Which command is used to monitor and manipulate IP traffic control settings?

  • tc
  • ipconfig
  • iptables
  • arp
The tc command is used to monitor and manipulate IP traffic control settings in Linux. It allows you to manage Quality of Service (QoS), bandwidth, and traffic shaping on network interfaces, making it a crucial tool for network administrators.

QEMU can be used for hardware emulation, but when paired with KVM, it leverages _________ virtualization for better performance.

  • Hardware
  • Software
  • Hypervisor
  • Full
QEMU, when paired with KVM (Kernel-based Virtual Machine), leverages "hardware" virtualization for better performance. Hardware virtualization allows the virtual machine to directly access the physical hardware, resulting in improved performance compared to software emulation.

Which Linux tool can be used to trace system calls and signals?

  • strace
  • dmesg
  • top
  • ps
The 'strace' tool is used to trace system calls and signals in Linux. It allows you to monitor the system calls made by a process and view the signals sent to it. This is useful for debugging and understanding how applications interact with the kernel.

To monitor I/O statistics and disk activity in real-time, you would use the ________ command in Linux.

  • iostat
  • top
  • df
  • du
To monitor I/O statistics and disk activity in real-time in Linux, you would use the iostat command. It provides detailed information about input and output operations, helping you identify performance bottlenecks related to disk I/O.

n shell scripting, which loop will continue executing as long as the specified condition remains true?

  • while
  • for
  • if
  • case
In shell scripting, the while loop continues executing as long as the specified condition remains true. It's a common choice for creating loops based on a condition, and it's used for tasks like reading files line by line or performing repetitive tasks.

You notice that a remote server is not accessible via its hostname, but it's accessible via its IP address. Which configuration file would you inspect first?

  • /etc/hosts
  • /etc/hostname
  • /etc/resolv.conf
  • /etc/network/interfaces
If a remote server is not accessible via its hostname, checking the /etc/hosts file is a good starting point. This file contains mappings of hostnames to IP addresses, and if there's an issue with name resolution, it's often related to this file.

What is the primary purpose of a VPN in a Linux environment?

  • Securing network communication
  • Running web servers
  • Managing system files
  • Creating user accounts
The primary purpose of a VPN (Virtual Private Network) in a Linux environment is to secure network communication. VPNs create encrypted tunnels over public networks, ensuring data privacy and security, which is crucial for remote access and protecting sensitive information.

In Debian-based systems, the ________ command is used to search for packages.

  • apt-cache search
  • yum install
  • dnf update
  • pacman -Ss
In Debian-based systems, the "apt-cache search" command is used to search for packages. This command allows users to find packages in the distribution's repositories based on keywords or descriptions.

In Linux, the _________ command is used to change a user's password.

  • passwd
  • usermod
  • chmod
  • pwd
In Linux, the passwd command is used to change a user's password. Users can execute this command to update their login credentials securely.

Which component of the Linux boot process loads the main system kernel?

  • Bootloader
  • Shell
  • init
  • BIOS/UEFI
The component of the Linux boot process that loads the main system kernel is the bootloader. The bootloader, such as GRUB, is responsible for locating the kernel image on the disk and passing control to it during the boot process.

Which special variable in a shell script represents the script's name?

  • $0
  • $1
  • $script
  • $name
The special variable $0 in a shell script represents the script's name. It allows you to access the name of the currently executing script. This can be useful for self-referencing within the script or for providing a script name in error messages or logs.

AppArmor profiles, when enforced, restrict system access based on ________ paths.

  • file system
  • network
  • environment
  • system call
AppArmor profiles, when enforced, restrict system access based on file system paths. These profiles define what files and directories a program can access, adding an extra layer of security.