Self Test

 < Day Day Up > 



The following questions will help you measure your understanding of the material presented in this chapter. Read all the choices carefully, as there may be more than one correct answer. Don't focus exclusively on these questions. There are no longer any multiple choice questions on the Red Hat exams. These questions exclusively test your understanding of the chapter. While the topics in this chapter are 'prerequisites,' it is okay if you have another way of performing a task. Getting results, not memorizing trivia, is what counts on the Red Hat exams.

Choose all correct answers for each question.

Basic Linux Knowledge

1. 

If you're editing the /etc/inittab file, which of the following vi commands would you use to copy the currently highlighted line?

  1. p

  2. c

  3. yy

  4. cw

 c . the yy command copies the entire line associated with the current location of the cursor. you can then use the p command to insert that line into the file. a is incorrect, since the p command only takes data from the buffer. b is incorrect, since there is no c command. d is incorrect, since it places only one word into the buffer.

Answers

1. 

þ C. The yy command copies the entire line associated with the current location of the cursor. You can then use the p command to insert that line into the file.
ý A is incorrect, since the p command only takes data from the buffer. B is incorrect, since there is no c command. D is incorrect, since it places only one word into the buffer.

Linux Filesystem Hierarchy and Structure

2. 

Which of the following commands would you use to mount an MS-DOS floppy disk?

  1. mount -t /dev/fd0 /mnt/floppy

  2. mount -t ext2 /dev/fd0 /mnt/floppy

  3. mount -t ext3/dev/fd0 /mnt/floppy

  4. mount -t vfat /dev/fd0 /mnt/floppy

 d . current ms-dos floppy disks are usually formatted to vfat, which supports long filenames. a is not correct, since you need to specify a file type with the -t switch. b and c are not correct, since ext2 and ext3 are unusable file types for an ms-dos disk.

Answers

2. 

þ D. Current MS-DOS floppy disks are usually formatted to VFAT, which supports long filenames.
ý A is not correct, since you need to specify a file type with the -t switch. B and C are not correct, since ext2 and ext3 are unusable file types for an MS-DOS disk.

Basic Commands

3. 

Which of the following commands returns the actual number of times user mj is logged into your Linux computer?

  1. wc -l

  2. who | grep mj

  3. who | wc -l

  4. who | grep mj | wc -l

 d . while this level of piping isn t covered in this chapter, this should be a straightforward question if you re sufficiently familiar with basic command line tools. the who command returns every active login of every user. piping the result returns just the lines associated with the logins of user mj. piping that result to wc -l returns the actual number of lines. a is not correct, as the wc command needs a file or other input to read first. b is not correct, as it returns the lines associated with the logins of user mj. while you could count the number of lines, that does not address the requirements of the question. c is not correct, as it would return the number of times all users are logged into this system.

Answers

3. 

þ D. While this level of piping isn't covered in this chapter, this should be a straightforward question if you're sufficiently familiar with basic command line tools. The who command returns every active login of every user. Piping the result returns just the lines associated with the logins of user mj. Piping that result to wc -l returns the actual number of lines.
ý A is not correct, as the wc command needs a file or other input to read first. B is not correct, as it returns the lines associated with the logins of user mj. While you could count the number of lines, that does not address the requirements of the question. C is not correct, as it would return the number of times all users are logged into this system.

Printing

4. 

You're maintaining a large queue of print jobs on your network, and you need some job numbers to make sure the engineers get highest priority on the printer. Which of the following commands lists print job numbers?

  1. lpr -l

  2. lpq -l

  3. lprm -l

  4. lpd

 b . the lpq -l command checks print queues. if you get an error message from this command, you may need to install a printer first. a is incorrect, as lpr is a print command, and its -l switch tells lpr to expect a binary file. c is incorrect, as lprm is for removing print jobs. d is incorrect, as lpd is the line print daemon. while this must be running before you can check a print queue, lpd does not itself check print queues.

Answers

4. 

þ B. The lpq -l command checks print queues. If you get an error message from this command, you may need to install a printer first.
ý A is incorrect, as lpr is a print command, and its -l switch tells lpr to expect a binary file. C is incorrect, as lprm is for removing print jobs. D is incorrect, as lpd is the line print daemon. While this must be running before you can check a print queue, lpd does not itself check print queues.

Shells

5. 

Which of the following commands would you use to add the /usr/sbin directory to your PATH?

  1. $PATH=$PATH:/usr/sbin

  2. $PATH=PATH:/usr/sbin

  3. PATH=$PATH:/sbin

  4. PATH=$PATH:/usr/sbin

 d . the variable is path. when you input $path, the value of that variable, in this case, the directories in your path, are substituted in this equation. a and b are not correct, since $path is not itself a variable. c is not correct, since /sbin is the wrong directory.

Answers

5. 

þ D. The variable is PATH. When you input $PATH, the value of that variable, in this case, the directories in your path, are substituted in this equation.
ý A and B are not correct, since $PATH is not itself a variable. C is not correct, since /sbin is the wrong directory.

Basic Security

6. 

When you run the umask command, you see the following result: 0000. The next time you create a file, what will be the permissions?

  1. drwxrwxrwx

  2. ----------

  3. -rwxr-xr-x

  4. -rw-rw-rw-

 d . the effect of umask has changed. even if you try to set it to allow execute permissions, red hat won t let you do this anymore. you ll need to set execute permissions on each file after creation. a is not correct, since the file is not necessarily a directory, and execute permissions are no longer set up by default. b is not correct, as this would correspond to a umask value of 0666 or 0777. c is not correct, as execute permissions are no longer set up by default.

Answers

6. 

þ D. The effect of umask has changed. Even if you try to set it to allow execute permissions, Red Hat won't let you do this anymore. You'll need to set execute permissions on each file after creation.
ý A is not correct, since the file is not necessarily a directory, and execute permissions are no longer set up by default. B is not correct, as this would correspond to a umask value of 0666 or 0777. C is not correct, as execute permissions are no longer set up by default.

System Administration

7. 

Based on the following line from a user's crontab file, when will the Berkeleylives program be run?

0 1 2 3 * Berkeleylives
  1. At 1:23 A.M. every day

  2. At 1:00 A.M. on March 2

  3. At 1:00 A.M. on February 3

  4. At 2:00 A.M. on March 2

 b . this is based on the convention for the first five entries in a crontab line: minute, hour, day of month, month, and day of week. a , c , and d are incorrect, as they are readings of the cited crontab line that don t correspond to the convention.

Answers

7. 

þ B. This is based on the convention for the first five entries in a crontab line: minute, hour, day of month, month, and day of week.
ý A, C, and D are incorrect, as they are readings of the cited crontab line that don't correspond to the convention.

Basic TCP/IP Networking

8. 

Which of the following sets of numbers, in order, correspond to an appropriate network address, subnet mask, and broadcast address?

  1. 192.168.14.255, 255.255.255.0 192.168.14.0

  2. 192.168.14.0, 255.255.255.0 192.168.14.255

  3. 255.255.255.0 192.168.14.255, 192.168.14.0

  4. 192.168.14.0, 192.168.14.255, 255.255.255.0

 b . by convention, a network with a 192.168.14.0 address with a 255.255.255.0 subnet mask uses a 192.168.14.255 broadcast address. a is not correct, as there cannot be a network that starts with a broadcast address. c is not correct, as there cannot be a network that starts with a subnet mask. d is not correct, as 255.255.255.0 is not a qualified broadcast address.

Answers

8. 

þ B. By convention, a network with a 192.168.14.0 address with a 255.255.255.0 subnet mask uses a 192.168.14.255 broadcast address.
ý A is not correct, as there cannot be a network that starts with a broadcast address. C is not correct, as there cannot be a network that starts with a subnet mask. D is not correct, as 255.255.255.0 is not a qualified broadcast address.

Standard Network Services

9. 

Which of the following services works to connect Linux to a Microsoft Windows-based network?

  1. NFS

  2. SMB

  3. DNS

  4. Windows for Workgroups

 b . the server message block (smb) file system, also known as samba, is the standard way to connect linux as a member of a microsoft windows or ibm os/2 based network. a is not correct. while it is possible to set up services for unix on some microsoft windows computers, that would no longer be a microsoft windows based network. c is not correct, since the domain name system has nothing to do with protocols necessary to connect operating systems. d is not correct, since windows for workgroups is not an available service in linux.

Answers

9. 

þ B. The Server Message Block (SMB) file system, also known as Samba, is the standard way to connect Linux as a member of a Microsoft Windows- or IBM OS/2-based network.
ý A is not correct. While it is possible to set up 'Services for Unix' on some Microsoft Windows computers, that would no longer be a Microsoft Windows-based network. C is not correct, since the Domain Name System has nothing to do with protocols necessary to connect operating systems. D is not correct, since Windows for Workgroups is not an available service in Linux.

Basic Network Security

10. 

Which of the following commands are associated with a Red Hat Enterprise Linux firewall configuration utility?

  1. lokwall

  2. lokkit

  3. redhat-config-securitylevel

  4. firewall-lokkit

 b and c are both current red hat enterprise linux firewall configuration utilities. a and d are not valid red hat enterprise linux commands.

Answers

10. 

þ B and C are both current Red Hat Enterprise Linux firewall configuration utilities.
ý A and D are not valid Red Hat Enterprise Linux commands.

Basic Hardware Knowledge

11. 

You've checked your /proc/interrupts file and find that you don't have any leftover IRQ ports. Nevertheless, you want to install another printer and network card. Which of the following actions would let you keep your current devices?

  1. You need to make some hard decisions on what devices you need to remove from your computer before installing anything new.

  2. Use the free PCI slots or USB connectors in your PC for new devices. The PCI system allows all PCI and USB devices to share a single IRQ.

  3. Look through /proc/ioports and /proc/dma. Find free I/O addresses and DMA channels for your new devices. Then IRQ conflicts are not a problem.

  4. Just install the new devices. The Linux plug and play system can make sure that extra devices share the appropriate IRQ ports.

 b . the pci system really does make sure that installed pci devices share irq ports, as needed. this works as well for any usb or ieee 1394 devices on your system. a is incorrect because it is possible for pci devices to share irq ports. in fact, usb devices can also share an irq port. c is incorrect because all devices need cpu service. d is incorrect because no plug and play system by itself can compensate for a lack of available irqs.

Answers

11. 

þ B. The PCI system really does make sure that installed PCI devices share IRQ ports, as needed. This works as well for any USB or IEEE 1394 devices on your system.
ý A is incorrect because it is possible for PCI devices to share IRQ ports. In fact, USB devices can also share an IRQ port. C is incorrect because all devices need CPU service. D is incorrect because no plug and play system by itself can compensate for a lack of available IRQs.

Hardware Compatibility

12. 

When you look through the Red Hat Hardware Compatibility List, you find that a number of devices in your computer are listed as 'community knowledge.' What should you do about these devices before installing Linux?

  1. Replace those devices with hardware that you know is compatible.

  2. Examine the LDP Hardware HOWTO.

  3. Check the Web sites of the manufacturers of each community knowledge device.

  4. Look at the documentation for each device and remove any winmodems from your PC.

 b and c . red hat enterprise linux community knowledge hardware lists devices that have not been tested by red hat. but others in the linux community have tested such hardware, and the results are often documented in the ldp s hardware howto. many device manufacturers now include any special installation instructions that you may need to install their devices on linux. a and d are both incorrect. most devices are compatible with linux. it would be a waste to remove hardware from your pc that red hat enterprise linux would recognize without any problems. while winmodems are a special case, some winmodems can be made to work with red hat enterprise linux.

Answers

12. 

þ B and C. Red Hat Enterprise Linux community knowledge hardware lists devices that have not been tested by Red Hat. But others in the Linux community have tested such hardware, and the results are often documented in the LDP's Hardware HOWTO. Many device manufacturers now include any special installation instructions that you may need to install their devices on Linux.
ý A and D are both incorrect. Most devices are compatible with Linux. It would be a waste to remove hardware from your PC that Red Hat Enterprise Linux would recognize without any problems. While winmodems are a special case, some winmodems can be made to work with Red Hat Enterprise Linux.

Configuring External Devices

13. 

How would you know if your serial mouse is properly attached to a serial port?

  1. Run the ls -l /dev/mouse command. You should see a file link to the appropriate serial port.

  2. Check the physical connection. If the connection is not solid, Linux may not be receiving signals from your mouse.

  3. Run the ls -l /dev/ttys0 command. You should see a file link to your serial mouse.

  4. Run the redhat-config-mouse utility and make sure you have a serial mouse.

 a . as with modems, the /dev/mouse file is linked to the port used by your mouse. b is incorrect since the question addresses device filenames in linux, not any hardware issue. c is incorrect, since you don t know which serial port is attached to your mouse. d is incorrect, since you shouldn t have to reconfigure your mouse just to find the serial port to which it is attached.

Answers

13. 

þ A. As with modems, the /dev/mouse file is linked to the port used by your mouse.
ý B is incorrect since the question addresses device filenames in Linux, not any hardware issue. C is incorrect, since you don't know which serial port is attached to your mouse. D is incorrect, since you shouldn't have to reconfigure your mouse just to find the serial port to which it is attached.

Preparing to Install Linux

14. 

What kind of information should you collect about your PC's video system if you want to install Linux with a graphical user interface?

  1. Model and manufacturer of the graphics card

  2. Horizontal and vertical refresh rates of the monitor

  3. Video memory

  4. Maximum monitor resolution

 a , b , c , d . most linux installation programs allow you to specify the model and manufacturer of the graphics card. this information is correlated as part of the linux installation database to provide information on other needed settings, including chipset and video memory. you do want to make sure linux does not exceed the horizontal or vertical refresh capabilities of the monitor, to minimize the risk of damage. the video memory allows you to verify what the red hat enterprise linux installation program reads from your system. if you exceed the resolution capabilities of the monitor, the graphics may degrade. there are no incorrect answer choices.

Answers

14. 

þ A, B, C, D. Most Linux installation programs allow you to specify the model and manufacturer of the graphics card. This information is correlated as part of the Linux installation database to provide information on other needed settings, including chipset and video memory. You do want to make sure Linux does not exceed the horizontal or vertical refresh capabilities of the monitor, to minimize the risk of damage. The video memory allows you to verify what the Red Hat Enterprise Linux installation program reads from your system. If you exceed the resolution capabilities of the monitor, the graphics may degrade.
ý There are no incorrect answer choices.



 < Day Day Up > 



RCHE Red Hat Certified Engineer Linux Study Guide[c] Exam (Rh302)
RCHE Red Hat Certified Engineer Linux Study Guide[c] Exam (Rh302)
ISBN: 71765654
EAN: N/A
Year: 2003
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net