Seventh Day of Linux learning

Source: Internet
Author: User
Tags parent directory php and mysql readable

1. In the following network protocol, the connection-oriented protocol is: A.

A Transmission Protocol B User Datagram Protocol C Internet Protocol D Inter-network Control Message Protocol

2. In the file system load parameters specified in the/etc/fstab file , the D parameter is typically used for mobile devices such as CD-ROM.
A defaults B SW C rw and RO D noauto

Let's explain what these five parameters mean and what they correspond to are the parameters,
Rw Readable and writable
RO Read Only
Suid Suid function
Nosuid no suid function
Dev Nodev

3. linux file permissions are 10 bits in length, divided into four segments, and the third paragraph represents C.
A file type B file owner's permissions C file owner group permissions D other users ' permissions

4. Terminate the command and Operation B that a foreground process may use.
A kill B <ctrl>;+c C shut down D Halt

5. when you use the mkdir command to create a new directory, the option to create a parent directory when its parent directory does not exist is D .
A-m b-d c-f d-p

6. The following about the I node describes the error is a.
A I node and the file is one by one corresponding ( each file has a unique index node number corresponding to it, but for an index node number, but can have more than one file name corresponding )
B I node can describe the number of blocks occupied by a file
The C I node describes the file size and pointers to the data block
D the transformation of the logical and physical structure of the file through the I node

7. a file name is RR. Z, the command that can be used to decompress is: D .
A tar B gzip C compress D uncompress

8. With a lot of C language functions, also known as the filter is C.
A csh B tcsh C awk D sed

9. A host to achieve over the LAN to communicate with another LAN, the job needs to do is C.
A configuration Name server B defines a route that the local computer points to the network C defines a route that the local computer points to the network Gateway D defines a route that the native points to the destination network gateway

10. The file to be used to establish dynamic routing has D.
A/etc/hosts b/etc/hostname c/etc/resolv.conf d/etc/gateways

11. The network address of the LAN is 192.168.1.0/24, the gateway address of the local network connection to the other network is 192.168.1.1. When the host 192.168.1.20 accesses the 172.16.1.0/24 network, its routing is set correctly for B.
A Route add–net 192.168.1.0 GW 192.168.1.1 netmask 255.255.255.0 metric 1
B Route add–net 172.16.1.0 GW 192.168.1.1 netmask 255.255.255.0 metric 1
C Route add–net 172.16.1.0 GW 172.16.1.1 netmask 255.255.255.0 metric 1
D route add default 192.168.1.0 netmask 172.168.1.1 metric 1

12. In the following reference, D is not within the scope of the Ifconfig command.
A Configure the local loopback address B to configure the IP address of the NIC to activate the network adapter D load the NIC into the kernel

13. The following is a description of the link, the error is B.
A hard link is to let the link file I node point to the linked file of I node B hard links and symbolic connections are generated a new I node C link is divided into hard links and symbolic links D hard connect cannot link directory file

when a host in the local area network tests the network connection with the ping command, it is found that the hosts within the network can be combined with the public network, and the problem may be C.
A Host IP set error B does not set gateway for LAN-connected network gateway or host gateway set incorrectly D LAN DNS server set incorrectly

15. In the following file, the file containing the mapping of the hostname to the IP address is: B.
A/etc/hostname b/etc/hosts c/etc/resolv.conf D/etc/networks

16. Do not need to compile the kernel is the case of D.
A remove the system without the device driver when B upgrades the kernel when C adds new hardware when D activates the NIC

17. There are four methods for assigning variables in the shell, in which the Name=12 method is called a.
A Direct Assignment B using the Read command C using command line arguments D using the output of the command

The D command intercepts the data for the specified content from each line of the text file .
A CP B DD C FMT D cut

19. The following is not a Linux system process type D.
A Interactive Process B Batch processing process C Daemon D Ready Process
20. Configure the Apache 1.3.19 server to modify the configuration file to ___a______
A httpd.conf B access.conf C srm.conf D named.conf '

the subsystem that the kernel does not include is D. process, memory, I/O, file management system
A Process Management System B memory management system C I/O management System D Hardware management System (file management System)

22. In the daily management, the CPU usually affects the performance of the system is: A.
A CPU running at full load B CPU operating efficiency for 30% C CPU operating efficiency for 50% D CPU operating efficiency of 80%
23. if the memory of a computer is 128MB, the size of the swap partition is usually C .
A 64MB B 128MB C 256MB D 512MB

24. The fifth step in installing Linux is to let the user choose how to install it, and if the user wants to install some of the components (software programs) and let the system install automatically after selecting it, the option that should be selected is D.
A full B expert C newbie D Menu
25. Linux has three commands to view files, if you want to view the contents of the file can be moved up and down to view the contents of the file, you should use the C command.
A Cat B More C less D menu

26. The following information is a running process that is listed by a system with the PS–EF command and the D process is running an Internet Super server that listens for connections on the Internet sockets and invokes the appropriate server to process the received information.
A Root 1 4.0 0.0 344 204? S 17:09 0:00 Init
B Root 2 0.0 0.1 2916 1520? S 17:09 0:00/sbin/getty
C Root 3 0.0 0.2 1364 632? S 17:09 0:00/USR/SBIN/SYSLOGD
D Root 4 0.0 1344 1204? S 17:09 0:10/usr/sbin/inetd

27. In the TCP/IP model, the application layer contains all the high-level protocols, and in some of the following application protocols, B is capable of implementing file transfers between local and remote hosts.
A telnet B FTP C SNMP D NFS
28. When we are not connected to a remote network, we need to track the route view in order to understand where there is a problem in the network, and the command that satisfies that purpose is C.
A Ping B ifconfig C traceroute D netstat
29. A file named Fido is modified with chmod 551 Fido, and its permission is D.
A-rwxr-xr-x b-rwxr--r--c-r--r--r--D-r-xr-x-x

30. In the Disk Address table in the I node table, if the length of a file is from block 1th to 11th of the disk Address table, the file occupies a total of B numbers .
A-B 266 C one D 256x10

31. The following list of files is listed with the Ls–al command, and the D file is a symbolic connection file.
A-rw-rw-rw-2 hel-s users, Sep 11:05 Hello
B-RWXRWXRWX 2 hel-s users, Sep 11:05 Goodbey
C drwxr--r--1 hel users Sep 08:10 Zhang
D lrwxr--r--1 Hel users 2024 Sep 08:12 Cheng
32. The DNS domain Name system is primarily responsible for parsing between host names and a.
A IP address B MAC address C network address D host Alias
33. WWW server is the most widely used on the Internet, it uses B structure.
A Server/Workstation B S/b C centralized D-distributed
34. The Linux system sends messages to other users via the C command.
A less B mesg y C write D Echo to
35. NFS is a C system .
A file B disk C Network file D operation
36. The D command can be used to perform file-to-tape backup work on Linux security Systems .
A cp B tr C dir D cpio

37. The files of the Linux file system are placed in the relevant directory according to their functions, and in the case of external device files, they should be placed in the C directory.
A/bin b/etc C/dev D/lib
38. When you restart the Linux system and write the information in memory to the hard disk, you should use the D command.
A # reboot B # halt C # reboot D # shutdown–r now
39. Network management has the following major functions: Configuration management, A, performance management, security management and billing management.
A Fault Management B daily backup management C upgrade Management D Send mail

40. The description of the proxy server, the correct is a.
A Use an existing public proxy server on the Internet, just configure the client.
The B proxy server can only proxy client HTTP requests.
C a proxy server that is set up can be used by any host on the network.
D the client using a proxy server does not have its own IP address.
41. Turn off the Linux system (do not restart) to use command B.
A Ctrl+alt+del B Halt C shutdown-r now D reboot
42. The command to implement conversion from IP address to Ethernet MAC address is: C.
A Ping B ifconfig C arp D traceroute

43. In the vi Editor, in command mode, type B to add a new row under the current line of the cursor.
A <a>; B <o>; C <I>; D A
44. In the vi Editor, in command mode, delete the character at the current cursor using the A command.
A <x>; B <d>;<w>; C <D>; D <d>;<d>;

45. In the vi Editor, in command mode, repeat the last action you made on the edited text, using the C command.
A up ARROW B down ARROW C <.>; D <*>;

46. The description of the file FF is shown in the command ls-al as follows, so the file FF is of type A.
-rwxr-xr--1 root root 599 Cec 17:12 FF
now use the ls-l command to view a list of files in the details format, and you will see the following:
Total 5
Drwxr-x---4 us ER group 4096 Mar 00:37 filename
drwxr-xr-x user group 4096 Mar 10 20:16 file name
-RW-------1 user group 524 M Ar 00:40 a
-rw-r--r--1 user Group 9 June b
drwx------2 user group 4096 Mar 11:06 C
Displays seven columns of information, From left to right: permissions, number of files, attribution user, attribution group, file size, creation date, file name
in particular, the first column:
Drwxr-xr-x
has 10 locations and can be divided into 4 groups:
D rwx r-x r-x
A group of only one character:
D folder
-normal file
L link
B block device file
P pipe file
C character device file
s set of interface files
The remaining 3 groups are attribution users, attribution groups, other users or group permissions for the file. We look at its format
rwx rwx rwx
R readable
W writable
x executable
They cannot be reversed by the way, and a location is empty (-), which means that it does not have the appropriate permissions.

A normal file B hard link C directory D symbolic link

47. The Delete file command is: D.
A mkdir B rmdir C MV D RM
48. The following names do not belong to the DNS server type : ____c_____
A Primary master server B secondary master server C Samba D cache_only Server
49. Network administrators to the WWW server access, control access and operation of control, these controls can be reflected in A file.
A httpd.conf B lilo.conf C inetd.conf D resolv.conf
50. The mail forwarding agent, also known as the Mail forwarding server, can use the SMTP protocol or the C protocol.
A FTP B TCP C UUCP D POP

51. There are two ways to start the Samba server process: The standalone boot method and the parent process startup mode, where the former is started as a standalone process in the C file.
A/USR/SBIN/SMBD b/usr/sbin/nmbd C Rc.samba d/etc/inetd.conf

52. DHCP is the short name of a Dynamic Host Configuration Protocol, which enables network administrators to manage a network system through a single server, automatically assigning ___d______ addresses to hosts in a network.
A network B MAC C TCP D IP
53. To ensure that the DHCP process starts automatically when the server is started, you should change the Dhcpd=no in a file to Dhcpd=yes.
A rc.inet1 B lilo.conf C inetd.conf D httpd.conf

54. The command to archive the file is D.
A DD B cpio C gzip D tar
55. Change the file owner's command to C.
A chmod B Touch C chown D Cat
56. The command to find a string in the given file that matches the set criteria is: A.
A grep B gzip C Find D sort
57. To create a new file you can use the command for D.
A chmod B more C CP D touch
58. In the following command, the command that cannot display the contents of a text file is: D.
A more B less C tail D join
59. When using Anonymous Logon FTP, the user name is B .
A users B anonymous C root D guest

60. In practice, to understand the use of command logname, you can type D to get help.
A logname--man B logname/? C help logname D logname--help
61. If Lilo is installed in the MBR, use the A command to uninstall Lilo.
A lilo–u B lilo–c c lilo–v D lilo-v
62. When viewing files and directories with command Ls–al, to view the contents of a volume over the screen, use the key combination D.
A shift+home B Ctrl + PgUp C ALT + PgDn D shift+ PgUp


63. MC is a UNIX-style operating system C.
A file Editor/program compiler B window tool for configuring the network
C Directory Browser/File Manager D Samba Server Administration Tool
64. The i node is a D-long table that contains information about the file.
A 8 byte B 16 byte C 32 bytes D 64 bytes

65. File permissions read, write, execute the three kinds of glyphs in turn is a.
A rwx B xrw C RDX D SRW
66. The length of a Linux file name must not exceed C characters.
A, B, C, D, 512.
67. There are three states of the process: C.
A readiness State, execution state and exit state B exact state, fuzzy state, and stochastic state
C run state, ready state and wait state D manual state, self-dynamic and Free State
68. to start a process from the background, add the symbol A at the end of the command.
A & B @ C # D $

69. B is not part of the messaging system.
A User Agent B Proxy Server C Transport agent D Delivery Agent
70. In a shell script, the command to read the contents of each field within a file and assign it to a shell variable is D.
A fold B Join C tr D Read
71. The crontab file consists of six fields, separated by a space between each domain, arranged as follows: B.
A MIN HOUR Day MONTH COMMAND
B MIN HOUR Day MONTH DAYOFWEEK COMMAND
C COMMAND HOUR Day MONTH DAYOFWEEK
D COMMAND Year MONTH day HOUR MIN

72. There are two modes of file transfer with ftp: C .
A Word and binary B. txt and word Document
C ASCII and binary D ASCII and rich Text Format
73. The permission of a member outside the group of a file is read-only, the owner has full permissions, and the permissions within the group are read and write, and the permission for the file is D.
A 467 B 674 C 476 D 764
74. when the DNS system is tested, the named process number is 53, and the command D notifies the process to reread the configuration file .
A KILL–USR2-B KILL–USR1-Kill-int kill–hup 53

75. Apache Server The default answer connection port number is C.
A 1024x768 B, C 8
76. The combined use of PHP and MySQL solved the C.
A handling of database access issues on proxy B dealing with hacker's illegal access problem on WWW server
C Handling database access issues on the WWW server
D Handling database access issues on the SendMail mail system
77. OpenSSL is an a.
A encryption Software B mail system C database management system D embedded scripting programming language
78. The configuration file for the Samba server is D.
A httpd.conf B inetd.conf C Rc.samba D smb.conf
79. About DNS servers, the description is correct for D.
A DNS server configuration does not require configuration of client B to establish a DNS server for a partition, only a primary DNS server that requires a primary DNS server to start the named process is required, and the secondary DNS server does not require
The root.cache file for the D DNS server contains information about the root name server
80. To exit the interactive mode of the shell, type C.
A <Esc>; B ^q C exit D quit

Seventh Day of Linux learning

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.