click below
click below
Normal Size Small Size show me how
TestOut Linux Pro
TestOut / Comptia Linux Chapters 1 Intro overview
| Question | Answer |
|---|---|
| pwd | Print the name of the current working directory. |
| cd | Change the shell working directory. Change the current directory to DIR. The default DIR is the value of the HOME shell variable. |
| ls | Displays the contents of a directory. Options include: -a displays all directory contents, including hidden content. -l displays extended information, including the owner, modified date, size, and permissions. -R displays the contents of a directory and all of its subdirectories. -d displays directories but not files. -r reverses the sort order. |
| mkdir | Creates a new directory. Use the -p option to create all directories within the specified path when that path does not already exist. |
| cp | Copies directories. Copying leaves the source contents (directories and files) intact. Use the -r or -R option to recursively copy subdirectories and files within the directory. |
| mv | Moves or renames directories (and files). Moving directories removes the source directory and places it in the destination. Options include: -f overwrites a directory that already exist in the destination directory without prompting. -i prompts before overwriting a directory in the destination directory. -n never overwrites files in the destination directory. |
| rmdir | deletes empty directory |
| rm | Removes the directory and file information from the file system, which makes the directories and files inaccessible. Options include: -i prompts before removing. -r removes directories, subdirectories, and files within them. -f eliminates prompt for read-only files and avoids an exit code error if a file doesn't exist. |
| touch | If the file does not exist, touch creates a blank version of the file. If the file does exist, this command updates the file's modification and last accessed times. |
| vi | Starts vi. Type the command at the shell prompt. |
| vi [file_name] | Starts vi and immediately begins working on the named file (either a new file or an existing file). Type the vi command at the shell prompt. |
| Insert key i s | Enters insert mode from command mode. |
| Esc key | Enters command mode from edit mode. |
| Delete key | Deletes text. |
| Insert key | Toggles between the insert and replace modes while in edit mode. |
| z | Exits without saving. |
| : | Enters command line mode from command mode. |
| w | Saves the current document. |
| w [file_name] | Names and save the file. |
| w![file_name] | Overwrites the file. |
| q | Exits vi. This produces an error if the text was modified. |
| q! | Exits vi without saving. |
| wq or exit | Saves the document and exits vi. |
| What year was Linux created? Who originally created Linux? | 1991 Linus Torvalds |
| What are the most common server roles for Linux servers? | • File server • Print server • Database server • Web server • Email server |
| What is the development cycle for Linux? | |
| What is a Linux kernel? | The Linux kernel is the core of the Linux operating system. It is the actual operating system itself. It is the component that fulfills the key operating system duties. Provides libraries. |
| What are Linux distributions? | (also known as a distro) is a unique compilation of the Linux kernel (free and open to all), utilities, desktop environments, applications, and more. • Mint • Ubuntu • Debian • Fedora • openSUSE • Red Hat Enterprise Linux • Oracle • CentOS |
| What is a Linux user interface? What are the two most common types of user interfaces? | GUI and Text Based |
| Linux kernel | The Linux kernel is the core of the Linux operating system. It is the actual operating system itself. |
| Graphical user interface(GUI) | A Linux graphical user interface (GUI) is similar to the GUIs used in other operating systems such as Windows. When a user wants to complete some task, they can click on buttons or navigate through menus to accomplish the desired task. |
| Distribution | A unique compilation of the Linux kernel (free and open to all), utilities, desktop environments, applications, and more. |
| LibreOffice | A free office software suite for word processing, spreadsheets, and presentations. |
| Apache OpenOffice | A free office software suite for word processing, spreadsheets, and presentations. |
| GIMP | GIMP is an acronym for GNU Image Manipulation Program. It is a free and open-source image editor similar to Photoshop. |
| LightWorks | An editing tool available in free and for-purchase versions. |
| Application platform | The operating system provides a platform where applications can run. |
| Hardware interface | A key function of the operating system is to ensure that one application running on the system does not try to use an area in memory that's already in use by another application. It is also responsible for ensuring that a given application running on the system does not monopolize the CPU time so that other applications running on the system cannot use the CPU. |
| Data storage | The operating system is responsible for providing an efficient and reliable means for storing data. This is usually done using some type of storage device, like a hard disk drive formatted with a particular file system. The file system's job is to organize the information on the hard disk in an easily retrievable format. |
| Security | The operating system is responsible for providing some degree of security for the data that's stored on its storage devices. For example, the system administrator can create rules and assign permissions that determine who can access what information on the system. |
| Network connectivity | The operating system provides some type of connectivity between computer systems over a network connection. They can do this using a variety of different network media and interfaces, such as an Ethernet connection between computer systems. There are other standards that can be used to create network connections, such as mobile broadband wireless or Wi-Fi wireless. |
| Linux on mobile devices | Linux has nearly taken over the mobile device market in the form of the Android operating system. The current Android operating system is a specialized Linux distribution created by Google. It was designed primarily for touch screen mobile devices, such as smart phones and tablet computers. |
| Linux virtualization | Virtualization is the ability to install and run multiple operating systems concurrently on a single physical machine. This is typically accomplished using a hypervisor. A hypervisor is a thin layer of software that resides between the guest operating system and the hardware. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. The Linux operating system can be virtualized. |
| Linux and cloud computing | In cloud computing, the hardware, software, and/or network resources that have historically been implemented on-site are moved offsite. This process is referred to as Infrastructure as a Service (IaaS). |
| Embedded Linux | Embedded Linux is the process of embedding Linux within intelligent devices, such as automation and control equipment, smart TVs, smart phones, and tablets. To accomplish this, the operating system is customized so it only provides the functions required by that particular device, and all the remaining unnecessary elements of the Linux kernel are removed. Once that's done, the kernel itself is embedded in flash memory chips on the given device. |
| GNU | GNU general public license (GPL), which requires the source code to remain freely available to anybody who wants it. GNU is a recursive acronym for "GNU's Not Unix!" |
| Libraries | contain pre-written code elements that the programmers can use within their programs, such as how to interface with a hard disk. For example, when a programmer needs to write data to a hard disk, the programmer does not need to know whether the machine has a SATA, IDE, or SCSI drive installed. Instead, the programmer simply calls the appropriate library and tells the operating system that it needs to write data to whatever hard drive is installed in the system, |
| Utilities | The Linux operating system includes a wide variety of utilities that can complete operating system management tasks, such as creating files and maintaining file systems, editing text files, managing the applications that are running on the system, installing new applications on the system, etc. |
| User interfaces | The Linux operating system provides the end user with a means of interacting with the operating system, the user interface. Linux provides two different user interfaces: GUI Text Based CLI |
| IaaS | Infrastructure as a Service You then pay that provider a fee to access this virtual machine through your organization's network connection. |
| SaaS | • Software as a Service (SaaS) SaaS provides access to software and data through the cloud. |
| NaaS | • Network as a Service (NaaS) NaaS provides network connectivity through the cloud. |
| STaaS | • Storage as a Service (STaaS) STaas provides access to storage devices through the cloud. |
| deamon | A daemon (also known as background processes) is a Linux or UNIX program that runs in the background. Almost all daemons have names that end with the letter "d". A type of program on the operating systems that runs unobtrusively in the background, rather than under the direct control of a user, waiting to be activated by the occurance of a specific event or condition. Daemons are usually instantiated as processes. |
| Process | A process is an executing (i.e., running) instance of a program. Processes are managed by the kernel (i.e., the core of the operating system), which assigns each a unique process identification number (PID). |
| NTP | The Network Time Protocol (NTP)(123) is used to synchronize the time on your Linux system with a centralized NTP server. A local NTP server on the network can be synchronized with an external timing source to keep all the servers in your organization in sync with an accurate time. NTP uses a hierarchy of clocks and computers for synchronizing the current time. NTP uses stepping to quickly make large adjustments to close wide time discrepancies, usually about once every 60 seconds.. |
| SSH | SSH (Secure Shell or Secure Socket Shell) (22) is a protocol used to securely log onto remote systems using encryption. SSH is the most common way to access a remote Linux system. Two major components of SSH include the SSH client and the SSH server. The SSH client is a program that is typically only run as needed. Once installed, the SSH server is a daemon that constantly runs in the background. |
| Web server | A web server is the program responsible for accepting HTTP (Hypertext Transfer Protocol) requests from web browsers or clients and, in turn, sending the clients the files that form webpages. |
| digital certificate | A digital certificate is an electronic document that can be used as proof of identification. For example, digital certificates are used between an end user and a bank to establish a trusted connection. As an end user, we trust digital certificates because we trust the entities that create the digital certificates. |
| Certificate authority | The entities that create these certificates are called certificate authorities (CAs). A few of the most public certificate authorities include GeoTrust, Comodo, Digicert, Thawte, Verisign and GoDaddy. These CAs require the person or company applying for a certificate (such as your bank) to provide documents and information that proves they are who they claim to be.. You can configure a Linux system to be a certification authority. One method of doing this is to use OpenSSL, a free open-source library. |
| FQDNs | fully qualified domain names |
| Name server | A name server resolves (or maps) the fully qualified domain names (FQDNs), such as www.TestOut.com, to their respective IP addresses and IP addresses to their respective FQDNs. |
| DHCP | The Dynamic Host Configuration Protocol (DHCP)(UDP 67 68) centralizes IP address assignment management by allowing a server (such as a Linux server) to dynamically assign IP addresses to clients. DHCP also allows users who move from network to network to easily obtain an IP address appropriate for the subnet they are connected to. The DHCP server and the client use broadcasts to communicate with each other. In many cases, you need to download and install the DHCP Server |
| SNMP | The Simple Network Management Protocol (SNMP)(161) is a protocol designed for managing complex networks and is used to communicate with and monitor network devices, servers, and more by means of the IP protocol. SNMP lets network hosts exchange configuration and status information. For example, SNMP can be used to remotely retrieve the operational statistics of a router or a firewall. On a Linux machine, SNMP runs as a daemon. In many cases, you need to download and install SNMP. |
| File servers | A Linux file server is a machine that has been set up and configured to let other machines store and retrieve files to and from a central location. In addition, using a file server can simplify backups and security. Using SMB shares and a variety of programs such as Samba or Network File System a Linux file server can share files with other Linux systems, as well as with non-Linux systems such as Windows and Mac. |
| SMB | In computer networking, Server Message Block (SMB), one version of which was also known as Common Internet File System. is a communication protocol[3] for providing shared access to files, printers, and serial ports between nodes on a network. It also provides an authenticated inter-process communication (IPC) mechanism. Most usage of SMB involves computers running Microsoft Windows, where it was known as "Microsoft Windows Network" before the introduction of Active Directory. |
| Authentication server | Most enterprise networks require centralized user authentication and access controls for all system resources. This is not only convenient for users, but also allows an administrator to monitor and audit user types and the type of access they have on each machine. It also makes provisioning and disabling user accounts easier. Linux centralized authentication (an authentication server) can be accomplished in many ways, depending on the Linux distribution being used. Some options include installing and using |
| Proxy | A proxy is a computer that provides indirect internet access to the computers in your network. In most cases, a proxy server is installed on the same computer as the firewall. Proxy servers provide increased performance and security by blocking direct access between two networks, such as the corporate network and the internet. Proxy can be configured in a variety of ways, such as using SSH tunneling or installing an app on a system that has been configured as a web server. |
| SSH tunnelin | SSH tunneling, or SSH port forwarding, is a method of transporting arbitrary data over an encrypted SSH connection. SSH tunnels allow connections made to a local port (that is, to a port on your own desktop) to be forwarded to a remote machine via a secure channel. |
| Logging | An important Linux role is the ability to capture a timeline of events that have taken place on the computer in the form of a file, which is referred to as a log file. The process of creating these logs is known as logging. Logging is enabled by default, and logs are often captured for such things as services, the Linux operating system, and applications. Although log files can be stored in a variety of places, most logs are stored in the /var/log directory or a subdirectory thereof. |
| Containers | Linux containers give you the ability to run an application (with all of the necessary libraries, dependencies, and files) in an isolated environment known as an image or container. Due to this isolation, multiple containers can be run on the same host without affecting each other or the main operating system. All containers utilize and share the same operating system kernel of the host machine, making them very lightweight and fast. Containers are highly portable. |
| VPN | A VPN (Virtual Private Network) can be installed on a Linux host and is a type of network that uses encryption to allow IP traffic to travel securely over the TCP/IP network. A VPN is primarily used to support secure communications over an untrusted network (for example, connecting two remote site by means of the internet). |
| Monitoring | Monitoring refers to the process of monitoring the essential Linux services, including such things as operating system metrics, process state, logs, service state, and file system usage. It also refers to monitoring servers' availability. Depending on the Linux distribution, monitoring information can often be gathered manually using command line monitoring tools, such as top, lsof, tcdump, and vmstat. Web-based utilities (such as Monit and Nagios) can also be installed, GUI |
| Database | A database is a structured set of data held in a computer, especially one that is accessible in various ways. In simpler terms, a database is an organized collection of various forms of data. The information stored in a database is typically organized into rows, columns, and tables. Database information is also indexed, to make it easier to find the information required. |
| Print server | When a company wants to make a printer available to multiple users over a network, this goal is typically accomplished using a print server. Print servers accept the print jobs from the users and stores them in a queue. When the appropriate printer is available, the job is sent from the queue to the printer. In addition, a print server makes printer queue and status information available to end users and network administrators. |
| CUPS | The Common UNIX Printing System, or CUPS, is the most common Linux printing system in use today. CUPS manages print jobs and queues and provides network printing using the standard Internet Printing Protocol (IPP). |
| IPP | the standard Internet Printing Protocol |
| MAU | mail user agent (MUA) (such as Evolution, Mozilla Thunderbird, or Mutt). The MUA must be configured to send and receive mail by means of a mail server or a Linux system where the mail transfer agent (MTA) has been installed. |
| MTA | mail transfer agent It is the MTA’s responsibility to then either save the message so it can be downloaded by another local user or, using the internet, send the email to the destination MTA where it will be stored for download by the intended user. Some Linux distribution may have a default MTA that can be configured and used. If one does not exist or you want to use a different email system, other MTAs can be downloaded and installed. A few common MTAs include Postfix and Qmail. |
| Mail server | A mail server is a computer that sends, receives, and stores email for users. |
| Load balancer | When a company has back-end servers that receive a significant amount of traffic (such as Netfilx, Hulu, or Airbnb), response time to these servers can be increased through load balancers by distributing the workload across the available servers. Although load balancers can be purchased as a hardware appliance, software can be installed on a Linux server, making it a load balancer. Three common Linux load balancers include • Linux Virtual Server (a free and open-source project), • Nginx • HAProxy |
| Clustering | With clustering, two or more servers are grouped together in a way to make them work like one. Clustering is often used to create a failover system, a load balance system, or a parallel processing unit. A failover cluster means that if one system fails, the other servers will take over the load, giving end-users uninterrupted access to the desired data. There are many options for building a Linux cluster, including using free open-source software (such as OpenHPC) or purchasing a commercial product. |
| A technician has been given a work order to install the Apache webserver on a system configured with a YUM repository. Which of the following commands will install the webserver? | yum install install httpd is used to install Apache on a system using a YUM repository. |
| What server roles would you implement to provide services offered by CUPS and IPP? | Print Server |
| What is the primary role of a mail transfer agent (MTA)? | Store messages so they can be downloaded or send email to a destination MTA. |
| Your company has been expanding the number of servers in the company's data center, and there is an increased need to gather metrics, watch process states, work with logs, watch services states and file system usage. What sever roles should be installed to provide this functionality? | Monitoring |
| Your company uses both Linux desktops and Windows desktops. What server roles should be used to provide a central location for users of both operating systems to share files? | File Serve |
| Alex, a webmaster, is implementing an order processing system on the company's website. What server roles should Alex implement with the order processing application? | Database |
| Your company is running a critical business application. The executive team wants to ensure the server is available at all times, even in the event of a server failure. What server roles would be used to provide a failover server in the event of a system failure? | Clustering |
| Your company recently setup a VPN and wants to use a digital certificate for authentication instead of a pre-shared key. What server roles would allow the company to provide this functionality internally instead of using an external provider? | Certificate Authority |
| Tim, a system administrator, wants to simplify the provisioning and disabling of user accounts. What server roles should Tim install and configure? | Authentication Server |
| Your company develops applications to run on Linux systems. You currently have four teams working on a different aspect of the same application. What server roles would give you the BEST method for testing all team members' code without effecting your part of the project or your operating system and personal files? | Containers |
| Capturing a timeline of events that have taken place on the computer in the form of a file. | Logging |
| A type of network that uses encryption to allow IP traffic to travel securely over the TCP/IP network | V:PN |
| Increases response time to back-end servers by distributing the workload across the available servers. | Load Balancer |
| A computer that provides indirect internet access to the computers in your network. | Proxy |
| A protocol used to communicate with and monitor network devices and servers. | SNMP |
| A protocol used to securely log on to remote systems using encryption. | SSH |
| Resolves (or maps) the fully qualified domain names (FQDNs) to IP Addresses. | Name Server |
| A program responsible for accepting HTTP (Hypertext Transfer Protocol) requests from clients. | Web Server |
| Users are complaining that they are unable to connect to any servers or the internet. Based on the symptoms they describe, you suspect that the users are not being assigned the correct IP addresses. What server roles would be the BEST role to work with to correct this issue? | DHCP |
| Users are complaining that the clocks for their operating systems do not match the current time for the location in which they live. What server roles is BEST for correcting this issue? | NTP |
| 20 | File Transfer Protocol (FTP) Data Transfer |
| 21 | File Transfer Protocol (FTP) Command Control |
| 22 | Secure Shell (SSH) |
| 23 | Telnet - Remote login service, unencrypted text messages |
| 25 | Simple Mail Transfer Protocol (SMTP) E-mail Routing |
| 53 | Domain Name System (DNS) service |
| 80 | Hypertext Transfer Protocol (HTTP) used in World Wide Web |
| 67 & 68 | The DHCP employs a connectionless service protocol UDP (User Datagram Protocol) and uses 2 UDP ports: 67 and 68. Port 67 is for a DHCP client (a destination port of a server), and port 68 is for a DHCP server (a destination port of a client) |
| 110 | Post Office Protocol (POP3) used by e-mail clients to retrieve e-mail from a server |
| 119 | Network News Transfer Protocol (NNTP) |
| 123 | Network Time Protocol (NTP) |
| 143 | Internet Message Access Protocol (IMAP) Management of Digital Mail |
| 161 | Simple Network Management Protocol (SNMP) |
| 194 | Internet Relay Chat (IRC) |
| 443 | HTTP Secure (HTTPS) HTTP over TLS/SSL |