Unix/Unix-based OS History
Question 1: Unix systems are characterized by a modular design that is sometimes called the,
what?
Answer 1: The Unix Philosophy
Question 2: The Unix operating system should provide a set of simple tools known as, what?
Answer 2: coreutils or core utilities
Question 3: What is the name of the GNU kernel?
Answer 3: GNU Hurd
Basic Key Terms
Question 1: The POSIX shell is the same as which shell?
Answer 1: Bourne Shell
Question 2: What is the default shell on GNU/Linux?
Answer 2: Bash/ Bourne again shell
Question 3: True or False: The CLI, terminal, and shell are just different names for the same
thing.
Answer 3: False
Fundamental Architecture
Question 1: What is the root of the filesystem?
Answer 1: / or a/.
Question 2: What is the name of the user that lives in kernel land?
Answer 2: root
Question 3: What is the home directory of the root user?
Answer 3: /root
Question 4: What is the administrator on a Linux system?Answer 4: a user that is allowed to run
commands as root. The sudo or "super user do" command is used to run a command as root.
LSA 5: IDENTIFY DEVICE DRIVERS
Question 1: What is a device driver?
Answer 1: Device drivers let the OS know how to access and use information from that device
Translator between device and application/OS
Question 2: What are the two types of device drivers?
Answer 2: Kernel-Mode Device Driver and User-Mode Device Driver
Filesystem Overview
Question 1: Where are log files kept?
Answer 1: /var/log
Question 2: Where are system configuration files located?
Answer 2: /etc/
Question 3: True or False - The /usr/bin directory contains required binaries.
Answer 3: false
File Navigation
Question 1: What is the ~ short for?
Answer 1: the home directory of the user
Question 2: What is a single dot short for?
Answer 2: the current working directory
Question 3: Where does the absolute path for a file or directory start?
Answer 3: /
LESSON 2
Examining System Calls
Question 1: What is the fundamental interface between an application and the Linux kernel?
Answer 1: Syscalls
Question 2: What is the command to pull up system calls by number on a Linux machine?
Answer 2: ausyscall –dump or ausyscall –dump | less
Question 3: What is the name of the C library on GNU/Linux called?\
Answer 3: glibc
Char of Different Unix Inter
Question 1: What is the file type for executable files in Unix/Linux?
Answer 1: elf
Question 2: What is the GNU C library called?
Answer 2: glibc
Question 3: What does the mmap system call do?
Answer 3: map files or devices into memory
Loadable Kernel Modules
Question 1: True or False: A reboot is required when one installs a LKM?
Answer 1: false
Question 2: What is the command to list loaded kernel modules?
Answer 2: lsmod
Question 3: What does the .ko file extension stand for?
Answer 3: The .ko file extension stands for Kernel Object.
Examining Proccesess
Question 1: What are some of the common arguments used with the ps command?
Answer 1: UID – user ID
PID – process ID
PPID – parent process ID
C – CPU utilization percentage
TTY – terminal
TIME – elapsed CPU use time
CMD – command to start process
Question 2: What is a type of process that runs in the background without any human
interaction?
Answer 2: Daemons
Describe Login Shells
Question 1: What are the three types of login shells?
Asnwer 1: Login Shell, Interactive Shell, Non-Interactive Shell
Question 2: What shell actively reads commands from user input?
Answer 2: Interactive Shell
Logging on with BASH
Question 1: What argument is used with the "su" command to open a BASH login?
Answer 1: The Login Argument
Question 2: What argument opens a BASH login with the "bash" command?
Answer 2: bash -l
Question 3: What is the restricted BASH shell called?
Answer 3: rBASH
Local and Env Variables
Question 1: What command is used to print environmental variables?
Answer 1: “printenv” or “env”
Question 2: What environmental variable is checked when we execute a command in the shell?
Answer 2: PATH
Describe Secure Shell
Question 1: SSH's most notable applications are what?
Answer 1: remote login and command line execution
Question 2: Name one file transfer protocol based on SSH.
Answer 2: SFTP
LESSON 3
Question 1: What is an administrator account?
Answer 1:A regular user allowed to run commands as root with the command sudo
Question 2: What type of account do users like Apache have?
Answer 2: Service accounts
Question 3: What of accounts belong to users like sys or a daemon?
Answer 3: System accounts
Question 1: What file contains user information?
Answer 1: /etc/passwd
Question 2: Where are user password hashes stored?
Answer 2: /etc/shadow
Question 3:Where are local user configurations stored?
Answer 3: ~/.bashrc file
Question 1: What restricts the rights and access of a user to the minimal amount required to
perform their role?
Answer 1: Principle of least privilige
Question 2: What element of user management says administrators of a system should not
share accounts?
Answer 2: Individual accounts
Question 3: What are some of the basics of password management?
Answer 3: Require the password to be changed periodically, do not allow the reuse of old
passwords, require that they be of some level of complexity. These are all the basics of
password management.
LESSON 4
LSA 1: Identify Linux Network Configuration
Question 1: What command is used to check network connectivity?
Answer 1: ping
Question 2: What command is used to display the routing table?
Answer 2: netstat
LSA 2: IP ADDRESS CONFIGURATION
Question 1: What information do you need to configure an IP address?
Answer 1: IP Address, Gateway Address, Network Mask
Question 2: What are three command line tools used to interact with Networkd?
Answer 2: networkctl, nmtui, nmcli
Question 3: The d after a process name ie Networkd stands for what?
Answer 3: Daemon
LSA 3: Describe Samba Linux Server
Question 1: Samba’s functionality comes from what two protocols?
Answer 1: SMB and CIFS
Question 2: What does Samba do?
Answer 2: provides file and print sharing between different Operating Systems.
LSA 4: Describe Samba Sec Modes
Question 1: Samba security modes are set in which file?
Answer 1: smb.conf
Question 2: What are the two security modes in Samba?
Answer 2: Share-level and User-level(default settings for samba)
LDAP
Question 1: What protocol does LDAP sit on top of?
Answer 1: TCP/IP
Question 2: What are two common implementations of LDAP?
Answer 2: Active Directory(AD) for windows and OpenLDAP for Linux
Identify Apache Web Server
Question 1: The majority of Apache servers run on what system?
Answer 1: Linux
Question 2: Where is the index.html file located?
Answer 2: /var/www/html
LSA 7: Describe HTTP Request/Response Headers
Question 1: What are the symbols used to denote request and response headers?
Answer 1: <, >, *
Question 2: What code means everything worked correctly?
Answer 2: 200 OK
LSA 8: Identify Apache Web Server
Question 1: Why study SQL in this section?
Answer 1: I have no idea
Question 2: Why study JavaScript in this section?
Answer 2: sorry I still don’t know
LESSON 5
NO CHECK ON LEARNING FOR THIS LESSON YAY
LESSON 6
LSA 1: Describe Console Logins and Linux
Question 1: SystemV has run levels, what did SystemD migrate too?
Answer 1: Targets
Question 2: In SystemV Linux what is the centralized configuration File?
Answer 2: inittab
LSA 2: Describe Syslog
Question 1: What is rsyslog?
Answer 1: rocket fast syslog server
Question 2: What command is used for querying systemd for logs, and has taken a good part of
the old syslog?
Answer 2: journalctl
LSA 3: Identify Key Files
Question 1: What command is used to edit the crontab?
Answer 1: crontab -e
Question 2: What is each field of the crontab?
Answer 2: MIN, HOUR, DOM(Day of month), MONTH, DOW(Day of Week), COMMAND
Packages and Patches
Question 1: What is the Debian package manager called?
Answer 1: apt
Question 2: A package is a container for?
Answer 2: Metadata