Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

TestOut Linux Pro

TestOut / Comptia Linux Chapters 1 Intro overview

QuestionAnswer
pwd Print the name of the current working directory.
cd Change the shell working directory. Change the current directory to DIR. The default DIR is the value of the HOME shell variable.
ls Displays the contents of a directory. Options include: -a displays all directory contents, including hidden content. -l displays extended information, including the owner, modified date, size, and permissions. -R displays the contents of a directory and all of its subdirectories. -d displays directories but not files. -r reverses the sort order.
mkdir Creates a new directory. Use the -p option to create all directories within the specified path when that path does not already exist.
cp Copies directories. Copying leaves the source contents (directories and files) intact. Use the -r or -R option to recursively copy subdirectories and files within the directory.
mv Moves or renames directories (and files). Moving directories removes the source directory and places it in the destination. Options include: -f overwrites a directory that already exist in the destination directory without prompting. -i prompts before overwriting a directory in the destination directory. -n never overwrites files in the destination directory.
rmdir deletes empty directory
rm Removes the directory and file information from the file system, which makes the directories and files inaccessible. Options include: -i prompts before removing. -r removes directories, subdirectories, and files within them. -f eliminates prompt for read-only files and avoids an exit code error if a file doesn't exist.
touch If the file does not exist, touch creates a blank version of the file. If the file does exist, this command updates the file's modification and last accessed times.
vi Starts vi. Type the command at the shell prompt.
vi [file_name] Starts vi and immediately begins working on the named file (either a new file or an existing file). Type the vi command at the shell prompt.
Insert key i s Enters insert mode from command mode.
Esc key Enters command mode from edit mode.
Delete key Deletes text.
Insert key Toggles between the insert and replace modes while in edit mode.
z Exits without saving.
: Enters command line mode from command mode.
w Saves the current document.
w [file_name] Names and save the file.
w![file_name] Overwrites the file.
q Exits vi. This produces an error if the text was modified.
q! Exits vi without saving.
wq or exit Saves the document and exits vi.
What year was Linux created? Who originally created Linux? 1991 Linus Torvalds
What are the most common server roles for Linux servers? • File server • Print server • Database server • Web server • Email server
What is the development cycle for Linux?
What is a Linux kernel? The Linux kernel is the core of the Linux operating system. It is the actual operating system itself. It is the component that fulfills the key operating system duties. Provides libraries.
What are Linux distributions? (also known as a distro) is a unique compilation of the Linux kernel (free and open to all), utilities, desktop environments, applications, and more. • Mint • Ubuntu • Debian • Fedora • openSUSE • Red Hat Enterprise Linux • Oracle • CentOS
What is a Linux user interface? What are the two most common types of user interfaces? GUI and Text Based
Linux kernel The Linux kernel is the core of the Linux operating system. It is the actual operating system itself.
Graphical user interface(GUI) A Linux graphical user interface (GUI) is similar to the GUIs used in other operating systems such as Windows. When a user wants to complete some task, they can click on buttons or navigate through menus to accomplish the desired task.
Distribution A unique compilation of the Linux kernel (free and open to all), utilities, desktop environments, applications, and more.
LibreOffice A free office software suite for word processing, spreadsheets, and presentations.
Apache OpenOffice A free office software suite for word processing, spreadsheets, and presentations.
GIMP GIMP is an acronym for GNU Image Manipulation Program. It is a free and open-source image editor similar to Photoshop.
LightWorks An editing tool available in free and for-purchase versions.
Application platform The operating system provides a platform where applications can run.
Hardware interface A key function of the operating system is to ensure that one application running on the system does not try to use an area in memory that's already in use by another application. It is also responsible for ensuring that a given application running on the system does not monopolize the CPU time so that other applications running on the system cannot use the CPU.
Data storage The operating system is responsible for providing an efficient and reliable means for storing data. This is usually done using some type of storage device, like a hard disk drive formatted with a particular file system. The file system's job is to organize the information on the hard disk in an easily retrievable format.
Security The operating system is responsible for providing some degree of security for the data that's stored on its storage devices. For example, the system administrator can create rules and assign permissions that determine who can access what information on the system.
Network connectivity The operating system provides some type of connectivity between computer systems over a network connection. They can do this using a variety of different network media and interfaces, such as an Ethernet connection between computer systems. There are other standards that can be used to create network connections, such as mobile broadband wireless or Wi-Fi wireless.
Linux on mobile devices Linux has nearly taken over the mobile device market in the form of the Android operating system. The current Android operating system is a specialized Linux distribution created by Google. It was designed primarily for touch screen mobile devices, such as smart phones and tablet computers.
Linux virtualization Virtualization is the ability to install and run multiple operating systems concurrently on a single physical machine. This is typically accomplished using a hypervisor. A hypervisor is a thin layer of software that resides between the guest operating system and the hardware. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. The Linux operating system can be virtualized.
Linux and cloud computing In cloud computing, the hardware, software, and/or network resources that have historically been implemented on-site are moved offsite. This process is referred to as Infrastructure as a Service (IaaS).
Embedded Linux Embedded Linux is the process of embedding Linux within intelligent devices, such as automation and control equipment, smart TVs, smart phones, and tablets. To accomplish this, the operating system is customized so it only provides the functions required by that particular device, and all the remaining unnecessary elements of the Linux kernel are removed. Once that's done, the kernel itself is embedded in flash memory chips on the given device.
GNU GNU general public license (GPL), which requires the source code to remain freely available to anybody who wants it. GNU is a recursive acronym for "GNU's Not Unix!"
Libraries contain pre-written code elements that the programmers can use within their programs, such as how to interface with a hard disk. For example, when a programmer needs to write data to a hard disk, the programmer does not need to know whether the machine has a SATA, IDE, or SCSI drive installed. Instead, the programmer simply calls the appropriate library and tells the operating system that it needs to write data to whatever hard drive is installed in the system,
Utilities The Linux operating system includes a wide variety of utilities that can complete operating system management tasks, such as creating files and maintaining file systems, editing text files, managing the applications that are running on the system, installing new applications on the system, etc.
User interfaces The Linux operating system provides the end user with a means of interacting with the operating system, the user interface. Linux provides two different user interfaces: GUI Text Based CLI
IaaS Infrastructure as a Service You then pay that provider a fee to access this virtual machine through your organization's network connection.
SaaS • Software as a Service (SaaS) SaaS provides access to software and data through the cloud.
NaaS • Network as a Service (NaaS) NaaS provides network connectivity through the cloud.
STaaS • Storage as a Service (STaaS) STaas provides access to storage devices through the cloud.
deamon A daemon (also known as background processes) is a Linux or UNIX program that runs in the background. Almost all daemons have names that end with the letter "d". A type of program on the operating systems that runs unobtrusively in the background, rather than under the direct control of a user, waiting to be activated by the occurance of a specific event or condition. Daemons are usually instantiated as processes.
Process A process is an executing (i.e., running) instance of a program. Processes are managed by the kernel (i.e., the core of the operating system), which assigns each a unique process identification number (PID).
NTP The Network Time Protocol (NTP)(123) is used to synchronize the time on your Linux system with a centralized NTP server. A local NTP server on the network can be synchronized with an external timing source to keep all the servers in your organization in sync with an accurate time. NTP uses a hierarchy of clocks and computers for synchronizing the current time. NTP uses stepping to quickly make large adjustments to close wide time discrepancies, usually about once every 60 seconds..
SSH SSH (Secure Shell or Secure Socket Shell) (22) is a protocol used to securely log onto remote systems using encryption. SSH is the most common way to access a remote Linux system. Two major components of SSH include the SSH client and the SSH server. The SSH client is a program that is typically only run as needed. Once installed, the SSH server is a daemon that constantly runs in the background.
Web server A web server is the program responsible for accepting HTTP (Hypertext Transfer Protocol) requests from web browsers or clients and, in turn, sending the clients the files that form webpages.
digital certificate A digital certificate is an electronic document that can be used as proof of identification. For example, digital certificates are used between an end user and a bank to establish a trusted connection. As an end user, we trust digital certificates because we trust the entities that create the digital certificates.
Certificate authority The entities that create these certificates are called certificate authorities (CAs). A few of the most public certificate authorities include GeoTrust, Comodo, Digicert, Thawte, Verisign and GoDaddy. These CAs require the person or company applying for a certificate (such as your bank) to provide documents and information that proves they are who they claim to be.. You can configure a Linux system to be a certification authority. One method of doing this is to use OpenSSL, a free open-source library.
FQDNs fully qualified domain names
Name server A name server resolves (or maps) the fully qualified domain names (FQDNs), such as www.TestOut.com, to their respective IP addresses and IP addresses to their respective FQDNs.
DHCP The Dynamic Host Configuration Protocol (DHCP)(UDP 67 68) centralizes IP address assignment management by allowing a server (such as a Linux server) to dynamically assign IP addresses to clients. DHCP also allows users who move from network to network to easily obtain an IP address appropriate for the subnet they are connected to. The DHCP server and the client use broadcasts to communicate with each other. In many cases, you need to download and install the DHCP Server
SNMP The Simple Network Management Protocol (SNMP)(161) is a protocol designed for managing complex networks and is used to communicate with and monitor network devices, servers, and more by means of the IP protocol. SNMP lets network hosts exchange configuration and status information. For example, SNMP can be used to remotely retrieve the operational statistics of a router or a firewall. On a Linux machine, SNMP runs as a daemon. In many cases, you need to download and install SNMP.
File servers A Linux file server is a machine that has been set up and configured to let other machines store and retrieve files to and from a central location. In addition, using a file server can simplify backups and security. Using SMB shares and a variety of programs such as Samba or Network File System a Linux file server can share files with other Linux systems, as well as with non-Linux systems such as Windows and Mac.
SMB In computer networking, Server Message Block (SMB), one version of which was also known as Common Internet File System. is a communication protocol[3] for providing shared access to files, printers, and serial ports between nodes on a network. It also provides an authenticated inter-process communication (IPC) mechanism. Most usage of SMB involves computers running Microsoft Windows, where it was known as "Microsoft Windows Network" before the introduction of Active Directory.
Authentication server Most enterprise networks require centralized user authentication and access controls for all system resources. This is not only convenient for users, but also allows an administrator to monitor and audit user types and the type of access they have on each machine. It also makes provisioning and disabling user accounts easier. Linux centralized authentication (an authentication server) can be accomplished in many ways, depending on the Linux distribution being used. Some options include installing and using
Proxy A proxy is a computer that provides indirect internet access to the computers in your network. In most cases, a proxy server is installed on the same computer as the firewall. Proxy servers provide increased performance and security by blocking direct access between two networks, such as the corporate network and the internet. Proxy can be configured in a variety of ways, such as using SSH tunneling or installing an app on a system that has been configured as a web server.
SSH tunnelin SSH tunneling, or SSH port forwarding, is a method of transporting arbitrary data over an encrypted SSH connection. SSH tunnels allow connections made to a local port (that is, to a port on your own desktop) to be forwarded to a remote machine via a secure channel.
Logging An important Linux role is the ability to capture a timeline of events that have taken place on the computer in the form of a file, which is referred to as a log file. The process of creating these logs is known as logging. Logging is enabled by default, and logs are often captured for such things as services, the Linux operating system, and applications. Although log files can be stored in a variety of places, most logs are stored in the /var/log directory or a subdirectory thereof.
Containers Linux containers give you the ability to run an application (with all of the necessary libraries, dependencies, and files) in an isolated environment known as an image or container. Due to this isolation, multiple containers can be run on the same host without affecting each other or the main operating system. All containers utilize and share the same operating system kernel of the host machine, making them very lightweight and fast. Containers are highly portable.
VPN A VPN (Virtual Private Network) can be installed on a Linux host and is a type of network that uses encryption to allow IP traffic to travel securely over the TCP/IP network. A VPN is primarily used to support secure communications over an untrusted network (for example, connecting two remote site by means of the internet).
Monitoring Monitoring refers to the process of monitoring the essential Linux services, including such things as operating system metrics, process state, logs, service state, and file system usage. It also refers to monitoring servers' availability. Depending on the Linux distribution, monitoring information can often be gathered manually using command line monitoring tools, such as top, lsof, tcdump, and vmstat. Web-based utilities (such as Monit and Nagios) can also be installed, GUI
Database A database is a structured set of data held in a computer, especially one that is accessible in various ways. In simpler terms, a database is an organized collection of various forms of data. The information stored in a database is typically organized into rows, columns, and tables. Database information is also indexed, to make it easier to find the information required.
Print server When a company wants to make a printer available to multiple users over a network, this goal is typically accomplished using a print server. Print servers accept the print jobs from the users and stores them in a queue. When the appropriate printer is available, the job is sent from the queue to the printer. In addition, a print server makes printer queue and status information available to end users and network administrators.
CUPS The Common UNIX Printing System, or CUPS, is the most common Linux printing system in use today. CUPS manages print jobs and queues and provides network printing using the standard Internet Printing Protocol (IPP).
IPP the standard Internet Printing Protocol
MAU mail user agent (MUA) (such as Evolution, Mozilla Thunderbird, or Mutt). The MUA must be configured to send and receive mail by means of a mail server or a Linux system where the mail transfer agent (MTA) has been installed.
MTA mail transfer agent It is the MTA’s responsibility to then either save the message so it can be downloaded by another local user or, using the internet, send the email to the destination MTA where it will be stored for download by the intended user. Some Linux distribution may have a default MTA that can be configured and used. If one does not exist or you want to use a different email system, other MTAs can be downloaded and installed. A few common MTAs include Postfix and Qmail.
Mail server A mail server is a computer that sends, receives, and stores email for users.
Load balancer When a company has back-end servers that receive a significant amount of traffic (such as Netfilx, Hulu, or Airbnb), response time to these servers can be increased through load balancers by distributing the workload across the available servers. Although load balancers can be purchased as a hardware appliance, software can be installed on a Linux server, making it a load balancer. Three common Linux load balancers include • Linux Virtual Server (a free and open-source project), • Nginx • HAProxy
Clustering With clustering, two or more servers are grouped together in a way to make them work like one. Clustering is often used to create a failover system, a load balance system, or a parallel processing unit. A failover cluster means that if one system fails, the other servers will take over the load, giving end-users uninterrupted access to the desired data. There are many options for building a Linux cluster, including using free open-source software (such as OpenHPC) or purchasing a commercial product.
A technician has been given a work order to install the Apache webserver on a system configured with a YUM repository. Which of the following commands will install the webserver? yum install install httpd is used to install Apache on a system using a YUM repository.
What server roles would you implement to provide services offered by CUPS and IPP? Print Server
What is the primary role of a mail transfer agent (MTA)? Store messages so they can be downloaded or send email to a destination MTA.
Your company has been expanding the number of servers in the company's data center, and there is an increased need to gather metrics, watch process states, work with logs, watch services states and file system usage. What sever roles should be installed to provide this functionality? Monitoring
Your company uses both Linux desktops and Windows desktops. What server roles should be used to provide a central location for users of both operating systems to share files? File Serve
Alex, a webmaster, is implementing an order processing system on the company's website. What server roles should Alex implement with the order processing application? Database
Your company is running a critical business application. The executive team wants to ensure the server is available at all times, even in the event of a server failure. What server roles would be used to provide a failover server in the event of a system failure? Clustering
Your company recently setup a VPN and wants to use a digital certificate for authentication instead of a pre-shared key. What server roles would allow the company to provide this functionality internally instead of using an external provider? Certificate Authority
Tim, a system administrator, wants to simplify the provisioning and disabling of user accounts. What server roles should Tim install and configure? Authentication Server
Your company develops applications to run on Linux systems. You currently have four teams working on a different aspect of the same application. What server roles would give you the BEST method for testing all team members' code without effecting your part of the project or your operating system and personal files? Containers
Capturing a timeline of events that have taken place on the computer in the form of a file. Logging
A type of network that uses encryption to allow IP traffic to travel securely over the TCP/IP network V:PN
Increases response time to back-end servers by distributing the workload across the available servers. Load Balancer
A computer that provides indirect internet access to the computers in your network. Proxy
A protocol used to communicate with and monitor network devices and servers. SNMP
A protocol used to securely log on to remote systems using encryption. SSH
Resolves (or maps) the fully qualified domain names (FQDNs) to IP Addresses. Name Server
A program responsible for accepting HTTP (Hypertext Transfer Protocol) requests from clients. Web Server
Users are complaining that they are unable to connect to any servers or the internet. Based on the symptoms they describe, you suspect that the users are not being assigned the correct IP addresses. What server roles would be the BEST role to work with to correct this issue? DHCP
Users are complaining that the clocks for their operating systems do not match the current time for the location in which they live. What server roles is BEST for correcting this issue? NTP
20 File Transfer Protocol (FTP) Data Transfer
21 File Transfer Protocol (FTP) Command Control
22 Secure Shell (SSH)
23 Telnet - Remote login service, unencrypted text messages
25 Simple Mail Transfer Protocol (SMTP) E-mail Routing
53 Domain Name System (DNS) service
80 Hypertext Transfer Protocol (HTTP) used in World Wide Web
67 & 68 The DHCP employs a connectionless service protocol UDP (User Datagram Protocol) and uses 2 UDP ports: 67 and 68. Port 67 is for a DHCP client (a destination port of a server), and port 68 is for a DHCP server (a destination port of a client)
110 Post Office Protocol (POP3) used by e-mail clients to retrieve e-mail from a server
119 Network News Transfer Protocol (NNTP)
123 Network Time Protocol (NTP)
143 Internet Message Access Protocol (IMAP) Management of Digital Mail
161 Simple Network Management Protocol (SNMP)
194 Internet Relay Chat (IRC)
443 HTTP Secure (HTTPS) HTTP over TLS/SSL
Created by: jacobth
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards