In the context of file systems, what does "journaling" primarily help with?

  • Ensuring file system consistency
  • Enhancing file compression
  • Improving file access speed
  • Optimizing file permissions
Journaling in file systems primarily helps ensure file system consistency. It records changes to the file system in a journal, which can be used to recover the file system in case of a crash or unexpected system shutdown, preventing data corruption.

In a situation where you'd want to deny a user from running specific commands as root, you would modify their entry in the _________ file.

  • sudoers
  • shadow
  • passwd
  • groups
In a situation where you want to deny a user from running specific commands as root, you would modify their entry in the sudoers file. This file contains rules and permissions for granting or denying superuser privileges to users and groups.

For enhanced security, Linux passwords are not stored in plain text but are _________ before storing.

  • Hashed
  • Encrypted
  • Compressed
  • Obfuscated
For enhanced security, Linux passwords are not stored in plain text but are hashed before storing. Hashing is a one-way process that converts the password into a fixed-length string of characters. This makes it difficult for attackers to reverse the process and obtain the original password.

Which Linux command can be used to monitor real-time network interface statistics?

  • ifconfig
  • netstat
  • iptraf
  • nmap
The correct command to monitor real-time network interface statistics in Linux is iptraf. It provides detailed information about network traffic, including traffic per interface, protocols, and ports. ifconfig and netstat are used for network configuration and monitoring, but they don't offer real-time statistics. nmap is a network scanning tool.

In package management, a ________ is a collection of patches, configuration files, and scripts that adapt a software source code to a particular distribution.

  • Source Package
  • Binary Package
  • Source Code
  • Dependency
In package management, a "Source Package" is a collection of patches, configuration files, and scripts that adapt a software source code to a particular distribution. Source packages are used to build binary packages specific to a particular Linux distribution.

To diagnose potential issues with domain name resolution, you might use the ________ command.

  • nslookup
  • ifconfig
  • ping
  • dig
To diagnose potential issues with domain name resolution, you might use the "dig" command. "dig" (Domain Information Groper) is a powerful command-line tool for querying DNS (Domain Name System) servers and obtaining detailed information about DNS records and name resolution, making it useful for troubleshooting DNS-related problems.

In terms of file permissions, what does the "s" stand for when seen in a permission string like "drwxr-sr-x"?

  • Set user or group ID
  • Special permissions
  • Sticky bit
  • Synchronized access
The "s" in a permission string like "drwxr-sr-x" signifies the "Set user or group ID" permission. When set on an executable file, it allows the user who runs the file to temporarily inherit the permissions of the file's owner or group, depending on where it's set (user or group ID).

In the context of performance tuning, what does the 'vm.swappiness' parameter control?

  • The balance between swapping out and caching application data
  • The number of processes a user can start
  • The kernel's version number
  • The I/O scheduler used by the system
The 'vm.swappiness' parameter controls the balance between swapping out and caching application data in Linux. It determines how often the system will swap data from RAM to disk and vice versa. A lower value (e.g., 0) keeps more data in RAM, while a higher value (e.g., 100) swaps data out more aggressively.

For optimizing database performance, you might adjust the __________ parameter to control disk caching behavior.

  • vm.dirty_ratio
  • ifconfig
  • lsusb
  • grep
For optimizing database performance, you might adjust the vm.dirty_ratio parameter to control disk caching behavior. This parameter in the sysctl settings defines the percentage of system memory that can be filled with dirty data pages before the kernel starts writing them to disk, which can impact database I/O performance.

Kernel modules that are loaded during the boot process are typically defined in the _________ directory.

  • /lib/modules
  • /boot
  • /etc/kernel
  • /var/modules
The correct option is /lib/modules. Kernel modules (device drivers and other kernel extensions) that are loaded during the boot process are typically defined in the /lib/modules directory. This directory contains subdirectories for different kernel versions and modules specific to those versions.