The ________ file in Linux is used to configure network interfaces and is typically found in the /etc/network/ directory.
- interfaces
- network.conf
- ifcfg
- resolv.conf
The file in Linux used to configure network interfaces and typically found in the /etc/network/ directory is the "interfaces" file. This file contains information about network interfaces and their settings, allowing you to define and manage network connections on your system.
The ________ mechanism in Linux allows processes to communicate with each other, commonly used in IPC.
- Inter-Process Communication (IPC)
- Inter-System Communication (ISC)
- Inter-Process Messaging (IPM)
- Intra-Process Communication (IPC)
The "Inter-Process Communication (IPC)" mechanism in Linux allows processes to communicate with each other. IPC is essential for processes to exchange data and synchronize their activities, and it's commonly used in various applications and services in Linux.
Your Linux system is experiencing slow boot times. Which tool can you use to analyze the time taken by each boot process?
- systemd-analyze
- top
- iostat
- ps
To analyze the time taken by each boot process on a Linux system, you can use the systemd-analyze command. It provides detailed information about the startup time of services and processes, helping you identify bottlenecks in the boot process.
In the context of networking, what does the acronym "NAT" stand for?
- Network Address Translation
- Network Access Token
- Network Analysis Tool
- Network Authentication Protocol
In the context of networking, "NAT" stands for Network Address Translation. NAT is a technique used to modify network address information in packet headers while in transit. It's commonly used to allow multiple devices on a local network to share a single public IP address for internet access.
To change the primary group of a user, the ________ command is utilized.
- usermod -g
- groupmod -g
- chgrp -p
- adduser -G
To change the primary group of a user, the "usermod -g" command is utilized. This command allows you to modify the primary group of an existing user. The "-g" option specifies the new primary group.
The iptables command that allows traffic only from a specific IP address, say 10.0.0.1, to a specific port, say 22, uses the ________ option.
- -s
- -p
- -dport
- -A
The iptables command that allows traffic only from a specific IP address, say 10.0.0.1, to a specific port, say 22, uses the -s (source) option. This option specifies the source IP address from which traffic is allowed.
In a shell script, if you want a loop to execute infinitely, which of the following would be the most appropriate construct?
- while true; do
- for (( ; ; )); do
- until false; do
- do forever;
The most appropriate construct for an infinite loop in a shell script is while true; do. This creates a loop that continues to execute as long as the condition true remains true, effectively resulting in an infinite loop.
The _________ Linux distribution is enterprise-focused and is backed by Red Hat.
- CentOS
- Debian
- Fedora
- Ubuntu
The CentOS Linux distribution is enterprise-focused and is backed by Red Hat. It is known for its stability and long-term support, making it a popular choice for enterprise environments.
Which protocol is primarily used by SSH for secure remote access?
- SSH
- FTP
- HTTP
- Telnet
SSH (Secure Shell) primarily uses the SSH protocol for secure remote access. SSH is a cryptographic network protocol that ensures secure communication over unsecured networks. It provides authentication and encrypted data transfer.
The _________ directory in Linux is typically used for transient or temporary data, often cleared during boot.
- /home
- /opt
- /tmp
- /var
The /tmp directory in Linux is typically used for transient or temporary data. It is often cleared during system boot to ensure it doesn't accumulate unnecessary files and take up space.