Linux Question Summary __linux

Source: Internet
Author: User
Tags chmod gz file mkdir parent directory domain name server file permissions


A Fill in the blanks question:
1. In a Linux system, access the device in a file format.
2. When the Linux kernel boots, read the file system to be loaded from the file/etc/fstab.
3. Each file in the Linux file system is identified by the I node.
4. All disk blocks are composed of four parts, namely, the boot block, the private block, the I node table block and the data storage block.
5. Links are divided into: hard links and symbolic links.
6. The Super block contains important file system information, such as I node table and free block table.
7. The permission for a file is: d-rw-_r--_r--, which represents the permission in numeric form, the octal number is: 644, the file property is a directory.
8. The foreground START process uses CTRL + C to terminate.
9. After static route setting, if the network topology changes, the system administrator should modify the routing settings.
10. The important tasks of network management are: control and monitoring.
11. When installing a Linux system to partition a hard disk, you must have two types of partitions: file system partitions and swap partitions.
13. The script file must be given permission to execute before the shell program is written to run.
14. One of the tasks of system management is the ability to secure, backup, recover, and update programs and data in a distributed environment.
15. The system swap partition is an area of the system's virtual memory.
16. The kernel is divided into four subsystems such as process management system, memory management system, I/O management system and file management system.
17. Kernel configuration is an important operation that the system administrator will perform when changing the system configuration hardware.
18. In installing the Linux system, the network is configured with the Netconfig program, which prompts the user to enter the necessary information such as host name, domain name, domain name server, IP address, gateway address and subnet mask step by step.
19. Each user is uniquely identified by the user ID and user name.
20. The RIP protocol is the most common kind of internal protocol, which is commonly called dynamic Routing Information protocol.
21. All content in a Linux system is represented as a file, and various methods of organizing files are called file systems.
DHCP can implement dynamic IP address assignment.
23. The System network administrator's management object is the server, the user and the server process as well as the system's various resources.
24. Network management is usually composed of three parts, monitoring, transmission and management, in which the management part is the center of the whole network management.
25. You must compile the kernel when you want to remove a device driver that is not used by the system, and you must upgrade the kernel when the kernel does not support device drivers on the system.
The ping command can test whether the local system in the network can reach a remote host, so it is often used to test the connectivity of the network.
The VI editing apparatus has two modes of operation: Command mode and input mode.
28. You can use the Ls–al command to observe the file's permissions, each file's permissions are expressed in 10-bit, and divided into four paragraphs, where the first paragraph accounted for 1 digits, the file type, the second paragraph accounted for 3, representing the file owner of the file permissions.
29. The difference between process and procedure lies in its dynamics, the generation and termination of dynamics, and the basic States from which the process can be produced to terminate: The running state, the ready state and the waiting state (blocking state).
DNS is actually a database of host information that is distributed over the Internet, and its role is to convert between IP addresses and host names.
Apache is an application that implements the WWW server functionality, commonly referred to as "browsing the Web server," which is the Apache application that provides users with browsing Web services on the server side.
32. There are two types of backup available on Linux systems: System backup and user backup. The former refers to the backup of the operating system, which refers to the backup of the application and user files.
The file system type of the CD-ROM standard is iso9660.
34. When the lilo.conf configuration is completed, make it effective, the command and parameters should be run is lilo.
35. When using the LS command, use the parameter-B to display nonprinting characters in octal form.
The type of file system that Linux uses to support Windows 9.x/2000 long file names is vfat.
37. Setting limits the user to use the disk space the command is quota.
38 in a Linux system, the directory used to store the configuration files and subdirectories required for the system is/etc.
39. Hard connection can only establish a link to the file. Symbolic links can be created across different file systems.
40. The property bit of the socket file is S.
41. The command to end the background process is kill.
42. There are two ways in which a process can run, that is, running independently and using the parent process.
Link is divided into hard links and symbolic links.
44. The command and parameter to be used is ps-aux, which displays all the processes running in the Linux system under the Super user.
45. The property bit of the pipe file is p.
46. The standard output of the previous command as the standard input for the latter command, called a pipe.
47. The command and parameter for assigning execution rights to the script program is chmod a+x filename.
48. The command to log on remotely is telnet.
49. To send 10 packet message test and host connectivity, the command and parameters should be used: Ping–c 10.
The process of the DNS server is named named, which automatically mounts the DNS partition database files defined in the named.conf file in the/etc directory when it is started.
The Apache server process configuration file is httpd.conf.

52. In the Linux system, the command to generate the suffix. gz file after compressing the file is gzip.
53. When editing a file with VI, the contents of the file are saved in the Test.txt file and should be typed in the command mode: w test.txt.
54 commands and parameters that can display the whole year calendar on standard output are cal-y.
55. In shell programming, the rule for using square brackets to represent test conditions is that there must be spaces on both sides of the square brackets.
56. Check the installed file system/dev/had5 is normal, if the inspection error, then automatically repair, its command and parameters are FSCK–A/DEV/HAD5.
57. One tool for sharing user directories in Unix/linux in a windows9.x environment is the samba server.
58. System administrators are responsible for system resource management, systems performance management, device management, security management, and systematic performance monitoring.
59 in a Linux system, test the DNS server for the ability to correctly resolve client commands for domain names, using the command nslookup.
60. Under the Linux system, the hard drive (from disk) of the second IDE channel is identified as HDB.
61. When the system administrator needs to upgrade the kernel version and change the system hardware configuration, the kernel should be recompiled.
62. If you only want to modify the system's IP address, you should modify the/etc/rc.d/rc.inet1 configuration file.
63./etc/hosts files should be configured when there are no conditions within the LAN to establish a DNS server, but want users within the LAN to be able to access each other using the computer name.
64. In the VI editing environment, the ESC key is used for mode conversion.
Slackware Linux 9.0 typically uses a ext3 file system, and the entire disk block of the system is made up of four parts.
66. Archive the/home/stud1/wang directory for compression, compressed to generate wang.tar.gz files, and save this file to the/home directory, the TAR command format to achieve this task tar zcvf/home/wang.tar.gz/home/ Stud1/wang.
67. Piping is the standard input of the previous command as the standard output of the latter command.
68. When you use a manual method to configure a network, you can modify the/etc/hostname file to change the hostname, and to configure the domain name resolution client for that computer, configure the/etc/resolv.conf file.
69. The startup process has two methods, manual start and dispatch start, in which the scheduler starts the common commands for at, batch and crontab. domain name is, if you want to configure a domain name server, you should define the working directory of the DNS database in the named.conf file.
The two major protocols used by the SendMail messaging system are: SMTP and POP, used to send mail, and the latter to receive mail.
DHCP is the abbreviation for a Dynamic Host Configuration Protocol, which is to assign an IP address to a host in a network.
73. There are many kinds of packages used by proxy server, and the use of squid in textbooks.
The main difference is whether a recursive switch-R or R is used to delete a file or directory.
MV commands can move files and directories, and can also be renamed for files and directories.
76. The Hops of routing Protocol (RIP) represent the number of gateways that must pass before the destination is reached, and the longest distance that RIP receives is 15 hops.
The ping command is used to test network connectivity, and the ping command is implemented through the ICMP Protocol (Internet Control Information Protocol).
The NFS protocol is used to implement file system sharing between UNIX (/linux) hosts.
79. In the Linux operating system, devices are accessed through special files.
Shell is not only a user-command interpreter, it is also a powerful programming language. Bash is the default shell for Linux.
81. Use >;>; The symbol attaches the output redirection content to the back of the original text.
82. The command to add one user is: AddUser or Useradd.
83 for string lookup, using the grep command.
84. Use * to match several characters at a time.
The/sbin directory is used to store the management programs used by the system administrator.

Two Single Choice question:
1. In the following network protocol, the connection-oriented protocol is: A.
A Transmission Protocol B User Datagram Protocol C Internet Protocol D Inter-Internet Control Message Protocol
2. In the file system load parameters specified in the/etc/fstab file, the D parameter is generally used for mobile devices such as CD-ROM.
A defaults B SW C rw and RO D noauto
3. linux file permissions in total 10-bit length, divided into four paragraphs, the third paragraph indicates that the content is C.
A file type B file owner's permissions
C file Owner group permissions D Other user's permissions
4. Terminate the command and Operation B that a foreground process may use.
A kill B <ctrl>;+c C shut down D Halt
5. When you create a new directory using the mkdir command, the option to create the parent directory when the parent directory does not exist is D.
A-m b-d c-f d-p
6. The following about the I node description error is a. (An inode is a data structure that describes the parameters of a file in a VFS.) )
A I node and the file are one by one corresponding
B I node can describe the number of blocks the file occupies
The C I node describes the file size and pointers to the data block
D the transformation of the logical structure and the physical structure of the file through the I node
7. A file name is RR. Z, the commands you can use to decompress are: D.
A tar B gzip C compress D uncompress
8. With a lot of C language functions, also known as the filter is C.
B tcsh
C awk (awk detailed)
9. A host to achieve through the LAN and another LAN communication, need to do the work is C.

A Configure the Domain name server
B defines a route that the local computer points to on the network
C defines a route that points to a native network gateway
D defines a router that points to the destination network gateway
10. The files needed to establish a dynamic route are D.
A/etc/hosts b/etc/hostname c/etc/resolv.conf D/etc/gateways
11. Lan network address, the local area network connection other network gateway address is When a host access to a network, its routing is set correctly for B.
A Route add–net GW netmask metric 1
B Route add–net GW netmask metric 1
C Route add–net GW netmask metric 1
D route add default netmask metric 1
12. The following formulation, which does not fall within the scope of the ifconfig order, is D.
A Configure the local loopback address B to configure the IP address of the network card
C Activate network adapter D load NIC into kernel
13. The following is a description of the link and the error is B.
A hard link is to let the link file I node point to the linked file I node
B hard links and symbolic connections are all generating a new I node
C links are divided into hard links and symbolic links D hard connections cannot link directory files
14. When a host in the local area network uses ping to test the network connection, it is found that the host within the network can be together with, but not connected with the public network, the problem may be C.
A host IP settings are incorrect
B does not have a gateway connected to the LAN
C LAN Gateway or host Gateway settings are incorrect
D LAN DNS server settings are incorrect
15. In the following file, the file containing the mapping relationship between the hostname and the IP address is: B.
A/etc/hostname b/etc/hosts c/etc/resolv.conf D/etc/networks
16. The case where the kernel is not required to be compiled is D.
A when B upgrades the kernel when a device driver is removed from the system
C when new hardware is added, D activates the NIC
17. There are four methods of assigning variables in the shell, in which the Name=12 method is used to call a.
A Direct Assignment b using the Read command
C using command line parameter d using the output of the command
The. D command intercepts the data for the specified content from each line in the text file.
19. The following is not the Linux system process type is D.
A Interactive Process B batch process C Daemon process D ready process (process state)
20. Configure the Apache 1.3.19 server to modify the configuration file as ___a______
A httpd.conf B access.conf C srm.conf D named.conf
21. Subsystems that are not included in the kernel are D.
A Process Management System B memory management system C I/O management System D hardware management system
22. In day-to-day management, the usual CPU impact on system performance is: A.
A CPU is running at full capacity B CPU operating efficiency of 30%
C CPU operating efficiency of 50% D CPU operating efficiency of 80%
23. If the memory of a computer is 128MB, the swap partition is usually the size of C.
A 64MB B 128MB C 256MB D 512MB
24. The fifth step in installing Linux is to let the user choose the installation mode, if the user wants to install some components (software program), and after the selection of the system automatically installed, should choose the option is D.
A full B expert C newbie D Menu
25. Linux has three commands to view files, you should use the C command if you want to see the contents of the file by moving the cursor up and down while viewing the contents of the file.
A Cat B More C less D menu
26. The following information is a running process listed by a system with the PS–EF command, and the D process is running an Internet Super server that listens for connections on the Internet sockets and invokes the appropriate server to process the received information.
A Root 1 4.0 0.0 344 204? S 17:09 0:00 Init
B Root 2 0.0 0.1 2916 1520? S 17:09 0:00/sbin/getty
C Root 3 0.0 0.2 1364 632? S 17:09 0:00/USR/SBIN/SYSLOGD
D Root 4 0.0 1344 1204? S 17:09 0:10/usr/sbin/inetd
27. In the TCP/IP model, the application layer contains all the high-level protocols, and B is capable of implementing file transfer between local and remote hosts in some of the following application protocols.
28. When we are not connected to a remote network, we need to track the route view to see where there is a problem in the network, and the command to meet that goal is C.
A Ping B ifconfig C traceroute D netstat
29. A file named Fido is modified with a chmod 551 Fido, and its license is D.
A-rwxr-xr-x b-rwxr--r--c-r--r--r--D-r-xr-x-x
30. In the table of disk addresses in the I-node table, if a file's length is from the 1th block to the 11th block of the disk Address table, the file occupies a total of B block number.
A 256 B 266 C-D 256x10
(??) 31. The following list of files is listed with the Ls–al command, and the D file is a symbolic connection file.
A-rw-rw-rw-2 hel-s users Sep 11:05 Hello
B-RWXRWXRWX 2 hel-s users Sep 11:05 Goodbey
C drwxr--r--1 Hel users 1024 Sep 08:10 Zhang

D lrwxr--r--1 Hel users 2024 Sep 08:12 Cheng
32. The DNS domain Name system is primarily responsible for parsing between host names and a.
A IP address B MAC address C network address D host Alias
33. The WWW server is the most widely used on the internet, and it uses the B structure.
A Server/Workstation B/s C centralized D-distributed
34. The Linux system sends messages to other users through the C command.
A less B mesg y C write D Echo to

[Note: MESG [y|n] All users decide whether to allow others to send messages to their own terminal interface]

35. NFS is a C system.
A file B disk C Network file D operation
36. The B command can do the work of file backup to tape in a Linux security system.
A cp B tr C dir D cpio

[Note: If a similar command such as Echo $PATH or echo $LD _library_path is used to display the path information, we will see a whole bunch of paths that are connected with colons, and the TR command can convert these colons to carriage returns, These paths are good for readability:
echo $PATH | TR ":" \ n "]
37. The files of the Linux file system are categorized in the relevant directories according to their function, and for external device files, they should generally be placed in the C directory.
A/bin b/etc C/dev D/lib
38. When you restart your Linux system and write the information in memory to your hard disk, you should use the D command to implement it.
A # reboot B # halt C # reboot D # shutdown–r now
39. Network management has the following major functions: Configuration management, A, performance management, security management and billing management.
A Fault Management B daily backup management C upgrade Management D Send mail
40. On the proxy server discussion, the correct is a.
A Use an existing public proxy server on the Internet to configure the client only.
The B proxy server can only proxy client HTTP requests.
C set up a proxy server can be used by any host on the network.
D the client that uses the proxy server does not have its own IP address.
41. Turn off the Linux system (no reboot) to use command B.
A Ctrl+alt+del B Halt C shutdown-r now D reboot
42. The command to implement the conversion from IP address to Ethernet MAC address is: C.
A Ping B ifconfig C arp D traceroute
43. In command mode in the VI editor, type B to add a new row under the current line of the cursor.
A <a>; B <o>; C <I>; D A
44. In command mode in the VI editor, delete the character at the current cursor using the A command.
A <x>; B <d>;<w>; C <D>; D <d>;<d>;
45. In command mode in the VI editor, repeat the last action you made on the edited text, using the C command.
A up ARROW B down ARROW C <.>; D <*>;
46. The description of the file FF with the command Ls-al is shown below, so that the type of file FF is a.
-rwxr-xr--1 root root 599 Cec 17:12 ff
A normal file B hard link C directory D symbolic link
47. The Delete file command is: D.
A mkdir B rmdir C MV D RM
48. In the following name, which is not part of the DNS server type: ____c_____
A Primary master server B Secondary master server
C Samba D cache_only Server
49. Network administrator to the WWW server access, control access and operation control, these controls can be reflected in A file.
A httpd.conf B lilo.conf C inetd.conf D resolv.conf
50. The mail forwarding agent is also known as the Mail forwarding server, which can use the SMTP protocol and

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.