isn't directly involved in this process, so examining it would be pointless, and option D is incorrect. Although the output of netstat – ap, when typed as root
, will include an indication of any instance of inetd
or xinetd
that's listening for connections, option E omits the critical -p
option, which causes the program to display process names. Thus, option E is incorrect. For more information, see Chapter 10, “Securing Your System.”
3. D. The lpc
utility is used to start, stop, change the priority of, and otherwise control jobs in a print queue. CUPS ships with an lpc
utility, but it's quite rudimentary compared to the lpc
utilities of BSD LPD and LPRng. Instead, CUPS relies on its Web-based interface to provide the ability to control print jobs. Thus, option D is correct, and the remaining options must logically all be incorrect. For more information, see Chapter 6.
4. C. The /etc/security/limits.conf
file defines various limits on user resources, including the number of simultaneous logins individual users are permitted. Thus, option C is correct. The /etc/pam.d/login-limits
file (option A) is fictitious, although login limits do rely on the pam_limits
module to the Pluggable Authentication System (PAM). The /etc/bashrc
file (option B) is a global bash
startup script file, but it's not normally used to impose login limits. The /etc/inittab
file (option D) is a key Linux startup file, but it doesn't have any direct bearing on imposing login limits. The /etc/passwd
file (option E) defines many key account features, but login limits are not among these. For more information, see Chapter 10.
5. C, D. The computer's IP address (option C) and network mask (aka subnet mask or netmask; option D) are the most critical components in TCIP/IP network configuration. (Additional information that you may need to provide on many networks includes the IP addresses of one to three DNS servers, the hostname or IP address of a router, and the computer's hostname.) You shouldn't need the IP address of a Dynamic Host Configuration Protocol (DHCP) server (option A) – and if a DHCP server is present, chances are you should be using DHCP rather than static IP address assignment. A NetBIOS Name Service (NBNS) server (option B) converts between names and IP addresses on NetBIOS networks. The hostname of such a computer isn't likely to be a critical configuration element, although you may need to provide this information to Samba for some operations to function correctly when sharing files. A Network Time Protocol (NTP) server (option E) helps you maintain system time on all of your computers, but this isn't required for basic network configuration. For more information, see Chapter 8, “Configuring Basic Networking.”
6. E. The wc
command displays a count of newlines, words, and bytes in the specified file (report.txt
). Piping this data through tee
causes a copy of the output to be stored in the new file (wc
in this example – you shouldn't run this command in the same directory