Section 34.1. Questions


34.1. Questions

  1. You have just finished creating a custom kernel. Which of the following is a valid next step for creating the kernel image?

    1. make dep

    2. make bzimage

    3. make kernel

    4. make image

  2. Which of the following is a common name of a kernel image?

    1. vmlinuz-2.6.10-5-686

    2. minix_stage1_5

    3. System.map-2.6.10-5-386

    4. initrd.img-2.6.10-5-686

  3. Which of the following is the final stage of a kernel update?

    1. Compile dependencies.

    2. Create a RAM disk image.

    3. Configure the boot loader (e.g., GRUB).

    4. Copy the bzImage file to the kernel name in the /boot directory.

  4. What is the name of the file in GRUB that you need to edit in order to change the kernel that will be booted by default?

    1. boot.conf

    2. grub.conf

    3. img.conf

    4. vmlinux.conf

  5. Which of the following do you have to accomplish before you can use an initrd image on your Debian system?

    1. Install all necessary modules for initrd.

    2. Switch from LILO to GRUB.

    3. Compile cramfs support into the kernel.

    4. Create a monolithic kernel.

  6. Which of the following commands allows you to easily inspect a compressed kernel patch?

    1. less

    2. bzip2

    3. bzmore

    4. source

  7. You discover that you need to remove two levels of path from a patch in order to proceed with patching a kernel. Which of the following commands will work on a file named patch-2.6.14.4.bz2?

    1. bzip2 -dc patch-2.6.14.4.bz2 | patch -p2

    2. patch -dc | bzip2 -dc patch-2.6.14.4.bz2

    3. bzip2 -dc patch-2.6.14.4.bz2 | make -p2

    4. patch -dc patch-2.6.14.4.bz2 | bzImage -m2

  8. Consider the following entry in /etc/inittab:

     23:respawn:/sbin/getty 38400 tty2 

    You wish to add another entry to start a terminal (tty) that operates at runlevels 2, 3, 4, and 5 on tty1. Which of the following is the correct inittab entry?

    1. 0 2345:respawn:/sbin/tty01 38400 getty

    2. /sbin/getty 38400 tty1 :1:2345

    3. 0:2,3,4,5:respawn:/sbin/getty 38400 tty0

    4. 1:2345:respawn:/sbin/getty 38400 tty1

  9. What is the name of the first startup script in a Debian-based system?

    1. /boot/grub.conf

    2. /etc/init.d/rc1

    3. /etc/init.d/rcS

    4. /etc/rc.sysinit/init

  10. Of the following options, which requireroot privileges? (Choose two.)

    1. Using the make modules install command

    2. Running the make xconfig command

    3. Editing the boot loader file (e.g., grub.conf or lilo.conf)

    4. Editing the Makefile that comes with the kernel

  11. You have decided to have Sendmail start automatically on levels 3 and 5 of your Linux system. Which one of the following commands makes this change?

    1. init sendmail 35

    2. init 35 sendmail --on

    3. chkconfig 35 sendmail on

    4. chkconfig --level 35 sendmail on

  12. Write in the command that allows you to adjust the system so that a filesystem check is run every 200 boots.

  13. You have just issued the following command:

     mkisofs -T -r -L -l -J -o /var/tmp/image.iso /home/james/backup/ 

    Which of the following describe the results of this command? (Choose two.)

    1. mkisofs will generate a warning that it is creating a filesystem that is not ISO9660-compatible.

    2. The command will fail because you are not creating a filesystem that is ISO9660-compatible.

    3. mkisofs will generate the image in such a way that non-root users can mount it on any Linux system.

    4. The command will create a filesystem that allows long filenames and Unix-style symbolic links.

  14. You have just added a SCSI disk to a production system. The new drive is recognized as /dev/sdb. You wish to create the ReiserFS file system on the entire disk. Which of the following commands will do this? (Choose two.)

    1. mke2fs -j -L Disk_2 /dev/sdb

    2. mkfs.reiserfs --label Disk_2 /dev/sdb

    3. mkreiserfs --label Disk_2 /dev/sdb

    4. mke2fs -j -L Disk_2 /dev/sdb1

  15. You wish to learn about the last time boot information was written to the/dev/hda2 partition on your Linux system. Which of the following commands do this? (Choose two.)

    1. tune2fs -l /dev/hda2

    2. fsck -l /dev/hda2

    3. fdisk -l /dev/hda2

    4. dumpe2fs -h /dev/hda2

  16. You have been asked to transfer the contents of a smaller hard disk (/dev/hdb) to a larger hard disk (/dev/hdc). Which of the following commands allows you to do this most efficiently?

    1. cp -s /dev/hdb /dev/hdc

    2. dd if=/dev/hdb of=/dev/hdc

    3. dd bs=8k if=/dev/hdb of=/dev/hdc

    4. dd bs=1k if=/dev/hdb of=/dev/hdd ln -s /dev/hdb /dev/hdd

  17. Consider the following /etc/raidtab file:

         raiddev /dev/md0     raid-level 1     nr-raid-disks 2     chunk-size 64k     persistent-superblock 1     nr-spare-disks 0     device /dev/hda2     raid-disk 0     device /dev/hdc2     raid-disk 1 

    Which of the following commands is necessary to activate this configuration?

    1. mdadm /etc/md0

    2. mkraid /etc/md0

    3. mdadm /dev/md0

    4. mkraid /dev/md0

  18. A developer has called you and asked you to troubleshoot a device driver for a PCI card your company has decided to support. He needs to know the IRQ that the device uses, as well as the latency statistics. Which of the following commands should you issue in order to give him the information he needs?

    1. lspci-p

    2. setserial

    3. lspci -vv

    4. lsdev -C /dev/

  19. You are having problems attaching a USB hard drive to your system. You wish to determine the data transfer capabilities of the device, as well as the potential connection speed of the USB controller. Write in the application that will help you determine this information in the space.

  20. You suspect that a hard drive's Direct Memory Access (DMA) ability is creating problems for you as you troubleshoot problems on the system. Which of the following commands disables direct memory access on your system?

    1. hdparm -d1 /dev/hda

    2. sysctl dma=disable /dev/hda

    3. hdparm -d0 /dev/hda

    4. sysctl disable=dma /dev/hda

  21. A PCMCIA device on a laptop sometimes renders the system unstable if it is ejected without warning. Which of the following commands informs the system that the card is going to be shut down?

    1. sudo cardctl suspend

    2. sudo cardctl eject

    3. sudo cardctl config

    4. sudo cardctl reset

  22. You wish to temporarily prohibit a user with the account name james from using a system's Samba account. However, you still want to allow this user to log on to the system using the X Window System and SSH. Which of the following solutions will accomplish this goal most efficiently?

    1. Edit the /etc/passwd file as root using a text editor and comment out the james account's username.

    2. Enter sudo smbpasswd -x james.

    3. Become root, edit the /etc/samba/smbusers file, and comment out the james account's username.

    4. Enter sudo smbpasswd -d james.

  23. Which of the following is the suggested back-end database for a Samba server that does not require LDAP or built-in database replication?

    1. mysqlsam

    2. xmlsam

    3. shadow

    4. tdbsam

  24. Consider the following alternative entries in /etc/exports:

     /home/james/     james.stangernet.com(rw) /home/james/     james.stangernet.com (rw) 

    What is the result of these two entries?

    1. The top entry shares the /home/james directory with read and write permissions to any user from the james.stangernet.com DNS domain. The bottom entry shares the /home/james directory with read-only permissions to any user in the james.stangernet.com domain, but gives read and write permissions to all other users anywhere.

    2. The top entry will be ignored because it has improper syntax. The bottom entry shares the /home/james directory with anyone in the james.stangernet.com DNS domain with read and write permissions. No one else will have access.

    3. The top entry shares the /home/james directory with read-only permissions to all users, except for the james.stangernet.com domain. The bottom entry shares the /home/james directory with read-only permissions to the james.stangernet.com domain, but with read and write permissions to all other users.

    4. The top entry shares the /home/james directory with anyone in the james.stangernet.com DNS domain with read and write access. The bottom entry will be ignored, because it is not formatted properly.

  25. What user account does NFS change root-owned files to, and why?

    1. To the nfs account, to avoid allowing users to overwrite files essential to the operation of the NFS daemon

    2. To the sys account, to avoid allowing users to overwrite files created by the root user

    3. To the first non-root account listed in the /etc/passwd file, to avoid overwriting essential system files

    4. To nfsnobody, to avoid allowing users to upload programs that have the setuid bit set to root

  26. Which of the following files contain real-time information that will help you troubleshoot NFS? (Choose two.)

    1.  /proc/fs/exports 

    2.  /etc/fstab 

    3.  /etc/exports 

    4.  /proc/fs/nfsd 

  27. Complete the following line to configure syslog so that it sends log messages to a remote host named backup.stangernet.com:

     *.info;mail.none;authpriv.none;cron.none ___________________  . 

  28. Which of the following lines sends all emergency messages to the file named /var/log/crit.log?

    1.  /var/log/crit.log emerg.* 

    2.  *.emerg var/log/crit.log 

    3.  /var/log/crit.log /dev/console:0:/var/log/crit.log 

    4.  emerg.* /var/log/crit.log 

  29. You have downloaded OpenOffice.org. You have just untarred the tarball and have discovered that it contains all RPM files. You intend to use OpenOffice.org on a Debian-based system, however. You are currently in the directory that contains the RPM files. Which of the following commands converts the RPM files to a package format that Debian can use?

    1.  alien * 

    2.  sudo alien * 

    3.  dpkg -c *.rpm 

    4.  alias -c * 

  30. Consider the following code:

     %files %attr(0755, root, bin) /usr/bin/file %attr(0644, root, bin) /usr/local/man/man2/manpage.1 

    What type of file is this code from?

    1. A Debian file

    2. A typical Makefile

    3. The /etc/manpath.config file

    4. An RPM spec file

  31. You need to install an update to Perl but are not sure of the exact name of the Perl module, due to poor documentation. You need to navigate the update options in an interactive shell. Which of the following is the correct command to begin interactive mode?

    1.  perl -e 'use interactive;' 

    2.  perl -a -s=/bin/bash 

    3.  perl -MCPAN -e shell 

    4.  perl --update 

  32. You need to execute a script named backup three hours from now, but do not plan on being in front of your system, or at a terminal where you can access your system. Which of the following commands allows you to execute this script?

    1.  at now + 3 hours <backup 

    2.  crontab -e < 0 3 * * * backup 

    3.  at now + 3 >backup 

    4.  echo "0 3 * * * backup" >> /etc/crontab 

  33. You have downloaded an ISO image and have burned it to a CD several times. However, the CD never seems to work properly. You suspect a problem with the ISO image you have downloaded. Which of the following commands can you issue to verify that this ISO image is valid?

    1.  sudo mount -o loop -t iso9660 /home/james/image.iso 

    2.  sudo mount -t loop -o iso9660 /home/james/image.iso /mnt/iso 

    3.  sudo mount -o loop -t iso9660 /home/james/image.iso /mnt/iso 

    4.  sudo mount -loop -t iso9660 /home/james/image.iso /mnt/iso 

  34. List the rdev option that allows you to specify /dev/hda5 as the swap device. (Note: There is more than one way to do this.)

  35. Consider the following line in /etc/fstab:

     /dev/hda5       /               ext3    defaults -ro 0       1 

  36. What option would you add to this partition so that no files could be executed on it?

    1. exec=0

    2. noauto

    3. e0

    4. noexec

    Which of the following lists the four standard boot stages in the correct order?

    1. The boot loader starts, the kernel loads, hardware initialization, service/daemon startup

    2. The boot loader starts, service/daemon startup, hardware initialization, the kernel loads

    3. Hardware initialization, the boot loader starts, the kernel loads, service/daemon startup

    4. The boot loader starts, hardware initialization, the kernel loads, service/daemon startup

  37. An older Linux system fails at boot time, displaying the following letters:

     LIL 

  38. Which of the following is the most plausible explanation for the error?

    1. The second stage boot loader has loaded at an invalid address.

    2. The second stage boot loader cannot start, but can find the descriptor table.

    3. The second stage boot loader was able to start, but the descriptor table has not been found.

    4. The second stage has been able to start, but the LILO boot loader has detected a problem with the map installer.

  39. You are trying to share a drive using NFS but are experiencing problems. You have tried restarting the portmapper. You have verified network connectivity and that the /etc/exports file is formatted properly. You have properly usedroot privileges. Which of the following steps can help you determine the exact point where nfsd and the portmapper encounter problems?

    1. Use the following command: tail -f /var/log/messages.

    2. Precede your commands with the strace command.

    3. Restart the system to restart the networking scripts.

    4. Verify that the nmbd daemon is running properly.

  40. Which of the following is the most plausible reason for a "Too many levels of symbolic links" error message?

    1. The symbolic links to the /boot/vmlinuz-2.6.10-5-686 file have become corrupt.

    2. A symbolic link still exists, but the file it refers to has been deleted.

    3. A series of symbolic links has led to a infinite loop.

    4. A symbolic link has been made to a symbolic link.

  41. A command keeps failing, no matter what changes you make to its configuration file. You suspect that the command makes a call to a missing dynamic library. Which of the following can help you confirm your suspicions most effectively?

    1.  ltrace 

    2.  strace 

    3.  paratrace 

    4.  mtrace 

  42. You have received a binary file from a coworker. You are not sure if the file is the correct one. You would like to quickly inspect its plaintext contents. Which of the following commands will help you view the human-readable contents of the file?

    1.  cat 

    2.  strings 

    3.  less 

    4.  mtrace 

  43. Which of the following files contains instructions concerning the mail directory for each user?

    1.  /etc/sysctl.conf 

    2.  /etc/bashrc 

    3.  /etc/login.defs 

    4.  /etc/sysconf.conf 

  44. The size of the kernel ring buffer has been set to 17384, which is 1000 more than the default. You wish to use the dmesg command to read the entire buffer. Write in the command that you would issue.

  45. You wish to mail the results of a cron job to a remote account named james.stangernet.com. The message is supposed to be sent every 20 minutes. You have created the following script:

     */20 * * * * /bin/security_program | mailx -s "Security report" user@gmail.com 

    However, the gmail.com account keeps bouncing the email. Which of the following can help you solve this problem?

    1. Use the mail program instead of mailx.

    2. Change the subject line of the mailx command. No spaces can be included.

    3. Fix the crontab file to have messages sent every 20 minutes, rather than every 20 days.

    4. Configure the system sending the message to rewrite the message headers so that they belong to a valid DNS domain.

  46. A user has just gotten married. She complains that her old name appears in the From field whenever she sends email using the mail command. Which of the following will likely solve this problem?

    1. Create an alias in the /etc/aliases file to map the user's account name to her real name.

    2. Edit the /etc/passwd file and change the fourth field of the user's new name.

    3. Edit the /etc/mail.conf file to reflect the user's new name.

    4. Create an alias in the user's .bashrc file that maps the user's old name to the user's new name.

  47. A user cannot currently log in. You check the /etc/shadow file and notice that an asterisk appears in the second field of that user's entry. Which of the following should you do to solve this problem?

    1. Edit the /etc/shadow file using a text editor and enter a default password.

    2. Use the passwd command to create a new password for the user.

    3. Use the shadowconfig command to create a new shadow file, because the existing file is corrupt.

    4. Edit the /etc/shadow file to remove the asterisk.

  48. You need to use the lsof command to determine which program has caused a system to hang for an unacceptably long time when it boots. You wish to direct lsof to avoid making any calls to the kernel that would cause the kernel to block the function of the lsof command. Write in the lsof command and option.

  49. You wish to determine whether a problem exists with the boot process of a system's second IDE hard drive. Which of the following commands helps you read kernel messages concerning the second drive?

    1.  lsof | grep hdb 

    2.  dmesg | grep hdb 

    3.  strings /dev/hdb 

    4.  modprobe -l | grep hdb 

  50. You cannot get a Samba server to run. You view the /etc/samba.smb.conf file and notice that the following lines have been uncommented:

     wins support = yes wins server = 192.168.2.33 

    From these lines, you can tell that the problem is:

    1. Your Samba server is trying to access a nonfunctioning WINS server.

    2. The WINS server is using a private IP address.

    3. The wins support entry should read wins support = 1.

    4. The Samba server is configured to be both a WINS client and a WINS server.

  51. A new application has been installed on a Linux web server to ensure more correct tracking of user visits. This application has required the installation of several new shared libraries. A system administrator has issued the following command:

     ldconfig -NX 

    However, the new application still complains that the libraries are not to be found. Which of the following will solve the problem?

    1. Reinstall the libraries after running ldconfig -NX.

    2. Specify the correct location of the libraries as an argument to ldconfig -NX

    3. Run ldconfig without arguments.

    4. Download the latest libraries from the developer.

  52. Which of the following commands measures the transfer rate of the first SCSI drive on a system?

    1.  hdparm -Tt /dev/sda 

    2.  lsof -t /dev/sda 

    3.  hdparm -X /dev/sda 

    4.  lsof -X /dev/sd1 

  53. A coworker has installed a new IDE optical device on a Linux server. The drive has been recognized as device /dev/hdc. You wish to verify its drive speed and whether DMA is enabled. Which of the following commands allows you to do this?

    1.  cat /proc/ide/hdc/settings 

    2.  lsof | grep hdc 

    3.  cat /etc/mtab 

    4.  sysctl -a 

  54. You have just downloaded the latest Linux kernel. Which of the following is a step you should take before runningmake xconfig?

    1. Type oldconfig -p

    2. Type make restore

    3. Type make oldconfig

    4. Type mrproper

  55. You wish to run fsck even though the system thinks that the filesystem is clean. You also want fsck to automatically repair any problems, should they be encountered. What fsck options would you choose? (Choose two.)

    1.  -y 

    2.  -f 

    3.  -n 

    4.  -r 



LPI Linux Certification in a Nutshell
LPI Linux Certification in a Nutshell (In a Nutshell (OReilly))
ISBN: 0596005288
EAN: 2147483647
Year: 2004
Pages: 257

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net