When setting up SSH for the first time, the server-side cryptographic keys are stored in the /etc/ssh/________ directory.

  • ssh_keys
  • certs
  • ssh_host_keys
  • crypto
When setting up SSH for the first time, the server-side cryptographic keys are stored in the /etc/ssh/ssh_host_keys directory. These keys are crucial for secure SSH communication.

What does the ifconfig command primarily display?

  • Network interface information
  • System uptime
  • List of installed packages
  • CPU usage statistics
The ifconfig command primarily displays network interface information. It shows details about all network interfaces on the system, such as their IP addresses, MAC addresses, and network configuration settings. This command is essential for managing and configuring network interfaces in Linux.

What command in Linux provides a dynamic real-time view of the system's running processes?

  • top
  • ls
  • ps
  • df
The 'top' command in Linux provides a dynamic, real-time view of the system's running processes. It displays information about CPU usage, memory usage, and more. 'top' is a powerful tool for monitoring system performance and identifying resource-intensive processes.

In the context of disk partitions, what does LVM stand for?

  • Logical Volume Manager
  • Linux Virtual Machine
  • Large Volume Memory
  • Logical Virtual Machine
In the context of disk partitions, LVM stands for "Logical Volume Manager." LVM is a technology that allows for flexible management of disk space in Linux. It enables features like dynamic resizing, snapshots, and the creation of logical volumes that span multiple physical disks. LVM is a crucial tool for efficiently managing storage in complex Linux environments.

Which Linux distribution has a rolling release update model and is known for its simplicity?

  • Arch Linux
  • CentOS
  • Fedora
  • Slackware
Arch Linux is a Linux distribution known for its rolling release update model and simplicity. In a rolling release, software updates are continuously provided, and users do not need to reinstall the entire system for major updates. Arch Linux allows for a highly customizable and minimalistic Linux environment.

In Red Hat-based systems, the ________ utility is used to manage and configure software repositories.

  • yum
  • apt-get
  • dnf
  • zypper
In Red Hat-based systems, the "yum" utility (Yellowdog Updater, Modified) is used to manage and configure software repositories. It allows users to install, update, and remove packages from Red Hat-based distributions.

When a process is neither in 'running' nor in 'blocked' state, which state might it be in?

  • Waiting
  • Zombie
  • Sleeping
  • Stopped
When a process is neither in the 'running' nor 'blocked' state, it is typically in a 'Sleeping' state. In this state, the process is waiting for an event or a specific condition to occur before it can continue execution. The process is temporarily inactive, often due to I/O operations or waiting for a signal.

Which command in Linux is commonly used to manage and update user passwords?

  • passwd
  • chmod
  • ls
  • cp
The correct command to manage and update user passwords in Linux is 'passwd.' It allows users to change their own passwords or allows administrators to manage user accounts. The 'passwd' command interacts with the /etc/shadow file to update password information securely.

Which daemon is responsible for network interface configuration and automatic switching between networks?

  • NetworkManager
  • SystemD
  • ifconfig
  • Apache
NetworkManager is responsible for network interface configuration and automatic switching between networks in Linux. It simplifies network setup and management, making it easier for users to connect to different networks seamlessly.

What does the 2>&1 notation signify when used in Linux command redirection?

  • Closes both standard error and standard output
  • Redirects both standard error (2) and standard output (1) to the same location
  • Redirects standard error (2) to standard output (1)
  • Redirects standard output (1) to standard error (2)
The "2>&1" notation signifies that both standard error (file descriptor 2) and standard output (file descriptor 1) are redirected to the same location. This is commonly used to capture both error messages and regular output when running commands.