The _________ directory in Linux contains device nodes and is crucial for the system's interaction with hardware.

  • /dev
  • /lib
  • /mnt
  • /var
The /dev directory in Linux contains device nodes and is crucial for the system's interaction with hardware. Device nodes represent physical and virtual devices, allowing the system to communicate with and control hardware components.

You've been given a new device without any documentation. You want to check if Linux has automatically loaded a driver for it. Which command would help you determine this?

  • lspci
  • dmesg
  • lsusb
  • udevadm
The dmesg command would help you determine if Linux has automatically loaded a driver for the new device. dmesg displays kernel messages, and you can look for entries related to the device to see if a driver has been loaded or if there are any issues with it.

The __________ phase of the Linux boot process is where the system checks and mounts file systems.

  • initrd
  • GRUB
  • LILO
  • init
The initrd phase of the Linux boot process is where the system checks and mounts file systems. The initial RAM disk (initrd) is used during the boot process to provide an initial file system that's used as a temporary root file system before the actual root file system is mounted. It contains necessary drivers and tools to get the system to the point where it can transition to the real root file system.

Imagine you are setting up user permissions for a shared directory. You want the files created by users to inherit the group ownership of the directory. Which special permission would you set on the directory?

  • SetGID
  • SetUID
  • Sticky bit
  • Chmod
To ensure that files created within a directory inherit the group ownership of the directory, you would set the SetGID (Set Group ID) permission on the directory. This special permission allows new files to inherit the group ownership of the parent directory, which is often used for shared directories.

You are setting up a high-performance database server and require a file system that supports large files and high data integrity. Which file system would be most suitable?

  • Ext4
  • XFS
  • Btrfs
  • ZFS
ZFS (Zettabyte File System) would be most suitable for a high-performance database server. It supports large files, data integrity through features like checksums, and provides advanced data management capabilities, making it ideal for critical data storage needs.

The _________ daemon in Linux is responsible for assigning IP addresses to devices on a local network.

  • DHCP
  • DNS
  • SSH
  • HTTP
The DHCP (Dynamic Host Configuration Protocol) daemon in Linux is responsible for assigning IP addresses to devices on a local network. It automates the process of configuring network settings for devices, ensuring they receive the necessary IP address, subnet mask, gateway, and other parameters.

In Linux, the ________ command is used to create symbolic links between files.

  • connect
  • link
  • ln
  • symlink
In Linux, the "ln" command is used to create symbolic links between files. A symbolic link is a reference to another file or directory, allowing you to access the linked content from a different location in the file system.

You're troubleshooting a software installation issue on a CentOS machine. You suspect a required package might be missing. Which command helps you check if a specific package is installed?

  • rpm -q
  • dpkg -l
  • yum info
  • apt-cache policy
On CentOS, you can use the 'rpm -q' command to check if a specific package is installed. This command queries the RPM database to determine if the package is installed on the system.

If a script is called with ./myscript.sh arg1 arg2 arg3, what does $2 represent?

  • The total number of arguments passed to the script.
  • The name of the script itself (myscript.sh).
  • The second argument, which is "arg2".
  • The process ID of the script.
In the given example, $2 represents the second argument passed to the script, which is "arg2". It's important to note that in shell scripting, arguments are accessed using positional parameters like $1, $2, $3, and so on.

You are an administrator and receive a report that a user is not able to execute certain commands with sudo. Where would you primarily look to diagnose the issue?

  • /etc/sudoers file
  • /etc/passwd file
  • /var/log/auth.log
  • /bin/sudo binary
To diagnose the issue of a user not being able to execute certain commands with sudo, you would primarily look at the /etc/sudoers file. This file contains the configuration for sudo privileges, and it's the first place to check for any restrictions or misconfigurations that might be affecting the user's access.