Deck 14: Troubleshooting, Performance, and Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 14: Troubleshooting, Performance, and Security
1
The shell restricts the number of file handles that programs can open to ____ by default.
A) 256
B) 512
C) 1024
D) 2048
A) 256
B) 512
C) 1024
D) 2048
C
2
Performance problems are caused by hardware, not software.
False
3
The free command can be used to display the total amounts of physical and swap memory in Kilobytes and their utilizations. _________________________
True
4
When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.
A) SIGINT
B) SIGQUIT
C) SIGTERM
D) SIGHUP
A) SIGINT
B) SIGQUIT
C) SIGTERM
D) SIGHUP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
A room where you lock important computers, such as Linux servers, and to which only Linux administrators or trusted users have key access is commonly called a(n) server closet. _________________________
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.
A) continue
B) noshell
C) nokill
D) nohup
A) continue
B) noshell
C) nokill
D) nohup
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.
A) two
B) five
C) ten
D) thirty
A) two
B) five
C) ten
D) thirty
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Almost all hardware problems are the result of damaged hardware.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ option for the sar command is used to display swap statistics.
A) -B
B) -b
C) -s
D) -q
A) -B
B) -b
C) -s
D) -q
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The ____ option for the sar command is used to displays statistics for the processor queue.
A) -r
B) -c
C) -q
D) -v
A) -r
B) -c
C) -q
D) -v
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.
A) -v
B) -m
C) -V
D) -M
A) -v
B) -m
C) -V
D) -M
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
All Linux problems can be divided into ____ categories.
A) two
B) three
C) four
D) five
A) two
B) three
C) four
D) five
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
If the / filesystem becomes corrupted, the system is unstable and must be turned off.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
The mpstat utility measures the flow of information to and from disk devices. _________________________
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The ____ command can be used to obtain root access when you need to perform an administrative task.
A) swu
B) sudo
C) su
D) switchu
A) swu
B) sudo
C) su
D) switchu
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
To identify which shared libraries are required by a certain program, you can use the ldconfig command. _________________________
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
For the GRUB boot loader, errors are typically the result of a missing file in the /boot directory. _________________________
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
____ are the most common hardware component to fail on Linux systems.
A) Floppy drives
B) Hard disks
C) NICs
D) Video cards
A) Floppy drives
B) Hard disks
C) NICs
D) Video cards
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
When performance issues arise, you can compare the output of performance utilities to the ____________________ values found in the system log book.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Viewing the output of the ____________________ command or the contents of the /var/log/boot.log and /var/log/messages log files can isolate most hardware problems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
To see what network services are running on your network, you can run the ____ command.
A) nmap
B) map
C) networkmap
D) nm
A) nmap
B) map
C) networkmap
D) nm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Match each term with the correct statement below.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
The file that contains a list of directories that contain shared libraries.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
The file that contains a list of directories that contain shared libraries.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
Match each term with the correct statement below.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
A utility that can be used to indicate whether more physical memory is required.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
A utility that can be used to indicate whether more physical memory is required.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.
A) authentication ; encryption
B) public ; private
C) unidirectional ; bidirectional
D) data ; code
A) authentication ; encryption
B) public ; private
C) unidirectional ; bidirectional
D) data ; code
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
Match each term with the correct statement below.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
The measures taken to reduce future system problems.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
The measures taken to reduce future system problems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
Match each term with the correct statement below.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
A tool used by network applications that authenticate users.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
A tool used by network applications that authenticate users.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
In SSH, the /etc/ssh directory stores the DSA public key in the ____ file.
A) ssh_host_dsa_key
B) ssh_host_dsa_key. pub
C) ssh_target_dsa_key
D) ssh_target_dsa_key.pub
A) ssh_host_dsa_key
B) ssh_host_dsa_key. pub
C) ssh_target_dsa_key
D) ssh_target_dsa_key.pub
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
A(n) ____ is a program that can start a network daemon.
A) network bootstrapper
B) TCP wrapper
C) IP wrapper
D) daemon launcher
A) network bootstrapper
B) TCP wrapper
C) IP wrapper
D) daemon launcher
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
Match each term with the correct statement below.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
A command that can be used to increase the number of processes that users can start in the shell.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
A command that can be used to increase the number of processes that users can start in the shell.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
Match each term with the correct statement below.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
A command that gives users the ability to run certain commands as the root user.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
A command that gives users the ability to run certain commands as the root user.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
Some peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ____________________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
Match each term with the correct statement below.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
The directory that contains most system log files.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
The directory that contains most system log files.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
The ____ option to the iptables command can be used to specify the destination address of packets for a rule.
A) -D
B) -L
C) -F
D) -d
A) -D
B) -L
C) -F
D) -d
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
Match each term with the correct statement below.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
Open source program for Braille translation
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
Open source program for Braille translation
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
Match each term with the correct statement below.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
The measures taken when system problems arise.
a.proactive maintenance
b.ulimit
c./etc/ld.so.conf
d.vmstat
e./var/log
f.sudo
g.Orca
h.reactive maintenance
i.Pluggable Authentication Modules (PAM)
The measures taken when system problems arise.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
Processes can initiate numerous connections, called ____________________, to files on the filesystem in addition to standard input, standard output, and standard error.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The ____ option to the iptables command can be used to specify the default policy for a certain chain type.
A) -P
B) -C
C) -p
D) -c
A) -P
B) -C
C) -p
D) -c
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The ____________________ command is used to view the current SELinux status.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
How can netfilter/iptables be used to create a firewall service?
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
How is the mpstat utility used? What information does it provide, and how can that information be interpreted?
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
What are the two golden rules that should guide you during any troubleshooting process? Describe each rule.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
How can you identify filesystem corruption? How should you troubleshoot filesystem corruption on a non-critical partition?
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
What methods can be used to physically secure local computers?
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck