您好,欢迎来到筏尚旅游网。
搜索
您的当前位置:首页linux考试题库(300道)

linux考试题库(300道)

来源:筏尚旅游网
使用shutdown -k命令并不真正使系统关机,而只是给用户提出警告 1 错误 2 正确 正确答案:2 提示:rx1:T

手工运行fsck的最好时机是在系统备份文件之后,这样在发现错误后,还可以利用备份文件进行修复 1 正确 2 错误 正确答案:1 提示:rx2:T

Linux 系统引导后,内核运行init程序,这个程序在处理任何其他规定的运行等级之后,在运行/etc/rc。d/rc.sysinit脚本 1 正确 2 错误 正确答案:2 提示:rx3:F

进程可以处于僵死状态,而在当前进程表中仍有记录 1 正确 2 错误 正确答案:1 提示:rx4:T

dump必须借助于其他工具才能支持备份级别 1 错误 2 正确 正确答案:2 提示:rx5:T

为了应用smbclient读取远程机power上的pub共享目录,共享目录的正确写法是//power:share 1 错误 2 正确 正确答案:1 提示:rx6:F

syslogd守护进程,不仅可以将日志记录在本地机message文件中,还可以将日志记录通过网络发送出去 1 正确 2 错误 正确答案:1 提示:rx7:T

Samba服务器可以设置成在网络下对外宣称自己是一个Windows NT服务器或Win95客户机 1 正确 2 错误 正确答案:1 提示:rx8:T

1

在fatab文件中,使用;标记注释行 1 正确 2 错误 正确答案:2 提示:rx9:F

为匹配所有的空行,可以使用如下正则表达式 ^$ 1 正确 2 错误 正确答案:1 提示:rx10:T

如果系统使用了sendmail,那么sendmail。log文件以二进制形式保存了sendmail的统计信息

1 错误 2 正确 正确答案:1 提示:rx11:F

a.out是现代Linux的可执行文件、目标文件和系统函数库的标准格式 1 正确 2 错误 正确答案:1 提示:rx12:T

Linux系统以文本文件的形式保存大部分系统日志,如lastlog 1 正确 2 错误 正确答案:2 提示:rx13:F

安装过程中,如果是使用fdisk分区工具,我们必须十分小心,因为对分区表所作的修改在每一步完成后,都会立刻反映到分区表上,除非在第二次打开fdisk后,选择删除新分区,再重新分区 1 错误 2 正确 正确答案:1 提示:rx14:F

目录树结构与文件系统是两个不同的概念,文件系统是磁盘或分区上文件的物理存放方法,而目录树结构是操作系统中管理文件的逻辑方式 1 错误 2 正确 正确答案:2 提示:rx15:T

dump不同于其它备份工具的地方在于:它直接读取文件系统,而不是通过文件系统读取文件来进行备份,这样可在不影响文件时间戳的情 况下,备份文件。 1 错误 2 正确 正确答案:2

2

提示:rx16:T

通常情况下,linux向进程传送的信号,将告诉系统内核按特殊的处理方法去处理额外的事件。 1 正确 2 错误 正确答案:2 提示:rx17:F

在samba配置文件中设置security = domain,这时samba服务器将使用远程SMB服务器(如Windows NT)进行身份验证,如果失败则自动切换 到user安全级。 1 错误 2 正确 正确答案:1 提示:rx18:F

当不存在at。allow文件的时候,那么凡不在at.deny文件中列出的用户都可以使用at。 1 错误 2 正确 正确答案:2 提示:rx19:T

Linux支持可动态装载和卸载的模块。利用模块,可方便地在内核中添加新的组件或卸载不再需要的内核组件. 1 错误 2 正确 正确答案:2 提示:rx20:T

只有root具有降低任务nice值的能力。 1 错误 2 正确 正确答案:2 提示:rx21:T

Linux系统使用nice值表示任务的优先级别,拥有负的nice值的任务优先级别较高。 1 错误 2 正确 正确答案:2 提示:rx22:T

如果是笔记本用户,一般来说制作linux启动盘时,除了利用boot.img制作启动盘外,还需要额外制作一张驱动盘,这时需要利用光盘上的pcmcia。img文件: 1 正确 2 错误 正确答案:1 提示:rx23:T

为了保证windows用户和Linux主机间用户能够正常地进行映射,用户必需保证在这两个系统上拥有相同的帐号。 1 错误 2 正确 正确答案:1

3

提示:rx24:F

运行passwd改变用户的口令,任何用户都需要输入原来的密码。 1 正确 2 错误 正确答案:2 提示:rx25:F

在目录/etc/rc。d/rc5。d下,有很多以K和S开头的链接文件,这里的以S开头的文件表示stop(停止)意思. 1 错误 2 正确 正确答案:1 提示:rx26:F

kill命令可以向一个正在运行的前台进程发送信号,终止进程的运行。 1 正确 2 错误 正确答案:2 提示:rx27:F

/tmp目录主要用于存储程序运行时生成的临时文件。 1 错误 2 正确 正确答案:2 提示:rx28:T

当客户机连接一个share安全级的服务器时,它在连接共享之前需要首先提供正确的帐号和密码以登录到该服务器。 1 正确 2 错误 正确答案:2 提示:rx29:F

在当前目录下解压归档文件this.tar.gz ,我们可以使用命令:$tar xvzf this.tar。gz 1 正确 2 错误 正确答案:1 提示:rx30:T

为了临时禁止用户ID500,我们可以采用如下方法

1 在口令影像文件中使用户的帐号到期usermod —e 00/00/00 ID500 2 删除该用户的工作目录rm -r /home/ID500

3 修改该用户的登录shell环境usermod -s /bin/safe ID500 4 将口令文件中用户名ID500的一行前加入* 正确答案:134 提示:rf_mx1:ACD

在 ______ shell环境中,使用如下的变量赋值方式:variable=5 1 bash 2 pdksh 3 tcsh

4

4 sh

正确答案:124 提示:rf_mx2:ABD

执行 su 命令后,$PATH变量被重置,一般可以通过修改/etc/login.defs中的_______ 值来改变 1 PATH

2 ENV_PATH 3 ENV_SUPATH 4 SU

正确答案:12

提示:rf_mx3:AB

在/etc/fstab文件中,我们可以看到以下信息 : 1 文件系统名 2 文件系统类型 3 文件系统大小

4 文件系统在系统中被fsck检查的顺序 正确答案:124

提示:rf_mx4:ABD

与磁盘定额服务有关的命令包括: 1 quotaon 2 quotaoff 3 repquota 4 edquota

正确答案:1234 提示:rf_mx5:ABCD

为了能够使用 ls 程序列出目录的内容,并能够使用 cd 进入该目录,操作者需要有 _____ 该目录的权限 1 读 2 写 3 执行 4 递归

正确答案:13

提示:rf_mx6:AC

假若我们监测得到的CPU空闲时间百分比较高,而系统负载又很重,那么对于当前系统性能瓶颈,我们可以估计出 ________ 信息 1 I/O

2 内存子系统

3 不在CPU子系统 4 黑客正在入侵系统 正确答案:12 提示:rf_mx7:AB

常用的输入输出重定向符号有: 1 > 2 <

5

3 〉〉 4 〈<

正确答案:1234 提示:rf_mx8:ABCD

Linux系统中的设备的类型包括: 1 块设备 2 字符设备 3 流设备 4 缓冲设备 正确答案:123

提示:rf_mx9:ABC 专家模式:

1 采用字符界面

2 提供对特殊的硬件的支持

3 操作方式也类似于字符方式的安装程序 4 需要启动通常Linux的核心 正确答案:1234

提示:rf_mx10:ABCD

NFS与分布式文件系统相比,不支持: 1 访问远程设备

2 跨越网关访问间接文件系统 3 对文件加锁 4 对目录加锁 正确答案:124

提示:rf_mx11:ABD

Linux系统安全管理的内容包括: 1 普通用户的系统安全 2 文件系统的安全 3 进程安全 4 文件内容安全 正确答案:1234 提示:rf_mx12:ABCD

下列文件中可以通过NIS服务发送出去的有: 1 passwd 2 group 3 hosts 4 rpc

正确答案:1234

提示:rf_mx13:ABCD

在/etc/passwd文件中保存的其它特殊帐户缺省情况下包括: 1 syslog 2 ftp 3 mail 4 lp

6

正确答案:234 提示:rf_mx14:BCD

bash环境中,常用的逻辑运算符有: 1 —a 2 -o 3 ! 4 !=

正确答案:123

提示:rf_mx15:ABC

为运行一个写好的shell程序,我们可以使用下列方法: 1 改变程序的属性

2 启动shell后,在外壳下运行 3 加入初使行#!/bin/sh 4 使用命令替换方式 正确答案:1234

提示:rf_mx16:ABCD

假设当前运行的PS命令的NI=5,则下述进程比PS进程运行级别高的进程有: 1 另一个终端下执行的NI= -5的ls命令 2 在系统默认状态下,执行的man命令 3 由root用户启动的NI=8的lsmod命令 4 普通用户启动的NI=0的yh命令 正确答案:24

提示:rf_mx17:BD

使用chmod命令修改文件权限时,可以使用的有关用户的选项参数有: 1 g 2 u 3 o 4 a

正确答案:1234

提示:rf_mx18:ABCD

如果需要启动内核模块化支持,我们需要启动选项: 1 enable loadable module support

2 set version information on all symbols for modules 3 kernel module loader

4 mttr(memory type range register) support 正确答案:13

提示:rf_mx19:AC

通常Linux支持的网卡类型包括: 1 令牌网卡 2 以太网卡 3 PCMCIA 4 PS/2

正确答案:123

提示:rf_mx20:ABC

7

bash环境中,常用的字符串运算符有: 1 = 2 != 3 —n 4 -z

正确答案:1234

提示:rf_mx21:ABCD

哪些命令无效?(test为一个存在的文件) 1 ls —lz test 2 ls test -l 3 ls —test l 4 ls -l test 正确答案:13

提示:rf_mx22:AC

在执行quotacheck -avug命令后,系统将会生成________文件。 1 quota。user 2 fstab

3 quota。group 4 edquota 正确答案:13

提示:rf_mx23:AC

使用 quota 可以让用户指定硬盘的储存,这包括: 1 用户使用的磁盘分区

2 用户所能够支配的索引节点数 3 用户可以使用的硬盘分区块数 4 用户可以使用的硬盘分区大小 正确答案:23

提示:rf_mx24:BC

用PS显示的进程的可能状态有: 1 进程位于就绪状态

2 由于子进程的跟踪而停止 3 进程需要更多的内存 4 进程在睡眠状态 正确答案:1234

提示:rf_mx25:ABCD 通常采用的备份方式有: 1 完全备份 2 增量备份 3 更新备份 4 冗余备份 正确答案:123

提示:rf_mx26:ABC

在 Linux 系统中常用的 shell 环境有: 1 bash

8

2 ksh 3 csh 4 pdksh

正确答案:123

提示:rf_mx27:ABC

使用 ps al 命令将显示有关进程的_______信息: 1 显示属于所有用户的进程 2 按长格式显示输出 3 显示进程环境变量

4 显示用户名和进程开始时间 正确答案:12

提示:rf_mx28:AB

系统提供的使用fdisk建立分区时输入分区大小的方式包括: 1 cylinder 2 +size 3 +sizeM 4 +sizeK

正确答案:1234

提示:rf_mx29:ABCD

使用vmstat命令,我们可以得到__________活动的信息: 1 I/O

2 内存子系统 3 CPU子系统 4 进程任务 正确答案:1234

提示:rf_mx30:ABCD 常见的IDE设备包括: 1 硬盘

2 CD—ROM驱动器 3 扫描仪 4 刻录机 正确答案:124

提示:rf_mx31:ABD

在安装软件包步骤时,为了解决软件包的相关性问题,我们最好能选上_______ 选项: 1 安装的软件包 2 安装支持的软件包 3 安装套件

4 选择全部安装方式 正确答案:2 提示:rf_sx1:B

init启动进程需要读取_______配置文件: 1 /etc/inittab 2 /sbin/init 3 /etc/sysvinit

9

4 /bin/sh 正确答案:1 提示:rf_sx2:A

NFS是一个基于核XDR和RPC顶层的应用。作为系统之间的高层借口,本地客户机把指定的操作翻译成一整套指令并传达给远程机器,然后远程机器返回传输结果,所以在使用NFS服务前,_______服务一定要打开。 1 NIS 2 NFS 3 TIP

4 PORTMAP 正确答案:4 提示:rf_sx3:D

我们可以修改默认的启动级别为_______,使得系统重启后自动采用X Window方式登录。 1 3 2 5 3 2 4 1

正确答案:2 提示:rf_sx4:B

在/etc目录下,设置Linux环境中特性的重要文件为:_______ 1 env.conf 2 bashrc 3 profile 4 。inputrc 正确答案:3 提示:rf_sx5:C

为了达到使文件的所有者有读(r)和写(w)的许可,而其他用户只能进行只读访问,在设置文件的许可值时,应当设为: _______ 1 566 2 4 3 655 4 744 正确答案:2 提示:rf_sx6:B

将Linux安装到用户MS-DOS分区上,可以选择_______安装方式. 1 字符 2 图形 3 升级

4 UMSDOS 正确答案:4 提示:rf_sx7:D

在/etc/rc。d/rc3.d目录下,有两个文件分别为S23crond和S45portmap,则这两个文件的执行顺序有_______规定: 1 同时执行

10

2 S23crond先于S45portmap执行 3 S45portmap先于S23crond执行 4 先后顺序不定 正确答案:2 提示:rf_sx8:B

为了观察正在不断增长的日志文件,我们可以使用系统提供的_______工具: 1 uptime 2 vmstat 3 tail 4 which 正确答案:3

提示:rf_sx9:C

在使用ln建立文件符号链接时,为了跨越不同的文件系统,我们需要使用_______ 1 普通链接 2 硬链接 3 软链接 4 特殊链接 正确答案:3

提示:rf_sx10:C

在/etc/crontab文件中可以定义的执行任务的小时列表栏中,可以选择的范围是: _______ 1 0—12 2 1-12 3 0—23 4 1-24

正确答案:3 提示:rf_sx11:C

我们登录后希望重新加载fstab文件中的所有条目,我们可以以root身份执行_______命令。 1 mount —d 2 mount -c 3 mount —a 4 mount -b 正确答案:3

提示:rf_sx12:C

系统当前已经加载的所有文件系统在_______文件中得到反映. 1 /usr/sbin/cfdisk 2 /sbin/fdisk 3 /etc/mtab 4 /etc/fstab 正确答案:4

提示:rf_sx13:D

为了能够把新建立的文件系统mount到系统目录中,我们还需要指定该文件系统的在整个目录结构中的位置,或称为_______ 1 子目录 2 加载点

11

3 新分区 4 目录树 正确答案:2 提示:rf_sx14:B

如果我们需要在Windows或DOS环境下制作linux的启动盘,这时应该利用 Linux 光盘上的_______文件: 1 boot。img 2 auto.bat 3 config。sys 4 pcmcia.img 正确答案:1

提示:rf_sx15:A

以下的命令将在_______自动执行:23 5 01 * * root /etc/monthly 2〉&1 | sendmail root 1 每月第23天的5:01分 2 每月第1天23:05分 3 每月第1天5:23分 4 其它时间 正确答案:3

提示:rf_sx16:C

假设我们正在运行一个进程,进程编号为ID=295;另一个进程编号为ID=3455,执行程序名称为:this。proc;如果我们不希望进程3455夺取进程295的资源,我们可以将进程3455放到后台运行,这是通过在命令行下执行命令_______来实现的。 1 this。proc & 2 this.proc ! 3 renice 3455 4 top 正确答案:1

提示:rf_sx17:A

目录/etc/rc.d/rc3.d下,有很多以K和S开头的链接文件,这里的以S开头的文件表示_______意思. 1 stop 2 start 3 sys 4 sysadmin 正确答案:2

提示:rf_sx18:B

在___ shell环境中,使用如下的变量赋值方式:set variable=5 1 bash 2 pdksh 3 tcsh 4 ksh

正确答案:3

提示:rf_sx19:C

我们可以使用tar命令的_______选项来建立一个.tar归档文件:

12

1 a 2 c 3 d 4 x

正确答案:2 提示:rf_sx20:B

Linux分区类型默认的是: _______ 1 vfat 2 ext2 3 swap 4 dos

正确答案:2 提示:rf_sx21:B

为了查看用户没有执行完成的at任务,用户可以执行: _______ 1 atrm 2 atinfo 3 atq 4 at -i

正确答案:3 提示:rf_sx22:C

Linux系统中,程序运行有若干优先级,最低的优先级是: _______ 1 18 2 19 3 10 4 20

正确答案:4 提示:rf_sx23:D

为了产生文件系统的定额信息,我们可以使用_______命令。 1 quotacheck 2 repquota 3 edquota 4 quota 正确答案:2 提示:rf_sx24:B

系统管理常用的二进制文件,一般放置在_______目录下。 1 /sbin 2 /root 3 /usr/sbin 4 /boot 正确答案:1

提示:rf_sx25:A

所有用户登陆的缺省配置文件是: _______ 1 /etc/profile 2 /etc/login.defs

13

3 /etc/。login 4 /etc/.logout 正确答案:2

提示:rf_sx26:B

编译内核有选项\"loopback device support\",该项选”y\",则: _______ 1 支持加进直接运行二进制代码 2 支持并口

3 支持把一个普通文件用作块设备 4 支持网络 正确答案:3

提示:rf_sx27:C

在/etc/fstab文件中,我们为确定引导时检查磁盘的次序,需要设置_______参数。 1 parameters 2 fs—passno 3 fs-type 4 fs-freq 正确答案:2

提示:rf_sx28:B

kill向指定的进程发出特定的信号,信号_______强制杀死进程。 1 9

2 TERM 3 6 4 14

正确答案:1 提示:rf_sx29:A

为了查找出当前用户运行的所有进程的信息,我们可以使用_______命令: 1 ps —a 2 ps —u 3 ls -a 4 ls —l 正确答案:2 提示:rf_sx30:B

为了定制XWindow,可以人工修改文件_______ 1 /etc/xwin

2 /etc/XF86Config或XF86Config-4 3 /etc/networks 4 /etc/named.boot 正确答案:2

提示:rf_sx31:B

SMB协议是基于TCP/IP实现的,它是windows下网络文件和打印共享基础。 1 正确 2 错误 正确答案:1 提示:rx1:T

14

我们可以使用fg命令将僵化进程调入前台工作。 1 正确 2 错误 正确答案:1 提示:rx2:T

由于系统需要保证/etc/smbpasswd和/etc/passwd同步,所以在密码字段上它们需要保持相同的格式。 1 正确 2 错误 正确答案:1 提示:rx3:T

网络设备不一定是物理设备,象loopback这样的设备就是纯软件设备。 1 错误 2 正确 正确答案:2 提示:rx4:T

为表述算术表达式2*(3+5),在bash环境下我们应当将其写为: $expr 2*(3+5) 1 正确 2 错误 正确答案:2 提示:rx5:F

硬盘分区方案内置于硬件和BIOS中,所以对硬盘重新分区后,相应的我们还需要在启动时,按键,进入Bios设置选单,修改硬盘参数。 1 正确 2 错误 正确答案:2 提示:rx6:F

在使用硬链接时,我们可以使硬链接跨越不同的文件系统与另一个目录链接。 1 正确 2 错误 正确答案:2 提示:rx7:F

df命令显示各种文件和目录所使用的硬盘空间数,并且可以显示系统中最多或者最少的硬盘空间的位置。 1 正确 2 错误 正确答案:2 提示:rx8:F

为了 Linux,在分区时,我们至少需要分出二个区,用来安装根(/)文件系统和交换(swap)文件系统。 1 错误 2 正确 正确答案:2 提示:rx9:T

15

在当前目录下解压归档文件this。tar。gz ,我们可以使用命令:$tar xvzf this.tar.gz 1 错误 2 正确 正确答案:2 提示:rx10:T

如果有多个SCSI硬盘,/boot启动目录必须放在标识为0的SCSI硬盘上,其它SCSI标识均不行。 1 错误 2 正确 正确答案:1 提示:rx11:F

对tar和cpio这些备份工具来说,必须借助于其他工具,才能实施备份级别。 1 错误 2 正确 正确答案:2 提示:rx12:T

我们可以通过进程日志获得关于一个确定的进程正在干什么之类的线索. 1 错误 2 正确 正确答案:2 提示:rx13:T

除root用户外,其它用户只能用kill命令终止自己的创建的进程。 1 错误 2 正确 正确答案:2 提示:rx14:T

如果用户拥有目录的写许可,则该用户可以创建、删除或修改目录中的任何文件或子目录,甚至于属于其它用户的文件和子目录。 1 正确 2 错误 正确答案:1 提示:rx15:T

Linux系统上的终端口对任何人都是可写的,从而使用户可以用write命令互相发送信息. 1 错误 2 正确 正确答案:2 提示:rx16:T

一般来说,具有偶数号的内核(例如0 、2 、4 ,等等)被认为是稳定的内核。 1 正确 2 错误 正确答案:1 提示:rx17:T

我们一般使用mknod工具来建立分区上的文件系统 1 错误

16

2 正确 正确答案:1 提示:rx18:F

系统中的每个设备都有一个主设备号,子设备号,同时拥有一个单独的设备驱动程序,主设备号用来确定使用什么驱动程序,子设备号是 设备代码,而驱动程序则是用于和设备通信的实际代码。 1 错误 2 正确 正确答案:2 提示:rx19:T

系统日志记录守护进程syslogd的配置文件 syslog.conf的配置,可以分为两个部分,第一部分用于区分消息的类型,第二部分用于设置消 息发送的目的地. 1 正确 2 错误 正确答案:1 提示:rx20:T

对于已经通过NFS输出的目录,我们可以进一步进入它的子目录,并通过NFS将子目录输出。 1 错误 2 正确 正确答案:2 提示:rx21:T

在使用fsck检查文件系统时,最好先卸载待检查的文件系统,保证它当前没有被使用。 1 错误 2 正确 正确答案:2 提示:rx22:T

NIS客户机使用ypbind进程探测本域中可用的NIS服务器. 1 错误 2 正确 正确答案:2 提示:rx23:T

安装Linux到逻辑分区是一种比较简便的方式,但是它只能工作在逻辑分区空间足够Linux系统使用的情况下. 1 错误 2 正确 正确答案:2 提示:rx24:T

我们用术语“柱面\",指示所有磁盘面的同一个磁道贯通所形成的假想的几何柱面,中心轴是硬盘的旋转轴. 1 错误 2 正确 正确答案:2 提示:rx25:T

为了建立用户的磁盘限额,我们只需要在该用户的工作目录下建立quota.user和quota.group

17

文件就可以了。 1 错误 2 正确 正确答案:1 提示:rx26:F

为了能让其它用户使用cd命令进入该目录,目录需要设置其它用户的读权限. 1 错误 2 正确 正确答案:1 提示:rx27:F

在配置/etc/nsswitch.conf文件时,我们发现在hosts行选项的次序是files nis dns,这表明在查找主机名时,将首先在/etc/hosts文件查找,然后通过N I S在映射hosts。byname中查找,最后通过DNS服务器来查找。 1 错误 2 正确 正确答案:2 提示:rx28:T

处于实验状态或开发状态下的内核,一般来说,版本号被标记为偶数号码以方便区分。 1 错误 2 正确 正确答案:1 提示:rx29:F

对笔记本电脑进行引导启动软盘映像是boot.img 1 正确 2 错误 正确答案:2 提示:rx30:F

/proc目录实际上是一个虚拟文件系统,它主要用于从内存中读取处理信息. 1 错误 2 正确 正确答案:2 提示:rx31:T

在安装过程中,如果没有设置好X Window系统,那么我们只能重新安装才能在安装结束后使用X窗口环境. 1 错误 2 正确 正确答案:1 提示:rx32:F

SCSI是工作站和服务器硬盘所采用的标准接口,在配置网络服务器时优先考虑SCSI接口磁盘。 1 正确 2 错误 正确答案:1 提示:rx33:T

18

如果使用者在一个以上的文件系统上建立文件,那么必须分别在每一文件系统上分别设置quota。 1 正确 2 错误 正确答案:1 提示:rx34:T

当客户机连接一个share安全级的服务器时,它在连接共享之前需要首先提供正确的帐号和密码以登录到该服务器. 1 正确 2 错误 正确答案:2 提示:rx35:F

使用 ps aex 命令将显示有关进程的_______信息: 1 显示属于所有用户的进程 2 显示没有控制tty的进程 3 显示进程环境变量

4 显示用户名和进程开始时间 正确答案:124

提示:rf_mx1:ABD

如果我们需要在Linux下安装一个新的硬件设备,而这个设备在已经安装的Linux内核中并不支持,这时我们可以尝试采取_________的方法: 1 安装新内核 2 重新配置内核 3 安装设备驱动 4 没有办法 正确答案:123 提示:rf_mx2:ABC

常用的备份工具中不能直接实现备份级别,而是必须借助于其它工具才能实现的包括: 1 tar 2 dump 3 cpio 4 afio

正确答案:123 提示:rf_mx3:ABC

bash环境中,常用的文件运算符有: 1 —x 2 —w 3 —ne 4 —d

正确答案:124

提示:rf_mx4:ABD

假设当前系统具有C. D。 E. F四个分区。它们分成两类,C盘是Windows 98的主分区。D. E. F三个分区都是逻辑分区,它们都属于Windows 98的扩展分区.Windows 98的主分区和扩展分区占据了整个硬盘空间。下面说法正确的是:

19

1 逻辑分区是在扩展分区中的分区 2 逻辑分区属于扩展分区

3 因此为了能够留出空间作为物理分区,必须先删除所有的逻辑分区然后再删除扩展分区。 4 逻辑分区的删除顺序是从后向前 正确答案:1234 提示:rf_mx5:ABCD

为了生成XF86Config文件,我们可以使用_________命令: 1 xf86config 2 Xconfigurator 3 xinit 4 startx 正确答案:12 提示:rf_mx6:AB

一个完整的 smb。conf 文件中关于linux打印机的设置条目有: 1 browseable 2 public 3 path 4 guest ok 正确答案:1234

提示:rf_mx7:ABCD

如果在配置内核时,我们选择启用模块支持,则一般说来我们需要运行_______以在系统中编译安装合适的模块。 1 make clean 2 make modules

3 make modules_install 4 make zlilo 正确答案:23 提示:rf_mx8:BC

bash使用的运算符有: 1 数值运算符 2 文件运算符 3 字符串运算符 4 逻辑运算符 正确答案:1234

提示:rf_mx9:ABCD

Linux交换分区的作用是: 1 存放临时文件 2 完成虚拟存储

3 用磁盘空间模拟硬盘空间

4 允许应用程序使用多于实际内存的存储容量 正确答案:124

提示:rf_mx10:ABD

系统管理员用户管理的内容,主要包括: 1 用户账号的建立

20

2 用户登录系统后相关环境的设定 3 用户可使用资源的配置 4 处理用户口令. 安全性问题 正确答案:1234

提示:rf_mx11:ABCD

下列文件中可以通过NIS服务发送出去的有: 1 protocols 2 mail 3 netid 4 passwd 正确答案:1234

提示:rf_mx12:ABCD

下述命令中与打印服务有关的命令有: 1 lprm 2 lpc 3 lpq 4 lpd

正确答案:1234

提示:rf_mx13:ABCD Linux的内核版本包括: 1 主版本号 2 次版本号 3 二次版本号 4 修正号 正确答案:124

提示:rf_mx14:ABD

为了监测系统的性能,我们需要关心_________子系统. 1 CPU 2 内存 3 磁盘IO 4 网络IO 正确答案:1234

提示:rf_mx15:ABCD

与正则表达式 [^0-9] 匹配的表达式有: 1 0 2 a 3 * 4 %

正确答案:234

提示:rf_mx16:BCD

fsck对文件系统的检查包括检查文件系统的________部分. 1 MBR 2 磁盘块 3 超级块

21

4 块链表 正确答案:234

提示:rf_mx17:BCD

与正则表达式[^a-zA-Z]匹配的表达式有: 1 a 2 9 3 * 4 %

正确答案:234

提示:rf_mx18:BCD

下列设备中,一般情况下是字符设备的有: 1 终端 2 键盘 3 游戏杆 4 硬盘

正确答案:123

提示:rf_mx19:ABC

cron 的守护程序 crond 启动时将会扫描________,查找由 root 或其他系统用户输入的定期调度的作业。 1 /etc/crontab 2 /var/spool/cron 3 /etc/cron.conf 4 /etc/nsswitch.conf 正确答案:12 提示:rf_mx20:AB

安装时候出现:“running /sbin/loader”表示: 1 正在运行安装程序的加载程序 2 已经完成了Linux核心的启动 3 安装已经完成

4 安装失败,运行诊断程序 正确答案:12

提示:rf_mx21:AB

下面出现的_________情况,都可能导致mount命令出错。 1 指定的是一个不正确的设备名 2 设备不可读

3 试图在一个不存在的安装点安装设备 4 文件系统存在碎片 正确答案:123 提示:rf_mx22:ABC

下列设备中,在一般情况下属于块设备的有: 1 硬盘 2 软盘 3 终端 4 CD-ROM

22

正确答案:124

提示:rf_mx23:ABD

通过使用不同的选项,ps命令可以报告下列信息: 1 父进程ID

2 利用的CPU时间 3 用户ID 4 组ID 正确答案:123

提示:rf_mx24:ABC

在安装过程中,我们可以选择将LILO安装在硬盘上的 _______位置。 1 主启动扇区(MBR) 2 根分区的第一个扇区 3 /boot子目录 4 / 分区 正确答案:12

提示:rf_mx25:AB

内核程序提供的使程序互相通信的机制包括: 1 共享内存 2 资源定位 3 信号标志 4 消息队列 正确答案:134

提示:rf_mx26:ACD

在smb.conf文件中有如下的表达%U,该表达的含义是: 1 当前服务使用的用户名 2 sambar的一个宏替换 3 当前会话使用的用户名 4 客户机的NetBIOS名 正确答案:23

提示:rf_mx27:BC

使用vmstat命令显示系统交换内存使用情况时,输出数据包括: 1 从磁盘换入的内存情况(si) 2 换出到磁盘的内存情况(so) 3 发送到块设备的数据块(bi) 4 从块设备收到的数据块(bo) 正确答案:1234

提示:rf_mx28:ABCD

文件系统是操作系统用于明确磁盘或分区上文件的方法和数据结构,将已经分区成功的磁盘中的一个分区作为文件系统使用,需要进行 ________操作。 1 重新分区 2 建立目录 3 建立文件系统 4 初使化 正确答案:34

23

提示:rf_mx29:CD

对于_________日志文件,这些文件是用二进制形式保存的,不能使用普通的编辑器观看,必须借助于其它一些工具,如。 1 /var/log/wtmp 2 /var/run/utmp 3 /var/log/lastlog 4 /var/log/lastcomm 正确答案:123

提示:rf_mx30:ABC

硬盘可以设置的分区类型有: 1 基本分区 2 扩展分区 3 逻辑分区 4 主分区 正确答案:234

提示:rf_mx31:BCD

下述正则表达式意思相同的有: 1 [ 0 1 2 3 4 5 ] 2 [ 0—5 ] 3 [ 0 1—5 ] 4 [ 0-2 3-5] 正确答案:1234

提示:rf_mx32:ABCD

通过使用不同的选项,ps 命令可以报告下列信息: 1 进程ID

2 进程当前状态 3 调度级别 4 进程地址 正确答案:123

提示:rf_mx33:ABC

Linux系统的核心代码存放于目录: 1 /usr/src/linux

2 /usr/src/linux—x。y。z(x.y.z是内核的版本号) 3 /etc/sysconjfig 4 /usr/lib/src 正确答案:12 提示:rf_mx34:AB

Linux系统支持的鼠标接口类型有: 1 PS/2 2 Serial 3 Com1 4 USB 正确答案:123

提示:rf_mx35:ABC

24

常用的备份工具有: 1 tar 2 cpio 3 dump 4 fsck

正确答案:123

提示:rf_mx36:ABC

在用户$HOME下,与用户登录系统后的登录环境有关的文件包括: 1 env.conf 2 bashrc

3 .bash_profile 4 .inputrc 正确答案:234

提示:rf_mx37:BCD PQMagic是一个: 1 分区工具 2 病毒

3 执行的时候不能终止系统

4 可能导致整个文件系统的不可恢复 正确答案:134

提示:rf_mx38:ACD

为了防止误删除,我们最好设置rm(删除指令)确认删除选项,即_______开关. 1 -f 2 —R 3 -r 4 —i 正确答案:4 提示:rf_sx1:D

以下的命令将在_______自动执行:06 23 * * 03 lp /usr/local/message | mail -s ”today’s message\" root

1 每周三23:06分 2 每周三06:23分 3 每周六23:03分 4 每周六03:23分 正确答案:1 提示:rf_sx2:A

我们强制用户或组使用软限额时,可以通过_______设置用户超过此数额的宽限时间 1 quotaon 2 quota -u 3 quota —t 4 edquota —t 正确答案:4 提示:rf_sx3:D 一般来说,使用fdisk命令的最后一步是使用_______选项命令将改动写入硬盘的当前分区表

25

中. 1 p 2 r 3 x 4 w

正确答案:4 提示:rf_sx4:D

为了使客户机知道如何去寻找域中所连的服务器,客户机使用_______进程探测本域中可用的NIS服务器。 1 rpc.nfsd 2 portmap 3 rpc。mountd 4 ypbind 正确答案:4

提示:rf_sx5:D

通常Linux的init程序风格采用的是_______形式的init. 1 Unix Sys V. 2 BSD 3 Ipv6 4 Solaris 正确答案:1 提示:rf_sx6:A

为了统计文件系统中未用的磁盘空间,我们可以使用_______命令。 1 du 2 df 3 mount 4 ln

正确答案:2 提示:rf_sx7:B

为了显示已经被Linux识别出的机器硬件配置情况,我们可以在使用_______命令: 1 df 2 inetd 3 uname 4 dmesg 正确答案:4 提示:rf_sx8:D

使用nfs服务时,我们需要在_____文件中指定服务内容: 1 /etc/fstab 2 /etc/exports 3 /etc/mountd 4 /etc/crontab 正确答案:2 提示:rf_sx9:B

我们可以在LILO: 提示符出现之前按下ALT或SHIFT键,采取rescue引导方式,使LINUX

26

进入_______模式,以对系统进行修复。 1 紧急模式 2 安全模式 3 单用户模式 4 非正常模式 正确答案:3

提示:rf_sx10:C

我们可以使用tar命令的_______选项来还原一个.tar归档文件: 1 a 2 c 3 d 4 x

正确答案:4

提示:rf_sx11:D

LILO的配置文件是:_______ 1 /etc/conf

2 /etc/lilo。conf 3 /proc/kcore 4 /usr/local/ 正确答案:2 提示:rf_sx12:B

在使用RAID0+1方式工作时,至少需要_______块硬盘。 1 1 2 2 3 3 4 4

正确答案:4 提示:rf_sx13:D

假设你是超级用户,需要给普通用户发布通知,需要修改文件: _______ 1 /etc/issue 2 /etc/inittab 3 /etc/motd

4 /etc/organization 正确答案:3 提示:rf_sx14:C

为使来访者具有一定的权限同时保证系统的安全,我们一般将guest acount 来宾帐户设置为_______ 1 guest 2 nobody 3 other 4 common 正确答案:1 提示:rf_sx15:A

安装通常Linux需要正确的设定BIOS,一般应该关闭Memory Hole选项,其作用是: _______

27

1 防止Linux仅仅检测到16M内存 2 避免Lilo死机

3 让Linux正确的检测的网卡 4 支持从光盘启动 正确答案:1

提示:rf_sx16:A

Linux存放专用信息譬如磁盘块总数的块是。 _______ 1 1 2 2 3 3 4 4

正确答案:1 提示:rf_sx17:A

在/etc/fstab文件中,使用_______标志标记注释行: 1 # 2 ! 3 ; 4 /

正确答案:1

提示:rf_sx18:A

tar命令的r选项命令含义是:_______ 1 产生一个归档

2 向归档文件末尾增加新的文件

3 将归档内容与文件系统上的文件作比较 4 使用gzip/gunzip来压缩归档文件 正确答案:2

提示:rf_sx19:B

在smb。conf文件中有如下的表达%T,该表达的含义是: _______ 1 当前的日期 2 当前的时间

3 当前的日期和时间 4 系统配置的时间 正确答案:3

提示:rf_sx20:C

使用PS获取当前运行进程的信息时,输出内容PPID的含义为:_______ 1 进程的用户ID 2 进程调度的级别 3 进程ID 4 父进程ID 正确答案:4

提示:rf_sx21:D

为了通过电子邮件获取linux相关信息,我们可以采取_______方式。 1 WWW资源 2 邮件列表

28

3 BBS 4 新闻组 正确答案:2 提示:rf_sx22:B

为了查看用户使用了多少磁盘空间,我们可以使用: _______ 1 quota –u user 2 df —t 3 which user 4 man user 正确答案:2 提示:rf_sx23:B

在缺省情况下,使用ls —-color命令显示当前目录下的所有文件时,对于链接文件一般显示为: _______ 1 红 2 绿 3 黄 4 蓝

正确答案:4

提示:rf_sx24:D

init的运行等级一般说来有_______个等级. 1 4 2 5 3 6 4 3

正确答案:3 提示:rf_sx25:C

使用raid设备的配置文件为_______。 1 /etc/mkraid 2 /etc/raidtab 3 /etc/raid.conf 4 /etc/raidconf 正确答案:4

提示:rf_sx26:D

设定动态链接库的路径,可以修改_______文件。 1 /etc/issue 2 /etc/inittab

3 /etc/ld。so。cache 4 /etc/ld。so.conf 正确答案:4

提示:rf_sx27:D

系统当前已经加载的所有文件系统在___________文件中得到反映。 1 /usr/sbin/cfdisk 2 /sbin/fdisk 3 /etc/mtab

29

4 /etc/fstab 正确答案:3 提示:rf_sx28:C

/etc/login.access可以控制用户登陆权限,它的一行包括三个字段,用字符__表示允许访问本机器. 1 - 2 + 3 | 4 !

正确答案:4

提示:rf_sx29:D

在/etc目录下,用来设置Linux环境常用命令的别名的重要文件为:___________ 1 env。conf 2 bashrc 3 profile 4 。inputrc 正确答案:3 提示:rf_sx30:C

我们可以修改/etc/inittab文件中类似于_______的一行,调整启动级别,使得系统登录时采用X Window方式. 1 id:3:initdefault 2 si::sysinit:/etc/rc。d/rc.sysinit

3 x:5:respawn:/usr/bin/X11/kdm —nodaemon 4 ca::ctrlaltdel:/sbin/shutdown –t5 –r now 正确答案:1 提示:rf_sx31:A

在文件/etc/inittab中,我们为了控制进程mingetty,使得登录用户退出终止mingetty进程后,该进程能重新启动,我们需要在运行级别后加上____ 指令: 1 wait 2 boot 3 respawn 4 ondemand 正确答案:3 提示:rf_sx32:C

当系统工作负载增加时,CPU的_______将占很大比重。 1 用户时间 2 系统时间 3 空闲时间 4 进程时间 正确答案:1

提示:rf_sx33:A

对于SMP(对称多处理机)的CPU性能监视来说,我们可以用vmstat命令得到每个CPU的工作负荷情况。 1 正确

30

2 错误 正确答案:2 提示:rx1:F

一个多协议支持的X终端上的用户,可以在与大型主机和另外一个Linux系统进行会话的同时,还可以通过拨号方式再与其他系统进行连接和会话. 1 正确 2 错误 正确答案:1 提示:rx2:T

我们可以通过进程日志获得关于一个确定的进程正在干什么之类的线索. 1 错误 2 正确 正确答案:2 提示:rx3:T

为了启动一个放在后台运行的任务,我们需要使用该项任务的进程号,如PID=143,我们可以使用fg %123将该项任务转为前台。 1 错误 2 正确 正确答案:2 提示:rx4:T

在使用NIS的情况下,大量的机器为了便于管理,可以被分组到不同的NIS域中,每一个NIS域均可设置自己的主从服务器。 1 正确 2 错误 正确答案:1 提示:rx5:T

最初,syslog只是为了sendmail而设计的消息日志工具,由于它提供了一个中心控制点,使得sys log非常好用和易配置,因此当今很多程 序都使用syslog来发送它们的记录信息。 1 正确 2 错误 正确答案:1 提示:rx6:T

一条ATA通道可以支持最多两台设备,分别作为主盘和副盘使用,并且同一时间内只能对每条通道上的一台设备进行访问。 1 正确 2 错误 正确答案:1 提示:rx7:T

如果我们需要卸载已经安装成功的Linux,我们可以选择安装方式中的卸载方式,或直接在Windows下使用format命令格式化Linux分区. 1 正确 2 错误 正确答案:1 提示:rx8:T

31

脚本/etc/rc。d/rc.local,在运行级别为单用户方式时,不被执行。 1 正确 2 错误 正确答案:1 提示:rx9:T

通常情况下,linux向进程传送的信号,将告诉系统内核按特殊的处理方法去处理额外的事件。 1 错误 2 正确 正确答案:1 提示:rx10:F

只有系统超级用户才能设置crontab文件,安排定时执行任务,这些任务一般是与系统管理相关的。 1 正确 2 错误 正确答案:1 提示:rx11:T

对于任何一个非启动分区来说,它们均有一个启动扇区。 1 正确 2 错误 正确答案:1 提示:rx12:T

在linux系统下,X Window主要是指系统底层的标准图形工具,而应用程序所依赖的基本图形操作由程序自己维护。 1 正确 2 错误 正确答案:1 提示:rx13:T

当不存在at.allow文件的时候,那么凡不在at。deny文件中列出的用户都可以使用at。 1 错误 2 正确 正确答案:2 提示:rx14:T

进程的拥有者和root具有把进程的nice值降低的能力,但是除root外,却不能把进程的nice值升高。 1 正确 2 错误 正确答案:2 提示:rx15:F

Linux的软件包是的,可以单独安装任何软件包。 1 正确 2 错误 正确答案:2 提示:rx16:F

32

一个进程既可以在前台也可以在后台运行,一个挂起的进程可以在它挂起的地方继续运行。 1 正确 2 错误 正确答案:1 提示:rx17:T

在/etc/fstab文件中,我们为允许linux将加载的文件系统可卸出,需要设置fs—passno参数。 1 错误 2 正确 正确答案:1 提示:rx18:F

mkinitrd命令在SCSI系统中虽然十分重要,但对IDE系统而言却并不是很重要. 1 错误 2 正确 正确答案:2 提示:rx19:T

在进行系统内核配置时,假若当前系统使用可刻写的CD-ROM,需要打开回送设备loopback选项。 1 正确 2 错误 正确答案:1 提示:rx20:T

在系统日志文件/var/log/wtmp中保存了所有的用户登录、退出信息,以及系统的启动、停机记录。 1 错误 2 正确 正确答案:2 提示:rx21:T

通过配置客户机的/etc/fstab文件,可以使客户机进入多用户模式时自动安装远程文件系统,这需要每个在启动时安装的远程文件系统都应该在/etc/fstab中有一个登记项。 1 错误 2 正确 正确答案:2 提示:rx22:T

在Linux系统中,字符设备依靠自己实现IO缓冲,而块设备通常以512或1024字节节(甚至更大)的块进行通信,是通过系统内核实现IO缓冲 。 1 错误 2 正确 正确答案:2 提示:rx23:T

在安装过程中设置分区是,我们可以设置使用Raid磁盘阵列方式. 1 错误 2 正确 正确答案:2 提示:rx24:T

33

在设置文件许可值时,我们发现一个文件的许可值为2755,这说明该文件设置了set—UID位。 1 错误 2 正确 正确答案:1 提示:rx25:F

Linux内核是压缩后安装的,所以在内核加载入内存中后的第一步任务是自行解压。 1 错误 2 正确 正确答案:2 提示:rx26:T

RAID是一种由多块廉价磁盘构成的冗余阵列,使用RAID技术可以充分发挥出多块硬盘的优势,实现远远超出任何一块单独硬盘的速度和吞吐量。 1 正确 2 错误 正确答案:2 提示:rx27:F

Linux系统通过对硬件的,使用户进程不能直接访问任何物理部件. 1 正确 2 错误 正确答案:2 提示:rx28:F

目录树结构与文件系统是二个不同的概念,文件系统是磁盘或分区上文件的逻辑存放方法,而目录树结构是操作系统中管理文件的方式。 1 错误 2 正确 正确答案:2 提示:rx29:T

linux系统给每个进程分配唯一的进程ID,用户在进程存在期间用进程ID标识一个进程。 1 正确 2 错误 正确答案:1 提示:rx30:T

磁盘定额的hard只有在设置了缓冲期限时才会运行. 1 正确 2 错误 正确答案:2 提示:rx31:F

改变用户的初使设置文件/etc/default/useradd中,EXPIRE一行内容,加入用户账号被禁止的时间,只有当使用口令影像shadow时,才能起作用。 1 错误 2 正确 正确答案:1 提示:rx32:F

34

fsck对文件系统的检查最先是从文件系统的块链表开始的. 1 正确 2 错误 正确答案:2 提示:rx33:F

为表述算术表达式2*(3+5),在bash环境下我们应当将其写为:$expr 2\\*\\(3\\+5\\) 1 错误 2 正确 正确答案:2 提示:rx34:T

Linux系统中所有的文件都被连接到一个总的目录树中。 1 正确 2 错误 正确答案:1 提示:rx35:T

对于Linux系统中的用户而言,个人的crontab文件的统一格式为:<*#*br *#*〉#minute hour mday month wd command 1 正确 2 错误 正确答案:1 提示:rx36:T

rawrite制作引导软盘,仅仅把数据写了进去没有进行校验,是否能够成功启动安装是个未知数。 1 错误 2 正确 正确答案:2 提示:rx37:T

我们用edquota修改用户或组的磁盘限额时,必须将用户或组的硬限额(hard)设置得小于软限额(soft)的数值。 1 错误 2 正确 正确答案:1 提示:rx38:F

/dev/null 是空的虚拟设备,属于字符设备类型。 1 错误 2 正确 正确答案:2 提示:rx39:T

进程的n i c e 值越低,它占用的C P U 周期越多。 1 正确 2 错误 正确答案:1 提示:rx40:T

使用fsck检查文件系统时,应该:

35

1 卸载(unmount)将要检查的文件系统 2 一定要在单用户模式下进行

3 最好使用-t选项指定要检查的文件系统类型

4 在linux下,运行fsck对文件系统进行了改变后不必重新启动系统,系统已经将正确的信息读入. 正确答案:13 提示:rf_mx1:AC

下面哪些建议有利于增加硬盘空间?

1 将很少使用的文件和目录备份到软盘,必要的时候再装入 2 定期删除临时文件

3 使用find –size查找异常大小的文件,删除特别大的或不断增大的文件 4 定期删除core文件 正确答案:1234

提示:rf_mx2:ABCD

一般说来,系统中的逻辑分区编号表示为hdax形式时,编号可能为________ 1 3 2 4 3 5 4 6

正确答案:34

提示:rf_mx3:CD

在linux系统中,以下的设备文件_______与音频设备有关: 1 /dev/dsp* 2 /dev/mixer 3 /dev/music 4 /dev/lsmod 正确答案:123 提示:rf_mx4:ABC

关于Linux内核版本说法正确的有:

1 遵循主版本号。次版本号。修正次数的约定 2 1.2.2.0表示稳定的发行版

3 2.2。6表示对内核2。2的第6次修正 4 1。3表示开发版本 正确答案:1234

提示:rf_mx5:ABCD

Linux中设备文件的主要内容包括: 1 设备权限 2 设备类型 3 主设备号 4 子设备号 正确答案:1234 提示:rf_mx6:ABCD

inittab文件是系统管理员需要了解的一个重要文件,下面是它若干行的内容:”id:3:initdefault: si:S:sysinit:/etc/rc.d/rs。S .。.”下面说法正确的是:

36

1 缺省的运行级别设为3

2 第二条记录表示init系统启动时运行/ etc/rc.d/rc.S 3 si为整个inittab文件中应该是唯一的 4 第二行包含了基本的系统初始化命令 正确答案:1234 提示:rf_mx7:ABCD

进程_______使得本地文件目录能被NFS客户通过网络安装。 1 rpc。nfsd 2 portmap 3 rpc。mountd 4 exportfs 正确答案:24

提示:rf_mx8:BD

在配置/etc/nsswitch.conf文件时,我们选择系统在搜索NIS服务时的搜索顺序包括: 1 files 2 nis 3 nisplus 4 dns

正确答案:124 提示:rf_mx9:ABD

在/var/log目录下保存的lastlog日志文件保存了系统的_____信息: 1 用户的最后一次登录信息 2 用户最后一次登录的时间 3 用户最后一次登录的地点 4 用户最后一次登录的出错程序 正确答案:234

提示:rf_mx10:BCD

在一般情况下,为进行备份工作,我们需要权衡_______这些问题: 1 备份介质 2 备份策略 3 备份工具 4 备份地点 正确答案:13

提示:rf_mx11:AC

使用ps命令得到当前进程动行状态时,一般情况下的输出包括: 1 pid 2 tty 3 status 4 command 正确答案:1234

提示:rf_mx12:ABCD

CPU的状态可以分为忙和空闲两类;当CPU忙时,可能正在执行用户态的程序也可能在内核态下执行,当CPU为空闲时,一般来说,此时CPU正在__________ 1 等待I/O

37

2 与进程通信 3 执行后台任务 4 没有任务 正确答案:14

提示:rf_mx13:AD 使用 tar cvz 命令将: 1 建立一个归档文件

2 从一个特定的归档文件中还原内容 3 显示执行的过程 4 使用压缩或解压方式 正确答案:134

提示:rf_mx14:ACD

为了使用当前系统中安装的光驱设备和存在的Window95分区,我们需要在配置系统内核的分区系统支持时,一般情况下我们需要选择对_______文件系统的支持: 1 iso9660 2 msdos 3 vfat 4 hpfs

正确答案:123

提示:rf_mx15:ABC

为了规划进程的工作,我们可以使用________工具. 1 at 2 fg 3 cron 4 &

正确答案:1234

提示:rf_mx16:ABCD

在使用NIS的情况下,大量的机器为了便于管理,可以被分组到不同的 _________中,每一个__________均可设置自己的主从服务器。 1 DNS域 2 NIS域 3 NET域 4 GROUP域 正确答案:12

提示:rf_mx17:AB

为了设置共享库的搜索目录,可以: 1 修改/etc/ld.so。conf文件

2 设置环境变量 LD_LIBRARY_PATH 3 设置环境变量PATH 4 修改/etc/ld。conf文件 正确答案:12

提示:rf_mx18:AB

除了用户自定义的变量外,linux还使用: 1 位置变量

38

2 系统变量

3 与执行进程相关变量 4 信号量变量 正确答案:123

提示:rf_mx19:ABC

samba 所提供的安全级别包括: 1 share 2 user 3 server 4 domain

正确答案:1234

提示:rf_mx20:ABCD NIS服务器通常包括: 1 主服务器 2 从服务器 3 二级服务器 4 域名服务器 正确答案:1234

提示:rf_mx21:ABCD

下列表示中属于文件运算符的有: 1 〉 2 -x 3 -O 4 ||

正确答案:23

提示:rf_mx22:BC

以下给变量赋值的方法中,在bash下合理的有: 1 variable=this is a tested ip 2 variable=\" this is a tested ip” 3 variable='this is a tested ip’ 4 variable=this\\ is\\ a\\ tested\\ ip 正确答案:234

提示:rf_mx23:BCD

在安装分区完成后,一般来说,需要格式化_______这几个分区的文件系统。 1 / 2 /usr 3 /swap 4 /var

正确答案:1234

提示:rf_mx24:ABCD

创建一个用户帐号对于系统来说,需要完成的步骤包括: 1 增加/etc/passwd记录 2 创建用户的主目录

3 设置用户的缺省配置文件

39

4 生成相应的日志文件 正确答案:1234

提示:rf_mx25:ABCD

客户机上安装NFS文件系统,可以使用下面哪种方法:

1 配置etc/fstab文件,在系统启动时自动安装远程文件系统 2 配置etc/exports文件,在系统启动时自动安装远程文件系统 3 管理员使用mount命令手工安装 4 普通用户使用Create命令手工安装 正确答案:13

提示:rf_mx26:AC

执行下列命令后,结果相同的有: 1 cd ~

2 cd $HOME 3 cd /home 4 cd $PS1 正确答案:12

提示:rf_mx27:AB

Lilo启动的时候,出现如下的信息:\"LI”,说明:_______ 1 LILO第二部分已经加载

2 LILO在第二部分出错的地方加载

3 用户的分区情况改变,没有重新安装LILO 4 第一部分加载,第二部分出错。 正确答案:3 提示:rf_sx1:C

PQMagic不能处理哪种格式的文件系统? _______ 1 FAT 2 FAT32 3 NTFS 4 ISO900 正确答案:4 提示:rf_sx2:D 我们采用root身份,使用命令ln –s建立当前目录下test(文件属主为guest)的符号链接test。link,并将test。link的属主由root改变为nobody,则最后文件test的属主为: _______ 1 root 2 guest 3 nobody 4 其它 正确答案:2 提示:rf_sx3:B

在Linux系统中,硬件设备大部分是安装在______目录下的. 1 /mnt 2 /dev 3 /proc 4 /swap

40

正确答案:2 提示:rf_sx4:B

比较重要的系统配置资料,一般来说大部分位于____目录下,如果是进行升级安装,最好先备份。 1 /boot 2 /etc 3 /home 4 /usr 正确答案:2 提示:rf_sx5:B

使用fdisk分区工具的p选项观察分区表情况时,为标记可引导分区,使用_____标志: 1 a 2 * 3 @ 4 +

正确答案:2 提示:rf_sx6:B

系统默认的进程启动后的nice值为: ___________ 1 0 2 1 3 5 4 10

正确答案:1 提示:rf_sx7:A

一个设置了a 标志的分区,是系统中的________ 1 主分区 2 逻辑分区 3 活动分区 4 额外分区 正确答案:3 提示:rf_sx8:C

设置从光盘引导需要改变: _______ 1 Linux设置 2 BIOS设置 3 跳线 4 重新分区 正确答案:2 提示:rf_sx9:B

为匹配以001开头的行,我们可以使用如下的正则表达式: _______ 1 ^001 2 $001 3 *001 4 \\001

正确答案:1

41

提示:rf_sx10:A

多个Linux系统共存的时候,进行升级需要: _______ 1 删除其他Linux系统,仅仅保留一个 2 不能完成升级

3 指定指定需要升级的主分区 4 多个Linux系统同时升级 正确答案:3

提示:rf_sx11:C

一般来说,linux系统下的各种系统记录文件log主要是存放在系统中的_____目录下: 1 /tmp 2 /var 3 /proc 4 /usr 正确答案:2 提示:rf_sx12:B

网络信息系统可缩写为_______,提供了一个简易的网络查询服务,由单一主机保存所有网络信息处理的文件和数据库,并能使网络信息在其它所有主机上传送。 1 NIS 2 NFS 3 TIP 4 YP 正确答案:1

提示:rf_sx13:A

我们可以通过设置条目_______来控制可以访问samba共享服务的合法主机名. 1 allowed 2 hosts valid 3 hosts allow 4 public 正确答案:3

提示:rf_sx14:C

一般说来,通常Linux内核的源程序可以在_______目录下找到。 1 /usr/local 2 /usr/src 3 /lib

4 /usr/share 正确答案:2

提示:rf_sx15:B

以下所列出的目录中,最有可能为空的目录是: _______ 1 /usr/local 2 /tmp 3 /opt 4 /lib 正确答案:2

提示:rf_sx16:B

42

Lilo配置文件中有如下的一行:append=\"mem=128M”,其含义是: _______ 1 设定Linux的交换分区使用的物理内存 2 设定Linux物理内存大小 3 设定高速缓存大小 4 设定磁盘缓冲区大小 正确答案:4 提示:rf_sx17:D

在Linux运行环境下,删除Lilo的命令是(假设Lilo安装在hda):_______ 1 lilo –u /dev/hda 2 lilo –d /dev/hda 3 lilo –r /dev/hda 4 /dev/hda 正确答案:2

提示:rf_sx18:B

为使来访者具有一定的权限同时保证系统的安全,我们一般将guest acount 来宾帐户设置为_______ 1 guest 2 nobody 3 other 4 common 正确答案:2

提示:rf_sx19:B

在 diff 命令中,—b参数表示的意思是: 1 忽略空格造成的不同 2 忽略空行造成的不同 3 忽略大小写的变化 4 使用纲要输出格式 正确答案:1

提示:rf_sx20:A

uniq test 等价的命令是: 1 uniq –du test 2 uniq –c test 3 uniq –u test 4 uniq –d test 正确答案:3

提示:rf_sx21:C /root目录是: 1 系统的根目录 2 超级用户的主目录 3 动态连接库 4 系统管理程序 正确答案:2 提示:rf_sx22:B

chmod为了表示“目标文件只有这些权限\",可以用符号_____

43

1 = 2 + 3 — 4 ! 正确答案:1

提示:rf_sx23:A

检查文件系统完整性的命令是: 1 fsck 2 mv 3 mount 4 cp 正确答案:1

提示:rf_sx24:A

下面的哪一个shell具有自动补齐功能? 1 csh 2 tcsh 3 bash 4 sh

正确答案:3 提示:rf_sx25:C

在gzip命令中,—t的作用是: 1 解压

2 显示压缩文件 3 检验压缩文件 4 删除压缩文件 正确答案:3 提示:rf_sx26:C 管道符是: 1 || 2 | 3 << 4 //

正确答案:2

提示:rf_sx27:B

at命令中需要从标准输入中读入所有 的命令,不能指定_______选项。 1 -q 2 —b 3 -d 4 —f

正确答案:2 提示:rf_sx28:B

chmod中通过指定”ugoa”可以控制哪些用户对某文件(目录)的权限可以被改变,其中”a\"表示:

1 文件的所有者

44

2 其他组的用户

3 与文件所有者同组的用户 4 所有用户 正确答案:4 提示:rf_sx29:D wall可以: 1 设置防火墙

2 向所有用户广播信息

3 定位帮助文件、源代码文件、执行文件 4 显示命令的全路径 正确答案:2

提示:rf_sx30:B

哪一个不是解包工具: 1 tar 2 gzip 3 zless

4 zcompress 正确答案:4

提示:rf_sx31:D

用下列命令查看Linux使用了多少内存 1 cat /proc/meminfo 2 cat /bin/meminfo 3 vi /proc/meminfo

4 vi /user/local/meminfo 正确答案:1 提示:rf_sx32:A

有如下的命令:$dd if=f1 of=f2。其中if=f1表示: 1 以f1作为源文件 代替标准输入 2 以f1作为目标文件代替标准输出

3 当条件满足f1的时候,执行真正的拷贝 4 拷贝的过程中,不转化文件 正确答案:1 提示:rf_sx33:A

Linux核心 1。0发布时间为: 1 1991 2 1993 3 1992 4 1994 正确答案:4 提示:rf_sx34:D

Korn shell输出变量用: 1 任何变量默认都输出 2 export 3 out

45

4 go

正确答案:2 提示:rf_sx35:B

Linux系统引导将启动__________进程。 1 init 2 getty 3 syslogd 4 lpd 正确答案:1

提示:rf_sx36:A

下面哪个不是循环控制结构? 1 for 2 switch 3 while 4 until 正确答案:2 提示:rf_sx37:B

假设执行如下的命令:alias lcd 'ls –l \\!;pwd * 现在输入 lcd test1 test2,shell实际上执行的是: 1 ls –l test1

2 ls –l test1 test2;pwd 3 pwd

4 ls –l ; pwd 正确答案:2 提示:rf_sx38:B

一般而言,Lilux中占地最多的目录是: 1 /boot 2 /mnt 3 /var 4 /usr 正确答案:4

提示:rf_sx39:D /sbin目录存放的是:

1 使用者经常使用的命令 2 动态连接库 3 系统管理程序 4 设备 正确答案:3 提示:rf_sx40:C

关于at命令下列说法正确的是: 1 任何用户都可以使用该命令

2 若at.deny不为空,那么除at。deny中指定的用户之外,所有的用户都可以使用该命令 3 若at。deny不为空,那么只有at.allow中的用户才能使用该命令 4 只有超级用户才能使用该命令 正确答案:3

46

提示:rf_sx41:C

crontab文件的格式是: 1 M D H m d cmd 2 M H D d m cmd 3 D M H m d cmd 4 M H D m d cmd 正确答案:4 提示:rf_sx42:D

在当前目录下有文件test,文件属主为guest;我们使用admin身份,用命令cp test /tmp,拷贝文件到/tmp(目录属主为root),则/tmp/test的文件属主为: 1 guest 2 root 3 admin 4 其它 正确答案:3

提示:rf_sx43:C

/boot目录用来存放Linux启动时所需要的一些数据和文件,如果该目录被破坏,系统将不能够启动,缺省情况下该目录应能由普通用户读 写。 1 错误 2 正确 正确答案:1 提示:rx1:F

如果某个用户过长时间占用某个系统资源,系统管理员必须有相应的措施剥夺他的使用权,否则将会影响其他用户的使用,甚至导致系统 的崩溃。 1 正确 2 错误 正确答案:2 提示:rx2:F

使用hostname命令可以帮助我们收集主机ID资料. 1 错误 2 正确 正确答案:2 提示:rx3:T

我们可以订阅新闻组、加入新闻列表获得最新的Linux资料。 1 错误 2 正确 正确答案:2 提示:rx4:T

如果命令在前台运行,那么用户在此进程结束前不能继续使用当前的shell。 1 正确 2 错误 正确答案:1 提示:rx5:T

如果设置了map to guest=bad user则当用户提供了一个正确的用户名而密码不正确的情况

47

下,用户将被映射成guest用户登录。 1 错误 2 正确 正确答案:1 提示:rx6:F

/分区越大约好,因为/越大,Linux启动速度越快。 1 错误 2 正确 正确答案:1 提示:rx7:F

脚本/etc/rc。d/rc.local,通常运行在启动运行等级 _________之后。 1 2 2 3 3 4 4 5

正确答案:24

提示:rf_mx1:BD

Linux下配置内核的makefile提供了配置选项的方法有: 1 make config 2 make xconfig 3 make menuconfig 4 make oldconfig 正确答案:1234

提示:rf_mx2:ABCD

为了给系统中增加一个新用户,我们可以使用________方式: 1 adduser 2 useradd 3 linuxconf 4 webmin

正确答案:1234 提示:rf_mx3:ABCD

在smb。conf文件中有如下的表达%U,该表达的含义是: 1 当前服务使用的用户名 2 sambar的一个宏替换 3 当前会话使用的用户名 4 客户机的NetBIOS名 正确答案:23 提示:rf_mx4:BC

使用SAMBA服务器,一般来说,可以提供: 1 域名服务 2 文件服务 3 打印服务 4 IP地址解析 正确答案:23

48

提示:rf_mx5:BC

系统管理员对于磁盘的管理任务主要包括: 1 格式化磁盘 2 硬盘分区

3 建立合适的文件系统 4 安装成文件目录 正确答案:1234 提示:rf_mx6:ABCD

为了从DOS下引导Linux需要做: 1 将内核拷贝到DOS分区 2 将Linux安装到了物理分区 3 运行LoadLin实用程序 4 安装Lilo 正确答案:123

提示:rf_mx7:ABC

常用的单机备份工具有: 1 tar 2 cpio 3 dump 4 nis

正确答案:123

提示:rf_mx8:ABC

在使用edquota配置磁盘定额内容时,一般来说我们可以设置________内容。 1 软 2 硬 3 分区 4 缓冲期间 正确答案:124 提示:rf_mx9:ABD

为匹配任意的单词,我们可以使用_______正则表达式: 1 [ A-Z a—z ]* 2 [ A—Z a-z ]+ 3 ^*[A—Z a-z] 4 *

正确答案:134

提示:rf_mx10:ACD

What program allows you to acess SMB shares using ftp—like commmands?

1 mount 2 smbftp 3 smbclient 4 smbmount 5 samba

49

正确答案:3

提示:p1:Explanation: The smbclient program allows you to acess SMB shares using commands similar to FTP.

How can a user set up their own crontab entry?

1 vi ~/。crontab 2 cp /etc/crontab 。 3 crontab —v 4 crontab —e 5 cron —edit 正确答案:4

提示:p2:Explanation: The crontab —e command is used to edit your own crontab。

Which options to chmod allow read access to all but only allow write and execute access to the owner?

1 chmod 777 filename 2 chmod 700 filename 3 chmod 744 filename 4 chmod 447 filename 5 chmod 775 filename 正确答案:3

提示:p3:Explanation: A is wrong because it allows read write and execute to everyone。 B is wrong because it does not allow read access to everyone。 C is correct。 D is wrong because it allows write acess to everyone。 E is wrong because it allows write access to the group。 What file contains the configuration for the Network Time Protocol server?

1 /etc/ntp.conf 2 /etc/xntp.conf 3 /etc/NTP 4 /etc/time.conf

5 /etc/timeserver。conf 正确答案:1

提示:p4:Explanation: The XNTP server is configured in /etc/ntp。conf。 What command will turn off the ftpd service in all runlevels?

1 chkconfig ftpd off

2 rm /etc/rc.d/init.d/*ftpd*

3 chkconfig ——levels 12345 ftpd off 4 service ftpd stop

5 service ftpd stop —persistant 正确答案:3

提示:p5:Explanation: The chkconfig command is used to do this. You should also know how to use ntsysv。

50

What program can be used to test the smb.conf file for errors?

1 mount 2 test

3 samba —-checkparm 4 testparm 5 smbfs 正确答案:4

提示:p6:Explanation: the testparm program parses the smb.conf file and reports any errors。 If you make a typo this program is likely to find it。

You have created a /home/projectfoo directory. How can you change its group ownership to the projectfoo group?

1 chmod g+rwx projectfoo /home/projectfoo 2 chown projectfoo /home/projectfoo 3 chgrp projectfoo /home/projectfoo 4 newgrp projectfoo /home/projectfoo 5 chown projectfoo.users /home/projectfoo 正确答案:3

提示:p7:Explanation: The chgrp command sets the group ownership of a file or directory.

You have a Linux machine that does not have X-Windows configured. What command can you use to find out what kind of graphics card it has?

1 Xfind 2 SuperProbe 3 Xsetup

4 cat /proc/video 5 videocfg 正确答案:2 提示:p8:Explanation: The SuperProbe program is used to find information about your graphics card.

You have installed a DHCP server on your Linux machine and edited the configuration file. What else must you do before it will give out ip addresses?

1 reboot

2 Put fixed-addresses in the configuration for each client. 3 service dhcp begin

4 touch /var/lib/dhcp/dhcpd.leases 5 All of the above 正确答案:4 提示:p9:Explanation: You must touch the /var/lib/dhcp/dhcpd。leases file in order to get DHCP to begin giving out ip addresses. How do you install an RPM?

51

1 rpm —evh packagename.rpm 2 rpm -ivh packagename。rpm 3 rpm —q packagename.rpm 4 rpm -qa *.rpm 5 rpm -ql *。rpm 正确答案:2 提示:p10:Explanation: A is wrong because the —e option is for uninstalling. B is right. C D and E are wrong because the —q option is for querrying. What file contains the configuration for BIND?

1 /etc/bind.conf 2 /etc/named.conf 3 /etc/dns.conf

4 /var/named/bind.conf 5 /var/named。conf 正确答案:2

提示:p11:Explanation: BIND (the Berkely Internet Name Daemon)is configured in /etc/named。conf.

How can you create a file of all your ISA plug and play device settings?

1 pnpdump 〉 isapnp。conf

2 pnpdump —isa 〉 isapnp。conf 3 isadump > isapnp.conf 4 cat /proc/isa

5 isaadmin -—dump 〉isapnp。conf 正确答案:1

提示:p12:Explanation: Only A is right What directory contains the kernel?

1 /

2 /kernel 3 /etc 4 /boot 5 /var/log 正确答案:4

提示:p13:Explanation: The Kernel is in /boot。 Where are source RPMs installed?

1 /usr/src/linux/rpms/ 2 /var/src/linux/rpm/ 3 /var/rpm/src/

52

which is a DNS server 4 /var/linux/rpm/src/ 5 /usr/src/redhat/ 正确答案:5

提示:p15:Explanation: Source RPMs are installed in /usr/src/redhat. There are 5 subdirectories under there. SOURCES contains the original source code。 SPECS contains the specification files that control the RPM build process. BUILD is where source code is uncompressed and built。 SRPMS contains the source RPM that is created when you build one.

You have Linux installed on a machine and you use LILO as your boot loader. How do you boot into single user mode?

1 A: Wait for the machine to boot up then log in as root。 Use the init 2 command。 2 B: At the LILO prompt use the linux single command。 3 C: At the LILO prompt use the linux 1 command。 4 D: At the LILO prompt use the linux command. 5 E: Linux only supports multi—user mode。 正确答案:23

提示:p16:Explanation: Either linux single or linux 1 will work at the LILO prompt。 A will not work because single user mode is runlevel 1。 D will only work if the default runlevel in /etc/inittab is set to 1 (which it is not normally。) How do I immeadiately shut down a Linux system?

1 A: Turn off the monitor then turn off the CPU。 2 B: /sbin/stop 3 C: init 6

4 D: shutdown -h now 5 E: None of the above 正确答案:4 提示:p17:Explanation: A is wrong because you should always gracefully shut down a machine. B is wrong because there is no such command. C is wrong becauuse it will reboot the machine. Hence D is correct。

What port does the Squid proxy server use by default?

1 A: 80 2 B: 1080 3 C: 3028 4 D: 3128 5 E: 8080 正确答案:4

提示:p18:Explanation: D is right!

You are configuring a Linux DHCP server. You have it setup and working (as Linux clients are getting ip addresses from the DHCP server fine) but some Windows 95 clients are not getting ip addresses properly from your DHCP server。 What do you need to do?

53

1 A: route add -host 255。255。255。255 dev eth0 2 B: route add -net 255。255。255.255 dev eth0 3 C: service dhcp restart 4 D: touch /var/state/leases

5 E: Windows 95 is not compatible with a Linux DHCP server。 正确答案:1

提示:p19:Explanation: Windows 95 insists that the DHCPOFFER messages be sent to 255。255.255.255. Linux will send them to the broadcast address instead. Adding a host entry for the host 255.255。255。255 will trick Linux into working with the Windows 95 clients。 How do you enable quotas on a partition in /etc/fstab?

1 A: Add the enforcequotas option.

2 B: You don’t. Quotas are turned on automatically when you install the quota rpm。 3 C: Add the quota option。

4 D: Add the usrquota and grpquota options。 5 E: You put a 1 in the last column. 正确答案:4

提示:p20:Explanation: To enable quotas on a partition you put the userquota and groupquota option in the options section for the partition in /etc/fstab。

You want to add a directory to all users paths. What file should you edit to do this?

1 A: /etc/sysconfig/profile 2 B: /etc/sysconfig/profile 3 C: /etc/bashrc 4 D: /etc/profile 5 E: /etc/env 正确答案:4

提示:p21:Explanation: The /etc/profile script is used for system—wide enviornment variables and startup files. You could also create a new file in /etc/profile。d/ that ends in .sh and set the enviornment variable in there。 Keep in mind that not all users will necessarily use bash。 Where are kernel modules stored assuming you are using kernel version 2.4。16-9?

1 A: /lib/redhat/modules/2.4.16-9 2 B: /lib

3 C: /lib/modules/2.4.16-9 4 D: /lib/modules 5 E: /usr/lib/modules/ 正确答案:3

提示:p22:Explanation: kernel modules are stored in /lib/modules/。

You have created a /home/projectx directory with the owner of projectx and a group of projectx。 How can you set its permissions so that all files created in this directory are owned by the projectx group?

1 A: chown projectx。projextx /home/projectx 2 B: chgrp projectx /home/projectx 3 C: chmod 755 /home/projectx 4 D: chmod g—s /home/projectx 5 E: chmod g+s /home/projectx 正确答案:5 提示:p23:

What command do you use to edit the default grace period for quotas?

1 A: quotaconfig —g 2 B: editquota —g 3 C: quotaconfig —t 4 D: edquota -t

5 E: quotaeditor --grace 正确答案:4

提示:p24:Explanation: You use the edquota command to edit quotas。 For example you can say edquota —u username to edit a specific user’s quota. Or you can type edquota -g to set a quota for a group。 You can say edquota —t to set up grace periods。

What command can you enter to find out which rpm contains the /etc/foo file?

1 A: rpm -qa |grep foo 2 B: rpm —ql /etc/foo 3 C: rpm -qlf /etc/foo 4 D: rpm -q —f /etc/foo 5 E: man foo 正确答案:4

提示:p25:Explanation: You can find out which rpm a file belongs to by using the rpm -q -f command。 You must have the redhatrpmdb rpm installed though。 You want to compile a new kernel. You have just run

1 make bzImage 2 make dep 3 make clean 4 make mrproper 5 make xconfig 正确答案:1 提示:p26:

What command allows you to switch from using Gnome to using KDE?

1 Xconfigurator 2 Xsetup

3 Xwindowconfig 4 switchdesk 5 videocfg

55

正确答案:4 提示:p27:Explanation: The switchdesk program allows you to switch desktop enviornments and window managers。

How can I see what directories are being shared via NFS on a remote host called fileserver?

1 ping fileserver

2 mount -a -t NFS fileserver 3 showmount -e fileserver 4 nfstalk -—query fileserver 5 None of the above 正确答案:3

提示:p28:Explanation: Only C is right!

Your IP address is 10.0。0.2 and your subnet mask is 255。255。255.0。 You have one ethernet card。 You want to set your default gateway to be 10.0。0。1. Which of the following is the correct syntax to accomplish this?

1 route add default 10.0.0.1 eth0

2 route add default gw 10。0。0。1 dev eth0

3 route add default gw 10。0.0.2 eth0 255.255.255.0 4 route add default gw 10.0.0.2 /dev/eth0 255.255.255.0 5 route add default gw 10。0。0.2 255。255。255。0 正确答案:3

提示:p29:Explanation: A and B don’t set the proper subnet mask。 C is correct. D's syntax is wrong. E's syntax is wrong.

You have just added a new NFS share to the appropriate file。 What must you do to activate the share?

1 reboot 2 exportfs —a 3 ndc restart 4 server nfs start 5 mount -A 正确答案:2

提示:p30:Explanation: To share a directory via NFS you must edit the /etc/exports file and then run exportfs —a。

How can you find out which ports are being used? A。 B。 C. D. E。

56

1 ifconfig —a 2 netstat —a 3 netstat -rn 4 ports

5 cat /etc/services 正确答案:2

提示:p31:Explanation: The netstat -a command shows you which ports are in use。 A is wrong because the ifconfig -a command tells you about your NICs. B is correct。 C is wrong because it shows you the routing table. D doesn’t do anyting. E just shows you the etc/ports file。

You install Linux and reboot your machine and you see only L instead of the expected LILO. What is wrong?

1 Lilo did not load at all。

2 The first stage boot loader loaded but not the second stage。 3 The descriptor table is corrupt.

4 The second stage boot loader loaded at an incorrect address 5 Nothing is wrong. 正确答案:2

提示:p32:Explanation: When Lilo just displays an L then the first stage boot loader loaded but not the second stage。 If the second stage loaded then LILO would print an LI。 When the descriptor table is corrupt LILO prints LIL-. When the second stage boot loader is loaded at an incorrect address LILO prints LIL?。 What does COPS stand for?

1 Company Oriented Password System 2 Computer Oriented Password Security 3 Computer Oracle and Password System 4 Computer Oracle and Points System 5 None of the above 正确答案:3

提示:p33:Explanation: COPS (Computer Oracle and Password System) can check your system for things that are insecure。

How can you see the kernel routing table?

1 netstat —Route 2 netstat —rn 3 netstat -an

4 route show default gw 5 netstat 正确答案:2

提示:p34:Explanation: The netstat -rn command shows the kernel routing table. What does the following cron entry do?

57

10 5 * * * /bin/foo

1 runs /bin/foo every 10 minutes 5 days a week 2 runs /bin/foo at 10:05 AM every day 3 runs /bin/foo on the 10th of May every year 4 runs /bin/foo at 5:10 AM every day 5 none of the above 正确答案:4

提示:p35:Explanation: The fields are: minute hour day of month month day of week command Sendmail is an example of a(n):?

1 MTA 2 MUA 3 MDA 4 MLA

5 All of the above 正确答案:1

提示:p36:Explanation: Only A is correct。 Sendmail is an MTA

What is the correct syntax to mount an MS DOS formatted floppy disk (do not assume that there is an entry in /etc/fstab)?

1 mount /dev/floppy /mnt/fd0

2 mount —t iso9660 /dev/fd0 /mnt/floppy 3 mount -t vfat /dev/fd0 /mnt/floppy

4 mount —t msdos /dev/floppy /mnt/floppy 5 mdir

正确答案:3

提示:p37:Explanation: A will only work if there is an entry in /etc/fstab。 B is wrong because iso9660 is for CDROM's. C is correct。 D is wrong becuase the device should be /dev/fd0 rather than /dev/floppy。

The PCMCIA card configuration file is read by cardmgr (8) at startup time。 It defines what resources are available for use by Card Services describes how to load and initialize device drivers and describes specific PCMCIA cards. Where is this file located?

1 /etc/pcmcia/config。opts 2 /etc/sysconfig/pcmcia 3 /etc/config.pcmcia 4 /etc/pcmcia

5 /etc/pcmcia/config 正确答案:1

提示:p38:Explanation: The card configuration file that contains specific PCMCIA files is /etc/pcmcia/config。opts.

58

What file would you edit to share out a directory via NFS?

1 /etc/nfsd.conf 2 /etc/nsf 3 /etc/fstab 4 /etc/exports

5 /etc/export。conf 正确答案:4

提示:p39:Explanation: To share a directory via NFS you must edit the /etc/exports file and then run exportfs —a。

If you want to allow X—Windows programs from hostB to run on the display on hostA what would you need to do?

1 run xhost +hostB on hostA。 2 run xhost +hostA on hostB。 3 run xhost + on hostA. 4 run xhost + on hostB.

5 just set the DISPLAY environment variable and it will work。 正确答案:1

提示:p40:Explanation: You want programs from hostB to display on hostA. So you must tell hostA to allow Xclients from hostB。 Hence A is correct. The xhost + command is too broad and allows anyone to connect to your X—server。

What file do I edit to prevent specific users from accessing an ftp server?

1 /etc/hosts.allow 2 /etc/hosts。deny 3 /etc/ftpacess 4 /etc/ftpusers 5 /etc/ftpd.conf 正确答案:4

提示:p41:Explanation: The /etc/ftpusers file lists users not allowed to FTP. How can you turn off interface eth1?

1 service network stop 2 service netork stop eth1 3 ifstop eth1 4 ifdown eth1

5 ps -aux |grep eth1| kill `awk —f {$1}` 正确答案:4

提示:p42:Explanation: The ifdown eth1 command will turn off the eth1 interface. the service network stop command will stop all networking which is not what you want. The ifstop command

59

does not exist。 The last command is just nonsense.

What command will create the quota。user and quota.group files for me?

1 quotacheck -avug 2 quotacheck -cugf 3 quotacheck -rugf 4 repquota —u 5 none of the above 正确答案:1 提示:p43:

What directory contains the DNS zone files?

1 /etc/bind/ 2 /etc/named/ 3 /etc/bind.d 4 /var/named 5 /var/bind.d 正确答案:4

提示:p44:Explanation: The zone files are stored in /var/named by default. The location of this directory is specified in /etc/named.conf.

Which installation class will automatically delete all of your DOS partitions?

1 Custom 2 Workstation 3 Laptop 4 Server

5 All of the above 正确答案:4 提示:p45:Explanation: The Server installation class will automatically delete all DOS partitions. The workstation class will use availiable free space。 The laptop class is very similar to the workstation class (but for laptops.)

Which files are used to configure TCP Wrappers?

1 /etc/tcpwrapper。conf and /etc/hosts.conf 2 /etc/hosts。allow and /etc/hosts。deny 3 /etc/tcpwrapper。conf and /etc/xinetd.conf 4 /etc/access。conf and /etc/xinetd。conf 5 /etc/tcpwrapper and /etc/access。conf 正确答案:2

提示:p46:Explanation: TCP Wrappers are configured in the /etc/hosts.allow and /etc/hosts.deny files。

You want to compile a new kernel. You have already compiled the kernel and modules。 How do you install the modules?

60

1 make modules_install 2 make install 3 make modules

4 make install_modules 5 make bzImage 正确答案:1 提示:p47:

You want to compile a new kernel. You have just run ___ to check the depended files.

1 make bzImage 2 make dep 3 make clean 4 make mrproper 5 make xconfig 正确答案:2 提示:p48:

What file do you edit to set the default runlevel?

1 /etc/grub。conf 2 /etc/lilo.conf 3 either A or B 4 /etc/inittab 5 /etc/runlevel 正确答案:4

提示:p49:Explanation: /etc/inittab is the standard place to do this and is the best answer. What file contains the list of terminals that root is allowed to log into?

1 /etc/rooterm。conf 2 /etc/terminals 3 /etc/secure 4 /etc/tty。conf 5 /etc/securetty 正确答案:5 提示:p50:Explanation: The /etc/securetty file contains a list of all terminals that root is allowed to log into

What command will map all of the dependencies between modules into a file?

1 modmap 2 depmod -a

3 depmod —-rebuild 4 modmap --rebuild 5 modprobe -—rebuild 正确答案:2

61

提示:p51:Explanation: The depmod -a command finds all the dependcies betwen modules and puts the information in the modules.dep file. What command do you use to edit quotas?

1 quotaconfig 2 editquota 3 quotaconfig 4 edquota 5 quotaeditor 正确答案:4

提示:p52:Explanation: You use the edquota command to edit quotas. For example you can say edquota -u username to edit a specific user’s quota。 Or you can type edquota -g to set a quota for a group。 You can say edquota —t to set up grace periods. What does the -N option do for the dhcpcd program?

1 Sets the hostname of the machine to the name provided by DHCP。

2 If the dhcpcd server is already running then it sends it an ALRM signal to get it to renew its lease.

3 Passes the machine name to DHCP as part of the DHCP request.

4 Only tries to get a new ip address if the current one is older than a certain number of hours。 5 None of the above 正确答案:2 提示:p53:Explanation: The —N option will an ALRM signal to dhcpcd,if it is already running, to cause it to attempt to renew it's lease。

What is the correct syntax to mount an MS DOS formatted floppy disk (do not assume that there is an entry in /etc/fstab)?

1 mount /dev/floppy /mnt/fd0

2 mount —t iso9660 /dev/fd0 /mnt/floppy 3 mount —t vfat /dev/fd0 /mnt/floppy

4 mount —t msdos /dev/floppy /mnt/floppy 5 mdir 正确答案:3

提示:p:Explanation: A will only work if there is an entry in /etc/fstab. B is wrong because iso9660 is for CDROM’s. C is correct。 D is wrong becuase the device should be /dev/fd0 rather than /dev/floppy.

Which option can not be specified to a Client using the DHCP protocol?

1 default gateway

2 primary WINS server 3 subnet mask 4 web proxy server 5 IP address 正确答案:4

62

提示:p55:Explanation: You can specify all of the above except the address of the web proxy server via DHCP。

You have just added a new NFS share to the appropriate file。 What must you do to activate the share?

1 reboot 2 exportfs -a 3 ndc restart 4 server nfs start 5 mount -A 正确答案:2 提示:p56:Explanation: To share a directory via NFS you must edit the /etc/exports file and then run exportfs —a.

UINX是唯一的一种超过90%用高级语言开发的操作系统,首次用于开发unix的语言是。

1 lisp语言 2 pascal语言 3 c语言

4 fortran语言 正确答案:3 提示:s1

C语言是UNIX环境中唯一能使用的语言。

1 正确 2 错误 正确答案:2 提示:s2

UNIX系统把物理设备作为文件来看待,以下哪一文件是本系统合法的设备文件:

1 /dev/a 2 /dev/hd1 3 /dev/ram 4 /dev/driver 正确答案:3 提示:s3

一个UNIX系统有15个终端,分别放置在15间办公室,欲知道某办公室里是否有人(何人)在使用该UNIX系统,使用下面那条命令:

1 ls 2 ps 3 who 4 find

正确答案:3

63

提示:s4

在UNIX系统中由那一部分解释命令行:

1 内核 2 应用系统 3 外壳程序 4 编译程序 正确答案:3 提示:s5

/etc/passwd文件中有以下几行:

user1:x:1001:100::/usr/user1:/bin/sh user2:x:1002:100::/usr/user2:/bin/sh user3:x:1003:103::/usr/user3:/bin/sh

现在user1想把他的文件 tt 给user3看应使用下面那条命令:

1 chmod g+r tt 2 chmod o+r tt 3 cp tt /usr/user3 4 cat tt

正确答案:2 提示:s6

/etc/passwd文件中有以下几行:

user1:x:1001:100::/usr/user1:/bin/sh user2:x:1002:100::/usr/user2:/bin/sh user3:x:1003:103::/usr/user3:/bin/sh

用户user2对下一文件有何权力:

—rw-r-—-—— 1 user1 100 1320 Oct 27 08:16 test

1 无权 2 读 3 读写 正确答案:2 提示:s7

在Linux下按键会重新启动计算机,这是因为:

1 在inittab中有这样的指令。 2 在内核中包含了该功能. 3 shell的能力. 4 硬件的能力。

正确答案:1 提示:s8

UNIX系统具有以下特点:

1 A: 多用户 2 B: 多进程 3 C: 多处理机 4 D: 多线程 正确答案:1234 提示:s9

UNIX系统中可按条件查找文件的命令有:

1 A: find 2 B: cat 3 C: grep 4 D: ls 正确答案:134 提示:s10

用于UNIX用户间通讯的命令有:

1 A: echo 2 B: cat 3 C: write 4 D: mail 正确答案:34 提示:s11

有关管道,以下论述正确的是:

1 A: 是一种文件. 2 B: 是一种设备.

3 C: 是进程间的一根\"管子\",他把数据按先进先出的原则传送。 4 D: 对管道的操作与文件操作完全相同。 正确答案:234 提示:s12

init进程是所有用户进程的父进程。它的进程号是: a.0 b.1 c.-1 d.0.1 1 0 2 1 3 —1 4 0。1 正确答案:2

65

提示:s13

在Linux环境下lilo是:

1 内核的一部分。 2 一个模块。 3 一个命令. 4 引导程序。 正确答案:4 提示:s14

unix 的 at 命令的功能是

1 作业调度 2 用户管理 3 进程调度 4 存储管理 正确答案:1 提示:s15

alias 命令的功能是

1 指定主机的别名 2 指定用户的别名 3 指定目录的别名 4 指定命令的别名 正确答案:4 提示:s16

Linux 中 /usr/bin/bc 是

1 Borland C for Linux

2 一种用于高精度计算的语言 3 C语言的变种

4 Linux 下的 ANSI C 语言 正确答案:2 提示:s17

与bg有关的命令是:

1 A: grep 2 B: fg

3 C: 按Ctrl+Z键 4 D: 按Ctrl+C键 正确答案:23 提示:s18

某用户在上机过程中启动了很多进程,下面哪一条命令能够找出名为\"shi\"的进程。

1 ps | find \"shi”

66

2 find | ps ”shi” 3 ps | grep ”shi” 4 grep | ps \"shi\" 正确答案:3 提示:s19 cu 是

1 cut命令的简称 2 远程登陆用的命令 3 cp的辅助命令 4 用户管理用的命令 正确答案:2 提示:s20

dos 下的命令:copy \\sx\\*.* 在unix下应该表示为:

1 cp /sx/*。* 2 cp /sx/*.* 。 3 cp /sx/* 4 cp /sx/* 。 正确答案:4 提示:s21

想知道系统现在的可用的内存空间还有多少,应该用下列哪个命令:

1 mem 2 df 3 nice 4 free

正确答案:4 提示:s22

想知道文件系统可用的空间还有多少,应该用下列哪个命令:

1 vmstat 2 df 3 top 4 free

正确答案:2 提示:s23

想知道系统哪个进程占用的cpu时间最多用下列哪个命令:

1 cu 2 top 3 vmstat 4 free

正确答案:2

67

提示:s24

root 用户在 /usr/bin 目录下执行命令 chmod +s * 会对系统造成的最可能的伤害是:

1 过多消耗系统可用内存,影响系统性能 2 对系统安全性造成伤害,使入侵变得容易 3 系统会立刻崩溃 4 没有什么伤害 正确答案:2 提示:s25

用ps x命令会看到下面的输出:请问init后面的3是什么意思?

PID TTY STAT TIME COMMAND

x ? S 0:01 init [3]

1 说明init的状态值,他可能是0-6。 2 说明init是第3次启动.

3 说明内存中有3分init拷贝。 4 没有什么特别的含义 正确答案:1 提示:s26

exec系统调用能

1 产生一个新进程 2 把当前进程复制一份

3 用新程序的内容替代当前进程的内容 4 更改当前进程的pid 正确答案:3 提示:s27

fork 系统调用能

1 调入某程序,产生一个新进程

2 把当前进程复制一份,产生一个新进程 3 用某程序的内容替代当前进程的内容 4 更改当前进程的pid 正确答案:2 提示:s28

在 unix 下格式化磁盘的命令是

1 format 2 mkdisk 3 fdisk 4 mkfs

68

正确答案:4 提示:s28

Linux is a(n) _______ operation system, meaning the source code is freely available. 1 closed source 2 open sourced 3 open binary 4 user licensed 正确答案:2 提示:s30

The ___ daemon listens for print jobs on a Linux system ? 1 lpd 2 lpr 3 lprint 4 lprinter 正确答案:1 提示:s31

How can you find the path to your history file ? 1 type show PATH 2 type show $PATH 3 type show HISTFILE 4 type show HISTORY 5 type echo $HISTFILE 正确答案:5 提示:s32

You have a text file named nytextfile . How would you sort the lines of the file in reverse alphabetical order ? 1 sort -a mytextfile 2 sort mytextfile 3 sort —r mytextfile 4 sort -ra mytextfile 正确答案:3 提示:s33

Standard input(stdin) is referenced by what number ? 1 1 2 2 3 3 4 0

正确答案:4 提示:s34

Who is the individual most responsible for the development of Linux ? 1 Bill Gates

2 Linux Torvalds 3 Linus Torvalds 4 Linus Tormalds

69

正确答案:3 提示:s35

How many primary partitions can exist on an IDE hard drive ? 1 2 2 4 3 16 4

正确答案:2 提示:s36

In order to write a floppy image file caled ’floppy。img' to a floppy in Linux ,which of the following commands would do so ? 1 write _image folppy。img 2 rawrite。exe floppy。img

3 dd if=/dev/fd0 of=floppy。img bs=1440K 4 dd if=floppy。img of=/dev/fd0 bs=1440K 正确答案:4 提示:s37

MD5 passwords are enabled by default on Linux installations. How many characters can a user’s password be when using MD5 passwords ? 1 8 2 32 3 4 256

正确答案:4 提示:s38

In the vi editor , what command will undo the last (previous) command ? 1 M 2 un 3 undo 4 u

5 none of the above 正确答案:4 提示:s39

What command facility(ies) can be used to schedule processes? 1 A: crontab -e 2 B: at

3 C: prsched 4 D: jobs 5 E: cron 正确答案:12 提示:s40

Linux is a(n) _________ operating system, meaning the source code is freely available。 1 closed source 2 open binary

70

3 open sourced 4 user licensed 正确答案:3

提示:BGLI1:The correct answer(s): C The popularity of Linux is partially due to the fact that its code is readily available。 This allows developers and administrators to tailor the software to fit their specific needs。

Which of the following will allow you to configure a dial-up connection? 1 Dial Up Manager 2 ttx-config 3 rp3-config 4 ppp-cfg 正确答案:3 提示:BGLI2:The correct answer(s): C Rp3—config is used to configure dial—up connections for your system。 Dial-up connections can be used for things like dial-up internet connections, or dial—up connections to a company’s central office。

The ____ daemon listens for print jobs on a Linux system? 1 lpd 2 lpr 3 lprinter 4 lprint 正确答案:1 提示:BGLI3:The correct answer(s): A The lpd daemon runs on your system and waits for print jobs to be submitted。 Lpr usually stands for line printer and represents the print device. Lprint is a Novell utility.

You want to repeat command number 3 in your history. How would you do this? 1 show 3 2 #3 3 repeat 3 4 !3

正确答案:4 提示:BGLI4:The correct answer(s): D The ! symbol is used to repeat a specific command. Specifying a number after the ! will indicate which command is to be repeated。 The history command will show a listing of previously entered commands. This will help you when using the ! symbol.

How can you find the path to your history file? 1 type echo $HISTFILE 2 type show PATH 3 type show HISTFILE 4 type show HISTORY 正确答案:1

提示:BGLI5:The correct answer(s): A The value of the HISTFILE variable is the path to your history file. The echo command is used to display the value of a variable。 Path refers to your general system path。 The system path is used when attempting to execute commands。 What switch for the sed command allows you to make substitutions?

71

1 sub 2 subst 3 su 4 s

正确答案:4

提示:BGLI6:The correct answer(s): D Sed is the stream editor. It is used to make changes within a file。 The s switch will allow you to substitute or replace a character or group of characters。

You have a text file named mytextfile。 How would you sort the lines of the file in reverse alphabetical order? 1 sort mytextfile 2 sort -ra mytextfile 3 sort -a mytextfile 4 sort -r mytextfile 正确答案:4

提示:BGLI7:The correct answer(s): D The sort command with the r switch can be used to sort the lines of a file in reverse alphabetical order。 The sort command also has other switches that allow sorting in other manners.

You have two files, file1 and file2。 You want to combine field 2 in file1 with field 3 in file2。 How would you do this? 1 combine 2 3 file1 file2 2 join -1 -2 file1 file2 3 join -1 3 -2 2 file1 file2 4 join -1 2 —2 3 file1 file2 正确答案:4

提示:BGLI8:The correct answer(s): D The join command can be used to combine files。 It can also be used to combine various fields within files. Combine is not a valid command. You want to display the last 10 lines of the file ’longfile'. How would you do this? 1 tail longfile

2 tail -d 10 longfile 3 head longfile

4 head —10 longfile 正确答案:1

提示:BGLI9:The correct answer(s): A The tail command can be used to display the trailing lines of a file。 You can also specify how many lines to display. The head command can be used to count the beginning lines of a file.

You want to copy the file mydir\\myfile to the directory dir2. But, you want to be warned if the file already exists. How would you do this? 1 cp -v mydir\\myfile dir2 2 cp -w mydir\\myfile dir2 3 cp -i mydir\\myfile dir2 4 cp mydir\\myfile dir2 正确答案:3 提示:BGLI10:The correct answer(s): C The cp command is used to do a file copy。 The —i

72

switch causes you to be prompted if the file already exists. The —f switch is used to force the copy without prompting the user, even if the file already exists。 which of the following will allow you to rename a file? 1 rn

2 replace 3 mv 4 rname 正确答案:3

提示:BGLI11:The correct answer(s): C The mv command can be used to move a file or to rename a file。 To rename a file, you simply specify a new file name with the mv command. Standard input(stdin) is referenced by what number? 1 2 2 0 3 1 4 3

正确答案:2

提示:BGLI12:The correct answer(s): B Standard input can be referred to by the number 0. This comes in useful when redirecting input. Standard output can be referenced by the number 1。 Standard error can be referenced by the number 2。

You want to list the contents of the directory 'directory1’ with any errors going to the file ’error1’。 How would you do this? 1 ls directory 〉 error1 2 ls directory1 2〉error1 3 ls directory 0>error1 4 ls directory1 1>error1 正确答案:2

提示:BGLI13:The correct answer(s): B The ls command is used to list the contents of a directory。 The 2> symbol is used to redirect errors. The number 2 represents standard error。 You want to stop the inetd process immediately。 It has a process id of 15. How would you do this?

1 kill —1 15 2 kill —3 15 3 kill -15 9 4 kill —9 15 正确答案:4 提示:BGLI14:The correct answer(s): D The kill command can be used to end processes. The kill command with the -9 switch is used to stop processes immediately.

You suspect that a particular process has been suspended。 What command would you use to check this? 1 process 2 pc 3 susp 4 jobs

正确答案:4

73

提示:BGLI15:The correct answer(s): D The jobs command can be used to check the status of your processes. This can be very useful in troubleshooting. It makes it easier to find out what process may be causing trouble.

What command would you use to find files that were owned by the group ’mygroup’? 1 find -group mygroup 2 find group

3 find all mygroup 4 find mygroup 正确答案:1

提示:BGLI16:The correct answer(s): A The find command is used to search for files。 The -group switch allows you to search for files by group ownership What command is used to mount a file system read—only? 1 mount 2 mount —a 3 mount -ro 4 mount -r 正确答案:4

提示:BGLI17:The correct answer(s): D The mount command is used to mount file systems。 The -r switch is used to mount a file system in read—only mode。 File systems do not have to be mounted one at a time。 By default file systems are mounted read—write。

Which of the following commands can be used to change the owner of a particular file? 1 change owner 2 chown 3 file -o 4 change -o 正确答案:2

提示:BGLI18:The correct answer(s): B The chown command is used to change the owner of a file. The owner of a file has the file size charged against his or her quota。

When setting file permissions using octal settings, what value represents read and write access? 1 2 2 6 3 4 4 1

正确答案:2 提示:BGLI19:The correct answer(s): B A value of 4 represents read access to a file。 A value of 2 represents write access to a file. A value of 1 is used to represent execute permissions. A value of 6 is used to represent read-write permissions。 4 + 2 = 6。

There is a file with the following permissions: -rw-rw—r—— What rights does the owner have? 1 read—write 2 read-only 3 write 4 none 正确答案:1

提示:BGLI20:The correct answer(s): A The first set of permissions represents the file owner's

74

permissions. The second set of permissions represents the owner’s group’s permissions. The last set of permissions represents the permissions of users other than the owner or the owner’s group. There is a file with the following permissions: —rw—r—-r—— What rights does the owner’s group have? 1 write

2 read-write 3 read 4 excute 正确答案:3 提示:BGLI21:The correct answer(s): C The first set of permissions represents the file owner's permissions. The second set of permissions represents the owner's group’s permissions. The last set of permissions represents the permissions of users other than the owner or the owner's group. Your system has a default mode of 666. You specify a umask value of 222. What will be the default permissions? 1 666 2 444 3 222 4 888 正确答案:2

提示:BGLI22:The correct answer(s): B If you specify a umask of 222 and your system has a default mode of 666, newly created files will have default permissions of 444. 666 — 222 = 444. The first 4 represents the permissions for the file owner。 The second 4 represents the permissions for members of the owner’s default group。 The third 4 represents the permissions for everyone else.

Only files on the same file system can be hard-linked. 1 True 2 False 3 None 4 None 正确答案:1

提示:BGLI23:The correct answer(s): A Files must be on the same file system in order to be hard linked。 Soft linked files don't have to be on the same file system.

External file systems are usually mounted from the ________ directory? 1 /fstab 2 /fs 3 /mnt 4 /mount 正确答案:3 提示:BGLI24:The correct answer(s): C The /mnt directory usually represents the point where external file systems will be mounted from。 You can; however, mount file systems from other directories。

Temporary files are generally stored in the _____ folder. 1 /data 2 /temp

75

3 /proc 4 /dev

正确答案:2

提示:BGLI25:The correct answer(s): B By default, temp files are generally stored in the /temp directory. Temp files can be stored in other directories. System information is usually contained in the /proc directory。 The /dev directory usually contains your system's device files。 What lilo option will list the name and location of available kernels? 1 -q 2 —k 3 —l 4 -v

正确答案:1

提示:BGLI26:The correct answer(s): A Lilo is the Linux boot loader. It controls the Linux boot process. The -q switch can be used with lilo in order to display available kernels.

Which lilo。conf parameter will specify the amount of time the system will wait before booting to the default image? 1 default 2 delay 3 wait 4 pause 正确答案:2

提示:BGLI27:The correct answer(s): B Lilo is the Linux boot loader. The lilo.conf file is used to configure lilo boot options。 The delay parameter with specify how long the system will wait before it boots to the default image。

What command can be used to print out system boot messages? 1 dmesg 2 messages 3 bootm 4 bmsg 正确答案:1

提示:BGLI28:The correct answer(s): A The dmesg command can be used to display system boot messages. This can be very useful in troubleshooting。 You can use it to check for warning and error messages。

You want to add information to a previously created tar file. How would you do this? 1 use the add command

2 use the tar command with the -a switch 3 use the tar command with the -r switch 4 use the append command 正确答案:3 提示:BGLI29:The correct answer(s): C The tar command is used to manage tar files. A tar file is a package of compressed files. The tar command used with the -r switch is used to add information to a previously created tar file.

What is the name of the configuration file used by the syslog daemon? 1 slog.conf

76

2 syslogd

3 syslog。conf 4 system.conf 正确答案:3

提示:BGLI30:The correct answer(s): C The syslog.conf file is used to control the syslog daemon。 The syslog daemon is what controls error messages。 What syslog。conf facility represents httpd processes? 1 smtp 2 proc 3 http 4 daemon 正确答案:4

提示:BGLI31:The correct answer(s): D The syslog.conf file is used to control the syslog daemon。 The syslog daemon is what handles error messages。 The daemon facility is used to represent the httpd daemon and other miscellaneous daemons。 What syslog。conf facility represents the line printer? 1 ptr 2 lpr 3 linep 4 lprinter 正确答案:2 提示:BGLI32:The correct answer(s): B The syslog。conf file is used to control the syslog daemon. The syslog daemon is what handles error messages. The lpr facility in the syslog。conf file represents the line printer.

What syslog.conf facility is used to create timestamps in log files? 1 stamp 2 tstamp 3 mark 4 time

正确答案:3 提示:BGLI33:The correct answer(s): C The syslog。conf file is used to control the syslog daemon. The syslog daemon is what handles error messages. The mark facility in the syslog.conf file is used to place time stamps in your log files。 Which daemon will send kernel alert messages. 1 alertd 2 syslogd 3 krnld 4 smtpd 正确答案:2

提示:BGLI34:The correct answer(s): B The syslogd daemon is responsible for sending kernel alert messages。 SMTP is used for sending system to system messages like e-mail messages。 You have just added the following line to your syslog。conf file: lpr。info /dev/console。 But, line printer messages are not being sent to the console。 What is most likely the problem? 1 after modifying the syslog.conf file, the syslog daemon needs to be restarted.

77

2 the entry is formatted incorrectly

3 the syslog daemon reads it configuration information from the syslogd file 4 none 正确答案:1 提示:BGLI35:The correct answer(s): A The syslog.conf file is used to control the syslog daemon. The syslog daemon is what handles error messages。 After changes are made to the syslog.conf file, the syslog daemon has to be restarted in order for the changes to take effect. What run level represents multi-user? 1 5 2 0 3 1 4 3

正确答案:4

提示:BGLI36:The correct answer(s): D Different run levels are used to represent different system states. Run level 3 represents multi—user mode。 Run level 1 represents administration mode。 Run level 0 represents a system power down. What file does init processes use as its control file? 1 /etc/proc 2 /etc/init 3 /etc/initproc 4 /etc/inittab 正确答案:4 提示:BGLI37:The correct answer(s): D The /etc/inittab file is used to control init processes。 The other files do not exist.

Which of the following can be used to switch your system to run level 1? 1 inittab 1 2 init 1 3 rlevel 1 4 level 1 正确答案:2

提示:BGLI38:The correct answer(s): B The init command can be used to switch your system run level. Different run levels are used to represent different system states. The runlevel command can be used to display your system runlevel.

What option can be used with the shutdown command to cancel a pending shutdown? 1 shutdown —n 2 shutdown -c 3 shutdown -x 4 shutdown —u 正确答案:2 提示:BGLI39:The correct answer(s): B The shutdown command can be used to reboot or shut down your system。 The shutdown -c command can be used to stop a pending shutdown. The —r switch can be used to reboot the system after a shutdown.

What option is used with the useradd command to specify the user’s login shell? 1 —u

78

2 -sh 3 —s 4 -l

正确答案:3

提示:BGLI40:The correct answer(s): C The useradd command is used to create users。 If you want to specify a users login shell, you can use the -s switch with the useradd command。 The -u option is used with the useradd command to specify a user id.

What switch is used with the useradd command to specify a user's initial group? 1 —i 2 —ig 3 -u 4 -g

正确答案:4

提示:BGLI41:The correct answer(s): D The useradd command is used to create users. The -g option can used with the useradd command to specify a user’s initial group。 The —u option is used with the useradd command to specify a user id。

You had a contractor come into your company。 You originally set his account to expire after thirty days。 You now need to change this. How can you do this? 1 usermod -x 2 usermod —e 3 usermod -a 4 usermod —d 正确答案:2

提示:BGLI42:The correct answer(s): B The usermod command is used to change user accounts. The usermod -e command can be used to change an accounts expiration date。 If you want to change a user’s home directory, you can use the usermod —d command。

You want to schedule a job to run April 1 at 2 am. Which of the following would accomplish this?

1 at 2am April 1 2 at 4 1 2 3 at 2 4 1

4 at April 1 2am 正确答案:1 提示:BGLI43:The correct answer(s): A The at command can be used to schedule commands。 Times can be entered in several different ways。 One of these is: [time] [date]。 You want to list the cron table for user1。 How would you do this? 1 crontab -u user1 2 cron —user1 3 crontab —d user1 4 cron -l user1 正确答案:1

提示:BGLI44:The correct answer(s): A The cron utility can be used to schedule jobs or tasks。 The crontab command is used to manipulate a cron table. The —u option is used to list the cron table for a specific user.

79

If the cron。allow file does not exist, then the _______ file will be checked in order to determine if a user has access to the cron utility。 1 cron。deny 2 deny。cron 3 cron。no 4 cron。conf 正确答案:1

提示:BGLI45:The correct answer(s): A The cron utility can be used to schedule jobs or tasks. Permissions for the cron utility are controlled by the cron。allow and cron。deny files. The cron。deny file is only checked if the cron。allow file does not exist.

You want to give the variable 'IQ’ a value of 4. How would you do this? 1 set $IQ=4 2 set IQ=4 3 IQ=4 4 IQ:=4 正确答案:1 提示:BGLI46:The correct answer(s): A The $ symbol is used to designate a variable. The set command is used to set the value for a variable. The unset command is used to remove variables。 Which of the following options can be used with the mkfs command to check for bad blocks before the file system is built? 1 —check 2 -b 3 -c 4 -e

正确答案:3

提示:BGLI47:The correct answer(s): C The mkfs utility is used to create a file system。 The -c option used with the mkfs command allows you to check for bad blocks on a file system。 What command is used to change the group that is associated with a file? 1 group 2 groupadd 3 change group 4 chgrp 正确答案:4 提示:BGLI48:The correct answer(s): D If you want to change the group associated with a file, you can use the chgrp command. The groupadd command is used to add groups. In what directory are spool files usually located? 1 /var 2 /lpq 3 /spool 4 /proc 正确答案:1 提示:BGLI49:The correct answer(s): A Spool files are generally located under the /var directory。 System information is usually contained in the /proc directory. It can however be stored in other directories。 The /boot directory usually contains the system kernel.

80

Which of the following can be used to replace the Master Boot Record on your system? 1 FDISK /MBR 2 MBR /replace 3 MBR /format 4 Format /MBR 正确答案:1

提示:BGLI50:The correct answer(s): A If you need to replace the Master Boot Record, you can use the FDISK /MBR command. This may need to be done in order to replace the LILO。 Which of the following commands can be used to show used swap memory 1 freemem 2 free

3 showmem 4 swap 正确答案:2

提示:BGLI51:The correct answer(s): B The free command can be used to show physical and swap memory stats。 It can help you in troubleshooting. The free command can be used to find out if your system is running low on memory and why。

You want to display default user options。 Which of the following would allow you to do this? 1 show user defaults 2 show defaults 3 useradd -u 4 useradd -D 正确答案:4

提示:BGLI52:The correct answer(s): D The useradd command is used to add users to your Linux system。 The useradd —D command is used to display the default user options for your system。

What command would you use to change the priority of a process that is already running? 1 nice -r 2 renice 3 priority 4 nice —p 正确答案:2

提示:BGLI53:The correct answer(s): B he nice command is used to start a process with a priority other than the default of 0。 The renice command is used to change the priority of a process that is already running。

You suspect that a particular process has been suspended. What command would you use to check this? 1 pc 2 susp 3 process 4 jobs

正确答案:4

提示:BGLI:The correct answer(s): D The jobs command can be used to check the status of your processes。 This can be very useful in troubleshooting。 It makes it easier to find out what

81

process may be causing trouble。

You want a particular process to run in the background so that it is only using minimal system resources。 What command would allow you to accomplish this? 1 bg 2 start -b 3 backgrnd 4 run —b 正确答案:1

提示:BGLI55:The correct answer(s): A The bg command can be used force a particular process to run in the background。 You can then use the fg command to bring it back to the foreground。 You have a process running in the background。 You want to move the process back to the foreground. What command would allow you to accomplish this? 1 fg 2 frgrnd 3 bg -f 4 process 正确答案:1

提示:BGLI56:The correct answer(s): A If a process is running in the background, the fg command can be used to move it to the foreground. The bg command is used to move a process to the background。

You want to locate all files that were accessed more than 3 days ago. How would you do this? 1 find time 3 2 find / -time -3 3 find time 3d 4 find / —atime -3 正确答案:4

提示:BGLI57:The correct answer(s): D The find command is used to search for files. The atime switch can be used to look for files according to when they were accessed.

What command would you use to find files that were owned by the group ’mygroup’? 1 find -group mygroup 2 find mygroup 3 find all mygroup 4 find group 正确答案:1

提示:BGLI58:The correct answer(s): A The find command is used to search for files。 The —group switch allows you to search for files by group ownership

Which of the following would be used to display the partition table for a particular device? 1 fdisk —l 2 fdisk —d 3 fdisk -t 4 fdisk —p 正确答案:1

提示:BGLI59:The correct answer(s): A The fdisk command can be used to display partition table information。 It can also be used to create partitions。

82

What command is used to mount all file systems listed in fstab? 1 mount —f 2 mount —a 3 umount 4 mount all 正确答案:2

提示:BGLI60:The correct answer(s): B The mount command is used to mount file systems. The —a switch will mount all file systems listed in fstab. By default, partitions will be mounted read-write.

What file contains a listing of default file systems? 1 fstab 2 filesys 3 fsys 4 fdisk 正确答案:1

提示:BGLI61:The correct answer(s): A The fstab contains a list of all your default file systems。 The fsck utility is one of the many utilities that makes use of this file. Fdisk can be used to manage partitions.

What command is used to mount a file system read-only? 1 mount

2 mount —ro 3 mount -r 4 mount -a 正确答案:3

提示:BGLI62:The correct answer(s): C The mount command is used to mount file systems。 The -r switch is used to mount a file system in read—only mode. File systems do not have to be mounted one at a time。 By default file systems are mounted read-write.

You want all the file systems listed in fstab to have quotas。 What command would allow you to do this without having to enable each one separately? 1 quotaon -a 2 fstab quota 3 quotaon all 4 quota fstab 正确答案:1 提示:BGLI63:The correct answer(s): A The quotaon command is used to enable disk quotas。 The —a switch is used to set a quota on all the file systems listed in fstab。 Edquota can be used to change the quotas on a given file system

What command would allow you to edit an existing quota? 1 edit quota 2 quota -e 3 quotaon —e 4 edquota 正确答案:4 提示:BGLI:The correct answer(s): D Edquota can be used to change the quotas on a given

83

file system. Quotas are enabled using the quotaon command.

Which of the following commands can be used to change the owner of a particular file? 1 file -o

2 change owner 3 chown 4 change —o 正确答案:3

提示:BGLI65:The correct answer(s): C The chown command is used to change the owner of a file。 The owner of a file has the file size charged against his or her quota。

When setting file permissions using octal settings, what value represents read access? 1 2 2 3 3 1 4 4

正确答案:4 提示:BGLI66:The correct answer(s): D A value of 4 represents read access to a file. A value of 2 represents write access to a file。 A value of 1 is used to represent execute permissions. When setting file permissions using octal settings, what value represents write access? 1 0 2 1 3 2 4 4

正确答案:3

提示:BGLI67:The correct answer(s): C A value of 4 represents read access to a file。 A value of 2 represents write access to a file. A value of 1 is used to represent execute permissions. When setting file permissions using octal settings, what value represents execute access? 1 0 2 2 3 1 4 4

正确答案:3 提示:BGLI68:The correct answer(s): C A value of 4 represents read access to a file. A value of 2 represents write access to a file. A value of 1 is used to represent execute permissions.

When setting file permissions using octal settings, what value represents read and write access? 1 4 2 6 3 1 4 2

正确答案:2 提示:BGLI69:The correct answer(s): B A value of 4 represents read access to a file。 A value of 2 represents write access to a file. A value of 1 is used to represent execute permissions. A value of 6 is used to represent read—write permissions. 4 + 2 = 6.

When setting file permissions using octal settings, what value represents read, write, and execute access?

84

1 7 2 6 3 3 4 5

正确答案:1 提示:BGLI70:The correct answer(s): A A value of 4 represents read access to a file. A value of 2 represents write access to a file. A value of 1 is used to represent execute permissions。 A value of 7 is used to represent read, write, and execute permissions。 4 + 2 + 1 = 7。

When setting file permissions using octal settings, what value represents read and execute access? 1 5 2 7 3 4 4 1

正确答案:1 提示:BGLI71:The correct answer(s): A A value of 4 represents read access to a file. A value of 2 represents write access to a file. A value of 1 is used to represent execute permissions. A value of 5 is used to represent read and execute permissions. 4 + 1 = 5. What is the purpose of a umask? 1 modify file permissions 2 reset file permissions 3 copy file permissions

4 determine default file permissions 正确答案:4

提示:BGLI72:The correct answer(s): D Setting a umask will determine what default permissions files will be given when they are created。 For example, if you set a umask of 022, your files will have default permissions of 4, when they are created。 666 - 022 = 4。 There is a file with the following permissions: -rw—rw—r—— What rights does the owner have? 1 write

2 read—only 3 read—write 4 excute 正确答案:3

提示:BGLI73:The correct answer(s): C The first set of permissions represents the file owner’s permissions. The second set of permissions represents the owner's group’s permissions。 The last set of permissions represents the permissions of users other than the owner or the owner's group. There is a file with the following permissions: —rw—rw-r—- What rights does the owner's group have?

1 read-only 2 write

3 read—write 4 excute 正确答案:3

85

提示:BGLI74:The correct answer(s): C The first set of permissions represents the file owner’s permissions. The second set of permissions represents the owner’s group’s permissions. The last set of permissions represents the permissions of users other than the owner or the owner’s group。 There is a file with the following permissions: -rw—rw—r—- What rights do users other than the owner and the owner’s group have? 1 read

2 read-write 3 write 4 excute 正确答案:1

提示:BGLI75:The correct answer(s): A The first set of permissions represents the file owner’s permissions。 The second set of permissions represents the owner’s group's permissions. The last set of permissions represents the permissions of users other than the owner or the owner's group.

There is a file with the following permissions: —rw-r--r—— What rights does the owner have? 1 read-write 2 write 3 read-only 4 excute 正确答案:1 提示:BGLI76:The correct answer(s): A The first set of permissions represents the file owner's permissions. The second set of permissions represents the owner's group's permissions. The last set of permissions represents the permissions of users other than the owner or the owner’s group. There is a file with the following permissions: -rw-r--r—- What rights does the owner's group have? 1 write 2 read

3 read-write 4 excute 正确答案:2 提示:BGLI77:The correct answer(s): B The first set of permissions represents the file owner's permissions. The second set of permissions represents the owner’s group's permissions. The last set of permissions represents the permissions of users other than the owner or the owner's group. What command can be used to list the modules that are currently resident on the system? 1 ls modules 2 modules 3 list mod 4 lsmod 正确答案:4

提示:BGLI78:The correct answer(s): D The lsmod command will give you a list of the modules that are currently running on your system。 This can help in system troubleshooting. The root user always has a UID of ______ 1 0 2 99

86

3 1 4 100

正确答案:1 提示:BGLI79:The correct answer(s): A The root user has a UID of 0。 The root user is created by default。 It is the first user created on the system.

Your system has a default mode of 666。 You specify a umask value of 022。 What will be the default permissions? 1 666 2 622 3 4 4 688

正确答案:3

提示:BGLI80:The correct answer(s): C If you set a umask of 022, your files will have default permissions of 4, when they are created. 666 - 022 = 4. The 6 represents the permissions for the file owner。 The first 4 represents the permissions for members of the owner's default group。 The second 4 represents the permissions for everyone else。

Your system has a default mode of 666. You specify a umask value of 222。 What will be the default permissions? 1 444 2 888 3 222 4 666

正确答案:1

提示:BGLI81:The correct answer(s): A If you specify a umask of 222 and your system has a default mode of 666, newly created files will have default permissions of 444. 666 — 222 = 444. The first 4 represents the permissions for the file owner. The second 4 represents the permissions for members of the owner's default group。 The third 4 represents the permissions for everyone else.

Your system has a default mode of 666。 You specify a umask value of 022. What default permissions will the file owner have? 1 6 2 1 3 4 4 2

正确答案:1

提示:BGLI82:The correct answer(s): A If you specify a umask of 022 and your system has a default mode of 666, newly created files will have default permissions of 4。 666 - 022 = 4. The 6 represents the permissions for the file owner. The first 4 represents the permissions for members of the owner’s default group. The second 4 represents the permissions for everyone else。 Your system has a default mode of 666. You specify a umask value of 022。 What permissions will everyone except the owner and the owner's group have? 1 2 2 6 3 1

87

4 4

正确答案:4

提示:BGLI83:The correct answer(s): D If you specify a umask of 022 and your system has a default mode of 666, newly created files will have default permissions of 4. 666 - 022 = 4。 The 6 represents the permissions for the file owner. The first 4 represents the permissions for members of the owner’s default group。 The second 4 represents the permissions for everyone else.

Hard-linked files share the same _______. 1 inode 2 anode 3 icon 4 name 正确答案:1 提示:BGLI84:The correct answer(s): A Files that are hard—linked have the same inode。 Files must reside on the same file system in order to be hard linked。 Soft—linked files do not have this requirement。

The root of a file system in Linux is denoted by a _______。 1 。。 2 \\ 3 〉 4 /

正确答案:4

提示:BGLI85:The correct answer(s): D The root of a Linux file system is denoted by a front-slash. Don’t confuse this with the root user. The root user is the default administrator on a Linux system。

External file systems are usually mounted from the ________ directory? 1 /mnt 2 /fstab 3 /fs 4 /mount 正确答案:1 提示:BGLI86:The correct answer(s): A The /mnt directory usually represents the point where external file systems will be mounted from。 You can; however, mount file systems from other directories。

The ____ directory is usually dynamic and contains system information? 1 /boot 2 /sys 3 /info 4 /proc 正确答案:4

提示:BGLI87:The correct answer(s): D System information is usually contained in the /proc directory。 It can however be stored in other directories. The /boot directory usually contains the system kernel。

Device files are usually located in the ______ directory.

88

1 /proc 2 /device 3 /dev 4 /etc

正确答案:3

提示:BGLI88:The correct answer(s): C The /dev directory usually contains your system’s device files. In Linux, devices are linked to device files。 System information is usually contained in the /proc directory.

The system kernel is usually stored in the _____ directory. 1 /boot 2 /data 3 /proc 4 /krnl

正确答案:1

提示:BGLI:The correct answer(s): A The /boot directory usually contains the system kernel。 The system kernel is the central part of the Linux OS。 System information is usually contained in the /proc directory。

Temporary files are generally stored in the _____ folder. 1 /data 2 /proc 3 /temp 4 /dev

正确答案:3 提示:BGLI90:The correct answer(s): C By default, temp files are generally stored in the /temp directory. Temp files can be stored in other directories. System information is usually contained in the /proc directory。 The /dev directory usually contains your system’s device files. The database used by the locate utility to find files is updated by what program? 1 update locatedb 2 updatedb 3 locate update 4 update 正确答案:2

提示:BGLI91:The correct answer(s): B The locate utility is used to search for files. In order for newly created files or directories to be searched using the locate utility, the updatedb utility must be run in order to update the locate database。

You have just renamed a file. You attempt to find the file by using the locate program. You are unable to find the file。 What should you do? 1 rename the file again 2 run locate —update

3 delete and recreate the file 4 manually run updatedb 正确答案:4 提示:BGLI92:The correct answer(s): D The locate utility is used to search for files。 In order for newly created files or directories to be searched using the locate utility, the updatedb utility

must be run in order to update the locate database。

You want to find the full path of a certain command。 How would you do this? 1 by using the ’path’ command 2 by using the ’where’ command 3 by using the 'which’ command 4 by using the ’come' command 正确答案:3

提示:BGLI93:The correct answer(s): C The which command can be used to find the path to a certain command. This is very useful if you don’t know the location of a command. What lilo option will list the name and location of available kernels? 1 —v 2 -q 3 —l 4 —k 正确答案:2 提示:BGLI94:The correct answer(s): B Lilo is the Linux boot loader. It controls the Linux boot process. The —q switch can be used with lilo in order to display available kernels.

You want to uninstall lilo。 Which of the following would you do to accomplish this? 1 lilo -u

2 remove lilo 3 lilo -r

4 uninstall lilo 正确答案:1 提示:BGLI95:The correct answer(s): A Lilo is the Linux boot loader. It controls the Linux boot process. The -u option can to used to uninstall lilo.

You want to set a script to run when your Linux system reboots. What lilo option should you use? 1 —L 2 -R 3 —T 4 -S

正确答案:2

提示:BGLI96:The correct answer(s): B Lilo is the Linux boot loader. It controls the Linux boot process. Lilo with the -R option allows you to run a script or command after a system reboot. You want to set a 30 second delay before your system boots to the default kernel. Which of the following command lines would do this? 1 lilo 30 2 lilo —d 30 3 lilo —t 30 4 lilo delay 30 正确答案:2 提示:BGLI97:The correct answer(s): B Lilo is the Linux boot loader. It controls the Linux boot process. The —d option can be used with lilo to set a delay。

Which lilo.conf parameter will specify the amount of time the system will wait before booting to

90

the default image? 1 pause 2 wait 3 default 4 delay 正确答案:4

提示:BGLI98:The correct answer(s): D Lilo is the Linux boot loader。 The lilo。conf file is used to configure lilo boot options。 The delay parameter with specify how long the system will wait before it boots to the default image。

What lilo。conf parameter is used to specify vga text mode? 1 svga 2 vtm 3 vgatext 4 vga 正确答案:4

提示:BGLI99:The correct answer(s): D Lilo is the Linux boot loader。 The lilo。conf file is used to configure lilo boot options. The vga option is used to specify vga text mode。

What lilo。conf parameter is used to specify what device should be mounted as root by default? 1 drive 2 root 3 mntroot 4 mount 正确答案:2 提示:BGLI100:The correct answer(s): B Lilo is the Linux boot loader. The lilo.conf file is used to configure lilo boot options。 The root parameter is used to specify what device will be mounted as the root.

What lilo。conf parameter will cause the root file system to be mounted read only? 1 no-write 2 read

3 read-only 4 no-right 正确答案:3

提示:BGLI101:The correct answer(s): C Lilo is the Linux boot loader。 The lilo.conf file is used to configure lilo boot options. If you want to specify that a file system be mounted read only, you can use the read-only parameter in the lilo。conf file。 What command can be used to print out system boot messages? 1 bootm 2 dmesg 3 messages 4 bmsg 正确答案:2

提示:BGLI102:The correct answer(s): B The dmesg command can be used to display system boot messages。 This can be very useful in troubleshooting。 You can use it to check for warning and error messages.

91

Which of the following commands can be used to create a tar archive file in verbose mode? 1 tar -cvf 2 tar -c 3 tar -vf 4 tar —v 正确答案:1

提示:BGLI103:The correct answer(s): A The tar command is used to manage tar files。 The c option is used with the tar command to create an archive。 The v option is used for verbose mode. Which of the following switches can be used with the tar command to find out the difference between two tar files? 1 —c 2 -d 3 —t 4 -v

正确答案:2

提示:BGLI104:The correct answer(s): B The tar command is used to manage tar files。 A tar file is a package of compressed files. The tar -d command is used to compare two tar files. Which of the following commands can be used to extract a tar file? 1 tar -e 2 tar —v 3 tar -xvf 4 tar -vf 正确答案:3

提示:BGLI105:The correct answer(s): C The tar command is used to manage tar files. The tar command used with the —x switch is used to extract tar files。 The -v switch is used to specify verbose mode.

You want to add information to a previously created tar file. How would you do this? 1 use the append command

2 use the tar command with the -r switch 3 use the tar command with the —a switch 4 use the add command 正确答案:2

提示:BGLI106:The correct answer(s): B The tar command is used to manage tar files。 A tar file is a package of compressed files. The tar command used with the —r switch is used to add information to a previously created tar file.

You want to find out what files are contained in a tar file。 How would you do this? 1 use the find command 2 use the grep command

3 use the tar command with the —t switch 4 use the tar command with the -r switch 正确答案:3

提示:BGLI107:The correct answer(s): C The tar command is used to manage tar files。 A tar file is a package of compressed files. The tar command used with the -t switch allows you to find out what files are contained within a tar file.

92

You want to add files to a previously created tar file. You want to replace existing files with newer files, how can you do this?

1 use the tar command with the -u switch 2 use the append command

3 use the tar command with the -t switch 4 use the add command 正确答案:1

提示:BGLI108:The correct answer(s): A The tar command is used to manage tar files. A tar file is a package of compressed files。 The tar command when used with the -u switch will allow you to add files to a file and replace older files with newer ones. What daemon controls the syslog? 1 sys 2 logd 3 syslogd 4 syslog 正确答案:3

提示:BGLI109:The correct answer(s): C Syslogd is the daemon that controls the syslog. The syslog daemon is what controls error messages。 The syslog。conf file is used to control the syslog daemon。

What is the name of the configuration file used by the syslog daemon? 1 syslog.conf 2 system。conf 3 slog.conf 4 syslogd 正确答案:1

提示:BGLI110:The correct answer(s): A The syslog.conf file is used to control the syslog daemon. The syslog daemon is what controls error messages. What syslog。conf facility represents user processes? 1 proc 2 user 3 auth 4 u

正确答案:2

提示:BGLI1:The correct answer(s): B The syslog。conf file is used to control the syslog daemon。 The syslog daemon is what handles error messages. The user facility is used to represent user processes。

What syslog.conf facility represents kernel processes? 1 user 2 daemon 3 kern 4 proc

正确答案:3

提示:BGLI2:The correct answer(s): C The syslog.conf file is used to control the syslog daemon。 The syslog daemon is what handles error messages. The kern facility is used to

93

represent kernel processes。

What syslog.conf facility represents mail processes? 1 daemon 2 proc 3 smtp 4 mail

正确答案:4

提示:BGLI3:The correct answer(s): D The syslog。conf file is used to control the syslog daemon. The syslog daemon is what handles error messages。 The mail facility is used to represent mail processes.

What syslog.conf facility represents httpd processes? 1 daemon 2 http 3 proc 4 smtp 正确答案:1

提示:BGLI4:The correct answer(s): A The syslog。conf file is used to control the syslog daemon。 The syslog daemon is what handles error messages. The daemon facility is used to represent the httpd daemon and other miscellaneous daemons。 What syslog.conf facility represents miscellaneous daemons? 1 proc 2 daemon 3 kern 4 misc 正确答案:2

提示:BGLI5:The correct answer(s): B The syslog。conf file is used to control the syslog daemon。 The syslog daemon is what handles error messages. The daemon facility is used to represent a variety of miscellaneous daemons.

What syslog。conf facility represents login processes? 1 login 2 auth 3 user 4 proc

正确答案:2

提示:BGLI6:The correct answer(s): B The syslog。conf file is used to control the syslog daemon。 The syslog daemon is what handles error messages. Login processes are represented by the auth facility in the syslog。conf file。

What syslog。conf facility represents user authentication processes? 1 proc 2 auth 3 user 4 login 正确答案:2

提示:BGLI7:The correct answer(s): B The syslog。conf file is used to control the syslog

94

daemon。 The syslog daemon is what handles error messages。 Authentication processes are represented by the auth facility in the syslog。conf file。 What syslog.conf facility represents the line printer? 1 linep 2 lprinter 3 lpr 4 ptr

正确答案:3

提示:BGLI8:The correct answer(s): C The syslog.conf file is used to control the syslog daemon. The syslog daemon is what handles error messages. The lpr facility in the syslog.conf file represents the line printer。

What syslog。conf facility represents Usenet news? 1 net 2 uunet 3 usenet 4 news 正确答案:4

提示:BGLI9:The correct answer(s): D The syslog。conf file is used to control the syslog daemon。 The syslog daemon is what handles error messages. The news facility in the syslog.conf file represents Usenet news。

What syslog.conf facility represents Unix to Unix copy? 1 uucp 2 ucp 3 uuc 4 copy

正确答案:1

提示:BGLI10:The correct answer(s): A The syslog。conf file is used to control the syslog daemon。 The syslog daemon is what handles error messages。 Unix to Unix copy is represented by the uucp facility in the syslog.conf file。

What syslog.conf facility represents the cron daemon? 1 cron 2 crontab 3 daemon 4 crond 正确答案:1

提示:BGLI11:The correct answer(s): A The syslog.conf file is used to control the syslog daemon. The syslog daemon is what handles error messages. The cron daemon is represented by the cron facility in the syslog.conf file。

What syslog。conf facility is used to create timestamps in log files? 1 mark 2 tstamp 3 time 4 stamp 正确答案:1

95

提示:BGLI12:The correct answer(s): A The syslog.conf file is used to control the syslog daemon。 The syslog daemon is what handles error messages。 The mark facility in the syslog。conf file is used to place time stamps in your log files.

Which of the following syslog identifiers represents the highest priority? 1 error 2 emerg 3 alert 4 critical 正确答案:2

提示:BGLI13:The correct answer(s): B The syslog daemon is what handles error messages。 Syslog identifiers use priorities in the following order: emerg, alert, crit, err, warning, notice, info, debug, none。 When you specify a priority, all events with that priority or higher will be acted upon.

Which of the following syslog identifiers represents the highest priority? 1 warning 2 notice 3 critical 4 error

正确答案:3 提示:BGLI14:The correct answer(s): C The syslog daemon is what handles error messages。 Syslog identifiers use priorities in the following order: emerg, alert, crit, err, warning, notice, info, debug, none. When you specify a priority, all events with that priority or higher will be acted upon。

Which of the following syslog identifiers represents the highest priority? 1 notice 2 warning 3 info 4 error 正确答案:2

提示:BGLI15:The correct answer(s): B The syslog daemon is what handles error messages. Syslog identifiers use priorities in the following order: emerg, alert, crit, err, warning, notice, info, debug, none。 When you specify a priority, all events with that priority or higher will be acted upon.

Which daemon will send kernel alert messages. 1 smtpd 2 syslogd 3 alertd 4 krnld 正确答案:2 提示:BGLI16:The correct answer(s): B The syslogd daemon is responsible for sending kernel alert messages. SMTP is used for sending system to system messages like e—mail messages. Which of the following syslog。conf entries would cause kernel warning messages to be sent to the system console?

1 kern.console warning

96

2 kern.warning /dev/console 3 kern warning console 4 kern。warning.console 正确答案:2

提示:BGLI17:The correct answer(s): B The syslog.conf file is used to control the syslog daemon。 The syslog daemon is what handles error messages. Syslog.conf entries use the following format: facility。priority action.

Which of the following syslog。conf entries would cause mail error messages to be sent to the system console?

1 mail.err /dev/console 2 mail. error console 3 mail error console 4 mail.err.console 正确答案:1

提示:BGLI18:The correct answer(s): A The syslog。conf file is used to control the syslog daemon. The syslog daemon is what handles error messages。 Syslog。conf entries use the following format: facility。priority action。

Which of the following syslog。conf entries would cause kernel error messages to be sent to the system console?

1 kern warning console 2 kern error console 3 kern.error console

4 kern。warning /dev/console 正确答案:4

提示:BGLI19:The correct answer(s): D The syslog。conf file is used to control the syslog daemon. The syslog daemon is what handles error messages。 Syslog。conf entries use the following format: facility。priority action. When you specify a priority, all events with that priority or higher will be acted upon.

You have just added the following line to your syslog.conf file: lpr。info /dev/console. But, line printer messages are not being sent to the console。 What is most likely the problem? 1 the entry is formatted incorrectly

2 the syslog daemon reads it configuration information from the syslogd file

3 after modifying the syslog。conf file, the syslog daemon needs to be restarted. 4 today is 6.1 正确答案:3

提示:BGLI20:The correct answer(s): C The syslog.conf file is used to control the syslog daemon。 The syslog daemon is what handles error messages. After changes are made to the syslog.conf file, the syslog daemon has to be restarted in order for the changes to take effect。 What run level represents a power down? 1 4 2 0 3 1 4 5

正确答案:2

97

提示:BGLI21:The correct answer(s): B Different run levels are used to represent different system states。 Run level 0 represents a system power down。 Run level 1 represents administration mode.

What run level represents administration mode? 1 5 2 1 3 0 4 6

正确答案:2

提示:BGLI22:The correct answer(s): B Different run levels are used to represent different system states。 Run level 1 represents administration mode. Run level 0 represents a system power down。 Run level 6 represents a system reboot。 What run level represents basic multi—user? 1 5 2 1 3 0 4 2

正确答案:4

提示:BGLI23:The correct answer(s): D Different run levels are used to represent different system states。 Run level 2 represents basic multi—user mode。 Run level 1 represents administration mode。 Run level 0 represents a system power down。 What run level represents multi-user? 1 0 2 3 3 5 4 1

正确答案:2

提示:BGLI24:The correct answer(s): B Different run levels are used to represent different system states。 Run level 3 represents multi-user mode。 Run level 1 represents administration mode. Run level 0 represents a system power down. What run level represents a system reboot? 1 1 2 2 3 6 4 5

正确答案:3

提示:BGLI25:The correct answer(s): C Different run levels are used to represent different system states。 Run level 6 represents a system reboot。 Run level 2 represents basic multi-user mode. Run level 1 represents administration mode.

What command can be used to find the current run level? 1 rlevel 2 level 3 runlevel 4 show level

98

正确答案:3

提示:BGLI26:The correct answer(s): C Different run levels are used to represent different system states. The runlevel command can be used to get the current and previous run level。 Run level 0 represents a system power down。 Run level 1 represents administration mode。 What command be used to find the systems previous run level? 1 rlevel previous 2 runlevel

3 show level previous 4 level

正确答案:2

提示:BGLI27:The correct answer(s): B Different run levels are used to represent different system states. The runlevel command can be used to get the current and previous run level. Run level 0 represents a system power down。 Run level 1 represents administration mode。 What file does init processes use as its control file? 1 /etc/initproc 2 /etc/proc 3 /etc/inittab 4 /etc/init 正确答案:3 提示:BGLI28:The correct answer(s): C The /etc/inittab file is used to control init processes。 The other files do not exist.

What command can be used to cause changes to the inittab file to take effect without a system reboot? 1 inittab r 2 init r 3 init q 4 inittab q 正确答案:3

提示:BGLI29:The correct answer(s): C Issuing the init q command will cause changes to the inittab file to take effect without a system reboot。 This can save you a lot of time。 Which of the following can be used to switch your system to run level 3? 1 rlevel 3 2 inittab 3 3 init 3 4 level 3 正确答案:3

提示:BGLI30:The correct answer(s): C The init command can be used to switch your system run level. Different run levels are used to represent different system states. The runlevel command can be used to display your system runlevel。

Which of the following can be used to switch your system to run level 1? 1 init 1 2 rlevel 1 3 level 1 4 inittab 1

99

正确答案:1

提示:BGLI31:The correct answer(s): A The init command can be used to switch your system run level。 Different run levels are used to represent different system states. The runlevel command can be used to display your system runlevel。

You want to have the process /etc/myprocess run when the system enters run level 3。 Which of the following inittab entries would accomplish this? 1 5:3:once:/etc/myprocess 2 once:3:4:/etc/myprocess 3 once:5:3:/etc/myprocess 4 3:4:once:/etc/myprocess 正确答案:1

提示:BGLI32:The correct answer(s): A Inittab is used to control your system at various run levels。 Inittab entries use the following format: id:level:action:process

You want to have the process /etc/myprocess to run when the system enters run level 2. You want the system to wait until the process completes。 Which of the following inittab entries would accomplish this?

1 7:2:wait:/etc/myprocess 2 wait:2:7:/etc/myprocess 3 2:7:wait:/etc/myprocess 4 wait:7:2:/etc/myprocess 正确答案:1

提示:BGLI33:The correct answer(s): A Inittab is used to control your system at various run levels。 Inittab entries use the following format: id:level:action:process What option can be used with the shutdown command to skip fsck on reboot? 1 shutdown -s 2 shutdown -f 3 shutdown -r 4 shutdown -o 正确答案:2

提示:BGLI34:The correct answer(s): B The shutdown command can be used to reboot or shut down your system。 The -f switch can be used to skip fsck after a system reboot. Fsck is used to check your file system for errors.

What option can be used with the shutdown command to cancel a pending shutdown? 1 shutdown -n 2 shutdown -u 3 shutdown -x 4 shutdown -c 正确答案:4 提示:BGLI35:The correct answer(s): D The shutdown command can be used to reboot or shut down your system。 The shutdown —c command can be used to stop a pending shutdown. The —r switch can be used to reboot the system after a shutdown.

What option can be used with the shutdown command to reboot the system? 1 shutdown -b 2 shutdown -c

100

3 shutdown -r 4 shutdown -y 正确答案:3

提示:BGLI36:The correct answer(s): C The shutdown command can be used to reboot or shut down your system. The —r switch can be used to reboot the system after a shutdown. The shutdown -c command can be used to stop a pending shutdown.

What option can be used with the shutdown command to send a warning message alerting users that the system will be shut down? 1 shutdown -a 2 shutdown -w 3 shutdown —c 4 shutdown -k 正确答案:4 提示:BGLI37:The correct answer(s): D The shutdown command can be used to reboot or shut down your system。 If you want to send users a warning message before doing a system shutdown, you can use the -k switch. The shutdown -c command can be used to stop a pending shutdown.

You want to do a system shutdown, but you don’t want the shutdown to occur immediately。 You want the system to wait 60 seconds before doing the shutdown。 What option can be used with the shutdown command to wait 60 seconds before starting the shutdown? 1 shutdown -w 1 2 shutdown —t 1 3 shutdown -t 60 4 shutdown -c 60 正确答案:3 提示:BGLI38:The correct answer(s): C The shutdown command can be used to reboot or shut down your system。 Shutdown —t is used to set a delay before a shutdown is started。 The shutdown —c command can be used to stop a pending shutdown.

Which of the following can be used to create a group named mygroup that has an id of 345? 1 groupadd —g 345 mygroup 2 group 345 mygroup 3 groupadd 345 mygroup 4 group -a 345 mygroup 正确答案:1

提示:BGLI39:The correct answer(s): A The groupadd command is used to add groups。 You can specify a group name and a group id.

What option is used with the useradd command to specify the user's user id? 1 —u 2 —s 3 —ui 4 —id

正确答案:1

提示:BGLI40:The correct answer(s): A The useradd command is used to create users. The -u option is used with the useradd command to specify a user id. If you want to specify a users login

101

shell, you can use the —s switch with the useradd command。

What option is used with the useradd command to specify the user’s login shell? 1 —s 2 -sh 3 —u 4 -l

正确答案:1

提示:BGLI41:The correct answer(s): A The useradd command is used to create users。 If you want to specify a users login shell, you can use the —s switch with the useradd command. The —u option is used with the useradd command to specify a user id。

What option is used with the useradd command to specify the user’s home directory? 1 -h 2 -a 3 -u 4 —d

正确答案:4 提示:BGLI42:The correct answer(s): D The useradd command is used to create users. The —d option when used with the useradd command, will allow you to specify a user’s home directory。 The -u option is used with the useradd command to specify a user id。

You want a user’s account to expire in ten days. What option used with the useradd command will allow you to do this? 1 -u 2 —d 3 —e 4 —t

正确答案:3 提示:BGLI43:The correct answer(s): C The useradd command is used to create users。 The useradd command with the —e option allows you to set an expiration date for an account。 The -u option is used with the useradd command to specify a user id。

You want there to be 3 grace days after a password expires before an account becomes disabled. How would you do this?

1 check the delay option in user admin

2 use the useradd command with the —f switch 3 use the useradd command with the —d switch 4 edit the user's user.conf file 正确答案:2

提示:BGLI44:The correct answer(s): B The useradd is used to add system users. You can use the -f switch to give a user grace days before his or her account is disabled。 There is no user。conf file.

What switch is used with the useradd command to specify a user’s initial group? 1 —u 2 —ig 3 -g 4 —i

102

正确答案:3

提示:BGLI45:The correct answer(s): C The useradd command is used to create users。 The -g option can used with the useradd command to specify a user's initial group. The -u option is used with the useradd command to specify a user id。

What switch is used with the usermod command to change a user’s secondary groups? 1 -U

2 —group 3 —d 4 -G

正确答案:4 提示:BGLI46:The correct answer(s): D The usermod command is used to change user options. The -G switch is used to change a user’s secondary group. If you want to change a user’s home directory, you can use the usermod —d command。

You are adding a new user. You want to create the user’s home directory only if the directory does not exist. Which of the following would accomplish this? 1 useradd —u 2 useradd -h -y 3 useradd -m 4 useradd -h 正确答案:3

提示:BGLI47:The correct answer(s): C The useradd command is used to create users。 The useradd —m command will create a user’s home directory if it does not exist。 The -u option is used with the useradd command to specify a user id。

Which of the following can be used to change a user’s home directory? 1 usermod —c 2 usermod —d 3 usermod -u 4 usermod -h 正确答案:2

提示:BGLI48:The correct answer(s): B The usermod command is used to change user accounts. If you want to change a user’s home directory, you can use the usermod —d command. The —G switch is used to change a user’s secondary group.

You had a contractor come into your company. You originally set his account to expire after thirty days. You now need to change this。 How can you do this? 1 usermod —a 2 usermod -d 3 usermod -x 4 usermod -e 正确答案:4

提示:BGLI49:The correct answer(s): D The usermod command is used to change user accounts. The usermod -e command can be used to change an accounts expiration date. If you want to change a user’s home directory, you can use the usermod -d command。 Which of the following can be used to change a user’s initial group? 1 usermod —g

103

2 usermod —i 3 usermod -G 4 usermod -c 正确答案:1

提示:BGLI50:The correct answer(s): A The usermod command is used to change user accounts。 The usermod -g command is used to change a user’s initial group。 The -G option is used to change a user’s secondary group.

What command can be used to see of listing of jobs scheduled with the at command? 1 at —r 2 at -l 3 at -d 4 at list 正确答案:2

提示:BGLI51:The correct answer(s): B The at utility is used to schedule tasks。 The at -l command is used to show a listing of the jobs scheduled with the at command。 The —r switch can be used to remove a job that has been scheduled。

What command is used to remove jobs scheduled with the at command? 1 at -j 2 at —r 3 at —l 4 at -d

正确答案:2

提示:BGLI52:The correct answer(s): B The at command is used to schedule commands or utilities to run。 The -r switch can be used to remove a job that has been scheduled。 The at -l command is used to show a listing of the jobs scheduled with the at command.

You want to schedule a job to run April 1 at 2 am. Which of the following would accomplish this?

1 at April 1 2am 2 at 4 1 2

3 at 2am April 1 4 at 2 4 1 正确答案:3 提示:BGLI53:The correct answer(s): C The at command can be used to schedule commands。 Times can be entered in several different ways. One of these is: [time] [date]。

You want to schedule a job to run at 3 am a week from now. Which of the following would accomplish this? 1 at 3 7 2 at 3 7d 3 at 3am + 7 4 at 7 + 3am 正确答案:3

提示:BGLI:The correct answer(s): C The at command can be used to schedule commands。 Times can be entered in several different ways. One of these is: [time] [days from now].

You want to list the at queue for the user user1. Which of the following would allow you to do

104

this?

1 at user1 2 user1 at 3 atq user1 4 show at user1 正确答案:3

提示:BGLI55:The correct answer(s): C The at utility is used to schedule tasks. The atq command can be used the display the at queue for a particular user。 The atrm command is used to remove all at queue entries for a particular user.

You want to remove all jobs for user1 from the at queue. Which of the following commands would you issue to do this? 1 atrm —a user1 2 at -r user1 3 at —a user1 4 at rm user1 正确答案:1

提示:BGLI56:The correct answer(s): A The at utility is used to schedule tasks. The atrm command is used to remove all at queue entries for a particular user. The atq command can be used the display the at queue for a particular user。

The ______ file is used to determine which users can schedule jobs using the at command. 1 at。allow 2 allow。at 3 at.conf

4 allow。cron 正确答案:1 提示:BGLI57:The correct answer(s): A Permissions for the at command are controlled by the at.allow and at.deny files. The at。allow file is used to specify what users have permissions to schedule jobs with the at command.

If the at。allow file does not exist, then the _______ file will be checked in order to determine if a user has access to the at utility。 1 at.conf 2 deny。at 3 at。no 4 at.deny 正确答案:4 提示:BGLI58:The correct answer(s): D Permissions for the at command are controlled by the at.allow and at。deny files。 The at.deny file can be used to deny users access to the at command. The at.deny file is only checked if the at。allow file does not exist。 Which of the following commands can be used to schedule jobs or tasks. 1 cron 2 schd 3 taskman 4 atime 正确答案:1

105

提示:BGLI59:The correct answer(s): A The cron utility can be used to schedule jobs or tasks。 The at command also serves a similar function.

You want to list the cron table for user1。 How would you do this? 1 cron -l user1

2 crontab —u user1 3 crontab -d user1 4 cron -user1 正确答案:2

提示:BGLI60:The correct answer(s): B The cron utility can be used to schedule jobs or tasks。 The crontab command is used to manipulate a cron table. The -u option is used to list the cron table for a specific user.

You want to modify the cron table for user2. Which of the following commands would allow you to do this? 1 cron —user2 2 crontab -m user2 3 crontab -e user2 4 cron -e user2 正确答案:3 提示:BGLI61:The correct answer(s): C The cron utility can be used to schedule jobs or tasks. The crontab command is used to manipulate a cron table。 The -e option is used to edit the cron table for a specific user。

The ______ file controls what users have access to the cron utility. 1 cron。conf 2 allow.cron 3 cron.yes 4 cron.allow 正确答案:4 提示:BGLI62:The correct answer(s): D The cron utility can be used to schedule jobs or tasks。 Permissions for the cron utility are controlled by the cron.allow and cron.deny files. The cron。allow file contains a listing of users who can use the cron utility. If the cron。allow file does not exist, then the _______ file will be checked in order to determine if a user has access to the cron utility. 1 deny.cron 2 cron。deny 3 cron。no 4 cron。conf 正确答案:2

提示:BGLI63:The correct answer(s): B The cron utility can be used to schedule jobs or tasks。 Permissions for the cron utility are controlled by the cron。allow and cron.deny files。 The cron。deny file is only checked if the cron。allow file does not exist。 The command ’echo *’ will accomplish which of the following? 1 print out the * character 2 clear the screen

3 nothing. It will return an error

106

4 provide of listing of all the files in the current directory 正确答案:4

提示:BGLI:The correct answer(s): D The * will be interpreted as a wildcard。 It can represent any number of characters。 Because of this, all the files in the current directory will be listed.

You want to give the variable ’IQ' a value of 4. How would you do this? 1 set IQ=4 2 IQ:=4 3 IQ=4

4 set $IQ=4 正确答案:4 提示:BGLI65:The correct answer(s): D The $ symbol is used to designate a variable。 The set command is used to set the value for a variable. The unset command is used to remove variables. What command is used to remove variables? 1 set 2 unset 3 remove 4 var

正确答案:2

提示:BGLI66:The correct answer(s): B The set command is used to create variables. The unset command is used to remove variables。

Which of the following commands is used to show exported variables。 1 var 2 var exp 3 export

4 show export 正确答案:3

提示:BGLI67:The correct answer(s): C The export command will give you a listing of your exported system variables. The set command can be used to create variables. The unset command can be used to remove variables.

Which of the following switches can be used with the fsck command to display status bars? 1 -b 2 —s 3 -v 4 -C

正确答案:4 提示:BGLI68:The correct answer(s): D The fsck utility is used to do a file system check. The -C option used with the fsck will display a status bar in order to give you a better idea how long a task will take。

Which of the following options can be used with the mkfs command to check for bad blocks before the file system is built? 1 -check 2 —c 3 -b

107

4 -e

正确答案:2

提示:BGLI69:The correct answer(s): B The mkfs utility is used to create a file system. The —c option used with the mkfs command allows you to check for bad blocks on a file system。 You want to view disk quotas for user1. How would you do this? 1 quotaon -user1 2 show quota user1 3 quota -u user1 4 repquota -u user1 正确答案:4

提示:BGLI70:The correct answer(s): D The quotaon command is used to set system quotas。 The repquota command is used to report user quotas.

You want to view the disk quota for group1。 How would you do this? 1 quota —group1 2 quotaon -group1 3 repquota —g group1 4 showquota —g group1 正确答案:3

提示:BGLI71:The correct answer(s): C The quotaon command is used to set system quotas. The repquota command is used to report user or group quotas.

If you execute the ls -l command, the 'sticky bit’ will appear as which of the following? 1 an ’s’ 2 a 't’ 3 a '+' 4 a ’-’

正确答案:2

提示:BGLI72:The correct answer(s): B The sticky bit shows up as a 't’. The sticky bit is usually set on directories like temp directories, where permissions vary per user。 What command is used to change the group that is associated with a file? 1 group

2 change group 3 chgrp 4 groupadd 正确答案:3 提示:BGLI73:The correct answer(s): C If you want to change the group associated with a file, you can use the chgrp command。 The groupadd command is used to add groups。 What lilo option can be use to uninstall the boot loader? 1 -r 2 —b 3 -u 4 —l

正确答案:3 提示:BGLI74:The correct answer(s): C Lilo is the Linux boot loader. It controls the Linux boot process。 The lilo boot loader is uninstalled using the -u option.

108

In what directory are spool files usually located? 1 /proc 2 /var 3 /spool 4 /lpq 正确答案:2

提示:BGLI75:The correct answer(s): B Spool files are generally located under the /var directory. System information is usually contained in the /proc directory。 It can however be stored in other directories。 The /boot directory usually contains the system kernel. Which of the following is more secure when connecting to a remote machine? 1 telnet 2 ssh 3 rlogin 4 rsh

正确答案:2 提示:BGLI76:The correct answer(s): B Ssh is the secure shell. Ssh is more secure than telnet because telnet passwords are passed in clear text. Ssh passwords are not.

You want to schedule a script file called '/usr/maintscripts/myscript’ to run every night at 1a.m. How would you do this.

1 * * * 0 1 /usr/maintscripts/myscript 2 * * * 1 0 /usr/maintscripts/myscript 3 1 0 * * * /usr/maintscripts/myscript 4 0 1 * * * /usr/maintscripts/myscript 正确答案:4

提示:BGLI77:The correct answer(s): D The cron utility can be used to schedule jobs or tasks。 Permissions for the cron utility are controlled by the cron。allow and cron.deny files。 The cron utility uses the following format to schedule commands: minute hour day month weekday command

You want to find out what program created a core dump file? What command would allow you to get this information? 1 file core 2 core file 3 show dump 4 coredump file 正确答案:1

提示:BGLI78:The correct answer(s): A The file core command will tell you what program created a dump file。 Dump files are used in system debugging.

Which of the following can be used to replace the Master Boot Record on your system? 1 Format /MBR 2 MBR /format 3 MBR /replace 4 FDISK /MBR 正确答案:4 提示:BGLI79:The correct answer(s): D If you need to replace the Master Boot Record, you

109

can use the FDISK /MBR command。 This may need to be done in order to replace the LILO. Which switch used with the tar command specifies that the archive should be filtered through gzip? 1 -g 2 —f 3 —gzip 4 —z 正确答案:4

提示:BGLI80:The correct answer(s): D The tar command is used to manage tar archive files. When the —z switch is used, an archive will be filtered through gzip. What command is used to change the effective group ID of a process? 1 gid 2 setgid 3 setuid 4 setid

正确答案:2

提示:BGLI81:The correct answer(s): B The setgid command is useful when process must be run with a different set of credentials。 This way you don’t have to log out and back in to run certain commands.

Which of the following commands can be used to show used swap memory 1 showmem 2 swap 3 freemem 4 free

正确答案:4

提示:BGLI82:The correct answer(s): D The free command can be used to show physical and swap memory stats. It can help you in troubleshooting。 The free command can be used to find out if your system is running low on memory and why.

You have a file named file2 that contains variations of the word pen。 You want to find all instances of these variations. Which of the following commands wold accomplish this? 1 grep \"pen[a-z]\" file2 2 grep ”pen \"file2 3 grep \"pen*\" file2 4 grep ”pen” file2 正确答案:4

提示:BGLI83:The correct answer(s): D The grep command is used to search for words or combinations within files。 ”pen \" will only find occurrences of the word pen, not variations。 If you have a list of words you want to search for, you can place these words in a file and use grep with the -f switch. The —i switch is used with the grep command to ignore case.

What switch used with the grep command allows you to specify a file containing words to search for? 1 -t 2 -s 3 —file

110

4 -f

正确答案:4

提示:BGLI84:The correct answer(s): D The grep command is used to search for words or combinations within files。 If you have a list of words you want to search for, you can place these words in a file and use grep with the —f switch. The —i switch is used with the grep command to ignore case。

You what to use the grep command to search for the name John. You want to find John, john, JOHN, all other occurrences regardless of capitalization。 What option will allow you to do this? 1 -f 2 -c 3 —a 4 —i 正确答案:4

提示:BGLI85:The correct answer(s): D The grep command is used to search for words or combinations within files。 The -i switch is used with the grep command to ignore case。 If you have a list of words you want to search for, you can place these words in a file and use grep with the -f switch.

You want to display default user options。 Which of the following would allow you to do this? 1 useradd -D

2 show user defaults 3 show defaults 4 useradd —u 正确答案:1

提示:BGLI86:The correct answer(s): A The useradd command is used to add users to your Linux system。 The useradd -D command is used to display the default user options for your system。

What is the minimum number of partitions needed to install Linux? 1 1 2 3 3 4 4 2

正确答案:4 提示:BGLI87:The correct answer(s): D The Linux installation requires at least two partitions. You must have one partition for system files and one partition for the swap partition. Which of the following utilities can be used to split a fat partition into two partitions? 1 FAT2 2 fips 3 split 4 div

正确答案:2

提示:BGLI88:The correct answer(s): B The fips utility can be used to split a FAT partition into two separate partitions。 The others are not valid Linux utilities.

You want to find out what shell you are currently running。 Which of the following commands would you use to get this information?

111

1 shell 2 $shell 3 show shell 4 echo $shell 正确答案:4

提示:BGLI:The correct answer(s): D A shell is a Linux user environment。 The shell variable stores the name of the current shell. The echo command is used to display the value of a variable.

A user’s name is listed in both the /etc/at。allow file and the /etc/at。deny file. Will the user be able to schedule jobs with the at command?

1 Yes 2 No

正确答案:1 提示:The correct answer(s): A Permissions for the at command are controlled by the at。allow and at.deny files。 The /etc/at.deny file is only checked if the /etc/at.allow file is not present. By default, when a file system is mounted, it is mounted _______. 1 read—only 2 read-write 正确答案:2

提示:BGLI91: The correct answer(s): B Only files on the same file system can be hard-linked. 1 True 2 False 正确答案:1

提示:BGLI92: The correct answer(s): A Files must be on the same file system in order to be hard linked。 Soft linked files don’t have to be on the same file system. Only files on the same file system can be soft-linked。 1 False 2 True

正确答案:1 提示:BGLI93:The correct answer(s): A It is possible to soft link files on different file systems。 Files have to be on the same file system in order to be hard linked。

Do changes to the inittab file require a reboot in order to take effect? 1 Yes 2 No

正确答案:2

提示:BPLI94:The correct answer(s): B Issuing the init q command will cause changes to the inittab file to take effect without a system reboot. This can save you a lot of time。

A user's name is listed in both the /etc/at.allow file and the /etc/at.deny file. Will the user be able to schedule jobs with the at command? 1 No

112

2 Yes

正确答案:2 提示:BGLI95:The correct answer(s): B Permissions for the at command are controlled by the at。allow and at。deny files。 The /etc/at.deny file is only checked if the /etc/at。allow file is not present.

A user’s name is listed in both the /etc/cron.allow file and the /etc/cron.deny file. Will the user be able to schedule jobs with the cron utility? 1 Yes 2 No

正确答案:1

提示:BGLI96:The correct answer(s): A Permissions for the cron utility are controlled by the cron。allow and cron。deny files。 The cron。deny is checked only if the cron.allow file does not exist. Since the cron.allow file exists and the user's name is listed there, the user will be able to use the cron utility。

Can regular users view disk quotas for other users? 1 No 2 Yes

正确答案:1 提示:BGLI97:The correct answer(s): A Only an administrator(root) can view quotas for other users. A user's quota is charged for each file the user 'owns’。

Which of the following are required in the /etc/passwd file when creating a user account?(Select all that apply) 1 A: userid

2 B: default group 3 C: password age 4 D: login name

5 E: minimum password length 正确答案:124

提示:BGLI98:The correct answer(s): A B D When creating user accounts, entries must be created in the /etc/passwd file for login name, userid, default group, and descriptive name.

Which of the following are required in the /etc/passwd file when creating a user account?(Select all that apply)

1 A: password age 2 B: default group 3 C: userid

4 D: minimum password length 5 E: login name 正确答案:235

提示:BGLI99:The correct answer(s): B C E When creating user accounts, entries must be created in the /etc/passwd file for login name, userid, default group, and descriptive name.

Which of the following are required in the /etc/passwd file when creating a user account?(Select all that apply)

1 A: minimum password length 2 B: descriptive name

113

3 C: shell

4 D: password age 正确答案:23

提示:BGLI100: The correct answer(s): B C When creating user accounts entries must be created in the /etc/passwd file for login name, userid, default group, descriptive name, and shell. Your current directory contains the following files: abcdefg abc123 abc 123 123abc abcd

If you were to type: ls abc*

which of the following would be returned?(Check all that apply)

1 A: 123

2 B: 123abc 3 C: abcdefg 4 D: abc 5 E: abc123 正确答案:345

提示:BPGL101:The correct answer(s): C D E The ls command is used to list the contents of a directory。 The list can be formed according to a set of requirements. The * wildcard can be used to stand for any number of characters。

Your current directory contains the following files: abcdefg abc123 abc 123 123abc abcd

If you were to type: ls abc

which of the following would be returned?(Check all that apply) 1 A: 123abc 2 B: abc123 3 C: abc 4 D: 123

5 E: abcdefg 正确答案:3

提示:BGLI102:The correct answer(s): C The ls command is used to list the contents of a directory. The list can be formed according to a set of requirements. Since no wildcards are specified, only file matching abc identically will be listed. Your current directory contains the following files: abcdefg

114

abc123 abc 123 123abc abcd

If you were to type: ls abc?

which of the following would be returned?(Check all that apply) 1 A: abc123 2 B: abcdefg 3 C: abc 4 D: abcd 5 E: 123abc 正确答案:4

提示:BGLI103: The correct answer(s): D The ls command is used to list the contents of a directory. The list can be formed according to a set of requirements. The ? Wildcard can only stand for one character。

Your current directory contains the following files: abcdefg abc123 abc 123 123abc abcd

If you were to type: ls abc[a—z]

which of the following would be returned?(Check all that apply) 1 A: 123abc 2 B: abcdefg 3 C: 123 4 D: abc 5 E: abcd 正确答案:5

提示:BGLI104:The correct answer(s): E The ls command is used to list the contents of a directory。 The list can be formed according to a set of requirements。 [a-z] can be replaced by any character between a and z。

Your current directory contains the following files: abcdefg abc123 abc 123 123abc abcd

If you were to type: ls abcd[A—Z]

which of the following would be returned?(Check all that apply) 1 A: abc

115

2 B: abc123 3 C: abcd

4 D: nothing would be returned 正确答案:4

提示:BGLI105:The correct answer(s): D The ls command is used to list the contents of a directory. The list can be formed according to a set of requirements. [A—Z] can be replaced by any character between A and Z. Remember, this is case sensitive。 Inodes contain which of the following?(Select all that apply) 1 A: permissions 2 B: data

3 C: type of file

4 D: file access times 正确答案:123

提示:BGLI106: The correct answer(s): A B C Inodes contain data, permissions, and the file type。 Hard linked files share the same inode。

What two modes are available with the dig command? 1 A: batch 2 B: privileged 3 C: interactive 4 D: user 正确答案:13 提示:BGLI107:The correct answer(s): A C The dig command is used to query DNS servers. It can run in either batch or interactive mode.

116

因篇幅问题不能全部显示,请点此查看更多更全内容

Copyright © 2019- efsc.cn 版权所有 赣ICP备2024042792号-1

违法及侵权请联系:TEL:199 1889 7713 E-MAIL:2724546146@qq.com

本站由北京市万商天勤律师事务所王兴未律师提供法律服务