unix check on learnings

Unix/Unix-based OS History

Question 1: Unix systems are characterized by a modular design that is sometimes called the,

what?

Answer 1: The Unix Philosophy

Question 2: The Unix operating system should provide a set of simple tools known as, what?

Answer 2: coreutils or core utilities

Question 3: What is the name of the GNU kernel?

Answer 3: GNU Hurd

Basic Key Terms

Question 1: The POSIX shell is the same as which shell?

Answer 1: Bourne Shell

Question 2: What is the default shell on GNU/Linux?

Answer 2: Bash/ Bourne again shell

Question 3: True or False: The CLI, terminal, and shell are just different names for the same

thing.

Answer 3: False

Fundamental Architecture

Question 1: What is the root of the filesystem?

Answer 1: / or a/.

Question 2: What is the name of the user that lives in kernel land?

Answer 2: root

Question 3: What is the home directory of the root user?

Answer 3: /root

Question 4: What is the administrator on a Linux system?Answer 4: a user that is allowed to run

commands as root. The sudo or "super user do" command is used to run a command as root.

LSA 5: IDENTIFY DEVICE DRIVERS

Question 1: What is a device driver?

Answer 1: Device drivers let the OS know how to access and use information from that device

Translator between device and application/OS

Question 2: What are the two types of device drivers?

Answer 2: Kernel-Mode Device Driver and User-Mode Device Driver

Filesystem Overview

Question 1: Where are log files kept?

Answer 1: /var/log

Question 2: Where are system configuration files located?

Answer 2: /etc/

Question 3: True or False - The /usr/bin directory contains required binaries.

Answer 3: false

File Navigation

Question 1: What is the ~ short for?

Answer 1: the home directory of the user

Question 2: What is a single dot short for?

Answer 2: the current working directory

Question 3: Where does the absolute path for a file or directory start?

Answer 3: /

LESSON 2

Examining System Calls

Question 1: What is the fundamental interface between an application and the Linux kernel?

Answer 1: Syscalls

Question 2: What is the command to pull up system calls by number on a Linux machine?

Answer 2: ausyscall –dump or ausyscall –dump | less

Question 3: What is the name of the C library on GNU/Linux called?\

Answer 3: glibc

Char of Different Unix Inter

Question 1: What is the file type for executable files in Unix/Linux?

Answer 1: elf

Question 2: What is the GNU C library called?

Answer 2: glibc

Question 3: What does the mmap system call do?

Answer 3: map files or devices into memory

Loadable Kernel Modules

Question 1: True or False: A reboot is required when one installs a LKM?

Answer 1: false

Question 2: What is the command to list loaded kernel modules?

Answer 2: lsmod

Question 3: What does the .ko file extension stand for?

Answer 3: The .ko file extension stands for Kernel Object.

Examining Proccesess

Question 1: What are some of the common arguments used with the ps command?

Answer 1: UID – user ID

PID – process ID

PPID – parent process ID

C – CPU utilization percentage

TTY – terminal

TIME – elapsed CPU use time

CMD – command to start process

Question 2: What is a type of process that runs in the background without any human

interaction?

Answer 2: Daemons

Describe Login Shells

Question 1: What are the three types of login shells?

Asnwer 1: Login Shell, Interactive Shell, Non-Interactive Shell

Question 2: What shell actively reads commands from user input?

Answer 2: Interactive Shell

Logging on with BASH

Question 1: What argument is used with the "su" command to open a BASH login?

Answer 1: The Login Argument

Question 2: What argument opens a BASH login with the "bash" command?

Answer 2: bash -l

Question 3: What is the restricted BASH shell called?

Answer 3: rBASH

Local and Env Variables

Question 1: What command is used to print environmental variables?

Answer 1: “printenv” or “env”

Question 2: What environmental variable is checked when we execute a command in the shell?

Answer 2: PATH

Describe Secure Shell

Question 1: SSH's most notable applications are what?

Answer 1: remote login and command line execution

Question 2: Name one file transfer protocol based on SSH.

Answer 2: SFTP

LESSON 3

Question 1: What is an administrator account?

Answer 1:A regular user allowed to run commands as root with the command sudo

Question 2: What type of account do users like Apache have?

Answer 2: Service accounts

Question 3: What of accounts belong to users like sys or a daemon?

Answer 3: System accounts

Question 1: What file contains user information?

Answer 1: /etc/passwd

Question 2: Where are user password hashes stored?

Answer 2: /etc/shadow

Question 3:Where are local user configurations stored?

Answer 3: ~/.bashrc file

Question 1: What restricts the rights and access of a user to the minimal amount required to

perform their role?

Answer 1: Principle of least privilige

Question 2: What element of user management says administrators of a system should not

share accounts?

Answer 2: Individual accounts

Question 3: What are some of the basics of password management?

Answer 3: Require the password to be changed periodically, do not allow the reuse of old

passwords, require that they be of some level of complexity. These are all the basics of

password management.

LESSON 4

LSA 1: Identify Linux Network Configuration

Question 1: What command is used to check network connectivity?

Answer 1: ping

Question 2: What command is used to display the routing table?

Answer 2: netstat

LSA 2: IP ADDRESS CONFIGURATION

Question 1: What information do you need to configure an IP address?

Answer 1: IP Address, Gateway Address, Network Mask

Question 2: What are three command line tools used to interact with Networkd?

Answer 2: networkctl, nmtui, nmcli

Question 3: The d after a process name ie Networkd stands for what?

Answer 3: Daemon

LSA 3: Describe Samba Linux Server

Question 1: Samba’s functionality comes from what two protocols?

Answer 1: SMB and CIFS

Question 2: What does Samba do?

Answer 2: provides file and print sharing between different Operating Systems.

LSA 4: Describe Samba Sec Modes

Question 1: Samba security modes are set in which file?

Answer 1: smb.conf

Question 2: What are the two security modes in Samba?

Answer 2: Share-level and User-level(default settings for samba)

LDAP

Question 1: What protocol does LDAP sit on top of?

Answer 1: TCP/IP

Question 2: What are two common implementations of LDAP?

Answer 2: Active Directory(AD) for windows and OpenLDAP for Linux

Identify Apache Web Server

Question 1: The majority of Apache servers run on what system?

Answer 1: Linux

Question 2: Where is the index.html file located?

Answer 2: /var/www/html

LSA 7: Describe HTTP Request/Response Headers

Question 1: What are the symbols used to denote request and response headers?

Answer 1: <, >, *

Question 2: What code means everything worked correctly?

Answer 2: 200 OK

LSA 8: Identify Apache Web Server

Question 1: Why study SQL in this section?

Answer 1: I have no idea

Question 2: Why study JavaScript in this section?

Answer 2: sorry I still don’t know

LESSON 5

NO CHECK ON LEARNING FOR THIS LESSON YAY

LESSON 6

LSA 1: Describe Console Logins and Linux

Question 1: SystemV has run levels, what did SystemD migrate too?

Answer 1: Targets

Question 2: In SystemV Linux what is the centralized configuration File?

Answer 2: inittab

LSA 2: Describe Syslog

Question 1: What is rsyslog?

Answer 1: rocket fast syslog server

Question 2: What command is used for querying systemd for logs, and has taken a good part of

the old syslog?

Answer 2: journalctl

LSA 3: Identify Key Files

Question 1: What command is used to edit the crontab?

Answer 1: crontab -e

Question 2: What is each field of the crontab?

Answer 2: MIN, HOUR, DOM(Day of month), MONTH, DOW(Day of Week), COMMAND

Packages and Patches

Question 1: What is the Debian package manager called?

Answer 1: apt

Question 2: A package is a container for?

Answer 2: Metadata