Imagine you are setting up user permissions for a shared directory. You want the files created by users to inherit the group ownership of the directory. Which special permission would you set on the directory?

  • SetGID
  • SetUID
  • Sticky bit
  • Chmod
To ensure that files created within a directory inherit the group ownership of the directory, you would set the SetGID (Set Group ID) permission on the directory. This special permission allows new files to inherit the group ownership of the parent directory, which is often used for shared directories.

You are setting up a high-performance database server and require a file system that supports large files and high data integrity. Which file system would be most suitable?

  • Ext4
  • XFS
  • Btrfs
  • ZFS
ZFS (Zettabyte File System) would be most suitable for a high-performance database server. It supports large files, data integrity through features like checksums, and provides advanced data management capabilities, making it ideal for critical data storage needs.

The _________ daemon in Linux is responsible for assigning IP addresses to devices on a local network.

  • DHCP
  • DNS
  • SSH
  • HTTP
The DHCP (Dynamic Host Configuration Protocol) daemon in Linux is responsible for assigning IP addresses to devices on a local network. It automates the process of configuring network settings for devices, ensuring they receive the necessary IP address, subnet mask, gateway, and other parameters.

In Linux, the ________ command is used to create symbolic links between files.

  • connect
  • link
  • ln
  • symlink
In Linux, the "ln" command is used to create symbolic links between files. A symbolic link is a reference to another file or directory, allowing you to access the linked content from a different location in the file system.

Kernel modules that are loaded during the boot process are typically defined in the _________ directory.

  • /lib/modules
  • /boot
  • /etc/kernel
  • /var/modules
The correct option is /lib/modules. Kernel modules (device drivers and other kernel extensions) that are loaded during the boot process are typically defined in the /lib/modules directory. This directory contains subdirectories for different kernel versions and modules specific to those versions.

In the context of file systems, what does "journaling" primarily help with?

  • Ensuring file system consistency
  • Enhancing file compression
  • Improving file access speed
  • Optimizing file permissions
Journaling in file systems primarily helps ensure file system consistency. It records changes to the file system in a journal, which can be used to recover the file system in case of a crash or unexpected system shutdown, preventing data corruption.

In a situation where you'd want to deny a user from running specific commands as root, you would modify their entry in the _________ file.

  • sudoers
  • shadow
  • passwd
  • groups
In a situation where you want to deny a user from running specific commands as root, you would modify their entry in the sudoers file. This file contains rules and permissions for granting or denying superuser privileges to users and groups.

For enhanced security, Linux passwords are not stored in plain text but are _________ before storing.

  • Hashed
  • Encrypted
  • Compressed
  • Obfuscated
For enhanced security, Linux passwords are not stored in plain text but are hashed before storing. Hashing is a one-way process that converts the password into a fixed-length string of characters. This makes it difficult for attackers to reverse the process and obtain the original password.

Which Linux command can be used to monitor real-time network interface statistics?

  • ifconfig
  • netstat
  • iptraf
  • nmap
The correct command to monitor real-time network interface statistics in Linux is iptraf. It provides detailed information about network traffic, including traffic per interface, protocols, and ports. ifconfig and netstat are used for network configuration and monitoring, but they don't offer real-time statistics. nmap is a network scanning tool.

In package management, a ________ is a collection of patches, configuration files, and scripts that adapt a software source code to a particular distribution.

  • Source Package
  • Binary Package
  • Source Code
  • Dependency
In package management, a "Source Package" is a collection of patches, configuration files, and scripts that adapt a software source code to a particular distribution. Source packages are used to build binary packages specific to a particular Linux distribution.