Linux face question 3

Source: Internet
Author: User
Tags message queue php and mysql uncompress

1. In the following network protocol, the connection-oriented protocol is: A.
A Transmission Protocol B User Datagram Protocol C Internet Protocol D Inter-network Control Message Protocol
2. In the file system load parameters specified in the/etc/fstab file, the D parameter is typically used for mobile devices such as CD-ROM.
A defaults B SW C rw and RO D noauto
3. linux file permissions are 10 bits in length, divided into four segments, and the third paragraph represents C.
A file type B permissions for the file owner
C file Owner group permissions D other users ' permissions
4. Terminate the command and Operation B that a foreground process may use.
A kill B; +c C shut down D Halt
5. When you use the mkdir command to create a new directory, the option to create a parent directory when its parent directory does not exist is D.
A-m b-d c-f d-p
6. The following about I node description error is a。 (Inode is a data structure that describes the parameters of a file in the VFS??) )
A I node and the file are one by one corresponding
B I node can describe the number of blocks occupied by a file
The C I node describes the file size and pointers to the data block
D the transformation of the logical and physical structure of the file through the I node
7. A file name is RR. Z, the command that can be used to decompress is: D.
A tar B gzip C compress D uncompress
8. With a lot of C language functions, also known as the filter is C.
A CSH
B tcsh
C awk
D SED
9. A host to achieve over the LAN to communicate with another LAN, the job needs to do is C.
A Configure the name server
B defines a route that the local computer points to the same network
C defines a route that the local computer points to the network gateway that is located
D defines a route that is native to the destination network gateway
10. The file to be used to establish dynamic routing has D.
A/etc/hosts b/etc/hostname c/etc/resolv.conf D/etc/gateways
11. The network address of the LAN is 192.168.1.0/24, the gateway address of the local network connection to the other network is 192.168.1.1. When the host 192.168.1.20 accesses the 172.16.1.0/24 network, its routing is set correctly for B.
A Route add–net 192.168.1.0 GW 192.168.1.1 netmask 255.255.255.0 metric 1
B Route add–net 172.16.1.0 GW 192.168.1.1 netmask 255.255.255.255 metric 1
C Route add–net 172.16.1.0 GW 172.16.1.1 netmask 255.255.255.0 metric 1
D route add default 192.168.1.0 netmask 172.168.1.1 metric 1
12. In the following reference, D is not within the scope of the Ifconfig command.
A Configure the local loopback address B to configure the IP address of the NIC
C Activate the network adapter D load the NIC into the kernel
13. The following is a description of the link, the error is B.
A hard link is to have the I node of the link file point to the I node of the linked file
B hard links and symbolic connections are all generating a new I node
C links are broken into hard links and symbolic links D Hard connect cannot link catalog file
14. When a host in the local area network tests the network connection with the ping command, it is found that the host inside the network can be combined with the public network, and the problem may be C.
A host IP setting is incorrect
B no gateway to the LAN is set up
C LAN Gateway or host gateway is set incorrectly
D LAN DNS server settings are incorrect
15. In the following file, the file containing the mapping of the hostname to the IP address is: B.
A/etc/hostname b/etc/hosts c/etc/resolv.conf D/etc/networks
16. Do not need to compile the kernel is the case of D.
A remove the system without the device driver when B upgrades the kernel
C When adding new hardware, D activates the network card
17. There are four methods for assigning variables in the shell, in which the Name=12 method is called a.
A Direct Assignment b using the Read command
C use command-line parameter d to use the output of the command
The D command intercepts the data for the specified content from each line of the text file.
A CP B DD C FMT D cut
19. The following is not a Linux system process type D.
A Interactive Process B batch process C Daemon D ready process (process state)
20. Configure the Apache 1.3.19 server to modify the configuration file to ___a______
A httpd.conf B access.conf C srm.conf D named.conf
21. The subsystem that the kernel does not include is D.
A Process Management System B memory management system C I/O management System D hardware management system
22. In the daily management, the CPU usually affects the performance of the system is: A.
A CPU running at full load B CPU operating efficiency of 30%
C CPU operating efficiency of 50% D CPU operating efficiency of 80%
23. If the memory of a computer is 128MB, the size of the swap partition is usually C.
A 64MB B 128MB C 256MB D 512MB
24. The fifth step in installing Linux is to let the user choose how to install it, and if the user wants to install some of the components (software programs) and let the system install automatically after selecting it, the option that should be selected is D.
A full B expert C newbie D Menu
25. Linux has three commands to view files, if you want to view the contents of the file can be moved up and down to view the contents of the file, you should use the C command.
A Cat B More C less D menu
26. The following information is a running process that is listed by a system with the PS–EF command and the D process is running an Internet Super server that listens for connections on the Internet sockets and invokes the appropriate server to process the received information.
A Root 1 4.0 0.0 344 204? S 17:09 0:00 Init
B Root 2 0.0 0.1 2916 1520? S 17:09 0:00/sbin/getty
C Root 3 0.0 0.2 1364 632? S 17:09 0:00/USR/SBIN/SYSLOGD
D Root 4 0.0 1344 1204? S 17:09 0:10/usr/sbin/inetd
27. In the TCP/IP model, the application layer contains all the high-level protocols, and in some of the following application protocols, B is capable of implementing file transfers between local and remote hosts.
A telnet B FTP C SNMP D NFS
28. When we are not connected to a remote network, we need to track the route view in order to understand where there is a problem in the network, and the command that satisfies that purpose is C.
A Ping B ifconfig C traceroute D netstat
29. A file named Fido is modified with chmod 551 Fido, and its permission is D.
A-rwxr-xr-x b-rwxr--r--c-r--r--r--D-r-xr-x-x
30. In the Disk Address table in the I node table, if the length of a file is from block 1th to 11th of the disk Address table, the file occupies a total of B numbers.
A-B 266 C one D 256x10
31. The following list of files is listed with the Ls–al command, and the D file is a symbolic connection file.
A-rw-rw-rw-2 hel-s users, Sep 11:05 Hello
B-RWXRWXRWX 2 hel-s users, Sep 11:05 Goodbey
C drwxr--r--1 hel users Sep 08:10 Zhang
D lrwxr--r--1 Hel users 2024 Sep 08:12 Cheng
32. The DNS domain Name system is primarily responsible for parsing between host names and a.
A IP address B MAC address C network address D host Alias
33. WWW server is the most widely used on the Internet, it uses B structure.
A Server/Workstation B S/b C centralized D-distributed
34. The Linux system sends messages to other users via the C command.
A less B mesg y C write D Echo to
[Note: MESG [y|n] All users decide whether to allow others to send messages to their terminal interface]
35. NFS is a C system.
A file B disk C Network file D operation
36. The B command can perform a file-to-tape backup of the Linux security system.
A cp B tr C dir D cpio
NoteIf you use echo $PATH or echo $LD _library_path and other similar commands to display the path information, we will see a lot of a colon concatenated with the path, the TR command can convert these colons to carriage return, so that these paths are very good readability:
echo $PATH | TR ":" \ n "]
37. The files of the Linux file system are placed in the relevant directory according to their functions, and in the case of external device files, they should be placed in the C directory.
A/bin b/etc C/dev D/lib
38. When you restart the Linux system and write the information in memory to the hard disk, you should use the D command.
A # reboot B # halt C # reboot D # shutdown–r now
39. Network management has the following major functions: Configuration management, A, performance management, security management and billing management.
A Fault Management B daily backup management C upgrade Management D Send mail
40. The description of the proxy server, the correct is a.
A Use an existing public proxy server on the Internet, just configure the client.
The B proxy server can only proxy client HTTP requests.
C a proxy server that is set up can be used by any host on the network.
D the client using a proxy server does not have its own IP address.
41. Turn off the Linux system (do not restart) to use command B.
A Ctrl+alt+del B Halt C shutdown-r now D reboot
42. The command to implement conversion from IP address to Ethernet MAC address is: C.
A Ping B ifconfig C arp D traceroute
43. In the vi Editor, in command mode, type B to add a new row under the current line of the cursor.
A B C D A
44. In the vi Editor, in command mode, delete the character at the current cursor using the A command.
A B;; C D;;
45. In the vi Editor, in command mode, repeat the last action you made on the edited text, using the C command.
A up ARROW B down arrow C; D
46. The description of the file FF is shown in the command ls-al as follows, so the file FF is of type A.
-rwxr-xr--1 root root 599 Cec 17:12 ff
A Plain file B hard link C directory D symbolic link
47. The Delete file command is: D.
A mkdir B rmdir C MV D RM
48. The following names do not belong to the DNS server type: ____c_____
A Primary master server B Secondary master server
C Samba D cache_only Server
49. Network administrators to the WWW server access, control access and operation of control, these controls can be reflected in A file.
A httpd.conf B lilo.conf C inetd.conf D resolv.conf
50. The mail forwarding agent, also known as the Mail forwarding server, can use the SMTP protocol or the C protocol.
A FTP B TCP C UUCP D POP
51. There are two ways to start the Samba server process: The standalone boot method and the parent process startup mode, where the former is started as a standalone process in the C file.
A/USR/SBIN/SMBD b/usr/sbin/nmbd C Rc.samba d/etc/inetd.conf
52. DHCP is the short name of a Dynamic Host Configuration Protocol, which enables network administrators to manage a network system through a single server, automatically assigning ___d______ addresses to hosts in a network.
A network B MAC C TCP D IP
53. To ensure that the DHCP process starts automatically when the server is started, you should change the Dhcpd=no in a file to Dhcpd=yes.
A rc.inet1 B lilo.conf C inetd.conf D httpd.conf
[Note: English literal: RC
Chinese explanation: Script file containing program (application even operating system) startup instruction]
Note: This file is automatically executed when the operating system starts, and it contains a list of instructions (commands or other scripts) to run.
54. The command to archive the file is D.
A DD B cpio C gzip D tar
55. Change the file owner's command to C.
A chmod B Touch C chown D Cat
56. The command to find a string in the given file that matches the set criteria is: A.
A grep B gzip C Find D sort
57. To create a new file you can use the command for D.
A chmod B more C cp D Touch (instruction changes the time history of the file. )
58. In the following command, the command that cannot display the contents of a text file is: D.
A more B less C tail D join
59. When using Anonymous Logon FTP, the user name is B.
A users B anonymous C root D guest
60. In practice, to understand the use of command logname, you can type D to get help.
A logname--man B logname/? C help logname D logname--help
61. If Lilo is installed in the MBR, use the A command to uninstall Lilo.
A lilo–u B lilo–c c lilo–v D lilo-v
62. When viewing files and directories with command Ls–al, to view the contents of a volume over the screen, use the key combination D.
A shift+home B Ctrl + PgUp C ALT + PgDn D shift+ PgUp
63. MC is UNIX-style operating system C.
A file Editor/program compiler B window tool for configuring the network
C Directory Browser/File Manager D Samba Server Administration Tool
64. The I node is a D-long table that contains information about the file.
A 8 byte B 16 byte C 32 bytes D 64 bytes
65. File permissions read, write, execute the three kinds of glyphs in turn is a.
A rwx B xrw C RDX D SRW

66. The length of a Linux file name must not exceed C characters.
A, B, C, D, 512.
67. There are three states of the process: C.
A readiness State, execution state and exit state B exact state, fuzzy state, and stochastic state
C run state, ready state and wait state D manual state, self-dynamic and Free State
68. To start a process from the background, add the symbol A at the end of the command.
A & B @ C # D $
69. B is not part of the messaging system.
A User Agent B Proxy Server C Transport agent D Delivery Agent
70. In a shell script, the command to read the contents of each field within a file and assign it to a shell variable is D.
A fold B Join C tr D Read
71. The crontab file consists of six fields, separated by a space between each domain, arranged as follows: B.
A MIN HOUR Day MONTH COMMAND
B MIN HOUR Day MONTH DAYOFWEEK COMMAND
C COMMAND HOUR Day MONTH DAYOFWEEK
D COMMAND Year MONTH day HOUR MIN
crontab Command: Implement program timed Run
72. There are two modes of file transfer with ftp: C.
A Word and binary B. txt and word Document
C ASCII and binary D ASCII and rich Text Format
73. The permission of a member outside the group of a file is read-only, the owner has full permissions, and the permissions within the group are read and write, and the permission for the file is D.
A 467 B 674 C 476 D 764
74. When the DNS system is tested, the named process number is 53, and the command D notifies the process to reread the configuration file.
A KILL–USR2-B KILL–USR1-Kill-int kill–hup 53
75. Apache Server The default answer connection port number is C.
A 1024x768 B, C (HTTP) D 8
76. The combined use of PHP and MySQL solved the C.
A handling of database access issues on proxy B dealing with hacker's illegal access problem on WWW server
C Handling database access issues on the WWW server
D Handling database access issues on the SendMail mail system
77. OpenSSL is an A.
A encryption Software B mail system C database management system D embedded scripting programming language
78. The configuration file for the Samba server is D.
A httpd.conf B inetd.conf C Rc.samba D smb.conf
79. About DNS servers, the description is correct for D.
A DNS server configuration does not require client configuration
B when establishing a DNS server for a partition, you only need to establish a primary DNS server
C the primary DNS server needs to start the named process, and the secondary DNS server does not require
The Root.cache file for the D DNS server contains information about the root name server
80. To exit the interactive mode of the shell, type C.
A B ^q C exit D quit
81. Install the Windows C: Disk (HDA1) in the/winsys directory of the Linux file system, and the command is B.
A
[[Email Protected]:%7e#mount][Email protected]:~ #mount [/email]
Dev/had1/winsys
B
[[Email Protected]:%7e#mount][Email protected]:~ #mount [/email]
/dev/had1/winsys
C
[[Email Protected]:%7e#mount][Email protected]:~ #mount [/email]
/dev/had1 Winsys
D
[[Email Protected]:%7e#mount][Email protected]:~ #mount [/email]
Dev/had1 Winsys
82. In the directory where Superuser root is currently located:/usr/local, after you type the CD command, the user's current directory is B.
A/home b/root C/home/root d/usr/local
83. The flag for the character device file type is B.
A P B c C s D l
84. The command to install the CD-ROM (hdc) to the file system's/mnt/cdrom directory is C.
A Mount/mnt/cdrom B MOUNT/MNT/CDROM/DEV/HDC
C Mount/dev/hdc/mnt/cdrom D MOUNT/DEV/HDC
85. The command to unmount the disc/dev/hdc is C.
A UMOUNT/DEV/HDC B UNMOUNT/DEV/HDC
C UMOUNT/MNT/CDROM/DEV/HDC D UNMOUNT/MNT/CDROM/DEV/HDC
86. There is a file in the/home/stud1/wang directory, using D to implement commands in the background, this command outputs the contents of the file files to the File.Copy file.
A cat file >;file.copy B cat >;file.copy C cat file File.Copy & D cat file >;file.copy &
87. In the DNS configuration file, the name used to represent a host alias is: B.
A NS B CNAME C NAME D CN
88. The commands that can complete the forward parsing and reverse parsing tasks for host names and IP addresses are: A.
A nslookup B arp C ifconfig D dnslook
89. The name of the shell variable that is valid in the following variable names is: C.
A-2-time B _2$3 C trust_no_1 D 2004file
90. QMail is B.
A e-mail protocol B mail Server a C mail message queue
92. A user is known to be STUD1, whose user directory is/home/stud1. Paging shows the file or directory name, user group, user, file size, file or directory permissions, file creation time, and so on, for all files in the current directory.
A more ls–al B more–al ls C more
B the date command is executed every January 1 morning at 6, using the AT command: at 6am Jan 1 date
C daily 11 o'clock in the evening executes the date command, crontab file should be: 0 * * * Date
D execute the clear command once per hour, crontab file should be: 0 */1 * * * Clear
94. There are users User1 and User2 in the system, which belong to the Users group. In the User1 user directory has a file file1, which has 644 of the permissions, if user2 users want to modify the User1 user directory under the File1 file, should have B permission.
A 744 B 664 C 646 D 746
?? 95. If you want to configure an anonymous FTP server, you should modify the C file.
A/etc/gateway b/etc/ftpservers c/etc/ftpusers d/etc/inetd.conf
96. The Samba server process is made up of B two parts.
A named and SendMail B SMBD and NMBD C BOOTP and dhcpd D httpd and squid
97. To configure Server for NFS, primarily configure C files on the server side.
A/etc/rc.d/rc.inet1 B/ETC/RC.D/RC. M c/etc/exports D/ETC/RC.D/RC. S
98. To ensure that the DHCP process starts automatically when the server is started, the B file should be edited.
A/etc/rc.d/rc.inet2 B/etc/rc.d/rc.inet1 c/etc/dhcpd.conf D/ETC/RC.D/RC. S
99. When configuring a proxy server, if you set the proxy server's working cache to 64MB, the configuration line should be D.
A Cache 64MB B Cache_dir ufs/usr/local/squid/cache 10000 16 256
C cache_ Mgr 64MB D cache_ mem 64MB
100. Security management involves the security issues that ensure the network management work reliably, and the protection of network users and network management object problems. C belongs to the content of security management.
A Configure the device's operating parameter B to collect data related to network performance
C control and maintenance access D monitoring failures
101. The following command is correct in that: B.
A LS and SL B Cat and TAC C more and Erom D exit and Tixe
Cat is the command that displays the folder, as you all know, the TAC is the reverse of cat's writing, and the meaning is the opposite. The cat is displayed from the first line to the last row, while the TAC is displayed from the last line to the first row, and Rev is displayed from the last character to the first character
102. The B command is executed in the VI editor to exit the disk.
A:q B ZZ c:q! D:wq
103. The following is a description of the/etc/fstab file, the correct is D.
A fstab file can only describe file system B Cd_rom and floppy disks that belong to Linux must be loaded automatically
The file system described in the C fstab file cannot be uninstalled when you load the file system by fstab file description at startup
104. When files are accessed by file name, the procedure inside the file system is through C.
A file finds the file data access location in the directory. B file name directly find the file data, for access operations.
The C file name locates the corresponding I node in the directory and accesses the file data through the I node.
D file name in the corresponding super block, find the corresponding I node in the Super block, access the file data through the I node
105. Linux takes storage devices and input/output devices as files, and C does not appear as files.
A directory B Soft link C i node table D network adapter
106. For the I node and the Super block, the following is an incorrect description of B.
A I-node is a fixed-length table B Super Block in the number of file systems is unique
The C I node contains all the information necessary to describe a file
The D-Block records the location of the I node table and the free block table information stored on the disk
107. The D device is a character device.
A hdc B fd0 C hda1 D tty1 (a,b,c for block devices)
108. The B directory holds the source code for Linux.
A/etc b/usr/src c/usr D/home
109. For installation and uninstallation of file systems, the following description is correct for a.
A If the CD is not uninstalled, the optical drive is not open the installation point of the B installation file system can only be/mnt
C CD-ROM device can be installed regardless of whether there is a disc in the optical drive
D mount/dev/fd0/floppy The directory/floppy in this command is automatically generated
110. B is not the difference between a process and a program.
A program is an ordered set of static instructions, the process is the execution of a program
B programs can only be run in the foreground, while processes may run in the foreground or background
C program can be saved for a long time, the process is temporary
D The program has no state, and the process is stateful
111. File Exer1 access is rw-r--r--, now to increase the execution rights of all users and the same group of users write permissions, the following command is correct is a.
A chmod a+x g+w exer1 B chmod 765 Exer1
C chmod o+x exer1 D chmod g+w exer1
112. For the archive and compression commands, the following description is correct for C.
A compressed file with a. zip suffix generated by the Compress command is decompressed with the uncompress command
B unzip command and gzip command can decompress files of the same type
C tar archived and compressed files can be decompressed by the gzip command
D tar command file After archive is also a compressed file
113. Not the shell has the functionality and characteristics of C.
A pipeline B Input Output redirect C Execute background process D handler command
114. The following is a fruit operation on the shell variable, correct: C.
A assigns a value to a variable: $FRUIT =apple B Displays the value of the variable: fruit=apple
C displays the value of the variable: Echo $FRUIT D to determine if the variable has a value: [-F "$FRUIT"]

Linux face question 3

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.