Linux operation Dimension Common pen question (choice question) __linux

Source: Internet
Author: User
Tags chmod mkdir parent directory php and mysql domain name server file permissions

ext: http://www.yunweipai.com/archives/11526.html

first, Shell part

1. There are four methods of assigning variables in the shell, in which the Name=12 method is used to call a .
A Direct Assignment
B Use the Read command
C using command line arguments
D using the output of the command

2.D commands can intercept the data for the specified content from each line in the text file.
A CP
B DD
C FMT
D Cut

3. In the shell script, the command to read the contents of each field in the file and assign it to the shell variable is D .
A fold
B Join
C TR
D Read

4. Exit the interactive mode shell, type C .
A
B ^q
C exit
D quit

5. The name of the shell variable that is valid in the following variable names is: C .
A-2-time
B _2$3
C Trust_no_1
D 2004file

6. The function and characteristic of the shell is C .
A pipeline B Input Output redirect C perform background process D handler command

7. The following to the shell variable fruit operation, the correct is: C .
A to assign a value to a variable: $FRUIT =apple
B shows the value of the variable: fruit=apple
C displays the value of the variable: Echo $FRUIT
D determine whether a variable has a value: [-f― $FRUIT ‖]

second, the network part
1. In the following network protocol, the connection-oriented protocol is: a .
A Transmission Control Protocol
B User Datagram Protocol
C Internet Protocol
D Inter-Internet Control Message Protocol

2. A host to achieve through the LAN and another LAN communication, need to do the work is C .
A Configure the Domain name server
B defines a route that the local computer points to on the network
C defines a route that points to a native network gateway
D defines a router that points to the destination network gateway

third, server management
1. In the file system load parameters specified in the/etc/fstab file, theD parameter is generally used for mobile devices such as CD-ROM.
A defaults
B SW
C rw and RO
D Noauto
#noauto只在命令下挂载

2.Linux file Permissions Total 10-bit length, divided into four paragraphs, the third paragraph indicates that the content is C .
A file type
B file Owner's permissions
The permissions of the group where the C file owner is located
D Permissions for other users

3. Terminate the command and Operation B that a foreground process may use.
A Kill
B; +c
C shut down
D Halt

4. When creating a new directory using the mkdir command, the option to create a parent directory when its parent directory does not exist is D .
A-m
B-d
C-f
D–p

5. The following about the I node description error is a . (An inode is a data structure that describes the parameters of a file in a VFS.) )
A I node and the file are one by one corresponding
B I node can describe the number of blocks the file occupies
The C I node describes the file size and pointers to the data block
D the transformation of the logical structure and the physical structure of the file through the I node

6. With a lot of C language functions, also known as the filter is C .
A CSH
B tcsh
C awk (awk detailed)
D SED

7. The files needed to establish a dynamic route are D .
A/etc/hosts
B/etc/hostname
C/etc/resolv.conf
D/etc/gateways

8. LAN network address 192.168.1.0/24, the local area network connection other network gateway address is 192.168.1.1. When a host 192.168.1.20 access to a 172.16.1.0/24 network, its routing is set correctly for B .
A Route add–net 192.168.1.0 GW 192.168.1.1 netmask 255.255.255.0 metric1
B Route add–net 172.16.1.0 GW 192.168.1.1 netmask 255.255.255.255 Metric1
C Route add–net 172.16.1.0 GW 172.16.1.1 netmask 255.255.255.0 metric 1
D route add default 192.168.1.0 netmask 172.168.1.1 metric 1

9. The following formulation, which does not fall within the scope of the ifconfig order, is D .
A Configure local loopback address
B Configure the IP address of the network adapter
C Activate network adapter
D load the NIC into the kernel

10. The following is a description of the link and the error is B .
A hard link is to let the link file I node point to the linked file I node
B hard links and symbolic connections are all generating a new I node
C links are divided into hard links and symbolic links
D Hard connections cannot link directory files

11. When a host in the local area network uses ping to test the network connection, it is found that the host within the network can be together with, but not connected with the public network, the problem may be C.
A host IP settings are incorrect
B does not have a gateway connected to the LAN
C LAN Gateway or host Gateway settings are incorrect
D LAN DNS server settings are incorrect

12. In the following file, the file containing the mapping relationship between the hostname and the IP address is: B .
A/etc/hostname
B/etc/hosts
C/etc/resolv.conf
D/etc/networks

13. The case where the kernel is not required to be compiled is D .
A to remove device drivers that are not used by the system
B when upgrading the kernel
C when adding new hardware
D Activate the NIC

14. The following is not the Linux system process type is D .
A Interactive Process
B Batch processing process
C Daemon Process
D ready Process (process state)

15. Configure the Apache server to be modified by a configuration file
A httpd.conf
B access.conf
C srm.conf
D named.conf

16. Subsystems that are not included in the kernel are D .
A Process Management System
B Memory Management System
C I/O management system
D Hardware Management System

17. In day-to-day management, the CPU will usually affect the performance of the system is: A .
A the CPU is running at full capacity
B CPU operating efficiency of 30%
C CPU operating efficiency of 50%
D CPU operating efficiency of 80%

18. If the memory of a computer is 128GB, the swap partition is usually the size of a.
A 4GB
B 16GB
C 64GB
D 256GB

19.Linux View the file's command, if you want to view the contents of the file can be moved up and down with the cursor to view the contents of the file, you should use the C command.
A Cat
B more
C Less
D Head

20. In the TCP/IP model, the application layer contains all the high-level protocols, and B is capable of implementing file transfer between local and remote hosts in some of the following application protocols.
A Telnet
B FTP
C SNMP
D NFS

21. When we are not connected to a remote network, we need to track the routing view to see where there is a problem in the network, and the command to meet that goal is C .
A Ping
B ifconfig
C traceroute
D netstat

22. A file named Fido was modified with a chmod 551 Fido, and its license is D .
A-rwxr-xr-x
b-rwxr–r–
c-r–r–r–
D-r-xr-x-x

23. Use the Ls–al command to list the following file, D file is a symbolic connection file.
A-rw-rw-rw-2 hel-s users Sep 11:05 Hello
B-RWXRWXRWX 2 hel-s users Sep 11:05 Goodbey
C drwxr–r–1 Hel users 1024 Sep 08:10 Zhang
Dl rwxr–r–1 Hel users 2024 Sep 08:12 Cheng

24.DNS domain Name System is mainly responsible for the resolution between host name and a .
A IP Address
B MAC Address
C Network Address
D Host Alias

The 25.WWW server is the most widely used on the internet, and it uses the B structure.
A Server/Workstation
b/S
C-Centralized
D distributed

The 26.Linux system sends messages to other users through the C command.
A Less
B MESG y
C Write
D Echo to
[Note: MESG [y|n] All users decide whether to allow others to send messages to their own terminal interface]

27.NFS is the C system.
A file
B disk
C Network Files
D operation

The B command enables files to be backed up to tape in a Linux security system.
A CP
B TR
C dir
D Cpio
[Note: If a similar command such as Echo $PATH or echo $LD _library_path is used to display the path information, we will see a whole bunch of paths that are connected with colons, and the TR command can convert these colons to carriage returns, These paths are well readable: echo $PATH | TR ":" \ n "]

29.Linux file system files are categorized into the relevant directories according to their function, and for external device files, they should generally be placed in the C directory.
A/bin
B/etc
C/dev
D/lib

30. To restart the Linux system while the memory of the information written to the hard disk, you should use the D command implementation.
A # Reboot
B # Halt
C # Reboot
D # Shutdown–r Now

31. Network management has the following major functions: Configuration management, A , performance management, security management and billing management.
A Fault Management
B Daily backup Management
C Upgrade Management
D Send mail

32. About the proxy server, the correct is a .
A Use an existing public proxy server on the Internet to configure the client only.
The B proxy server can only proxy client HTTP requests.
C set up a proxy server can be used by any host on the network.
D the client that uses the proxy server does not have its own IP address.

33. Turn off the Linux system (no reboot) to use command B .
A Ctrl+alt+del
B Halt
C Shutdown-r Now
D reboot

34. The command to implement the conversion from IP address to Ethernet MAC address is: C .
A Ping
B ifconfig
C ARP
D traceroute

35. In command mode in the VI editor, type B to add a new row under the current line of the cursor.
A
B
C
D A

36. In command mode in the VI editor, delete the character at the current cursor using a command.
A
B;;
C
D;;

37. In command mode in the VI editor, repeat the last action you made on the edited text, using the C command.
A Up ARROW
B DOWN ARROW
C
D <*>;

38. The description of the file FF with the command Ls-al is shown below, so that the type of file FF is a . -rwxr-xr–1 root root 599 Cec 17:12 ff
A Normal file
B Hard Link
C Directory
D Symbolic Link

39. Delete File command as:D
A mkdir
B rmdir
C MV
D RM

40. In the following name, which is not part of the DNS server type:C
A Primary Master Server
B Secondary Master Server
C Samba
D cache_only Server

41. The Mail forwarding agent is also known as the Mail forwarding server, which can use the SMTP protocol or the C protocol.
A FTP
B TCP
C UUCP
D POP

42. There are two ways to start the Samba server process: Standalone startup and parent process startup, in which the former is started in a standalone process in the C file.
A/usr/sbin/smbd
B/usr/sbin/nmbd
Crc.samba
D/etc/inetd.conf

43.DHCP is the abbreviation of Dynamic Host Configuration Protocol, which can enable network administrators to manage a network system through a server, and automatically assign D addresses to host computers in a network.
A Network
B MAC
C TCP
D IP

44. The command to archive the file is D .
A DD
B Cpio
C gzip
D Tar

45. The command to change the owner of the file is C .
A chmod
B Touch
C Chown
D Cat

46. Find the command in a given file that matches a set condition string: A .
A grep
B gzip
C Find
D sort

47. The command to be used to create a new file is D .
A chmod
B more
C CP
D Touch (Instructions change the time record of the file.) )

48. In the following commands, commands that cannot display the contents of a text file are: D .
A more
B Less
C Tail
D Join

49. When using Anonymous Logon to FTP, the user name is B .
A Users
B Anonymous
C Root
D Guest

50. In the actual operation, want to understand the use of command logname, you can type D to get help.
A Logname–man
B logname/.
C Help LogName
D Logname–help

51. The three glyphs for the reading, writing, and execution of file permissions are, in turn, a .
A rwx
B XRW
C RDX
D SRW

52.Linux filename cannot be longer than C characters.
A 64
B 128
C 256
D 512

53. Starting the process from the background, you should add symbol A at the end of the command.
A &
B
C
D $

The 54.crontab file consists of six domains, separated by spaces between each field, arranged as follows: B .
A MIN HOUR Day MONTH the year COMMAND
B MIN HOUR Day MONTH DayOfWeek COMMAND
C COMMAND HOUR Day MONTH DayOfWeek
D COMMAND Year MONTH day HOUR MIN
crontab Command: Implement the program to run regularly

55. FTP for file transfer, there are two modes: C .
A Word and Binary
B. txt and word Document
C ASCII and Binary
D ASCII and Rich Text Format

56. The permissions of a file outside the group are read-only, the owner has full permissions, and the permissions within the group are read and written, and the file has a D .
A 467
B 674
C 476
D 764

57. In the DNS system test, the named process number is set to 53, and command D notifies the process to reread the configuration file.
A KILL–USR2 53
B KILL–USR1 53
C Kill-int 63
D Kill–hup 53

The default answering connection port number for the 58.Apache server is C .
A 1024
B 800
C (HTTP)
D 8

The combined use of 59.PHP and MySQL solves the C .
A Handling database access issues on a proxy
B handling illegal access of hackers on WWW server
C processing database access problems on the WWW server
D Handling database access issues on SendMail messaging systems

60.OpenSSL is a a.
A Encryption Software
B Mail system
C Database Management System
D Embedded Scripting programming language

61. Install Windows C: Disk (HDA1) in the/winsys directory of the Linux file system, and the command is B .
aroot@l04.edu.cn:~ #mount Dev/had1/winsys
broot@l04.edu.cn:~ #mount/dev/had1/winsys
croot@l04.edu.cn:~ #mount/dev/had1 Winsys
droot@l04.edu.cn:~ #mount Dev/had1 Winsys

63. The current directory for Superuser Root is:/usr/local, after typing the CD command, the user's current directory is B .
A/home
B/root
C/home/root
D/usr/local

64. The symbol for the character device file type is B .
A P
B C
C s
D L

65. In the/home/stud1/wang directory, there is a file, using D to implement the command in the background, which outputs the contents of the file to the File.Copy file.
A Cat File >;file.copy
B Cat >;file.copy
C Cat file File.Copy &
D Cat file >;file.copy &

66. In the DNS configuration file, the name used to represent a host alias is: B .
A NS
B CNAME
C NAME
D CN

67.qmail is B .
A agreement to receive mail
B Mail server of a
C Mail-Sending protocol
D Mail queues

68. A user is known to be STUD1 and its user directory is/HOME/STUD1. Pagination Displays the command of the file or directory name, user group, user, file size, file or directory permissions, file creation time, and so on for all files in the current directory.
A more Ls–al
B More–al ls
C More < Ls–al
D Ls–al | More

69. With regard to process scheduling commands, B is incorrect. at– scheduling commands for regular execution of programs
A on the day 11 o'clock in the evening execute the clear command and use the AT command: at 23:00 today clear
B Execute Date command at 6 o ' Day January 1 every year, using at command: at 6am 1 date
C daily 11 o'clock in the evening execute date order, crontab file should be: 0 * * * * Date
D execute the clear command once per hour and the crontab file should be: 0 */1 * * * Clear

70. The system has users User1 and User2, belonging to the Users group. In the User1 user directory there is a file file1, it has 644 of the permissions, if user2 users want to modify User1 user directory File1 file, should have B permissions.
A 744
B 664
C 646
D 746

71. If you want to configure an anonymous FTP server, you should modify the C file.
A/etc/gateway
B/etc/ftpservers
C/etc/ftpusers
D/etc/inetd.conf

The process of a 72.Samba server consists of two parts B .
A Named and SendMail
BSMBD and NMBD
C BOOTP and DHCPD
D httpd and squid

73. To configure Server for NFS, the main configuration of the C file on the server side.
A/etc/rc.d/rc.inet1
B/ETC/RC.D/RC. M
C/etc/exports
D/ETC/RC.D/RC. S

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.