Test your linux knowledge (Source Network)

Source: Internet
Author: User
Tags inode usage
Test your linux knowledge (Source Network)-General Linux technology-Linux technology and application information. The following is a detailed description. Source: Network

1. Fill in blank questions (20 points in total, 1 point for each blank question)
1. CD-ROM standard file system type is ---------------- (iso9660)
2. in Linux, run the command -------------- (nslookup) to test whether the DNS server can correctly resolve the domain name's client commands)
3. compress the/home/ixdbadirectory and generate the ixdba.tar.bz2 file. Save the file to the/home directory to implement the tar command format ---------------- of the task ----------------
(Tar-jxvf/home/ixdba.tar.bz2/home/ixdba)
4. in Linux, the hard drive (slave disk) of the second IDE channel is identified as -------------- (hdb)
5. The vi editor has two working modes: ------------ and -------------- (command mode and input mode)
6. The ping command is used to test network connectivity. The ping command is implemented through the ------------ protocol. (ICMP)
7. In the vi editing environment, use ------ -------- to convert the mode (ESC)
8. dns (Domain Name System) is actually a database of host information distributed on the internet. Its function is to convert between ---------- and. (IP address domain name)
9. When manually configuring the network, you can change the host name by modifying the file ----------------. to configure the domain name resolution client of the computer, you need to configure the file.
(/Etc/sysconfig/network/etc/resolv. conf)
10. The rm command can delete files or directories. The main difference is whether to use the recursive switch ------------------
(-R or-R)
Ii. Question (10 points in total, 1 point per question)
1./The larger the partition, the higher the/, the faster the Linux Startup speed. (Error)
2. During network configuration, the netstat command is used to test whether hosts in the network are connected (incorrect)
3. The file system in/etc/fstab can be automatically loaded when the system starts (right)
4. ping the command to check whether the IP address is active (error)
5. dns is a dedicated domain name resolution system that provides host name to ip address translation for TCP/IP-based networks. (Yes)
6. In shell command line mode, only one command can be written in one line, and only one command can be used at a time (error)
7. The mail system consists of three parts: User proxy (ua), transmission proxy (ta), and delivery proxy (da ). The transfer proxy function is to put the mail into the user's mailbox. (Error)
8. The samba server is one of the internet application servers. It allows users to share files between heterogeneous network operating systems. The procedure is to start the processes smbd and nmbd on the linux side, and modify the registry of Windows 95/98 on the client side. (Yes)
9. There are two backup modes in linux: system backup and user backup. The purpose of user backup is to restore the system operation quickly, easily, and completely after the system crashes. (Error)
10. You can use a key to interrupt a process. (Error)
3. multiple choice questions (40 points in total, 2 points per question)
1. The file name is rr. Z. The command that can be used for decompression is --------:
A) tar
B) gzip
C) compress
D) uncompress
Answer: d
2. Linux supports multiple file systems through VFS. The default file system in Linux is --------
A) VFAT
B) ISO9660
C) Ext Series
D) NTFS
Answer: c
3. to disable the linux system (do not restart), run the command.
A) ctrl + alt + del B) halt c) shutdown-r d) reboot
Answer: B
4. Run the following command to modify the Ethernet mac address:
A) ping B) ifconfig c
) Arp d) traceroute
Answer: B
5. In command mode in the vi Editor, type -------- to add a new line under the current row of the cursor.
A) B) c) d)
Answer: B.
6. In the command mode in the vi Editor, use the -------- command to delete the characters at the current cursor.
A) B) c) d)
IXDBA. NET Technical Community
Answer:
7. In the command mode in the vi editor, you can use the ------ command to repeat the last operation on the edited text.
A) Up Arrow B) Down Arrow c)> d)
Answer: c
8. you can run the "vi/etc/inittab" command to view the content of the file. You accidentally modified some content. To prevent system problems, you do not want to save the modified content. What should you do?
A) in the last row mode, type: wq
B) in the last row mode, type: q!
C) In the last line mode, type: x!
D) In editing mode, type the "ESC" key to exit vi.
Answer: B
9. Run the following command to delete a file:
A) mkdir B) move c) mv d) rm
Answer: d
10. Which of the following statements is used to display the inode usage of mounted file system disks ______?
A) df-I
B) su-I
C) du-I
D) free? I
Answer:
11. network administrators can control the access, access control, and operation of www servers. These controls can be reflected in the ----------- file.
A) httpd. conf B) lilo. conf c) inetd. conf d) resolv. conf
12. If you want to implement hot start in Linux, you should modify the line under/etc/inittab.
A) # Trap CTRL-ALT-DELETE
B) # ca: ctrlaltdel:/sbin/shutdown-t3-r now
C) # id: 3: initdefault:
D) #10: 3: wait:/etc/rc. d/rc 3
Answer: B
13. Start the samba server process in two ways: independent start mode and parent process start mode. The latter is started in the --------------- file as an independent process.
A)/usr/sbin/smbd B)/usr/sbin/nmbd c) rc. samba d)/etc/inetd. conf
Answer: c
14. Which of the following commands is used to create
A detailed list of tar files.
A) tar-t B) tar-cv c) tar-cvf d) tar? R
Answer:
15. If the symbolic link of the file fileA is fileB, the following descriptions are correct after fileA is deleted:
A) fileB is also deleted.
B) fileB still exists, but it is an invalid file.
C) Because fileB is not deleted, fileA will be automatically re-established by the system.
D) fileB will be automatically deleted by the system as fileA is deleted.
Answer: B
16. The command for archiving files is ---------------
IXDBA. NET Technical Community
A) dd B) cpio c) gzip d) tar
Answer: d
17. Change the file owner's command ----------
A) chmod B) touch c) chown d) cat
Answer: c
18. The command to search for strings that match the specified conditions in a given file is:
A) grep B) gzip c) find d) sort
Answer:
19. The command that can be used to create a new file is ----------------
A) chmod B) more c) cp d) touch
Answer: d
20. In the TCP/IP model, the application layer includes all the high-level protocols. In some of the following application protocols, ____ is capable of file transfer between local and remote hosts.
A) telnet B) FTP c) SNMP d) NFS
Answer: B
4. brief question (30 points in total, 10 points per question)
1. How many running levels of linux have been described in brief?
Answer points:
0-Shutdown mode,
1-in single-user mode, only the system administrator can log on to a single-user mode.
2-multi-user mode, but does not support file sharing. For example, NFS is not supported. This mode is not commonly used.
3-full multi-user mode, supporting NFS service. The most common user mode, default logon to the system character interface.
4-The user mode is basically not used, and some specific login requests can be implemented.
5-in full multi-user mode, log on to the X-window system by default, that is, log on to the linux graphic interface.
6-Restart mode: Execute to close all running processes and restart the system.
2. What is a link? What is the difference between a symbolic link and a hard link?
Answer points:
A link uses an I node to correspond to multiple file names. A hard link points the I node number of the file to the I node, and the link counter value is increased by 1. When you delete a linked file, the counter value is reduced by 1. When the value is 0, the I node is released. A symbolic link is a link file with only one file name and does not point to a real I node. When deleting a symbolic link file, it is different from a hard link file.
3. What is Network File System nfs? What is its role?
Answer points:
Network File System is an application service at the application layer. for users, you can easily access a remote file system through nfs, which is called a part of a local file system. It is applicable to the network of a specified large network or wide area connection.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.