Services in Linux that start at boot and run in the background are commonly referred to as _________.

  • services
  • daemons
  • applications
  • processes
Services in Linux that start at boot and run in the background are commonly referred to as daemons. Daemons are long-running background processes that perform various tasks such as serving network requests, managing hardware devices, and more.

The _________ command provides a snapshot of the current processes in the system.

  • df
  • ls
  • ps
  • top
The ps command in Linux provides a snapshot of the current processes in the system. It displays detailed information about running processes, including their process IDs (PIDs), CPU and memory usage, and other vital statistics.

Which component of the Linux boot process loads the main system kernel?

  • Bootloader
  • Shell
  • init
  • BIOS/UEFI
The component of the Linux boot process that loads the main system kernel is the bootloader. The bootloader, such as GRUB, is responsible for locating the kernel image on the disk and passing control to it during the boot process.

In Linux, the _________ command is used to change a user's password.

  • passwd
  • usermod
  • chmod
  • pwd
In Linux, the passwd command is used to change a user's password. Users can execute this command to update their login credentials securely.

In Debian-based systems, the ________ command is used to search for packages.

  • apt-cache search
  • yum install
  • dnf update
  • pacman -Ss
In Debian-based systems, the "apt-cache search" command is used to search for packages. This command allows users to find packages in the distribution's repositories based on keywords or descriptions.

What is the primary purpose of a VPN in a Linux environment?

  • Securing network communication
  • Running web servers
  • Managing system files
  • Creating user accounts
The primary purpose of a VPN (Virtual Private Network) in a Linux environment is to secure network communication. VPNs create encrypted tunnels over public networks, ensuring data privacy and security, which is crucial for remote access and protecting sensitive information.

You notice that a remote server is not accessible via its hostname, but it's accessible via its IP address. Which configuration file would you inspect first?

  • /etc/hosts
  • /etc/hostname
  • /etc/resolv.conf
  • /etc/network/interfaces
If a remote server is not accessible via its hostname, checking the /etc/hosts file is a good starting point. This file contains mappings of hostnames to IP addresses, and if there's an issue with name resolution, it's often related to this file.

n shell scripting, which loop will continue executing as long as the specified condition remains true?

  • while
  • for
  • if
  • case
In shell scripting, the while loop continues executing as long as the specified condition remains true. It's a common choice for creating loops based on a condition, and it's used for tasks like reading files line by line or performing repetitive tasks.

To monitor I/O statistics and disk activity in real-time, you would use the ________ command in Linux.

  • iostat
  • top
  • df
  • du
To monitor I/O statistics and disk activity in real-time in Linux, you would use the iostat command. It provides detailed information about input and output operations, helping you identify performance bottlenecks related to disk I/O.

Which Linux tool can be used to trace system calls and signals?

  • strace
  • dmesg
  • top
  • ps
The 'strace' tool is used to trace system calls and signals in Linux. It allows you to monitor the system calls made by a process and view the signals sent to it. This is useful for debugging and understanding how applications interact with the kernel.