linux qans nov10

198
Linux Interview Questions And Answers Set - 1 You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a file. The -15 tells tail to display the last fifteen lines of each specified file. Who owns the data dictionary? The SYS user owns the data dictionary. The SYS and SYSTEM users are created when the database is created. You routinely compress old log files. You now need to examine a log from two months ago. In order to view its contents without first having to decompress it, use the _________ utility. zcat The zcat utility allows you to examine the contents of a compressed file much the same way that cat displays a file. You suspect that you have two commands with the same name as the command is not producing the expected results. What command can you use to determine the location of the command being run? which The which command searches your path until it finds a command that matches the command you are looking for and displays its full path. You locate a command in the /bin directory but do not know what it does. What command can you use to determine its purpose. whatis The whatis command displays a summary line from the man page for the specified command. You wish to create a link to the /data directory in bob's home directory so you issue the command ln /data /home/bob/datalink but the command fails. What option should you use in this command line to be successful. Use the -F option In order to create a link to a directory you must use the -F option. When you issue the command ls -l, the first character of the resulting display represents the file's ___________. type The first character of the permission block designates the type of file that is being displayed. What utility can you use to show a dynamic listing of running processes? __________ top The top utility shows a listing of all running processes that is dynamically updated. Where is standard output usually directed? to the screen or display

Upload: amritpal-singh

Post on 20-Apr-2015

41 views

Category:

Documents


0 download

DESCRIPTION

Interview Questions Answer - MCSE , CCNA , CCNP , VoIP , CCVP , Router , Switch , Firewall , RAID

TRANSCRIPT

Page 1: Linux QANS Nov10

Linux Interview Questions And Answers Set - 1

You need to see the last fifteen lines of the files dog, cat andhorse. What command should you use?tail -15 dog cat horse

The tail utility displays the end of a file. The -15 tells tail todisplay the last fifteen lines of each specified file.Who owns the data dictionary?The SYS user owns the data dictionary. The SYS and SYSTEM users arecreated when the database is created.You routinely compress old log files. You now need to examine a logfrom two months ago. In order to view its contents without firsthaving to decompress it, use the _________ utility.zcat

The zcat utility allows you to examine the contents of a compressedfile much the same way that cat displays a file.You suspect that you have two commands with the same name as thecommand is not producing the expected results. What command can youuse to determine the location of the command being run?which

The which command searches your path until it finds a command thatmatches the command you are looking for and displays its full path.You locate a command in the /bin directory but do not know what itdoes. What command can you use to determine its purpose.whatis

The whatis command displays a summary line from the man page for thespecified command.You wish to create a link to the /data directory in bob's homedirectory so you issue the command ln /data /home/bob/datalink but thecommand fails. What option should you use in this command line to besuccessful.Use the -F option

In order to create a link to a directory you must use the -F option.When you issue the command ls -l, the first character of the resultingdisplay represents the file's ___________.type

The first character of the permission block designates the type offile that is being displayed.What utility can you use to show a dynamic listing of runningprocesses? __________top

The top utility shows a listing of all running processes that isdynamically updated.Where is standard output usually directed?to the screen or display

Page 2: Linux QANS Nov10

By default, your shell directs standard output to your screen or display.You wish to restore the file memo.ben which was backed up in thetarfile MyBackup.tar. What command should you type?tar xf MyBackup.tar memo.ben

This command uses the x switch to extract a file. Here the filememo.ben will be restored from the tarfile MyBackup.tar.You need to view the contents of the tarfile called MyBackup.tar. Whatcommand would you use?tar tf MyBackup.tar

The t switch tells tar to display the contents and the f modifierspecifies which file to examine.You want to create a compressed backup of the users' home directories.What utility should you use?tar

You can use the z modifier with tar to compress your archive at thesame time as creating it.What daemon is responsible for tracking events on your system?syslogd

The syslogd daemon is responsible for tracking system information andsaving it to specified log files.You have a file called phonenos that is almost 4,000 lines long. Whattext filter can you use to split it into four pieces each 1,000 lineslong?split

The split text filter will divide files into equally sized pieces. Thedefault length of each piece is 1,000 lines.You would like to temporarily change your command line editor to bevi. What command should you type to change it?set -o vi

The set command is used to assign environment variables. In this case,you are instructing your shell to assign vi as your command lineeditor. However, once you log off and log back in you will return tothe previously defined command line editor.What account is created when you install Linux?root

Whenever you install Linux, only one user account is created. This isthe superuser account also known as root.What command should you use to check the number of files and diskspace used and each user's defined quotas?

repquota

The repquota command is used to get a report on the status of thequotas you have set including the amount of allocated space and amountof used space.In order to run fsck on the root partition, the root partition must be

Page 3: Linux QANS Nov10

mounted asreadonly

You cannot run fsck on a partition that is mounted as read-write.In order to improve your system's security you decide to implementshadow passwords. What command should you use?pwconv

The pwconv command creates the file /etc/shadow and changes allpasswords to 'x' in the /etc/passwd file.Bob Armstrong, who has a username of boba, calls to tell you he forgothis password. What command should you use to reset his command?passwd boba

The passwd command is used to change your password. If you do notspecify a username, your password will be changed.The top utility can be used to change the priority of a runningprocess? Another utility that can also be used to change priority is___________?nice

Both the top and nice utilities provide the capability to change thepriority of a running process.What command should you type to see all the files with an extension of'mem' listed in reverse alphabetical order in the /home/ben/memosdirectory.ls -r /home/ben/memos/*.mem

The -c option used with ls results in the files being listed inchronological order. You can use wildcards with the ls command tospecify a pattern of filenames.Linux Interview Questions And Answers Set - 2What file defines the levels of messages written to system log files?kernel.h

To determine the various levels of messages that are defined on yoursystem, examine the kernel.h file.What command is used to remove the password assigned to a group?gpasswd -r

The gpasswd command is used to change the password assigned to agroup. Use the -r option to remove the password from the group.What command would you type to use the cpio to create a backup calledbackup.cpio of all the users' home directories?find /home | cpio -o > backup.cpio

The find command is used to create a list of the files and directoriescontained in home. This list is then piped to the cpio utility as alist of files to include and the output is saved to a file calledbackup.cpio.What can you type at a command line to determine which shell you are using?echo $SHELL

Page 4: Linux QANS Nov10

The name and path to the shell you are using is saved to the SHELLenvironment variable. You can then use the echo command to print outthe value of any variable by preceding the variable's name with $.Therefore, typing echo $SHELL will display the name of your shell.What type of local file server can you use to provide the distributioninstallation materials to the new machine during a networkinstallation?A) InetdB) FSSTNDC) DNSD) NNTPE) NFSE - You can use an NFS server to provide the distribution installationmaterials to the machine on which you are performing the installation.Answers a, b, c, and d are all valid items but none of them are fileservers. Inetd is the superdaemon which controls all intermittentlyused network services. The FSSTND is the Linux File System Standard.DNS provides domain name resolution, and NNTP is the transfer protocolfor usenet news.If you type the command cat dog & > cat what would you see on yourdisplay? Choose one:a. Any error messages only.b. The contents of the file dog.c. The contents of the file dog and any error messages.d. Nothing as all output is saved to the file cat.

d

When you use & > for redirection, it redirects both the standardoutput and standard error. The output would be saved to the file cat.You are covering for another system administrator and one of the usersasks you to restore a file for him. You locate the correct tarfile bychecking the backup log but do not know how the directory structurewas stored. What command can you use to determine this?Choose one:a. tar fx tarfile dirnameb. tar tvf tarfile filenamec. tar ctf tarfiled. tar tvf tarfile

d

The t switch will list the files contained in the tarfile. Using the vmodifier will display the stored directory structure.You have the /var directory on its own partition. You have run out ofspace. What should you do? Choose one:a. Reconfigure your system to not write to the log files.b. Use fips to enlarge the partition.c. Delete all the log files.d. Delete the partition and recreate it with a larger size.

d

Page 5: Linux QANS Nov10

The only way to enlarge a partition is to delete it and recreate it.You will then have to restore the necessary files from backup.You have a new application on a CD-ROM that you wish to install. Whatshould your first step be?Choose one:a. Read the installation instructions on the CD-ROM.b. Use the mount command to mount your CD-ROM as read-write.c. Use the umount command to access your CD-ROM.d. Use the mount command to mount your CD-ROM as read-only.

d

Before you can read any of the files contained on the CD-ROM, you mustfirst mount the CD-ROM.When you create a new partition, you need to designate its size bydefining the starting and ending _____________.cylinders

When creating a new partition you must first specify its startingcylinder. You can then either specify its size or the ending cylinder.Linux Interview Questions And Answers Set - 3

What key combination can you press to suspend a running job and placeit in the background?ctrl-z

Using ctrl-z will suspend a job and put it in the background.The easiest, most basic form of backing up a file is to _____ it toanother location.copy

The easiest most basic form of backing up a file is to make a copy ofthat file to another location such as a floppy disk.What type of server is used to remotely assign IP addresses tomachines during the installation process?A) SMBB) NFSC) DHCPD) FTE) HTTP

C - You can use a DHCP server to assign IP addresses to individualmachines during the installation process. Answers a, b, d, and e listlegitimate Linux servers, but these servers do not provide IPaddresses. The SMB, or Samba, tool is used for file and print sharingacross multi-OS networks. An NFS server is for file sharing acrossLinux net-works. FTP is a file storage server that allows people tobrowse and retrieve information by logging in to it, and HTTP is forthe Web.Which password package should you install to ensure that the centralpassword file couldn't be stolen easily?A) PAMB) tcp_wrappers

Page 6: Linux QANS Nov10

C) shadowD) securepassE) ssh

C - The shadow password package moves the central password file to amore secure location. Answers a, b, and e all point to valid packages,but none of these places the password file in a more secure location.Answer d points to an invalid package.When using useradd to create a new user account, which of thefollowing tasks is not done automatically.Choose one:a. Assign a UID.b. Assign a default shell.c. Create the user's home directory.d. Define the user's home directory.

c

The useradd command will use the system default for the user's homedirectory. The home directory is not created, however, unless you usethe -m option.You want to enter a series of commands from the command-line. Whatwould be the quickest way to do this?Choose Onea. Press enter after entering each command and its argumentsb. Put them in a script and execute the scriptc. Separate each command with a semi-colon (;) and press enter afterthe last commandd. Separate each command with a / and press enter after the last command

c

The semi-colon may be used to tell the shell that you are enteringmultiple commands that should be executed serially. If these werecommands that you would frequently want to run, then a script might bemore efficient. However, to run these commands only once, enter thecommands directly at the command line.You attempt to use shadow passwords but are unsuccessful. Whatcharacteristic of the /etc/passwd file may cause this?Choose one:a. The login command is missing.b. The username is too long.c. The password field is blank.d. The password field is prefaced by an asterisk.

c

The password field must not be blank before converting to shadow passwords.When you install a new application, documentation on that applicationis also usually installed. Where would you look for the documentationafter installing an application called MyApp?Choose one:a. /usr/MyApp

Page 7: Linux QANS Nov10

b. /lib/doc/MyAppc. /usr/doc/MyAppd. In the same directory where the application is installed.

c

The default location for application documentation is in a directorynamed for the application in the /usr/doc directory.What file would you edit in your home directory to change which windowmanager you want to use?A) XinitB) .xinitrcC) XF86SetupD) xstartE) xf86init

Answer: B - The ~/.xinitrc file allows you to set which windowman-ager you want to use when logging in to X from that account.Answers a, d, and e are all invalid files. Answer c is the main Xserver configuration file.What command allows you to set a processor-intensive job to use less CPU time?A) psB) niceC) chpsD) lessE) more

Answer: B - The nice command is used to change a job's priority level,so that it runs slower or faster. Answers a, d, and e are validcommands but are not used to change process information. Answer c isan invalid command.While logged on as a regular user, your boss calls up and wants you tocreate a new user account immediately. How can you do this withoutfirst having to close your work, log off and logon as root?Choose one:a. Issue the command rootlog.b. Issue the command su and type exit when finished.c. Issue the command su and type logoff when finished.d. Issue the command logon root and type exit when finished.

Answer: bYou can use the su command to imitate any user including root. Youwill be prompted for the password for the root account. Once you haveprovided it you are logged in as root and can do any administrativeduties.Linux Interview Questions And Answers Set - 4

There are seven fields in the /etc/passwd file. Which of the followinglists all the fields in the correct order?Choose one:a. username, UID, GID, home directory, command, commentb. username, UID, GID, comment, home directory, commandc. UID, username, GID, home directory, comment, command

Page 8: Linux QANS Nov10

d. username, UID, group name, GID, home directory, commentAnswer: bThe seven fields required for each line in the /etc/passwd file areusername, UID, GID, comment, home directory, command. Each of thesefields must be separated by a colon even if they are empty.Which of the following commands will show a list of the files in yourhome directory including hidden files and the contents of allsubdirectories?Choose one:a. ls -c homeb. ls -aR /home/usernamec. ls -aF /home/usernamed. ls -l /home/username

Answer: bThe ls command is used to display a listing of files. The -a optionwill cause hidden files to be displayed as well. The -R option causesls to recurse down the directory tree. All of this starts at your homedirectory.In order to prevent a user from logging in, you can add a(n)________at the beginning of the password field.Answer: asterick

If you add an asterick at the beginning of the password field in the/etc/passwd file, that user will not be able to log in.You have a directory called /home/ben/memos and want to move it to/home/bob/memos so you issue the command mv /home/ben/memos /home/bob.What is the results of this action?Choose one:a. The files contained in /home/ben/memos are moved to the directory/home/bob/memos/memos.b. The files contained in /home/ben/memos are moved to the directory/home/bob/memos.c. The files contained in /home/ben/memos are moved to the directory /home/bob/.d. The command fails since a directory called memos already exists inthe target directory.

Answer: aWhen using the mv command to move a directory, if a directory of thesame name exists then a subdirectory is created for the files to bemoved.Which of the following tasks is not necessary when creating a new userby editing the /etc/passwd file?Choose one:a. Create a link from the user's home directory to the shell the user will use.b. Create the user's home directoryc. Use the passwd command to assign a password to the account.d. Add the user to the specified group.

Answer: aThere is no need to link the user's home directory to the shellcommand. Rather, the specified shell must be present on your system.You issue the following command useradd -m bobm But the user cannot

Page 9: Linux QANS Nov10

logon. What is the problem?Choose one:a. You need to assign a password to bobm's account using the passwd command.b. You need to create bobm's home directory and set the appropriate permissions.c. You need to edit the /etc/passwd file and assign a shell for bobm's account.d. The username must be at least five characters long.

Answer: aThe useradd command does not assign a password to newly createdaccounts. You will still need to use the passwd command to assign apassword.You wish to print the file vacations with 60 lines to a page. Which ofthe following commands will accomplish this? Choose one:a. pr -l60 vacations | lprb. pr -f vacations | lprc. pr -m vacations | lprd. pr -l vacations | lpr

Answer: aThe default page length when using pr is 66 lines. The -l option isused to specify a different length.Linux Interview Questions And Answers Set - 5

Which file defines all users on your system?Choose one:a. /etc/passwdb. /etc/usersc. /etc/passwordd. /etc/user.conf

Answer: aThe /etc/passwd file contains all the information on users who may loginto your system. If a user account is not contained in this file,then the user cannot log in.Which two commands can you use to delete directories?A) rmB) rm -rfC) rmdirD) rdE) rd -rf

Answer(s): B, C - You can use rmdir or rm -rf to delete a directory.Answer a is incorrect, because the rm command without any specificflags will not delete a directory, it will only delete files. Answersd and e point to a non-existent command.Which partitioning tool is available in all distributions?A) Disk DruidB) fdiskC) Partition MagicD) FAT32E) System Commander

Answer(s): B - The fdisk partitioning tool is available in all Linux

Page 10: Linux QANS Nov10

distributions. Answers a, c, and e all handle partitioning, but do notcome with all distributions. Disk Druid is made by Red Hat and used inits distribution along with some derivatives. Partition Magic andSystem Commander are tools made by third-party companies. Answer d isnot a tool, but a file system type. Specifically, FAT32 is the filesystem type used in Windows 98.Which partitions might you create on the mail server's hard drive(s)other than the root, swap, and boot partitions?[Choose all correct answers]A) /var/spoolB) /tmpC) /procD) /binE) /home

Answer(s): A, B, E - Separating /var/spool onto its own partitionhelps to ensure that if something goes wrong with the mail server orspool, the output cannot overrun the file system. Putting /tmp on itsown partition prevents either software or user items in the /tmpdirectory from overrunning the file system. Placing /home off on itsown is mostly useful for system re-installs or upgrades, allowing youto not have to wipe the /home hierarchy along with other areas.Answers c and d are not possible, as the /proc portion of the filesystem is virtual-held in RAM-not placed on the hard drives, and the/bin hierarchy is necessary for basic system functionality and,therefore, not one that you can place on a different partition.When planning your backup strategy you need to consider how often youwill perform a backup, how much time the backup takes and what mediayou will use. What other factor must you consider when planning yourbackup strategy? _________

what to backupChoosing which files to backup is the first step in planning yourbackup strategy.What utility can you use to automate rotation of logs?Answer: logrotateThe logrotate command can be used to automate the rotation of various logs.In order to display the last five commands you have entered using thehistory command, you would type ___________ .

Answer: history 5The history command displays the commands you have previously entered.By passing it an argument of 5, only the last five commands will bedisplayed.What command can you use to review boot messages?Answer: dmesgThe dmesg command displays the system messages contained in the kernelring buffer. By using this command immediately after booting yourcomputer, you will see the boot messages.What is the minimum number of partitions you need to install Linux?Answer: 2Linux can be installed on two partitions, one as / which will containall files and a swap partition.

Page 11: Linux QANS Nov10

What is the name and path of the main system log?Answer: /var/log/messagesBy default, the main system log is /var/log/messages.Of the following technologies, which is considered a client-side script?A) JavaScriptB) JavaC) ASPD) C++

Answer: A - JavaScript is the only client-side script listed. Java andC++ are complete programming languages. Active Server Pages are parsedon the server with the results being sent to the client in HTML

Page 12: Linux QANS Nov10

IT Essentials 2: Module questions and answers Module 1: Study questions 1 From which Windows configuration tool can a user perform hardware and network

configurations?

Window Manager

My Computer

Control Panel

Task Manager

2 When compared to a command line interface, what is a major disadvantage of a GUI?

It requires an understanding of commands.

It requires more memory and storage space.

It is more difficult to use.

Most server operating systems do not support a GUI.

3 What is a beneficial feature of preemptive multitasking?

Applications share the use of the processor by time slicing.

The processor dynamically adjusts the amount of memory needed by the application programs. Application programs share memory addresses and exchange information.

The operating system controls the allocation of processor time.

4 Though obsolete in current desktop environments, what are three valid reasons for the

continued use of MS-DOS? (Choose three.)

MS-DOS supports legacy applications.

MS-DOS is an intuitive, high-overhead operating system.

MS-DOS rarely crashes because it is a multitasking operating system.

MS-DOS is relatively easy to use.

MS-DOS can run on inexpensive hardware.

5 Which acronyms describe the two general categories of OS user interfaces?

DOS and UNIX

DOS and GUI

UNIX and GUI

CLI and GUI

Page 13: Linux QANS Nov10

6 Which of the following is a valid concern for a company considering a move from Windows to Linux?

Linux generally allows companies to recycle old hardware and software.

Users may need special training to become productive with Linux.

Special third party software may be necessary to secure and configure Linux.

Linux generally requires more disk space than Windows.

7 What is meant by the statement, "We have to support our legacy system"? Support must be provided for the newest Linux system.

Support must be provided for the system called legacy.

Support must be provided for the newest Microsoft system.

Support must be provided for outdated software.

8 Which three of the following file systems does Windows 2000 use? (Choose three.)

EXT2

FAT16

FAT32

NTFS

HPFS

9 Windows and Linux both use a file system that resembles an upside-down tree. What is

the name of this type of file structure? binary

hierarchical

empirical

subsystem

10 Which part of the OS, loaded into memory at boot time, controls memory allocation?

user interface

application software

kernel

file system

11 What is the main reason FAT32 was created?

New operating systems required the use of filenames greater than eight characters.

Earlier versions of FAT used disk space inefficiently.

FAT32 was needed to support drives up to 4 GB.

The maximum length of file extensions needed to be increased to three characters.

Page 14: Linux QANS Nov10

12 Which of the following is generally regarded as the standard GUI for Linux?

Red Hat Desktop

CDE

GNOME

Star Office

13 Which two of the following statements are true? (Choose two.)

Linux is a true 16-bit operating system that uses preemptive multitasking.

Linux supports all Windows applications through the use of cooperative multitasking. Linux operating system code is available for anyone to modify and use.

Linux is a true 48-bit operating system that uses minimal virtual memory.

Linux is a true 32-bit operating system that uses preemptive multitasking.

14 Which command is entered in the Run dialog box of a Windows XP system to open a

command prompt window? run

start

cmd

dosprompt

15 Which two statements describe the security features of Linux? (Choose two.)

Compared to Windows, Linux is virtually virus-free.

Users must have a valid username and password to log into a Linux system, by default. Linux security is one dimensional.

Most security features for Linux must be purchased from a third party.

16 Which two of the following shells are commonly available for Linux? (Choose two.)

Bore shell

Korn shell

Cash shell

C shell

PC shell

Page 15: Linux QANS Nov10

17 With the FAT file system, what is the basic unit of logical storage on a disk? megabyte

cluster

directory

logical drive

18 Which two statements describe security in the Windows operating system? (Choose

two.) Windows is less susceptible to viruses than Linux.

By default, users must have a username and password to log into Windows.

Windows security is generally one dimensional.

Windows security is improved through the use of third-party applications.

Windows can securely support multiple users with the Terminal service installed by default on personal computers.

19 What are three reasons why a company may choose Linux over Windows as an

operating system? (Choose three.) The entire Linux installation can be completed using either a GUI or CLI.

The entire Windows installation can be completed using either a GUI or CLI.

Windows can be run entirely from a CD.

Compared to Windows, Linux is virtually virus-free.

Linux is a true multi-user system.

Linux has superior one-dimensional security.

20 Network operating systems were designed to provide which of the following tasks?

(Select three.) file security

multitasking

user privileges

resource access for a single user

resource sharing among multiple users

Page 16: Linux QANS Nov10

Module 2: Study questions 1 What does the term media access control describe?

the rules for coordinating the use of the medium

a list of users allowed to use the network

the system administrator's role in controlling access to the network

how to determine which media type is best for a network

2 Which two types of cabling will support 100BASE-X? (Choose two.)

Category 2

Category 5

two-strand fiber-optic

50-ohm coaxial

3 What is one disadvantage of a client/server network?

It can have a single point of failure.

It does not scale well to large networks.

It requires each user to be trained to perform administrative tasks.

It is less secure than a peer-to-peer network.

4 Peer-to-peer and client/server networks share many characteristics. What is unique to

the client/server environment? Passwords may be required to access shared resources.

Local data files and devices can be shared by several users.

Computers typically communicate using request/response protocols.

Security and resource management scales easily as the network grows.

5 Why are open source technologies appealing to many people? A more organized source of funding and development is available.

Proprietary technologies involve cooperation between many companies.

De facto standards allow for more choice.

Users are not bound by copyright laws.

6 Which of the following statements best describes full-duplex transmission?

Data can be sent across bus hubs and switches.

Data can be simultaneously sent and received.

Data can only be sent in one direction.

Data can be sent and then received.

Page 17: Linux QANS Nov10

7 Which access control method is specified in the IEEE 802.3 standard?

CSMA/CA

CSMA/CD

token passing

store and forward

8 What is the physical topology when all the computers in a network connect to a central

point? point-to-point

star

ring

bus

9 Which of the following statements is true of print sharing?

It requires a company to purchase more printers.

It makes it more difficult for an administrator to control printers.

It allows for more efficient use of printers.

It limits the user to a single network printer.

10 Which statement is true of peer-to-peer networks?

They scale easily as the size of the network grows.

Security is easily maintained.

Computers may change roles from client to server as needed.

At least one computer functions as a dedicated server.

11 What is a major advantage of UTP?

It is inexpensive.

It is highly resistant to electromagnetic interference.

It limits the number of hosts on a network.

It is an inexpensive way to interconnect remote locations.

12 Which technology provides the best support for upload-intensive Internet tasks?

ISDN

cable modem service

analog modem service

ADSL

Page 18: Linux QANS Nov10

13 What do transport layer protocols use to identify the application needed to process data?

ports

MAC addresses

IP addresses

DNS

flags

14 Which statement best describes a serial link?

Bits of information are transmitted across the link one after another.

Bits of information are randomly transmitted across the link.

Bits of information are sent across a dedicated link in one direction only.

Bits of information are only sent using dial-up or ISDN lines.

15 What is one advantage of directory and name services?

All directories are kept in a single location.

User names have a standardized format.

Text names are easier to remember than numeric addresses.

Network resources are bound to a physical location.

16 What is an advantage of Linux?

Linux is easy to use.

With copyrights, Linux experiences fast technological growth.

Linux is free for public use.

Linux has an organized source of development.

17 What is the purpose of protocols?

to provide a controlled sequence of messages between systems

to define which users have access to the network

to allow the network administrator to decentralize control

to limit access to network resources

18 Which of the following is the most popular physical LAN topology?

ring

star

bus

fiber

Page 19: Linux QANS Nov10

19 Which DSL technology is most commonly used? SDSL

ADSL

VDSL

IDSL

20 Which network layer protocol enables routers to discover the best path between

networks using hop count? IP

RIP

ARP

OSPF

21 Which of the following works as a "storage and retrieval" application?

Telnet

e-mail

DNS

SNMP

22 Which features are LANs generally designed to accommodate?

many users, high speed, limited geographical area

many users, high speed, broad geographical area

few users, low speed, limited geographical area

few users, low speed, broad geographical area

23 What are two advantages of Windows over Linux? (Choose two.)

Windows can be used publicly for free.

Windows is easier to use than Linux.

Unlike Linux, Windows is standardized through the efforts of many independent sources.

Unlike Linux, Windows has an organized source of funding and development.

Page 20: Linux QANS Nov10

Module 3: Study questions 1 Which list indicates advantages associated with fiber-optic cable?

capable of running long distances, inexpensive to install, not susceptible to electromagnetic interference not susceptible to electromagnetic interference, expensive to install, lower data rates

not susceptible to electromagnetic interference, higher data rates, capable of running long distances lower data rates, inexpensive to install, capable of running long distances

2 Which term refers to the path that signals take from one point on a network to another?

address resolution

logical topology

dynamic host configuration

physical topology

3 Which data link layer device can segment a network into different collision domains?

a router

a switch

a gateway

a transceiver

4 What is the function of a DHCP server?

It stores websites that are used frequently.

It dynamically assigns IP addresses to hosts.

It determines the subnet mask of a network.

It serves as a "first line of defense" firewall.

5 Which of the following statements best describes DNS?

DNS servers are used to map an IP address to a physical address.

DNS servers are used to map a name to an IP address.

DNS servers are used to configure logical address information for host computers.

DNS servers are used to translate from private addresses to public addresses.

Page 21: Linux QANS Nov10

6 Which three of the following items can a DHCP server provide to a host computer? (Choose

three.) subnet mask

MAC address

default gateway

IP address

DHCP server address

7 Which two devices are at the core of wireless communications? (Choose two.)

satellites

light emitting diodes

transmitters

receivers

modulators

8 How many bits are in an IP address?

16

64

32

48

9 What is the main function of the DNS?

to scan the network for viruses

to translate computer names to their corresponding IP addresses

to assign IP addresses to nodes on the network

to provide names to all the nodes on a network

10 What are three important considerations when selecting a NIC? (Choose three.)

network type

operating system

system bus

network media

number of network users

Page 22: Linux QANS Nov10

11 Which list contains important considerations when selecting a NIC to use on a network?

type of network, type of RAM, type of system bus

type of media, type of system bus, type of RAM

type of network, type of media, type of system bus

type of system bus, processor speed, type of media

12 What are the two most common wireless networking technologies? (Choose two.)

radio frequency

microwave

laser

infrared

satellite wavelength

13 What is the purpose of the twists in Category 5/5e UTP cable?

to prevent the cable from breaking

to make the cable easier to install and terminate properly

to make the cable cheaper to produce

to limit signal degradation caused by cross talk

14 Which of the following options correctly describes APIPA?

APIPA allows a privately addressed host to assign itself a public IP address in order to access a remote network. APIPA enables a computer to assign itself an IP address if it cannot contact a DHCP server. APIPA is fault-tolerant feature that allows a server to mirror another server on a local network. APIPA enables a computer to translate domain names into IP addresses if it cannot contact a DNS server.

15 What are three options for assigning logical addresses to hosts? (Choose three.)

static

dynamic

negotiation

automatic

holistic

Page 23: Linux QANS Nov10

16 Which of the following devices is used to segment a network into different broadcast

domains? switch

active hub

bridge

router

17 What is a major disadvantage of the bus topology?

It is expensive.

It requires a lot of cabling.

A break in any one part of the cable brings down the entire network.

All computers must be placed in a straight line.

18 What is the most commonly used architecture in Ethernet LANs?

bus

star

mesh

ring

19 What are two advantages of using dynamic address assignment instead of manual address

assignment? (Choose two.) On a large network, manually assigning addresses can be very time consuming.

Manual address assignment requires network administrators to understand physical addressing. Dynamic address assignment can help segment a large network.

Manual address assignment requires network administrators to understand logical addressing.

20 Which two of the following statements accurately describe a default gateway? (Choose two.)

A default gateway is used when a host transfers data to another host on the same network segment. A default gateway is the IP address assigned to the near-side router interface.

A default gateway is the IP address assigned to the near-side switch interface.

A default gateway is used when a host transfers data to a host on another network segment.

Page 24: Linux QANS Nov10

Module 4: Study questions 1 What must a computer have when connected to a network?

one unique name per function

one unique address per service

one unique address per connection point

one unique network

2 What is the range of numbers in the first octet of a Class C address?

1-127

192-223

128-191

224-255

3 A technician needs to log into a remote Linux PC to perform some maintenance. Which

application layer protocol could be used? Telnet

FTP

HTTP

SNMP

4 Which protocol is used to translate a domain name into an IP address?

ARP

DNS

UDP

NetBIOS

5 Which classes of IP addresses are used by commercial organizations for host

addressing? A,C,D

B,C,D

C,D,E

A,B,C

6 Which of the following rely on ICMP?

sending an Echo Request

logging in to a remote host

mapping an IP address to a MAC address

resolving a host name

Page 25: Linux QANS Nov10

7 What is subnetting?

dividing large networks into smaller ones using the same network number

allowing several small networks to communicate over the common carrier infrastructure combining several networks into a single larger network

allowing separate companies to share an IP address by taking turns using it

8 How would a technician permanently change the IP address of an Ethernet card on a

Red Hat Linux PC to 192.168.34.4?

use the command ifconfig eth0 192.168.34.4

use the command route add default IP 192.168.34.4 dev eth0

use the command ping 192.168.34.4

edit the IPADDRESS line in the file /etc/sysconfig/network-scripts/ifcfg-eth0

9 Which utility is used in Windows and Linux to view network connections and protocol

statistics? arp

netstat

nbstat

ipconfig

10 What is a unique characteristic of the IP addressing scheme?

flat addressing

hierarchical addressing

internetwork addressing

single-octet addressing

11 In which layer of the TCP/IP model does ICMP operate?

Application

Transport

Internet

Network Access

12 Which address class contains the IP address 168.12.0.0?

A

B

C

D

Page 26: Linux QANS Nov10

13 How many octets are contained in an IP address?

1

2

4

8

14 Which Linux command is used to temporarily change the default gateway of a host?

arp

ifconfig

netstat

route

ping

15 What is the primary function of NAT?

convert a MAC address to a domain name

translate between a local IP address and a global IP address

allocate IP addresses to commercial organizations

determine the best route through a network

16 Which service is used to enable individual computers to automatically obtain an IP

address?

WINS

DNS

ARP

DHCP

17 Which service does ARP provide?

It resolves a physical address to a TCP port number.

It resolves a broadcast address to an IP address.

It resolves an IP address to a MAC address.

It resolves a URL to a MAC address.

18 What is the range of numbers that can be used in the first octet of a Class A network?

1-126

128-191

192-223

1-255

Page 27: Linux QANS Nov10

19 Which IP address range, as indicated by the first octet, is reserved for testing, and

includes the loopback address? 127.x.x.x

168.x.x.x

255.x.x.x

192.x.x.x

20 The performance of a network has dropped. Which command should an administrator

use in a Linux system to determine which routers are causing the problem?

ping

traceroute

tracert

route

ifconfig

Page 28: Linux QANS Nov10

Module 5: Study questions 1 Which statement correctly describes an NIS slave?

An NIS slave is another name for an NIS client.

An NIS slave is where the NIS database is maintained.

An NIS slave is where the NIS database is created.

An NIS slave contains a copy of the NIS database.

An NIS slave contains the portions of the NIS database needed by the clients it serves.

2 What are three characteristics of an intranet? (Choose three.)

communication with outside business partners

firewalls

multiple networks across the company

public access

local area network only

web servers

3 Which version of Directory Service does Linux use?

NDS

NIS

NFS

NDAP

4 Which two protocols are used to control the transfer of web resources from a web server

to a client browser? (Choose two.) ASP

FTP

HTML

HTTP

HTTPS

IP

5 Which TCP/IP protocol is responsible for file sharing?

DNS

NFS

UDP

IPX

Page 29: Linux QANS Nov10

6 Which popular web server software is only available for Windows operating systems? Apache

Firefox

Internet Explorer

Internet Information Server

Netscape Server

Opera

7 Which scripting language can be used on a Linux server to notify users that a print job

is complete? batch script

JavaScript

JScript

shell script

VBScript

8 What is the default order in which print jobs are processed when using a FIFO queue?

The last job placed in the queue is the first to be printed.

The oldest job in the queue is printed first.

Smaller jobs are printed before larger jobs.

Larger jobs are printed before smaller jobs.

The network administrator determines which jobs are printed first.

9 Which of the following is a list of common FTP commands?

get, put, cd, bye

download, upload, dir, chdir, exit

send, receive, dir, cd, exit

transfer [from | to], list, dir, exit

10 What are two common uses of scripting languages? (Choose two.) automate administrative tasks, such as cycling log files

provide user interaction with a compiled program

run scheduled tasks at user login

deliver files to remote users on request

download required drivers to printers

11 Which protocol controls web page transmission?

Page 30: Linux QANS Nov10

FTP

HTTP

SMTP

DNS

12 A network administrator is operating in the GNOME desktop environment. Which

application would the administrator start in order to establish a command line session with a remote server?

gFTP

Mozilla

Star Office

xterm

13 Which syntax is invalid for opening an FTP connection?

ftp connect hostname

ftp <hostname | IP_address>

ftp 192.127.34.219

ftp computer.company.com

14 Which protocol was designed for file sharing on the Internet?

HTTP

FTP

SMTP

TCP

15 Where do print jobs wait to be printed?

print list

print queue

wait list

print job roster

16 What is the purpose of a directory service?

It increases the need for redundant logins.

It provides administrators with centralized control of users and resources across the network. It impairs network security and must therefore be used with a firewall.

It keeps track of the home addresses and phone numbers of all users.

17 Which of the following is a list of popular scripting languages?

Page 31: Linux QANS Nov10

X Window script, vi script, Gnome script

XML script, Sequel, Gnomepad

UNIX shell script, pico script, EmacsScript

VBScript, Linux shell script, JavaScript

Page 32: Linux QANS Nov10

Module 6: Practice questions 1 Which Linux distribution was built solely for nonprofit uses?

Debian GNU/Linux

Caldera eDesktop and eServer

SuSE Linux

LinuxPPC

2 Which of the following is open source?

all versions of UNIX

Windows 2000

all versions of NetWare

Linux

3 What are two benefits of having more than one processor in a system?

support for remote locations and automatic job queuing

faster speeds and increased work capacity

reduced need for IP addresses and decreased boot time

reduced need for IP addresses and increased manageability

4 Why might the administrator of a small company choose Windows 2000 Server instead of

Windows 2000 Professional? The operating system is to run on a dual-processor system.

The system is to act as a DNS server.

The company needs an intranet based on a small web server.

The server will be accessed by up to ten simultaneous users.

5 How is redundancy built into a server system?

by including additional hardware components that can take over if other components fail

by including a tape back-up system to preserve data

by adding redundancy software to the system

by keeping duplicates of all data

6 Which of the following is a better choice than Telnet for Remote Login Servers on a Linux

system? SSL

SSH

Kerberos

Remote Access

Page 33: Linux QANS Nov10

7 In a Windows NT environment, what is the meaning of the term domain?

a dedicated server containing the database of all IP and MAC addresses on the network

a group of computers located in a specific physical or geographic region

the OU that contains all user accounts

groups of computers, users, and resources that form an administrative boundary

8 Which program, running on a Linux server, allows Windows-based clients to see the Linux

file system without installing client software? NFS

Apache

Samba

KDE

9 What are two important features provided by security on a NOS? authentication and encryption

reliable performance and account management

virus protection and prevention from spamming

processor balance and sustained work load

10 Which type of authentication security does Windows 2000 Professional support?

Secure Socket Layer

Kerberos

Samba

Apache

11 How many Primary Domain Controllers (PDCs) are allowed in a Windows NT environment? 1

2

4

9

12 Which of the following criteria must software meet in order to display the Open Source

Initiative trademark? It must be easily altered and adapted to all major operating systems and source code must be limited. It must be compatible with third party add-ons and use standard source code.

It must be provided in multiple languages and cost must be minimal.

It must be freely distributed without restriction and the source code must be available.

Page 34: Linux QANS Nov10

13 Which client/server file system is used by most varieties of Linux file servers?

FAT32

NFS

NT

SMB

14 What are two popular Desktop Environments that run on Linux?

GNOME and KDE

Apache and Samba

Xfree86 and GNOME

Apache and KDE

15 What are three important considerations when selecting a Linux distribution? (Choose

three.)

whether the computer will be used as a client or a server

whether or not the computer will be connected to a network

whether or not a GUI interface is required

whether or not a command line user interface is required

the experience level of the user

16 Windows 2000 Professional supports plug-and-play technology. What is one of the major advantages of this technology?

An administrator can add devices from any manufacturer to the system and they will work. Devices no longer need software drivers to interact with the system.

Components will interact with the system if plugged in prior to system boot.

An administrator or user can easily add components to the system without manual configuration.

17 Which one of the following office tools is available for both Linux and Windows?

ClarisWorks

ApplixWare

Lyx

StarOffice

Page 35: Linux QANS Nov10

18 Which statement accurately describes the Slackware Linux distribution? It is designed for Linux novices.

It has a range of user interfaces and uses RPM.

It is designed for advanced users and uses text-based configuration tools.

It is intended solely for non-profit organizations and uses the Debian package manager.

19 A user account on a server enables the server to do which of the following?

automatically download appropriate applications and print queues to that user

authenticate that user and allocate those resources the user is allowed to access

assign a specific IP and MAC address to the user's workstation

assign the user to a specific domain and user group

Page 36: Linux QANS Nov10

Module 7: study questions 1 What must be done when setting up a RAID array in Linux?

All the disks must be partitioned as primary partitions.

All the partitions need an extended partition.

The disks must be mounted using LVM.

The disks must be formatted using NFS.

2 What are two valid file systems for a Linux partition? (Choose two.)

ext1

ext2

ext3

HFS

boot

FAT

3 Which Windows file performs the same function as the Linux LILO files?

HAL

NTLDR

NTDETECT

NTOSKRNL

4

The figure shows a section of the display from Device Manager. What does it show about the laser printer?

The network cable is unplugged.

Windows recognized the device but could not locate a suitable driver.

Windows does not know the proper name of the device.

Windows could not locate the device in the expected location.

Page 37: Linux QANS Nov10

5 When setting up a hard disk, what are the three possible types of partitions? primary, secondary, and logical

primary, logical, and extended

C, D, and E

boot, program, and data

6 How is the root partition identified in Linux?

?

Root

/root

/

7 How many partitions can an MS-DOS-type partition table describe?

one

two

four

eight

8 Most NOSs will only run on certain hardware configurations. For which four

items are minimum requirements specified? (Choose four.) CPU speed

CPU type

RAM

CD-ROM drive

hard disk space

NIC

9 A technician is trying to configure a PC to dual boot with Windows XP and

Linux. XP has already been installed and configured in one partition. Linux has been installed in another partition. The technician wishes to replace the LILO loader with grub but is having problems. What is the most likely cause of the problem?

The technician did not remove the LILO files first.

Grub will not work with XP.

Linux should have been loaded first.

The technician did not run /sbin/grub-install.

Page 38: Linux QANS Nov10

10 The ping command is used to test network connectivity. What is the best IP address to ping for this test?

the DNS address

the loopback address

the local NIC address

the default gateway address

11 Which of the following Windows file systems is the most appropriate for a

network file server? FAT16

FAT32

NTFS

HFS

12 Which four items of information are required for TCP/IP network

configuration? (Choose four.) IP address of host

subnet mask

MAC address

IP address of default gateway

IP address of DNS server

host name

13 Which task should be performed before installing a NOS?

Change the system hardware and peripherals before beginning.

Verify that the NOS supports all application software that will run on the server. Run the evaluator software prior to loading to establish hardware settings. Be familiar with the NOS so configuration questions can be ignored.

14 Linux systems typically dedicate an entire partition to virtual memory. What

is this partition called? the RAM partition

the swap partition

the pagefile partition

the page partition

the memory partition

Page 39: Linux QANS Nov10

15 Which Windows utility can be used to perform a hardware inventory? Administrative Tools

ScanDisk

Windows Explorer

Device Manager

16 ext3 introduced journaling capabilities to Linux file systems. What is an

advantage of a journaling file system? It reduces the time spent recovering a file system after a crash.

It allows administrators to determine the owners of files created on the system.

It keeps file clusters attached to the files to which they are allocated.

It enables Linux systems to interoperate with Windows systems.

17 What is the best source of hardware compatibility information?

the World Wide Web

a hardware manual

a software manual

the CD-ROM readme document

18 What is the first step every computer will perform when it is turned on,

regardless of the operating system?

boot

RAM

POST

SCSI

Page 40: Linux QANS Nov10

Module 8: Study questions 1 Which method should an administrator use to provide for securely sharing

files on a larger network? arrange for each host on the network to share files with the other hosts on the network to distribute the load only allow clients used by trusted users to share files with others on the network require users to map to a network drive on a network file server on the LAN set up an area on a web server that can then be accessed from anywhere through web browsers

2 An administrator has written a script in VBScript and saved the file. What

must the administrator do to ensure that WSH is aware that this is a VBScript file?

The first line of the script file must be VBS.

The WSH configuration file needs to be updated with the name of the new script file. The file must have the extension .vbs.

WSH must be informed that it is a VBScript file when it is loaded.

3 Which command can be used in Windows 2000 to capture the output from a printer

port and redirect it to a network printer? net use

capture

lpt1 > net

netprint

4 An administrator needs an account that can be used to manage all the computers in a

domain. What is the name of the group that Windows 2000 provides to allow the administrator to perform this function?

Root

Admin

Domain Admins

Enterprise Admins

Administrator

5 What are three desirable characteristics of a print server? (Choose three.)

good graphics

fast processor

adequate RAM

adequate disk space

adequate tape backup

Page 41: Linux QANS Nov10

6 In Windows 2000, what is the best way to restore a deleted user account?

Select undelete from the popup menu.

Create a new account with the same user name.

Select undo from the Edit menu.

Delete cannot be undone.

7 Which component of Windows 2000 accommodates many types of scripting

languages? VBScript

JScript

WSH

ShellScript

8 When installing Windows 2000 Professional on a new machine, what must you do

to boot from the CD? Nothing, it will automatically boot from the CD.

Select the correct install device option from the menu.

Enter the CMOS setup and set the boot sequence to boot from the CD-ROM drive first. Insert the Windows 2000 CD in the CD-ROM drive and press Enter.

9 In Windows 2000, which of the following is a required field when creating a new user

account?

the full name

the password

the user name

he description

10 What is the main reason that NTFS is the preferred file system for a Windows 2000

partition?

It is the only file system that is available to a Windows 2000 administrator.

It cannot be accessed by Linux systems.

It supports a bigger file system than any of the alternatives.

It offers better security than any of the alternatives.

Most Windows 2000 administrators are trained to use NTFS.

Page 42: Linux QANS Nov10

11 What is the purpose of the user's full name in the New User account box?

It is informational only.

It authenticates the username.

It allows the user to logon.

It matches the user to permissions.

12 What is the default method of authentication used by Telnet in a Windows 2000

environment?

plain text

NTLM

kerberos

ND5

.net passport

13 Which two of the following statements about passwords are correct? (Choose two.)

No two users should have the same password.

Passwords should be at least five characters long.

Passwords should contain at least one non-alphabetic character.

Passwords should be easy to remember such as a favorite sports team.

14 In Windows 2000, what is the name of the HTTP web service located in the

Administrative Tools menu? Default FTP Site

Default Web Site

Default Web Service

Default Internet Information Service

15 An administrator has just finished setting up a Windows 2000 PC. What should the

administrator do first to ensure that the NIC has been correctly configured? run the ifconfig -a command

run the ipconfig /all command

ping the local host

ping the default gateway

Page 43: Linux QANS Nov10

16 Which two statements about computer names in Windows 2000 are correct? (Choose two.)

A computer name is optional.

The maximum length for a computer name is 15 characters.

The maximum length for a computer name is 255 characters.

There is a default computer name based on the organization name.

Computer names on a network do not need to be unique if they have unique IP addresses.

17 In the Windows 2000 NOS, which tools must be loaded to run FTP services?

FTP Services

Network Services

Internet Information Services

Site Services

18 A network administrator is setting up a web presence for a small company. The

company plans to use the address www.thecompany.com but has not created a DNS entry for the server yet. The administrator has set up a new web server on a networked machine with the IP address 111.111.111.111. What should the administrator initially do to determine if the web server is functioning?

Run a web browser on the server machine and enter the address http://127.0.0.1.

Run a web browser on a host connected to the same network and enter the address http://111.111.111.111. Ask someone outside the organization to try to access the website using the address http://111.111.111.111. Ask someone outside the organization to try to access the website using the address http://www.thecompany.com. Run a web browser on a host connected to the same network and enter the address http://www.thecompany.com.

19 Which Windows tool allows an administrator to easily view or navigate a file system?

Internet Explorer

Windows Explorer

WinNT Explorer

File Explorer

20 Which three of the following groups can be created in Windows 2000? (Choose

three.) local groups

global groups

domain local groups

domain global groups

audit groups

Page 44: Linux QANS Nov10

21 What must a Windows 2000 client do in order to assign a logical drive letter to a

shared folder on a network file server? map to the network drive

link to the file server

share the network folder

create a path to the file server

22 Which two of the following tasks are performed before the Setup wizard stage of a

Windows 2000 installation? (Choose two.)

reconfigure hard disk partitions if necessary

enter the product registration key

format the disk

configure networking

Page 45: Linux QANS Nov10

Module 9: Study questions 1 You would like to install the samba program on your Linux machine. You have located

the file samba-2.0.7.tar.gz. Which command should you use to completely unpack the files in this package?

gunzip samba-2.0.7.tar.gz

tar -xvf samba-2.0.7.tar.gz

tar -xvzf samba-2.0.7.tar.gz

gunzip -xvf samba-2.0.7.tar.gz

2 When is the root account typically created in Linux?

at first login

during NOS installation

when configuring NOS user accounts

after user accounts are created

3 Which term describes the Linux superuser account?

sys

root

power user

wheel

daemon

4 What is the name of the X Window package that is supplied with most distributions of

Linux?

X Window

Xfree86

Xfree386

Xlib86

Xlib386

Page 46: Linux QANS Nov10

5 Which of the following are valid boot loader options for most Linux installations? (Choose

two.) BOOT.INI

AUTOEXEC.BAT

LILO

GRUB

Loadlite

RPM Loader

6 A user wishes to install Linux on a PC with an Intel compatible Pentium class processor

and 64 MB of RAM. What is the recommended minimum amount of free space on the hard drive to complete the installation?

200 MB

500 MB

900 MB

1 GB

2 GB

7 Which of the following commands would assign a default gateway of 172.16.5.3 to the

local host?

ifconfig eth0 def-gate 172.16.5.3

ifconfig eth0 gw 172.16.5.3

ifconfig eth0 default gw 172.16.5.3

route add def-gate 172.16.5.3

route add gw 172.16.5.3

route add default gw 172.16.5.3

8 You have formatted a drive while doing a Linux installation for a production server. The

formatting revealed that there were several bad blocks. You see that the bad blocks make up about four percent of the total disk. Which of the following would be the best course of action?

reformat the drive with a high level format

reformat the drive with a low level format

replace the drive

mark the blocks as "bad" and continue the installation

Page 47: Linux QANS Nov10

9 Which three statements are correct when describing the ifconfig command? (Choose three.)

Settings must be saved following this command or they will be lost when the computer is rebooted. Printers can be shared using this command.

The NIC card can be set up and configured using this command.

The IP address of the local host can be assigned using this command.

The hardware address of the local host can be assigned using this command.

10 You are installing RedHat 7.2 and have decided to use the installation class called

"Workstation". Which of the following packages will not be installed? (Select two.) X Windows

Telnet daemon

HTTP daemon

Vi editor

Sendmail daemon

Browser

11 Which of the following would be standard file system types that Linux would use during

an installation? (Select two.) NTFS

FAT16

FAT32

ext2

ext3

VFAT

12 Which of the following can be set within the LILO configuration file?

an option to ask for a DNS server

an option to clear the /tmp directory at boot

an option to boot to runlevel 5

an option to use DHCP

13 You would like to perform a high-level format on a hard disk. Which of the following Linux commands will accomplish this?

format

fdformat

hformat

mkfs

mkhfs

Page 48: Linux QANS Nov10

14 Which of the following directories stores the package database for the Red Hat Package

Manager?

/etc/var/rpm

/var/lib/rpm

/etc/lib/rpm

/var/rpm/db

15 A technician is setting up a Linux workstation to automatically get all of the correct IP

settings as soon as it boots. Which protocol should be configured on the workstation to accomplish this?

DNS

ARP

DHCP

NetBEUI

default gateway

16 Which of the following is the most widely supported package type available in Linux?

RPMs

DPMs

tarballs

gzip

17 You have decided to install your new Linux distribution by using the bootable CD that

came with it. What must be configured before you can boot from the CD? CMOS

NVRAM

BIOS

Hard drive

18 You have tried to install a particular RedHat package but it keeps telling you that it has

a "failed dependency". What would cause this error? The package depends on certain user input.

The package depends on operating system input.

The package depends on another package being installed.

The package depends on hardware that is not present in the computer.

Page 49: Linux QANS Nov10

19 A file system is written to a partition when a hard drive is formatted. Which three of the following file systems can be used in a typical Linux installation? (Choose three.)

NTFS

ext2

ext3

FAT

FAT32

Reiser

Page 50: Linux QANS Nov10

Module 10: Study questions 1 Which of the following commands will allow only the owner of a file named

programs to execute the file?

chmod 664 programs

chmod 544 programs

chmod 422 programs

chmod 462 programs

2 In Linux, which command allows users to learn more about any command?

cal

man

help

doskey

3 In Linux, which command is used to switch from the X Window GUI to the CLI?

Ctrl+Alt+(F1-F6)

Shift+Ctrl+(F1-F6)

Shift+Alt+(F1-F6)

Ctrl+Delete+(F1-F6)

4 Which of the following is a translator that allows Linux and UNIX systems using

PostScript to print to non-PostScript printers? Printcap

Chatscript

Linuxscript

Ghostscript

Printscript

5 A user wants to disable the Telnet and FTP services in Linux. In the configuration

file, which character would the user place at the beginning of the Telnet or FTP line?

x

?

#

!

Page 51: Linux QANS Nov10

6 Which file must be edited by the Linux administrator to manually disable a user's password?

/etc/passwd

/user/shadow

/etc/shadow

/root/shadow

7 In which file does the activation of the Linux FTP service take place?

/etc/conf/init.d

/etc/conf.d

/etc/rc.d/init.d/xinetd

/etc/activate/inetd

8 Which command character allows users to enter the vi edit mode?

#

i

e

>

9 Which of the following Linux daemons listens for incoming requests and forwards

each request to the appropriate daemon? HTTPD

LPD

crond

syslogd

inetd

10 What is X Window?

It is server software to setup web services in Linux.

It is software that allows users to set the number of open Telnet windows in Linux. It is a GUI interface for Linux.

It is mail client software for Linux.

11 What are Pico and vi?

versions of Linux

Linux CLI commands

text editors

user desktop environments

Page 52: Linux QANS Nov10

12 Which file is used by a Linux computer to determine which printers are online and

available for printing? /etc/printcap

/etc/lpd

/etc/print/lpr

/etc/lprd

13 Which of the following configuration files determines the default runlevel at system

startup?

/etc/rc/init

/etc/inittab

/etc/init/rc.d

/etc/rc.d/inittab

14 Which of the following files can be edited to allow a user other than root to use the

umount command? /etc/lilo.conf

/etc/fstab

/etc/var/mnt

/var/mnt

15 On a computer running Linux, which attribute prevents anyone other than the

owner of a file, the directory owner, or root from renaming or removing files in a directory?"

owner bit

no override

lock

sticky bit

16 In the path /etc/rc.d/rc#.d, what is specified by the #?

the number of columns in the file

the priority associated with the file in the directory

the runlevel associated with the file

the number of users who can concurrently access the file

Page 53: Linux QANS Nov10

17 In Linux, which command is used to rename a directory?

mv

cd

dir

mkdir

18 In Linux, which command is used to create a new directory?

md

mdir

dir

mkdir

19 Which of the following indicates only read and write permissions when used with

the chmod command?

4

5

6

7

20 Which service can be deployed as a more secure alternative to Telnet?

FTP

NFS

SSH

TFTP

21 Which Linux process will automatically run scheduled tasks at a specified time? run

crond

sched

auto

22 Which scripting language is basic to the Linux OS?

VBScript

shell script

JavaScript

Perl Script

Page 54: Linux QANS Nov10

23 On a Linux system, which configuration files contain user account information?

(Choose two.) \etc\shadow

/etc/passwd

/etc/user/passwd

\etc\passwd

/etc/shadow

/etc/user/passwd

Page 55: Linux QANS Nov10

Module 11: Study questions 1 Which Linux command is used to create partitions on a hard disk?

mkdev

fdisk

mkfs

fsck

2 What are two guidelines that an administrator should follow to maintain a healthy hard

drive? (Choose two.) limit the amount of RAM available to individual users

defragment the hard drive regularly

allow users to use all available storage with no limits

continually manage available disk space

do not limit the size of user home directories

3 Which statement is true when the SUID bit is set as the root account for a program?

Root cannot execute the program.

Only root can execute the program.

Any user can execute the program using root account permission.

Users can execute the program only if they belong to the same group as the owner of the program. Only the owner of the program can execute the program.

4 Which setting determines if a program will run with the permissions of its assigned

group or the permissions of the user's groups?

SUID

GUID

SSID

SGID

5 What are three key concepts when analyzing and optimizing network performance?

bottlenecks, baselines, and best practices

baselines, base logs, and best practices

best practices, base logs, and bottlenecks

baseline, bottlenecks, and backups

Page 56: Linux QANS Nov10

6 Which of the following can be used to monitor system resources in Windows XP and

Windows 2000? Event Viewer

Scandisk

Performance Tool

Task Scheduler

Checkdisk

7 What is the function of the /etc/crontab file in Linux?

to schedule system jobs

to schedule user jobs

to validate created processes

to remove cron jobs

8 Linux administrators have several CLI commands available to display information on

system resources. What is the output associated with using the du command? a display of disk usage for a file system

a display of disk usage for a directory

a display of disk usage for file information

a display of the user's remaining disk space

9 Which Linux command can be used to terminate processes that are consuming too

many system resources?

at

stop

kill

term

kip

10 Which output does the df command produce when executed from the Linux CLI?

detailed information about the file system

detailed information about the top-level directory

detailed information about CPU and RAM usage

detailed information about the data stored on the disk

Page 57: Linux QANS Nov10

11 Which file can be studied by programmers to determine the potential cause of a program crash?

Core Dump

Script Debugger

Process Tracker

Trace File

Error Pack

12 Which of the following statements is true about the use of Performance Tool?

Performance Tool is only available for use on Linux computers.

Performance Tool should be used sparingly since it uses valuable system resources.

Performance Tool can only be used to monitor network computers.

Performance Tool can only be used in conjunction with a pre-established baseline.

13 A system unexpectedly shuts down due to power failure. As a result, the file system is

damaged. Which Linux command could be used to repair the file system?

mkfs

fsck

diskcheck

filrep

ps

14 Which of the following can be used to execute a series of Linux commands at a

specified time? which

run

time

at

when

15 When should a baseline reading of network performance be made?

at the busiest time of day

when the network is running normally

at the least busy time of day

when the network is not in use

Page 58: Linux QANS Nov10

16 Which of the following tools can be used to analyze Linux system log files? Logcheck

Regscan

Filecheck

Scanfile

17 Which Linux command can be used to terminate a group of processes that have the

same name instead of terminating them with their PID numbers? term

stop

killall

halt

18 Which Linux command is used to create filesystems on a partition?

mkdev

fdisk

mkfs

fsck

19 Which disk management tool is available to limit the amount of data a user can store

on a network? disk quota

disk ceiling

disk limit

disk wall

disk container

Page 59: Linux QANS Nov10

Module 12: Study questions 1 Which version of the Linux kernel includes ISA PnP support that does not require the isapnp

program?

2.1.x

2.2.x

2.3.x

2.4.x

2 Which insmod option will automatically unload the module when it is no longer being used?

-s

-p

-f

-k

3 Which of the following is an OS-independent component that is responsible for basic

hardware and resource configuration before the OS loads?

USB ports

SCSI

BIOS

CPU

4 What would be the most important feature to consider when selecting a video card for a

workstation based on performance? warranty

amount of on-board RAM

manufacturer

price

5 Which two steps should a technician perform first when troubleshooting a new EIDE hard

drive installation that a computer does not recognize? (Choose two.) check CMOS to ensure that the hard drive settings are correct

ensure that the drive has the correct master or slave jumper settings

ensure that the kernel contains the correct drivers for the drive

make sure the device number and termination are correct

Page 60: Linux QANS Nov10

6 Which option of the insmod program will send output to a log file instead of the console? -s

-p

-f

-k

7 A new EIDE hard drive has been added to a Linux workstation. The hard drive is functioning

but performance is poor. What should the administrator do first to check the installation? ensure that the ribbon cable connector being used is the one closest to the motherboard

ensure that the jumpers on the hard disk are set to configure it as the master drive on EIDE channel 1

repartition the disk to create smaller partitions

use the hdparm utility to test the disk and set options

8 What is the most common cause of core system hardware failure?

static discharge

overheating

incorrect drivers

excessive use and age

physical damage

9 Some PCMCIA driver packages allow drivers to be mounted while a device is installed and

unmounted when the device is removed from a laptop. Which feature makes this possible?

ACPI

Card Services

lsmod

mount

sleep

umount

10 Which insmod option will instruct the program to load the module even if the module was

compiled for a different kernel? -s

-p

-f

-k

Page 61: Linux QANS Nov10

11 What is the main concept to be aware of when installing hardware on a Linux system? price

type of device

compatibility

number of slots available

12 Which Linux file needs to be edited to specify an IRQ for an Ethernet card?

/lilo.conf

/irq.conf

/etc/lilo.conf

etc/loli.conf

/etc/irq.conf

13 A technician is adding an internal PnP modem to a system, but a check of system resources

shows that all available IRQs are reserved or being used by other devices. What could the technician do to get the device to work?

manually assign the IRQ of another device that is not expected to be used at the same time as the modem use trial and error to find an IRQ that will work with the modem

configure the modem to work without an IRQ

change CMOS settings to allow the BIOS to free up an unused IRQ

configure the modem to use a DMA address instead of an IRQ

14 Which two of the following statements about SCSI devices and configuration are true?

(Choose two.) The SCSI controller needs to be terminated if it is at the end of a chain.

A forked chain occurs when two SCSI cables are connected to a single controller.

Throughput can be reduced if all SCSI devices are not the same variant.

All SCSI devices in a chain must have the same device number.

15 Which program is used to insert a single module into the Linux kernel?

imsmod

smod

ismod

insmod

Page 62: Linux QANS Nov10

16 How is PnP handled in a Linux system? (Choose two.) isapnp program

iopnp program

ISA configuration option in control panel

ISA configuration option in the Linux kernel

17 Which of the following factors should be considered when installing a SCSI drive to ensure

system compatibility? (Choose three.) variant

RPM

ID

termination

drive size

average seek time

18 A module needs to be loaded. However, confirmation that the Linux kernel can load the

module is important. Which of the following options of the insmod program will accomplish this task?

-s

-p

-f

-k

19 Which of the following Linux files can be viewed to see resource allocations? (Choose three.)

/proc/interrupt

/proc/dma

/proc/imports

/proc/ioports

/proc/alloc

20 On a Linux system, which of the following files will show the interrupt request number

allocation? /dev/interrupt

/proc/interrupt

/interrupt

/var/interrupt

Page 63: Linux QANS Nov10

Module 13: Study questions 1 An administrator is responsible for a mixed Linux/Windows network. The administrator has

configured a new computer with the Windows XP operating system. The administrator then attempts to ping it from a Linux computer but fails. What should the administrator do next?

try to ping the Windows computer from another Windows computer

run ifconfig on the Linux machine and specify the IP address of the Windows computer

run ipconfig on the Windows machine to ensure it is set up correctly

run ping 127.0.0.1 on the Windows system

2 Which command is used to determine the active TCP connections on a computer?

ping

ICMP

ifconfig

traceroute

netstat

3 In a Linux system, the set of recent kernel messages is known as the kernel ring buffer.

Which command displays these messages? dmesg

imesg

kmsg

rmesg

4 What is the simplest and most recommended method of creating a custom emergency boot

disk for Linux?

Run the btdisk command.

Modify one of the existing boot disks.

Copy individual boot files to a floppy.

Download a custom configuration from a Web site.

5 Which type of files can be helpful in identifying several types of problems in a Linux server?

security files

user data files

log files

text files

Page 64: Linux QANS Nov10

6 What is the easiest way to stop a non-responsive process in a Linux system? issue the stop command

issue the kill command

log out and log back in again

press Ctrl-Alt-Del and click Stop when the Task Manager appears

7 Which two files are commonly used to access the tape backup devices? (Choose two.)

/dev/ht0

/dev/hd0

/dev/nst0

/dev/tp0

8 Why is it necessary to use the appropriate Sys V script to stop some processes?

It is the only way to stop some services.

It is the best way to stop zombie processes.

It will prevent lock files from causing error messages.

It will save the data that has been processed.

9 While booting a Linux server, the booting process has stopped. Upon troubleshooting, an 'L'

error code is discovered. What does this indicate? No part of LILO loaded.

The second stage of LILO did not load.

The first and second stages both loaded, but the second stage will not run.

The disk descriptor table (/boot/map) is corrupt.

10 Which statement best describes the LOADLIN program?

It is a text editor.

It is an MS-DOS utility used to load a Linux kernel.

It is a command line interpreter.

It is a Linux kernel program that loads and executes applications.

11 Which parameter can be used with tar to list the contents of an archive?

-a

-i

-l

-t

Page 65: Linux QANS Nov10

12 In Linux, what is the first program that takes control of the boot process from the BIOS? kernel

LILO

config.sys

linux.sys

13 What is the loopback address that a technician would ping to verify that TCP/IP is correctly

installed? 192.0.0.1

127.0.0.1

168.0.0.1

223.0.0.1

14 What is the best way for an administrator to determine if a server is overloaded?

ask users if the service has declined

keep a record of the frequency of server crashes

monitor the network load and note when it becomes very high

check the server log files

15 Which Linux log file is most likely to contain the word oops?

/var/log/messages

/var/log/error

/var/log/syslog

/var/log/secure

Page 66: Linux QANS Nov10

Module 14: Study questions 1 Which two options accurately describe network security? (Choose two.)

As security increases, the level of accessibility increases.

As security increases, the level of accessibility decreases.

Users want more accessibility and administrators want more security.

The level of security required is the same for all organizations.

2 According to SANS, which three of the following services are among the top ten security

vulnerabilities of Linux? (Choose three.) Remote Procedure Calls

Dynamic Host Configuration Protocol

MySQL

Secure Shell

Apache Web Server

RMON

3 Several computers on a network are running slow and many user tasks are timing out. The

administrator checks the network and finds duplicate copies of program code in the active memory of each computer. Which of the following options best describes this self-replicating code?

virus

Trojan horse

worm

bug

4 Which three of the following terms refer to the public network that acts as a buffer area

between a firewall and a boundary router? (Choose three.) Internet

DMZ

extranet

sacrificial LAN

dirty LAN

demarcation zone

Page 67: Linux QANS Nov10

5 Which directory should be used for decompressing LSAT?

/usr/bin

/etc/bin

/usr/local/bin

/usr/sbin

/etc/local/bin

6 Which three of the following items should be included in a security policy to increase the

level of password control? (Choose three.) Passwords should expire after random periods of time.

Passwords should be familiar names or words, so that users will not have to keep written reminders near computers. Passwords should be a combination of letters and numbers.

Written rules should be distributed to advise users of password expiration and lockout policies. All passwords should be changed by the user after a specified period of time.

7 Which of the following options best describes Network Address Translation?

Network Address Translation usually replaces proxy services and packet filters.

Network Address Translation uses private addressing to hide inside hosts from outsiders. Network Address Translation is used to alter the destination address of packets leaving a secure network. Network Address Translation allows packets to be filtered as they enter or leave the network.

8 Which three OSI model layers are used for packet filtering? (Choose three.)

Layer 2

Layer 3

Layer 4

Layer 5

Layer 6

Layer 7

9 Which statement accurately describes a Smurf attack?

The IP headers of ping requests are spoofed so that replies will overwhelm the target host. The IP headers of SYN requests are spoofed so that a target will attempt to reply to itself. This DoS attack overflows buffers by sending illegally large ping requests to the target.

This attack exploits the three-way handshake used with TCP.

Page 68: Linux QANS Nov10

10 Which of the following options refers to a software-based, real-time network IDS that is designed for smaller networks?

PIX

Snort

Smurf

proxy server

11 Which statement is true about username and password standards?

Complex usernames are less important than complex passwords.

Standards should only be applied to passwords. Users should select their own usernames.

Usernames should expire every three months.

Passwords should be simple and easy to remember.

12 How can developing an e-mail policy protect a network from viruses?

An e-mail policy will state what can be sent and received so that users will no longer need to be made aware of security issues. An e-mail policy will make it safe for users to open all attachments.

An e-mail policy will define what can be sent and received to make users more aware of security issues on the network. An e-mail policy will require users to notify the other users on the network as soon as a threat is suspected.

13 Which two of the following options provide a basic firewall solution by using rules to

control network traffic? (Choose two.) proxy services

ip masquerade

packet filters

Network Address Translation

access control lists

14 Which two of the following protocols are used by IPSec? (Choose two.)

Encrypted Secure Header

Encapsulating Security Payload

Authentication Header

Authenticated Secure Header

Page 69: Linux QANS Nov10

15 Which of the following options best describes the characteristics of an IDS? hardware, inspects all network activity, denies or permits access using filters, signals an alarm hardware or software, limits access to prevent intrusion, inspects all network traffic

software, designed to identify intrusion using a set of patterns, signals an alert

inspects all network activity, identifies suspicious patterns, signals an alert

16 Which three of the following vulnerabilities have been overcome in newer versions of

operating system software? (Choose three.) ping of death attack

land attack

Teardrop

buffer overflow

17 Which three of the following options are necessary to protect against the threat of viruses?

(Choose three.) Outgoing traffic should be filtered at all gateways.

Incoming traffic should be filtered at all gateways.

Current virus protection software should only be installed on incoming gateways.

One administrator should issue all virus warnings.

Policies should be created to control outgoing e-mail.

Virus protection software should be current on all computers.

18 Which two of the following statements correctly describe audit trails? (Choose two.)

Audit trails secure a network.

Audit trails help maintain security on a network.

Audit trails back up data on a network.

Audit trails are used to recover lost data.

Audit trails are used to allocate network resources.

19 To create a security policy, which of the following actions should occur first?

All servers should be placed in a secure, central location.

All users should be surveyed to identify potential security threats.

All users should receive written guidelines of what is acceptable and allowed on the network. All users should receive instructions outlining how to install and upgrade virus software.

Page 70: Linux QANS Nov10

20 Which DoS attack uses fragments with overlapping reassembly information to take advantage of the way IP handles fragmentation?

SYN attack

Teardrop

ping of death

land

Page 71: Linux QANS Nov10

c

�������������������� ��������������

���������������� �� �������������������������� ��� �������� ���������������������������������� ����� ����������� ����� ���������

��������c

����c�����c���c������c�������c����c����c ����c�c�����c ����c�c���c����c

�������������c����c�����c�c�c�����c�����c�����c� ������c��c�c���!���� ����c��"����c�#c����c���c$���c%�&�'c�c�� �c����c�����c����c�����c���c�������c��c

��c�����c� �����c�� ����c���"c$���c%�&�'c�c���!c��c����c����c����c

(c�����c��c�c���c� ��'c�c�c�c������c����c�����c�������c ��c �����c

����c���c���!�"c� ���c� ���c�c���c()�c�*c������c*��c�����c��������'c�����c� ���c��������c�!�c���c&$��c� ���c���c�����c�����c��c�c��c

��+�"'c

c

���� ��� ���! ���" ��� ������#����$��%&'��c

�,�c��!�c��c��������c���c ����c�����c-c����c$���c��c�c"���c%�&��c��c����c���c$���c%�&�c��c ����c���c���c��c���c�����c��c���c"��"�c��c���c

������c��c����'c.���c����������c���c��c���c������c-c��c��c������c������c

�c���'c/�,��c�c���c ��"�c�*c����"c������c�*c���c������c��c ���c��c��c

���c��c�!�c�c��������c�**����c��c�c�������c��c�����c����c����c�*c������c����c��c�����'c����c�**���c����c��c �c�������c���c�����*����c ��c�*c

��c���c��c�����c���c� �����c��c���c��c���"��c���c�������c��c�� �c

*�c����c����c��c�� �c��c���c��'c%�������c�*c���c������"c ������c

�����c ��"c*��c����,�c���c����0cc

�"���������( ������� ���)�*���������( ��+���,���c

1��c��&c����c��c����c���c���c� �����c��c���c(2))c�������c����c"��c���c

�������c����"c*��c����c��c�� �c���c����c�c���c���c���!�c��c����'c/���0c���c��c���c���,�c�c�c�����c��c����c �*���c�c3��"�0c

4�������c�������c*��c��c��c���5c���'c6���,�c���c�������5c

7��&c8����c��c��c�������"c��c� ����c��������c���"c��c�� �����"c����c

$����c�����c ������"c���c������"��c��c��c������c��*��������c�*c

� �����c������'c'c'c'c7� �����c����c �c����������c�c���c9���c���!�c��c����,c�c�����c

���!�������c��*����'c

7�����c ��"c �����c����c������c(�2))c��������c���c����c�������c����c����c

�*����c �c��&c�c�����"c����c������c���!c��"��c�� ���c��c���"c$���c �������c���c�����,�c������"��'c��������c���"c$���c���c����c��c�c

��&,�c���"���c����"c����c����c����c �c���"����':c

�����c����"c����c���c��c����c�������c �����c��c����c*��c���c��"��c����c��c

�c� ���c��c���,��c�� �c��c7*���c���c����;�����:5c79��&c���c���c��"��c��c��*��c���c������"��c���c���c���c���c��c���c��c�����,c

����c����"'c9c�*c��������c��c����c�����c���!�"c��c�����c��c�*����c���c

Page 72: Linux QANS Nov10

��"���',c����"c�����c����c��&c���c�c;����c� ���c�*����"c���c������c

��"���c�������c�c���c�����c�c������"c���c<=':c

>�c�*c����c����,�c���!�c���c����,��c��**c��c����,��c��**c��c����,��c ���c����c�����c���'c

>�c���c������c!���c��&c��c���!�"c����c�%.c��c��;���c?�����c��@�c

�%.c ��"��c�c�����c ��!Ac��c�� ����c�c��c�Bc ��c<��'c6��c����c�����c���c

&���c���!c��"�����c�c����c������0c>��c���c����"c�c���"c$���c���c�c������c�������c�����c.������c���c�c�>��B�c��c����c$���c �c�c

,����"��c&�,c��c��c�c����c������c����c.������c��c*������0cc

&��c�"���c��c*��c���c������c���c��c��������c����c�����c�� �c���c��c

�c�c ���c��&,�c����c��c$���'c/�c3���c��������c���������c����c����;c���!��c����c����,�c@��cC��"c$���c����c���c"���c�*c�����"c��c�B� ��'c1��c

��c*��c&��c��&c���c���!�"c����c��c��c���c���c���"'c���c���!c��,�c

����� ��c��c�����c�c!����c������"c�������c*��c$���c�������c������"c��c

���!�"c��c���c$���c!����0c����c����c�����"c����c �c���c ��!����c����������c3��"�"c*��c�����c��c���������c��c����c����c�����c�*c��'c

6��c�c���c�����c����c��c��� �c��c���c�%.c����c���c���c��c� �c�%.c����c

*����������c���c���c&��c��&c�����*c���c���!�"c��c�!�c$���c�����c�c

���������c���c�*c���c��"����c����c����c��c����c�c�����c�������c��c�c

�**����c��c�����c�c������c��c��c����c����c���c���c����� ��c��������'c>�c������"c�������c��c �c�**c�c��&,�c��������c������c�c���c��"��c������'c

�����c����c �c���c����c���!c�����c��"��c���0c/����c���,�c��c"��c�������c

��c�����"'c%���c���c���!0c

/���c����c����c*�����c������c*��c��&c<��c���!c��!�0c�c>��c���c"��"c���c�8�c����c��c"��������c�����"c���c����c��c<��c�c*� ��c�*c$����c��c���c

���c������"c�c��������c�� ������c����c�*c ���c&��0c/���c*�������c

��������c�c��&c����c���c��c�c$���c��c���c*���c��c��������c*��c�����c

���������c���������c�*c$���0cc7.���� 5c&��c*����c�������c������c��c����"��"c�c�������c� ������'c

/��c��c �"�c��c������c���c&�c���� ��� ���c*��c���c���c(�c�����c���c

����c���c����c<��/���cDc��c��&c&��c��� ��c2c����c������c� �"c

�����'c$��!c*������c��c��c�� �������c��c����'c

74���������c �����"c�����c ��������c�c�c��� ��c����*��c���c���������c�c����� �����c��c� ���� �����'c>�����"�c��c ���� �c�c�c��"�c��"���c�*c����� �����c

����c����c*��c���c�� ��c�*c����c��������c��� ����c �c���c&��c������c

�������c��c*���c��c����c��c �c;����*���c����c �����!�"c����������c

��!�c.�%��'c����c����c�c� ��c�*c����� ��c*������c���� ����c-c3������+�"c*���c�������c�������c*��c�������"c����c���������c�E&c-c���"�c

����c�!�c��c������c��c� ��c ��"c���c�����c����c��c��c���� ��c���c

�����c���c;���!��'c

/���c��&c �c����� ���"E����������"c��c�������"�c��E��c������c����c��c�����c��c����c�*c���c$���c�������c�**���0c>����c���c����c��!��c��������c

��c���c�c��c$���c������c ��"c����c�c���"�c ��������c��c��c��c�����c��������c

����c �c����c�������c�������c��������c*��c����0cc

Page 73: Linux QANS Nov10

7.���� 5c��&c��c����������"c���c������������c��c��c����� �����c���c���c

&��c������c������'c�c���c������c��c����c �c��!�"c������c

�������"�c����c��c���!c��c�����c�c���c$���c��!��c��c��� �"c��c*������c��c���c���3���c��������'c@�"��c���c��c���c*�����"c�c ��"�"c

���c�*c���c��"�����*�����c����c�� ������c�����c��c$���'c�c�����c

������c��c����c�!�c���c�������c� ���� ��c��c��*�����c��������c�������c

�c�����*��c������c�*c��� �"c���c*������c��c���3����'c�

- �� �� ������� ���� ���"�����!���� �����.����! �������������������

! �����������������!�! �����������������������! �����c

>�c�����������c.����c��c�������"�c�����������c�c����c��c��c����c������c�����+�c���c������c�*c�������"�c��c�����c������"�c�����"c��c

����������'c4**���� ���c���"����"c�������"��c���"c��"����c�����c��c

�����c�����"c��c*�����c�;�����c��������c����� �������c��c������ ���c��c

����c1�$%c�����cF�c����cGc��c� ���'c>��"�"c*�������c������c��������c��c �����"c"����c��c���c �c���c �c*���������"c� ���������"c�� ��������c

� ���c����c��c���c��c���c��"����c�����c��c�������"�c��c���"�c�������c

��c����������c���������'c.�c����c�����*������c���c��c*����c�c�����"c

��������c��c������������c�44c����c������"c��c�����"c��c �c��!��c

���c��������"c���c��c����c"���c��c����� ��c�����c��c�������"��������c������"c�����'c�c*����c�c�c��� ����c��������cHc������� ��c����c

���� �����c��c�������c�������c�c���c��c4���������c�������"�c���'c

>����c*��c��� �"c��c�c�������c�,c����c�������c��c�����"c���c�������

���c�������c�*c�����"c����c�������"�c�;������c��*�����c��c������c���������'c/����c�c�c�c"����c�c���c����c�c���c���c�*c�������"�c�c���c

���������c�c��c��!�c�c����c����c��c���c���� �c���c�����c��������c

��������c����c�����������c����c��c���������� �c����������'c�������"�c

��c ���"�c���c����c �����c����������c�� ���c����������c��c���������� �c���������'c�������"c����������c�*c����c��c���c���"c��c

*��"����"'c6��� ���c ��"c��*����c�c*���c�*c����c������c����c������c��c

���c ��*��c�*c����c��c�������c����c��,��c������c��c��c��c���������'c

������ �� ��������������!����������� ��������� � !��������������/)�0�����12��������c

�����*��c�������"���c���c�����"c���c �����c�*c��� ������'c/���c���c

�� ��c�*c�� � ����c�����c*��c����c�""��"����E����""��"�����c����c

�� �����"�c���������c��c���c����� �������c������c��c� ��c��"���c����c �c3���"c���c�����"��'c�, �c����������c����c*��������c����c

�c*����c���c ��""�"c��c��������"�c��c���c� �����c��c����� �����c����c

������c�����c���c"�� �'c

�c��"��c��c����c �c��!�c���c� �����c ��"��c����c*��c�����c��������'c$�!�c����c��������c�*���c���c� ��c/��c8���c�����c�c����"��c�����c

�"�c�c"�� ��c�����������c����c���c� �����c��c���c��c ��c�c����c

������c���c"��"c��c��"��"���c�c����c��������'c�c���c��c�*c�����c

Page 74: Linux QANS Nov10

����"���c���c����c��c�c�"��c�� �"c�� ��������c����c������c�����c

�c���c���'c1���c�����c�� ��������c���c������"c����c������c�����c

���c"�� �'c.�c����c�c����c�������c����c �c��c*���������c��c����c���c�����������c���c�*c���c@���E/����c/� 'c�c�c�����c�����c� �����c��c

����� ����c���c���c*��c�*������c��������c��c��� ������ �"c��c��������'c

.�c����������c�c"����"c���������c�����"�c%�"�c�*������c��� ���

��� �"c��������c���c��c���c*�������+��c�c����c�����c�����������c ��c����c������c�c"����c������'c.��"�"c�*���������� ������ �"c

����������c����c���c$� ���c�*c�������"�c����������c?$&��Ac*������!c

��c����c��������c� �c�c�����c���� ���c*��c�c�����c�� ��c�*c���c�� ����c

%���,�c�������c����c��c��������c��c�������'c.���c����� ������c��c����c���������c����c����c���c��"c���c*��c����������c

����������c�������"�c�**����'c�c()c������c�*c��c�����c����������c

�������"�c����c ����c�64c������"c*�����c�c�������c�������c���c3��"��c

�������*��c��c���c ��c����c��c��c*��c�c���������c��**����c��������c���c��c��"���'c�c���c�����c�������c���c� ���c��� �����c�������� ���'c

�������"��c�c���c*������c��c����c �c� ���c���c����������c���c

����� �������c���!�"c�c ������c� ������c��!�c�����c$�*�c��c����c

����������c�������"�c����c ����c�c��������'c

����������'�������������� ����c

>c���c�*c����������E;������c����c������c �c��������c��c������c ��!c��c�c

��"��c�����c���'c

4�����c����� �����c���������c������c�c.��I$'cc4���c���c���c���c���������c�����c����������c����c��c�c�������c���c��c

�������c����c ��c������c�*c�����"c���������c.��I$c������c �����c

� ���'c

4�����c.��I$c���!�'cc�� ����� ��c���!�c�����c���c����c��c���!c���c�����c�� ���c��"���� ��c���!�c

�����c���!�"c�*c������c�������c�*c���c�� ���c?�����c�������c���c��*�����c��c

��c�� ���A�c������ ��c���!�c���c���c���c"������c��c�����c���!�"c�*c�����*��c

����'c

4�����c.��I$c������������'cc���c*���c�����c��!��c����c�*c�����!c��������c��c��������c

��������������c���c�����c�����c����c���c�I$c;����c�����"�c��c���c���c

;����c��c������c�**c��c���c�����"�c�"��'c>c�����"�c�"��c�����c �c������c

�c��*����c��c��������c����c.��I$c?.���>.Ac��c�c��������c��c��������c �c�c�����������c ����c?�����G%�c��G%�c���'Ac

��

Page 75: Linux QANS Nov10

����������������������� ��� "�3��������� �� ���� ����c

�c ��c��������������c���c����c�c�c ������c�*c�����������c����c��c���������c

�c����� ����c����������c�������c��c������c�����������'c�

��������.456�'��c

1� �������c@���c/����c.�����c����c������cC����c����'c��c��c����c!��c��c

������c@>.c�

����6�'����������������#��c

@&.c����c �c����c��c����!c ������c��c��c��c����� ��c��c�����c��c@&.'c

�������������#��c

����!c��c�c������c�*c@>.c����c*��c�� �"c���c�����c�*c���"��c������c

��c"�����c�������c��"������'c

���������"��!��c

C��"c��c�c*����*���c����c��c�����c���c�*������c� ���c���c������c�*c�c

���������c��c���c������c�*c���c���������c��������c���c�������c

�������� ���� ��������������������������c>��c���c����������c�� �c��������c���������'c

����������� ��������c

�������c��c����c��c��������c���c��"���� ��c��"��"�c���"��c���c�����c����c��c�c���'c��c����,�c��;����c�������c���������c��c�����c�c�c�����c��c

������c������������'c���c4�������c���c��c����c�������c��c����������'c

%�""�����������������6�'�����6�'��c@>.5c@���cEc/����c�����c6�"�c������c#�������c.����'c@&.5c@���c���c

�����c$��c������c1�c#������c.����'c

�������������� ����������������������� "�&+6�'��c

C�����"c'"���c> ������c�3�����c.&�c?C>.&�Ac���������c��c����c�c����c����c�*c4�@&.'c

���������������������������� "�� ���������c

�����c.����c��c�������c���c�*c�������'c�

����������������� ����c

�����c����c��c�c����c��"�������c����'c��c��c����c*��c��������c

�����"�c�*c����cJc�*������c �����c���c��c����c��c���c��<c?�����c��������"c���A'c���c�����c����c��c���c�c@>.'c

Page 76: Linux QANS Nov10

�������������������c

��������c��c�c��"��c���c �c�������c�� ���c��c���c���������c��c��c��c

��;����c���c���������c��c���*��c�c����������c���!'c�

%�""���������������������������������6�'��c

������c@>.5c1�c��*�����"�c�c��c�c.&�c����������c���c��;�����c��c*��c��c

����c�����c�*������c������c��c ����"�c�� ��c�c�c*���c*���'cG����c@>.5c@�*������c�������������cHc��cBc����������c���c��;�����c��c*��c��c����c

�����c�*������c��c������c��c�c����"�c�c���c"���c��c�� ������c����������'c

��������������""����������������������7���� �������� ��!���������c�c������c�����"�c�� ���c���c�����"�c��������c��c������'c��c���c�c �������c

����'c�c��������c�����"�c�� ���c���c�����"�c��������c��c���"��'c��c��c�c

� �������c����'c������c�� ����c���5c@>.cEc@&.'c��������c�� ����c

���5cC�����c����cEc6���c���!'c�

����� ������� �� ���� ��� ������6�'��������c

.�������������c�����c@&.c����c ������c��c�����c����������c��c�������c

����'c

��������������������*�-��c

$����c��c�cG�c����c*����*���c����c��c�c��������c�����"�c�� ���c���������c �c

�c���"c��"���c�����c��c�����c)c��c('c���c������c*�����c�*c�c$����c��c

����c�����"�'c��c��c����c�c������c�� ����c����c��c$4G�c��c����c���c����c*��c�������'c

��������������""������������������ �� ���� ���������� � ��� ������c

�c.�������������c���c���������c*��c ��c�����"c����������'c%��c�c.�������������5c*����c���������c���c ��c�����"c�����������c��c����c��c��c

��*���c��c�c�� ���c����c�������c����c����������c�����cJc����cEc������c

��"��c����c�c�c��"��c����'c

���������������������!�� "����� �� ���� ���c��c���c���������c�c���c��+�c�*c����'c.���c.�������������c����c��c�������c

*�����"�����c���������'c

���������������������5������� �����c���c����c ��c��c%������������c ������c���c���c ��c��c����c*��c����*��c�*c

����c �����c.����c���������c��c����c��c����cEc������c�� ����c�c ���c

���c��������'c

��

Page 77: Linux QANS Nov10

����������������������������� �����c

���c�������c ��c��c������������c ������c���c�������c�*������c��c������c"� �c �c���c.����c���������c��c�������c�c����c�������c�*c�c����cEc

������c�� ����'c

%�"����-�'����c6�"��������c�c����c����������c.����c&����c������c*����c�**���c

���������'c

��������1���8�/���8�9���8�:���!������� ���� ���� ���c���c���������c���c�*c�.&�cEc1.&�cEc6.&�cEc6�.&�c�������"�c��c������c

(��cEcF�cEcH��cEcB��c"�������c����������c��c��c��c���c��c�*cBcEc�cEc(�cEc

HFc ���'c

�9������3230��� ���� ���������������3������� ���� ���c

%������c�)�2c���������c���c�c ��c>$<c?>��������c$�"��c@� ���A'c��������c

�)��c���������c���c(�c ��c>$<'c

;������������" ��3�8�1<�8�9/�����'��� �� ���� ���c�� ��c���������c�c�)�2cEcK�)cEc��))�c(�� ��c���������c�c�)��cEc��)))cEc

K�)))�cHF� ��c���������c�c�)H��cEc�)B��'c

����������'��� �� ���� ���c.�������������c��c�c���"������������c�� ����c�����c*������c���c����������c

*��c�����c�������c��c��������c���c����������'c.���c.����c���������c

��c��"���c����c�� ����'c

������� ������ ����� ������� �����������������"������� ���

�����!����� ����������c

���c���c���c�����c����c��c������c�c����c*���c�������c����"c��c���c

��'c>�����c�c��c�c����c��c� ����c������c����"�c������c�*c�����c�"��c

��������c �c�������c��c����c��c�c����c����'c>�����c c��c�c�����+�c��������c��c��c��c��c�����*�c���c��;�������c�*c���c;������'c

��������c�����c��c����c��c���"�c���c��������c�*c�c*���c�*c���c������c

���������c�c��c*���c����c������c��������c����c �c�������c

������� "�����" �� ��!�� ������������ ������� �������������������

���������������c

���c�����c����c��c�������c�c$���c ��c���c�������c���c�� ����c��c���c

�'c>�����c�c��c�c���c��������'c%���c�*c�����c���c����c��c����c���c�c$���c ���c��c�������c��'c

���c�c����c��c����c��c�������c���c$���c�����c'c

Page 78: Linux QANS Nov10

������ �� �������� ��� �������!��� �������������������������������

���������� ���������� ���c

���c!���c����c �c�����*c�����c��c�����c�c�������c��c����c������'c���c����c!���c�Lc��G�c�c���c�����c����c��c� ������c����c�c�������c����c����c��c;���c �c

��c�����c���'c>����c������"c����M�c���!�c*��c��c���"���'c>�����c

c��c�c���c���c ����c�c���c��������c��c� �c�c�����c�������c����c��c

���!c�c�c��"c�������'c�

������� ������� �� ������� �����!�������������c

���c����c����c��c���"�c��c�� ���c��c���'c>�����c��c��c��c�c����c��c

� ����c�����'c>����c c��c�c ����c�����c ��c����c��c���c���c������c��c�� ��'c���c��c�� ��c����c��������c���c������c��c�� ���c��c

���c��c����c���c����c��������c �*���c�����"c����c��'c

������� �� ������������ ������� �������������� �������c���c��c���c����c��c�c��*c��c������c�c���������'c>����c�c��c���������c

������c���c�c����c�������c��c�����*��c*��"�c����c��c������c�c

����������c��c����c���c������c*����'c>�����c�c��c�c����c��c�c���������c

����'c

������ ����� �������� ���������������/2������� "��������"����� ��*%�.��c

<��c���c����c����c�F)c*�����c��c���c���c����cF)c����c�*c�c*���'c���c

������c*��c�c��c�c ���c����c��c�c� ����c����'c���c�����c*��c c

�����c��c�c ����c����'c����"c����c�����c�c����c�c ����c*���c��c����c� �c"� �c���c���c������'c6��� ���c���c����c����c�����c���c���c��c

��""��c��c��c����c��c��������c����c���c������c�*c��c*���c���c�c���c

����'c���c�����c*��c��c���c����c�����c��c����c��c���!c��c���c

�"��"c�*c�c*����c��c���c��'c����c������c����c �c�������c�����c ������c���c����c����c��c����c��c���c

���c����c�����c�*c��c*���c �c��*����c��c��!�c()c���c

���������� ��� ��� ���������� �#��������5=�+�+9��������������c

���c����c�����c����c�������c���c�&�Hc���c��� ���'c���c�&�Hc���c��� ���c���c�����"�c���c�����c�����c��c�c���c��'c>�����c�c��c�c

����c��c���������c��c��c�����c��������c�����'c>����c�c�����c��c

���c<����c���c

����'c�

�� � ����������������� ������c

���c���c����c���c���c����c���������'c���c���c��c����4.c�����c���c

�������c���c���c���� ���c��c�������'c���c���c����c���c���c����c���������'c���c���c��c����4.c�����c���c�������c���c���c���� ���c��c

�������'c

���c��c��c��*�"���c����c����c���� �c����"c������cLc����������'cc

Page 79: Linux QANS Nov10

6� �c���c����c��� ��c�c�c*�����c��� �'c>�c���c�����c�*c�����������c���c�c

���c*��c���c�GEG#G�c�c���c������c�����c7��:'c��c����c��!c*��c���c��� ��c

*�����c�����c�c��c����c����c���c����c��� ��'c���c���c��c��*�"���E��������c���c��� �c���"c���!c�����c��c*���!c

����������""���������������*������6�.��c

���c����c��c����c��c��������c���c���!c�����c��c���c���c���c����������c�:��:c����c��c����c��c��������c���c���!c���c���c�'�'c��c��c

���c��c���'c

����������""���������������������!�������������������� ���c����c��"���5����c��"���c��c����c����c��c�������+��c��c����c��������'c�*c���c

��������E*���E���c��c�������c��c��c��c� ��c��c��"�c

����c��������5��������c��c����c��c��������c��c���c*���E���������'c����c��c

������������c�*c��c��c������������c*��c����������c*���c��c��'c

��c�"��c �c����c��c���c�c��""�����'c

���������������������� "�%-�+��c

G����c��������"c�����*���c�����!c�����������c ������c���c�E�c!����c����!c�*c��c���������c������c���c��;����"c�c�����������c��c

��"�c���c���!'c����c���c��c�������c��c �c�����c��c���c�����!c

�������c��c���!c�*c������c����"�"c��;��c��c�������'c

G����� �c���c ���c�������c�*c����c*� �����c$���c�c��c���c������c��c���c��'cc

%���c�������c��!��c�����c�cBc�����c����cBc��c����������'c

����c(c

���c���c�������c��c��������c��c��c������������c� �!��c%�&���c@&.c����c� �����c�c���c

����� �����'���c%�&�c����c�����c���c���������c��c���*��c�c�&��������c

�c���*c�����c��c����!c�������c���c�������c�� ���c���c�����c��c���c��c���c

���!�"c��������'c

&��c���c�&��c��c��������c%�&�c����c3��c��c�c�����*���c�������c�c���c@>.c��c����!c*��c���c ����"c�� ���'c���c ���c������c��c������c���c*����c

������c�*c���c����c���!c��c%�&�c����c����c���c.%@c���c���c����'c

����cFc

6���c���c ���c������c��!��c���c������c�*c���c ����"c�������'$�$&c��c8@<%c��c���c ���c�������c�����c� ���� ��'c��c����c����c���c����c��c������c ������c

���c������'cG�����"c�c���c ���c�����c��������c���c!����c��c������'c

����cHc

>*���c!����c��c������c���c!����c����c��!�c���c������c�*c���c ����"c�������c��c��c����c�������+�c���c���c���������c������"c�E&c����������c���'!����c���c

�������c�c����c�� ���c��c����c���c���������'c

����cBc

Page 80: Linux QANS Nov10

�1��c��c������'c

6��c��c������c�(HLc������!c��� ���c�c����2')0c������c����c�c���'cc

G������c���c��� ��c*��c������'c���c3���c�+��c���c��� ���c���"c���c�+� *c

���c*��c*����c������c��c���"c�!�c��c�!�c������c

C��c������c����������c�*c���c��� ��c����c���c�1��>$$cEc@4>G.4c*���c"� �c�c

���c��� ���'c�

( ����������!!��!��������������� �����������������!��( ������� �

��������������!�������������������!��������� ������ !�������

� �������� ����� �������c���c����c����c������c���c��c!���c�c��"c���c��c���c����c��c����"�c

��c��c��c������c��c���c��"'c

������ "�����" �� ��!����#������ �������� ������������������ ����� �������c

���c�����c����c��c�������c����c��c���*�c������c�c*���,�c������c��c

���*������c���'c��c��c����c �c����c��c������c�c��c*���'c

( ������� �� ����������� ��� ��������� ������ ������� ���� ��������� "�����" �� ��!�� �������������� �������������c

���c��c�����c�����c���c��c����c��c������c���c�����������'c���c��c�����c

������c���c���"���c���������'c

�( ���������������������������������" �� ��!�� �����>�����"?8��8"�2�

��?01/� "?8��������� ����������� ��������c

���c��c����c��c�c�������c����c����c�*��c����c*��c*�����c���!�c��c

�����'c���c�*Nc�����c�����*���c���c�������c���c �Nc��c���c ���!c��+��c��c���c�*Nc�����c��c���c������'c

( ����������� ����������"�������������������������!��������� ������

��������� ������"������������ ������������� ������c

�c�����c��c������c�c*����c���c���c�� �c�����c��"���c��c���c���������c������"c���c*���'c

( ������� ��������" �������������������������!������������� ���

�� ����� �������c<��c���c�������!c?OAc��c����c��c+���c��c���c����������'c���c90,c������c��c

��c��c���������c��c����0c�����c��c*��c����'c

��

Page 81: Linux QANS Nov10

( ��������"����������@#��# "" ����� ������#��� �"��������������

��!�����!��������������������� "�����" �� ��!�� �����������

��� �������������c���c����c"���cP�)�L�c!��!�**c����c�����c"���c��c������c���c*���c!��!�**c

*��c��c���c �"��"c����c�c��"��'c

( ������� �#� �� �������������������#��# ""�"����� �������@���A� �������� "�����" �� ��!�� ������������� ��������������������������c

<��"c���c��c�����c����c���c"���c����c����c����c���c�����c� ��c�*c

����c������"c���c�����*���c������c������c���c��������"c���c����c

������"c���c������'c�

( ������� ����"��������������������"����#��# ""�� ������@� � ��������

"�����" �� ��!�� �������������� �������������c

���c�c�����c���c����c����c���c�����c���c���c����c������"c���c������'c�c����c�����c���c������c��c9%� ,c��c���c*���c��c �c��������c��c

!��!�**'c

( ��������"������������ ���B������ �� ��#� ������������������������

������������ �� #��������� ������� "�����"�����c���c'Kc�������c��������c����c����c��c�c*���c����c���c ��c���������c���"c

���c�������c�������'c���c+���c�������c��� ����c���c� �����c��c�������c���c

������c�*c�c���������c*���'c

�( ������� ���#������ �������" ��� ���������� �� ����"� �������#���

������ �� �������� �� ��c

�*c���c���c���c����c�����c��c���c���c�c���c*��� c*���c����c��*���c���c��c

���c����c�G�@&.�c���c����c�����c����c �c� ��c��c���c��'c/���c��c�������c�c���c���������cc

���cE����c���������c��c�c ������c*���c�����c����c������c�����c�*������'c

�"����� ����!���"����� ���"� �������#)������� ����� ��� ���" ���

��� ��!��������#��c�*c���c��c��c����c���c*�����c �*���c��� �"c���c���c*����c�c���c*�����c

��c ����c���������'c

( ����������C� ����" ������� ����������������"� "�� �����������������!�� ������������������������������� ������������ "�����

" �� ��!�� ������������� ������c

I�����c���c���c�c�c��������c �c��������c ����'c�*c����c�����c�� �c���c

�����������c�c��**����c����������c���c����c���c��c��*�"���c;�����c*��c����c��������'c

Page 82: Linux QANS Nov10

������ �������� ����� ������� �����#������������ "�"������������#�

������������������������ ����"�����C� �����c

���c���;����c����c��c����c��c"��c�c������c�c���c������c�*c���c;�����c���c�� �c���c������"c���c����c�*c���������c�����c��c����c�*c����c

�����'c

� �����������!��������������� �������������8����������� ��������"�����""�������� ���������� ���������� �����!���- ������ ��������������

������ ����������������������"� ������������������� ��������� ������c

%�c������"c�c��!c��c���c*���c�c����c����,�c���c����������c����c����c��c� ��c

��c������c���c��c����c���c�����������'c>����c��c���"��c����c���c���c���c���c �c���c���c�����c����c������'c

( ��������"������������������������������������� �������#��� �������

� � ��� ��������� ����� ��������� �����������������������#�� �� �!��� �#���- ������ ��"����������#��c

%������c���c��!c�c � ,�c���������c��c�c�� ����c��!�c�*c���c*���c�����c����c�c

���cE����c���������c��c��������c���c�� ����c��!c����c�c��"��c���!'c

( ������� �"��������� ���""������������ �������������������� �������������� "����#������ �����c

6���c��!�c���c�� �c���c���c����c� ���c���!�c�� ����c��!�'c

( �������� �� �������"��������������������������� ��� "�� ������� ������������������ ��������� �������� ��� �� ��#� ������ ����- �

� ����� ����������"����� ������� �� ����������"�����c

/��c���"c���c*��c����c��c������c�c*���c �c��c���c���c�����*�c���c

������"c�����c�c���c���������c���������c��c���c���c�����c��c�����*�c���c*���c��c������c*��'c

- ���)������ ������������ � ��������"�������������������"����

������ ������� �� �������� ������ �!���� �� �������� "�����

"�����c���c����c����c��c �c����c �c����c��c"� �c��������c�*c�c*���c��c��c

����'c

���������������������#�������c/��c���c����!�c ��c��c���c�c�c�����c����� ��c����������c���c���c����c��c

������c��c*���c�������c�c����c���������'c

( �����"���������#����22/�������� ��������������c���c��"���c�*c����c���!c��������c�����c"����c��c������c�c����c�����'c

���c)c"� ��c����c��c�����c*��c*����c��c���cFc"� ��c����c���c*��c*����'c

Page 83: Linux QANS Nov10

������ "�����" �� ��!�� ����������������������� ����������� "�����

���������������� ����������������"���������!��c

/��c���"c���c��c��c�c������c��c��������c���c��*����c�����c��c��c���c�������c���c*����c���������c�c����c���'c>���"c���c9",c�!��c���c�������c���c

����������c�*c���c������c���c� �c���c��c������c�������c����c�c���c

���c���'c

�( ����������������������"������������� ��� ����������� �����!��

���������� �" ����������������� ����������� ������� ���� �������

������c

%�c��*�����c�����c�� ����c�� �c��c��"��c������'c<��c���c��c�����c��c���"�c����c ��� ���'c

( ������������� �����������D������� ����������������!� ����������c

�*c���c� ��c�*c����c��c�������c��c��c�����*����c���c*����c��c����c�*c���c�����*���c*���c���c���������'c���c�������!c�����c����c��c�������c���c�����c�*c

����c*���c�c���c������c���!�"c���������'c

���������"����������� ������� ������������������"������� ��������������c

���c��c����c*�����c����c����c���c������c�*c�c*���c��c�������c��c�cF� ���c�����c� ���'c

����� ������������������ "������ ������������5��� !�������c

���c�����c����c*�����c�������c3���c���c*����c��������"c���c����������"c����c����c�c�� 'c���c��c������c���� ���c����c�����c�����c��c�������c���c*����c*����c

��"�c���c�c��c���c����������c��c���c���c*���c���'c

( ������� �����������"��������� �������<2�������� �����!��������� "�����" �� ��!�� �������������� �������������c

���c��*����c��"�c��"��c���c���"c��c��c��c����'c���c��c�����c��c����c��c

�����*�c�c��**����c��"��'c

����� ������������������ "�������!������ ������������ ��� ���c���c���c����c*�����c��c�c�� ����c���'c��c��������c�c*���c������"c����c���c����c���c

��c���"c����c���c*����c���'c

( �������� ��������������"�"����������� "�����"������ !)���������� ����������� �������� ����� �������c

���c����c�������c��������c���c��c�*c�c*���'c���c�(2c�����c����c��c�������c���c����c

*�*���c����c�*c����c�����*���c*���'c

��

Page 84: Linux QANS Nov10

( ����������"������ ��� �������� ������������� ���������������

���������������������� �����( ������� �����!�������� ����� ���

����� � ��������� "�����" �� ��!�������� �������������c���c��c�������c��c����c��c�������c��c����"c �c������'c6���c���c����c*��c��c��c

��� ����c �c���c���c����c��c���c����c���c���c��������c �c

��������'c

��"�� ������������ ����������� !�=��������� ����� ������ ��� ���

���������c

/��c���c���cQc*��c�����������c��c���c�**����c���c�������c������'c>�c

����"��c���c��c�������c�����c�����c�����c������c�c����c�������'c�

������"����5�������!����� "�����"������������ �����������E ����� "�

������������������ �"�!����� ��"������������������������ ������c

���cE���c������c�*c���c*���c�����c������c�c� ��c�*c�����c��c����c��*�"������c*����'c>�����c��c��c��c��c�c���c ����c*������� ��c������������c ��c

���c��������'c���cE ��c���������c������c����c����c���"�c�c�c��"����c

�����c����c��c��"c*����c��c����c��c���c�����c�����������'c���cE �c

���������c������c�����c �������c�������c���cE� �c���������c������c

������c����c��c����c�<�Gc��� ���"��c��c��c�c�����*��c����'c���cE�� c���������c������c�����c�� �������c ���c������c��c��������'c

������ ��������� ��� ��� ��������� ���� �5���������E ��� �����

������+,�������c���c���c����c��c����c��c���"�c�c3� ,�c��������c�� ���c��c����c��c���c

������c��c*�����'c>�����c��c��c��c�c���c ����c�����c ��c���c��c����c

��c���"�c�������c�*������'c>����c�c��c�c� ����c����'c

������� "�����" �� ��!�� �������������������� �!�����" ����� ��

�� ��������#�!���c

���c�c����c�����c��c�c��"���c���c�*�c����c�����c��c����*�c

��"��c�����c�� �c��������c���c�c��"��c*��c���c���!�"���c��c���c

�������c����c�����c���c��c*��c�������c�����'c>�����c c��c�c���c��c������c�*c"����"c�*������c� ���c�c���!�"�c

/����c��c�c"���c�����c��c�����c�����c�������c����c���c*��c���c �c���c������cc

��c��c ���c��c!���c�������c���c���c*��c����c������c����cRE �'c>�����c

�c��c��c��c�c���c���c ����c���������c ��c��c���c ���c������c��c!���c����������*��c�������'c

/����c��������c������������c������c���c!���c�c��c���c�����"c

��"�����c����c���c��� ��,�c����c�*c�������0c�������c���c�������c�������cc

>c���c��� ��c ��*���c*��c�c���"�c����c�*c@>.�c�c*���c��<�c��c���"�c�����c�*c*����������c����c��� �c�����'c���c�����c��c ��*���c*��c�� �"c

�c���c�*c����c��c����c��c��c���c�����c"�����c�*c���c����"��c���c��c

���'c>c*���c��<c�����c��c� �c�����"�c���������c���c;���!���c����������c

Page 85: Linux QANS Nov10

���c��c����c��c"������"c�����"�c��c���"�c����"c�����'c6� �"c�c���c�*c

����c��� �c�����c������c����c���c���c�����c����c��c��c���c�*c*���c���'c

>�����c�c��c�c���c��������c�c�c�����c����c��c���c��c��� ���c���c��� ���'c>c$���c ��c��� �"c����c�c�������c�����c���c �c������c���c����c

�c8<�c���"�c��c���c8<�c��c���c�����c��c �c�������c����c ���c���c

�����c���������c��c ����c@>.'c

��"�����" �� ��!������ � !���)���������� �����������������5�����

��������c

S� �������c��c���c���c����������c������c������'cS� �c��c�MMc���c�������c

���"���"c��"��"��c'c>��� �c��� ��c��"��c���c������c�c���c��� ��c����c���c�������c ��"c���c��c

���c�����c�c6�.$'c

���������� "���������������� ���� ���������!���+������������ ���������������!��������������� ���� ������c

���c��c���c�cG6��c��� ��c��c����"c��c���������c��c��� �����c������c

����"c���c����������c�������'c>�����c��c �c��c��c�c����c��"������c$���c

��� ����c ��c�����c��� ���c��c��c��� ���c��c���������'c���c�.%�c��c�� ��c

����c��c����c*��c*���c��c����c�����"c������c�����&�c�����!�c'c>c1C�c��� ��c��c*��c*���c�����"c������c$���c������!�'cC��c��c�c*���c

�����"�c��� ��c����c������c������c��c �����c��c������ �c�*������c �c

��""�"c�c��c���c��c6���c��c*��c���c/� c

����������� "�� ����"��������������� ������� ��� ������������������ ��

���������� ������������� ���������������������!������ �#�

���������� ���c

���c��c���c�c1C�c��� ��c��c��� ���c���c������ ����c����������c��������c��c���c�����c�c�����c���c���c���*���"c���c����������'c>�����c��c �c

��c��c�c���c���c ����c����c ��c��c�*c���c���c*���c��� ���'c����c��c���c

���������c�����c�������c���c�����������c����c�����!c��� ����'c���c

C���1Gc��c���c$���cC���c�����c�������'cG1�c��� ����c����c��c

����������c��c11��c��c���c����*��c��������c*��c�����c���'c�

���������� ������#�!���� ����� ����������� �����������������

������������ ���"����� ���� ������� ������������c

���c������c��������c���!�"�c� ��c���c������c��������c*���c��c�c���c������c�������'c>�����c��c �c��c�c���c����c��c ����c���!�"���c ��c��c�*c

�����c������c���c��������c*���c�c�c���c������c�������'c>����c�c�����c��c

�c� ����c���!�"�'c

��

Page 86: Linux QANS Nov10

������� ������ �#�������� ����������������� ���� ����������� ��

���#���c

���c! ������!c����c�������c�c ���c���!'c>�����c c��c�c���c��������'c���c�!�c���!�"�c��c����c��c������c��*�����c

�c��c������c ���c���!�'c>�����c�c��c�c����c��c� ����c�����'c

�������������� �� ������������������!������� ����� �������������c����c����c �c������������c�� ��c�����c���c��c������"c��!�c�!�c�c

�����c*��c���c�������c������c����c������c����c������'c�����"�c*��c

�������c���c����c����"c�c�� ���c��c�������c��c�����c��c�c7�����":c��c

�����c����c���c������������c�� ��'c>�����c��c �c��c�c���c���������c��������'c>����c�c��c���������c ��c���c��c�� �c���c �c���c�*c���c

������c��'c

���������#�!���� ��������������� ���� !�������� ��)������������������������ !�����c

���c���c���!�"�c������c���c��c��*�"���c������c�����c�������c��c�����c

�����c��"��'c>����c�c�����c��c�c� ����c���!�"�'c>����c�c�����c��c�c

����c���!�"��c ��c������c������c����������c��c����c��������'c>�����c

�c��c�c����c��c*��������"c���!�"���c�����c��"�����c����c������c�c��c���c�*c�c$>1�c ��c��c��c�����c����c��������'c

���������#�!������� ������� ���!�������������� �#����""������

��� ���� ��������������"����������)������ �� ������ ���������������c���c���T��������c���!�"�c��c����c��c��"�����c���c���E��c�����!c���**��c

���"c�c��c���c�*c�c�����'c>�����c c��c�c ���c����c��c ����c

*��������"c���!�"���c ��c�����c���!�"��c���c����c*��c�c�����c$>1�c��c3���c

��c�����'c>����c�c�����c��c���c�����������c��������c����c��c������c����c� ��c���c������'c>����c�c�����c��c�c� ����c���!�"�'c

���������� "���������������� ���� ���������!���+������������ �

��������������!��������������� ���� ������c

���c��c���c�cG6��c��� ��c��c����"c��c���������c��c��� �����c������c����"c���c����������c�������'c>�����c��c �c��c��c�c����c��"������c$���c

��� ����c ��c�����c��� ���c��c��c��� ���c��c���������'c���c�.%�c��c�� ��c

����c

��c����c*��c*���c��c����c�����"c������c�����&�c�����!�'c>c1C�c��� ��c��c*��c*���c�����"c������c$���c������!�'cC��c��c�c*���c�����"�c��� ��c����c

������c������c��c �����c��c������ �c�*������c �c��""�"c�c��c���c��c

6���c��c*��c���c/� c

��

Page 87: Linux QANS Nov10

������������� ���!�� ������������������������������� ����c

���c*���!c���������"c����c��c� ���� ��c�c���c$���c������ �����'c>�����c��c��c��c�c���c�����c���������"�c ��c��c��c���c����c���c������ �����'cG��!c

G����c��c���c �c@��c6��c��c����c�c���c������ ����c���"c����c���c

���� ��� ��'c��������c.�"��c��c�����c������c���c�����c���c �c

�����������c�������'c>����c�c��c��c�c�����c ��c�c*���c�����c����'c�����*�������cC>�HFc��c���c*���c�����c����c����c�c/�����cL�'c

/����c*������� ��c��"��c�*c���c*���c�����c������c�c�3�����c�*c�����cc

���cE���c������c�*c���c*���c�����c������c�c� ��c�*c�����c��c����c

��*�"������c*����'c>�����c��c��c��c��c�c���c ����c*������� ��c������������c ��c���c��������'c���cE ��c���������c������c����c����c���"�c�c�c��"����c

�����c����c��c��"c*����c��c����c��c���c�����c�����������'c���cE �c

���������c������c�����c �������c�������c���cE� �c���������c������c

������c����c��c����c�<�Gc��� ���"��c��c��c�c�����*��c����'c���cE�� c���������c������c�����c�� �������c ���c������c��c��������'c

������"����� �� �������� ������������ ���� �� �������� ��������c

���c*���cE���E*��� c��"��c�����c���������c���c������������c�����c���c

���c*���c�����'c>�����c c��c�c��*��c��c ����c�����c ��c����c���c��c����c��c��"�c���c*���c�����'c���c*���cE���E��� ����c���c�����!�"c��� ����c

��c���c�����c����c�����+��c��cE���E� '��*c��c���c��*�"������c*���c*��c���c

�� �c��� ���'c>�����c�c��c�c����c��c*����c����c��c��c�����'c

�������"����5�������!����� "�����"������������ �����������E ����� "�

������������������ �"�!����� ��"������������������������ ������c

���cE���c������c�*c���c*���c�����c������c�c� ��c�*c�����c��c����c

��*�"������c*����'c>�����c��c��c��c��c�c���c ����c*������� ��c������������c ��c���c��������'c���cE ��c���������c������c����c����c���"�c�c�c��"����c

�����c����c��c��"c*����c��c����c��c���c�����c�����������'c���cE �c

���������c������c�����c �������c�������c���cE� �c���������c������c

������c����c��c����c�<�Gc��� ���"��c��c��c�c�����*��c����'c���cE�� c���������c

������c�����c�� �������c ���c������c��c��������'c�

������"����� �� �������� ������������ ���� �� �������� ��������c

���c*���cE���E*��� c��"��c�����c���������c���c������������c�����c���c

���c*���c�����'c>�����c c��c�c��*��c��c ����c�����c ��c����c���c��c����c��c��"�c���c*���c�����'c���c*���cE���E��� ����c���c�����!�"c��� ����c

��c���c�����c����c�����+��c��cE���E� '��*c��c���c��*�"������c*���c*��c���c

�� �c��� ���'c>�����c�c��c�c����c��c*����c����c��c��c�����'c

��

Page 88: Linux QANS Nov10

������������� �� ������!��� ���+�+9�����5 ������� �����c

���c����"c�c�&�Hc���c������c��c���cE �E*����c�����'c>�����c c��c�c ���c

����c��c���c���c������c���c ���c�����'c6��� ���c����"�"c����c�����c��c�c�&�Hc���c����c"� ��c��c��c���c��"�c�������c�����c��c����c���c���c����"c��c

� ���'c>�����c�c��c�c���c ���c� ����c������c�c�c�������c�����'c

������ ������ ����� ������� �����������������"������� ��� �����!����� ����������c

���c���c���c�����c����c��c������c�c����c*���c�������c����"c��c���c

��'c>�����c�c��c�c����c��c� ����c������c����"�c������c�*c�����c�"��c

��������c �c�������c��c����c��c�c����c����'c>�����c c��c�c�����+�c��������c��c��c��c��c�����*�c���c��;�������c�*c���c;������'c

��������c�����c��c����c��c���"�c���c��������c�*c�c*���c�*c���c������c

���������c�c��c*���c����c������c��������c����c �c�������c

�������� ������� �� ������� �����!�������������c

���c����c����c��c���"�c��c�� ���c��c���'c>�����c��c��c��c�c����c��c

� ����c�����'c>����c c��c�c ����c�����c ��c����c��c���c���c

������c��c�� ��'c���c��c�� ��c����c��������c���c������c��c�� ���c��c

���c��c����c���c����c��������c �*���c�����"c����c��'c�

���������� ��� ��� ���������� �#��������5=�+�+9��������������c

���c����c���������c�������c���c�&�Hc���c��� ���'c���c�&�Hc���c

��� ���c���c�����"�c���c����������c��c�c���c��'c>�����c�c��c�c����c��c���������c��c��c�����c��������c�����'c>����c�c�����c��c

���c<����c���c����'c

�� � ����������������� �������c���c���c����c���c���c����c���������'c���c���c��c����4.c�����c���c

�������c���c���c���� ���c��c�������'c

���c���c����c���c���c����c���������'c���c���c��c����4.c�����c���c

�������c���c���c���� ���c��c�������'c

���c��c��c��*�"���c����c����c���� �c����"c������cLc����������'cc6� �c���c����c��� ��c�c�c*�����c��� �'c>�c���c�����c�*c�����������c���c�c

���c

*��c���c�GEG#G�c�c���c������c�����c7��:'c��c����c��!c*��c���c��� ��c*�����c

�����c�c��c����c����c���c����c��� ��'c���c���c��c��*�"���E��������c���c��� �c���"c���!c�����c��c*���!'c

��

Page 89: Linux QANS Nov10

����������""���������������*������6�.��c

���c��c �c���c���c*��c�c����������c���c ��c��c��c����c��c��������c��c

�������c������c>�����c������c>�����c���c����c��c����c��c��������c���c���!c

�����c��c���c���c���c����������c�:��:c����c��c����c��c��������c���c

���!c���c���c�'�'c��c��c���c��c���'c

�����������""���������������������!�������������������� ���c

����c��"���5����c��"���c��c����c����c��c�������+��c��c����c��������'c�*c���c

��������E*���E���c��c�������c��c��c��c� ��c��c��"�c

����c��������5��������c��c����c��c��������c��c���c*���E���������'c����c��c������������c

�*c��c��c������������c*��c����������c*���c��c��'c

��c�"��c �c����c��c���c�c��""�����'c

����������������������� "�%-�+��c

�����c6���c��*�"������c��������?G6��Ac��c�c��������c����c �c�����!��c

�� ����c?������Ac��c� ���c���c��c�������'c

������c>�����c������c>�����cG����c��������"c�����*���c�����!c

�����������c ������c���c�E�c!����c����!c�*c��c���������c������c���c��;����"c�c�����������c��c��"�c���c���!'c����c���c��c�������c

��c �c�����c��c���c�����!c�������c��c���!c�*c������c����"�"c��;��c

��c�������'c

G����� �c���c ���c�������c�*c����c*� �����c$���c�c��c���c������c��c���c��'cc

%����"c�������c5c*����c%�&�c�����c���c ���c��������c���c ���c�������c�����c

���c!����c����c!����c���c���c*���c������c��c��� ���c����������c����c

��!��c�����c��c�c��c����c �c������'c6��c��c������c�(HLc������!c��� ���c�c����2')0c������c����c�c���'cc

G������c���c��� ��c*��c������'c

���c3���c�+��c���c��� ���c���"c���c�+� *c

���c*��c*����c������c��c���"c�!�c��c�!�c������c

C��c������c����������c�*c���c��� ��c����c���c�1��>$$cEc@4>G.4c*���c"� �c�c���c��� ���'c

����������""���������������������!�������������������� ���c

����c��"���5����c��"���c��c����c����c��c�������+��c��c����c��������'c�*c���c��������E*���E���c��c�������c��c��c��c� ��c��c��"�c����c

��������5��������c��c����c��c��������c��c���c*���E���������'c����c��c

������������c�*c��c��c������������c*��c����������c*���c��c��'c

��c�"��c �c����c��c���c�c��""�����'c�

Page 90: Linux QANS Nov10

���������������������� "�%-�+��c

G����c��������"c�����*���c�����!c�����������c ������c���c�E�c!����c����!c�*c��c���������c

������c���c��;����"c�c�����������c��c��"�c���c���!'c����c���c��c

�������c��c �c�����c��c

���c�����!c�������c��c���!c�*c������c����"�"c��;��c��c�������'c�

%������������� ���� ����� "�� ���"� ��������������������������������

� �������c

%���c�������c��!��c�����c�cBc�����c����cBc��c����������'c����c(c

���c���c�������c��c��������c��c��c������������c� �!��c%�&���c@&.c����c

� �����c�c���c����� �����'���c%�&�c����c�����c���c���������c��c

���*��c�c�&��������c�c���*c�����c��c����!c�������c���c�������c�� ���c���c�����c��c���c��c���c���!�"c��������'c&��c���c�&��c��c��������c

%�&�c����c3��c��c�c�����*���c�������c�c���c@>.c��c����!c*��c���c ����"c

�� ���'c���c ���c������c��c������c���c*����c������c�*c���c����c���!c��c%�&�c

����c����c���c.%@c���c���c����'c

����cFc6���c���c ���c������c��!��c���c������c�*c���c ����"c�������'$�$&c��c8@<%c

��c���c ���c�������c�����c� ���� ��'c��c����c����c���c����c��c������c ������c

���c������'cG�����"c�c���c ���c�����c��������c���c!����c��c������'c

����cHc>*���c!����c��c������c���c!����c����c��!�c���c������c�*c���c ����"c�������c

��c��c����c�������+�c���c���c���������c������"c�E&c����������c���'!����c���c

�������c�c����c�� ���c��c����c���c���������'c

����cBc�1��c��c������'c

��������������������������� "�������� ���� �������� ����������������

������ ����������� ������� ������� �������!����c

('c�����c��������'c ���c���������c����c��������c��c����c���������c�����c���c���c���c

���������c��c������c

���c$���'c

F'c���"c��cE ��E��"E����"��c/���c����c���c�������c��c�������c���c����c*� �c�����c���c�� �c

������0c/����c���������c�"��c���c�������c�c���c��� ��c6GG�c�����c���c

���c�����c����c��c ���c���������0c/����c���������"c����c��c� ���� ��c�c���c

������ �����0c/����c���c�����c��c���c���c��c������c�����������0c/����c*���c��*���c���c�����c�c����c�����0cc

('c�������U����c�2c

F'cE ��c

Page 91: Linux QANS Nov10

H'c*���!�c������c

B'c��c����c

2'cE���E������c�

- �� ���������319F�������#���������������0�2��+�������������� ����c

G������c���c��� ��c*��c������'c

���c3���c�+��c���c��� ���c���"c���c�+� *c���c*��c*����c������c��c���"c�!�c��c�!�c������c

C��c������c����������c�*c���c��� ��c����c���c�1��>$$cEc@4>G.4c*���c"� �c�c

���c��� ���'c

������� �����������5���������������!��������������������������

��� ���c

���c���������������c$���c!����c�*�����c�������c������c������c

��������c����c��*��c����c���"���c��c�����c��� ���c��c���c���c����c�*c��� ���"�c����c��;����c��c��c�����c3� �'c/��c��*���c�c����c����c

���c� �����c�*c�����c����c���"���c��c�����c�����c��c�����c���c���c

���������c? ��c �**��c� ��*����c��c����*�"��������c*��c������Ac��c

�������c��c��������'c����c��*����c������c��������c����������c

�*c���c����������c$���c������c������c�������'c��c���c�c������c�*c�c7����:c�����������c��c����c��c�����c���c�����!��c��������"�c�*c���c

����������c$���c��������c�������c?����c��c�c��������c�c

������E���"��c ������A'���c��������c�*c�c����*���c$���c�����c������c

�c���c����������c�*c���c!�����c���c���c��� ���"��c������������c��c����c�*c�����c��*�"�������'c>c��� ��c�c��c��c�*c�����c�����c��c�����c���c

��������c�*c���c�����c�����'c�c��������c���c��������c�*c�c���*���c

�����c ����c�c���c���������������c$���c!����c������c��������c�c

���c����������c�*c���c!����c��c���c��������c������c��*�"������'c/����c��� ���c����c���c����������c��c��*�"������c�*c�����������c��c�����c���c

������c��������c�*c��� �����c����c���"���c��c�����c������c����c

��c��c����c�c������c��c���c��������c�*c�����c����c���"���c��c�����c

�����c��c��c���c��������c�*c���c�����c��c�c�����'c

����������&�������c

�4$���c

���������������c$���c��c�c��������c���������c�*c���c$���Vc!����c��c�c

� ��c�*c���������c����c������c��������c*����������c����"��c�����c��c���������c���c ����c�*c�������c������c�������c��c���c$���c������c

��c���c����c�������c�����c �c�����c��c$���'c���c���������������c

$���c!����c������c��c�������������c�������c���"�����c�� ������c��c

���� �c���c��������c�*c���cC���!c�������"c�����'c�����c�������������c�������c��� ���c"�����c�������c*��c���c�*������c�*c��c!���c�*c

�������c������c������c���������c������"c�����c ����c�c���c�������c�*c

����c4*������V�c@���� ����c>�����c�������c��c.������� ��c��������'c

Page 92: Linux QANS Nov10

������������� ���!����"������� �!���� �������������!��������� ����c

���c���c"����*��c���c��c��c���c���c����c���c�'c

�*c���c���c��c����c� ������"c���c �*���c"��"c��c��"��c����c���c���c��c���c)c*����c��c*��c���c�!c�����c��c�c ���c��'c

/����c�c����c��c*��c���c�*c���c*����c�����c�� �c ��c��������c�����c���c

����c()c����'cc

���c*������"c����c����c*��c���c�*c���c*����c�����c�� �c ��c��������c�����c���c����c()c����c

*��cEc�����c*c�����c�()cQcG��� ��'*����c

����c����c����c*��c���c���c*����c����c�����c�����c��c9E,�c����c*���c����c��c

*���'c9�����c�H)Wc����c"� �c���c���c*����c��������c����c���c()c����c�"�'c>�c���c������c����c���c���c�c*���c����c.�����'*����'c

�����������������������!�� "��������!����#��� ���"������������ "�

� ����� "�����"�����c���c��c�� ���"�c��c��c������c����c��c�� ��c���!c�����c?����"�c��c����c

����c���Ac ���c�������c����c�c���"�c�*c���������c�c���c*���c��c�������c��c���c

���c��!c������c�����'c���c��!c����c����c���������c�*c����������c ��c����c

��c*��c���c��!c�����*c��c��c���c������c��c���c*���c��c�����c���c��!c�����'c

����c�*c���c���c��c���"�c���c���������c*��c�c�����c����c��c���c���c���c�� �c��c��c��c�c���c���"���'c/���c������c���c�� �c��c*��c���c�*c���c

������c��c���"�c��������c�c����c�*c���c������'c

��������������c$�$&c�����c*��c$���c ���c������'c��c����c����c���c.%@�c�����c ���c�������c

���c���c�����c��c����c���c�����c�����c��������c��c����c��� �c��c ���c

*��'c

����������4���c

�#�c��c��������c#�����c�����'c��c��c���c*���c��c��c���c@��c�� ����c

������c�����c�����c������c���c����c�*c�� ����c������c*��c�c���������c

�*c*����c�c�c��"��c���������c��c�c������������c���������c�*c�����������c

�������"c�*c�� ����c���������c*����'c�����c�����������c��c*����c��c �c�� ���c��"�����c��c*��c�c��*�����c�������'c

�����c���c���c���*��c�����c����c���c ��"c����c ���c�*��'c����c���c

� �c����!���c

� �c������c� �c���c

� �c��� �c

� �c����c

��

Page 93: Linux QANS Nov10

��������.$���������������E ���c

1C�c�����c*��c1�����!cC���c�����'c1C�c�� ���c*���������c����������c

������"c�c��c�������c�����c��c �c����c �c�����c��������c�c���c�����!�c�������"c��c�����c�c���c�����c����c��c3���c������c�����c���!'c

�����������)������������"�����������c

���c*���c��� ��c��c�c�����c����c������c���c���!c�����"�c��c*����c����c�����c������c�c���c�����!'c

�������������������C���������� ������� ������������� ����� �����������

��������c/�c��c���c���c�3��c�����;���c��c�����c���c���������'c����c���c���c

��������"c��c��������c�����"'c�c���c��������"�c����c����c����c����c

��c�c*���c�����c����c���c������c�c������c����c�c���c�����'c�c��������c

�����"�c����c�����c�����c�������c�*c�c��!��c����'c>��c����c����c�����"c��c�c"� �c�����c����c���c�������c�c����c����'c

��������������E ��������!�� "���������������c

���c�3��c�� ���"�c�*c�c����c�� ��c��c���c�����'c%������c���c����c*�����c

��c��c��!�c�c��"�c�*c!��c �����c��c����*��c���c���c����c �����c�c����c�c���c����c���c!��c �����c���c������ ����c������c������c���c���c

������c�*c�c����c�� ��'c

��������������� ��������c���c�����c����c�� ���c���c��c�����c�c������c����"�c�c���c�����c

������c����'c���c�� �c��c�����c���c�����c����c����c���c��"�c�Gc�*c

���c����c����c���c���c���c��c��������'c���c�����c����c�*���c

���c����c��c���c�����c��c����c�����c��c�c����"�c*��c������c����'c�����c������c����c����"�c���c���c�����c����,�c������c�*c�����c������,�c�����c

���������c���c���'c4 �c�*c����c���c�c���c�����c�*c�c����c�������c�����c

� ��������c����� ��c��c�c���c�����'c���c����c������c������c���c��c

����������c���c��c�������c���c���"���c�����c�c���c�������c����c�����$'c

�����c��c�����c����c*��c������c����������c ��c���c��c�� �c�c������c�� �������c��c����c

����( ���� ���� ��,�������� ��� !����c

���c����c��"�c����c��c��������c���c�c��c���'c/��c���c��"c�c��c�����c���c ����c���c�����'c���c����c��"�c��c����c�������c������c���c�����c����c

��"�'c/���c��c�����c�����c������c������c�c�������c��c �c��������c

���c��c�������c����c�����c$���c����������'cC��c����c������c���c���c����c

��"�c���c���c��������'c> ���c���������"c����c�����c���c���c��c��"c�c��c����'c

Page 94: Linux QANS Nov10

- ���!��� �����������5������������� ������c

����c�����c��c����c��c�c�������c�*c��������c@>.�c���c���c@>.c���c

�� ��c���c����c����c�����c��c��;�����'c���c��c���c���c����c�*c����c�����c��c���c����c�*c@>.c��"�����c��c"��c���c����c�*c@>.c$���c����c

���'cC��c�������c�*c���c�� �c�.%c�*c@>.c�c����c�����,�c����� �����c

��c�c(�.%c����������c���������c$���c����c ��� �c��c����"�c���c���c

FB.%c�*c�����c@>.'c�

������"�������������� ���"������������ ����"������������c

��������c����c*�����c������c������c����c��c��"�c�����c��c����c

��c�����*�c����c�����c���c����c����c���c���c��c��"�c�'c�

������ ��������������������� �)�� �������� �����!�����������A�����

��"����!������������!����������!��c

���������/��c������"c�c��c��������c���c���c*����c�����*�c���c������"c�������'c���c��c���c������c�����*�c���c��+�c��c���c���"c�������'c

���������� ������������� ������������ ����������������������� ��

��������!��c

����c0�64$$����c��c��c����c��c���c�����c���c���c���"c��c�� ��c��c���c�64$$c� �����c ���� ��'c���c��c���c���c���c����c����c��c����c

���c���c ����c�*c��c ���� ��c �c�������"c���c ���� ��,�c��c����c0'c

�����*����c����"c����c0�64$$c����c�������c���c��c�*c����c�����'c

���� ������ ������������������"���� �������� ������������������!�

����"��� �����)�� �� ����������c

*�c�2����c*�c����c��c �c����c��c����c��c����c�����c���c�� �c

��� ������c������'c��c�����*�c���c� ��c�*c�����c��c�����c���c�'c�

������ �������� ����� ������� �����#�� ���"������������c

*��!����c*��!c����c��c����c��c����!c���c���"����c�*c���c*���c�����c�c

����c���!'c

������"������"��������������� "������!����������� ��������� !�"������c

!����'����c�������c���c ������c�� ���c�*c����"��c����c���c��*���c�c

����c������c�����c���c!����'�c*���'c

��������� �������������������� �����������������c

�����/��� ��c���c������c$����c���c��c����c������c��c�������'c����c��c

���c�����c����c������c����c!��c��c����'c

��

Page 95: Linux QANS Nov10

��������� ��������� �������" ������#��!������� ��� �����������c

�����"�����c�����"�c����c��c������� ��c*��c����!�"c�����c�*������c

��c�� �"c��c��c�����*���c��"c*����'c�

��������������� ���������������������������c

��c���c�����c��c��������%�c��*�����c����c�����c�������c�������c������c��c

����c�����c��c�������'c�

������������������ ������� ��� �����������������!� "�������!�

�� ��������c

�������c���c�������c�����c�c�����"c�*c���c���"c���������c����c��c���������c�������c

�� � ����������������� ������c

���c���c����c���c���c����c���������'c���c���c��c����4.c�����c���c�������c���c���c���� ���c��c�������'c

� ���������������������������! ���������� ��������������!�

��! ��������c

C��c���c�� ������c���cX������c����������c$���c����c�c��������+���c������� ����c��"�����'c4���c�������c���������c�c������c� ��c�*c��������"c

��������c���c�c��c���!c���c �c�����c��c���c���c�������c����c���c

�������c��c��������'c4 ���c���c����c�c����c��������c�������c���c��������c

���"c�������c�����c��c�������c���c���c�������c�������c+����c��c��c��������c��c������c�������c��c�����'c�*c�c��� ��c���������c�� �c

��c��������c���c$���c���*���c�c���������"c���������c����"c�������c��c

� ���c�������c�c���c�����c?������c���c3���c��c���c��� ��c���A�c

�������"c��c���c*������"c����5c�������cNc�������EFcMc��������c

���c� � �c��������"c�����c��c����c*��c����������c�������c��c���c�c$���c

*��c���c��������c��������"c��c������c��c����c��������"c�������5c*����c����c

*����c��� ��c

?C�C�A�c��c������� �c?@@Ac'�c ���c������c����c�������c���c�c��������c�c�������c��c���c��������"c�����'c�c���������"c��������"�c���� ���c

���������c�*c��**����c����������c��c�����c������c����c��c������c��c���c

������c�c��������c��������"�c���c���������c������c���c���c�������c����c

���c��"����c��������'c>�"c���������c�*c�;���c���������c��c���c���c�������c����c���c ��c�����"c��"���'c���c���c

��**�����c �����cC�C�c��c@@c��������"c��c����cC�C�c���������c������c

��c��c����c����c������c����c��c ���!�c�������c�c������� �c�������c����c �c

��������c�*���c�c�����c��c����c �c� ��c��c���c��c�*c���c��������"c;�����c��c������� �c���������c�*c�;���c��������c����c������������c���c

�����c��"c������ ��'c

Page 96: Linux QANS Nov10

$���,�c��������c��������"c��c��*������c���c������c���c���������c���'c���c

���������c�**���c������c"��������c� ���c���c������ �c����������c�*c��������c

����������c ��c���c!����c����c��c�**��c��c"��������c� ���c���c;���!��c�c��������c�������c����c �c���������c���c����c�������c �����c��� ��'c

����c���c$���c����c��**����c��������"c�������c*��c����������c��c�����

���c���������'c

cc

���������������� ��������������

4�c u��������� ����� ��� ����������������c��c u�������� �������� �� ������� ���������������������� ��������c��c u�������������������������������������������������������������������c�c�������c

�cc��� c��c�����������c��������c���c��c�����c����c��c�������c��c���c �c����c��������c����c�c����c������c�����c�����������c���c�����c����c�c����c����c����������c���c �������c����c�cc��� c��c���������c����� �cc

��c u������������������ ��� ����������������� ����������� ��� ����������c���c���c����c��c�� c �c���c��c����c�c� !"!#�c$c%&'(c����)���*c�c+�c����,c� !"!#�c$c%&'(c����)���c��!&!c-./0c��������1*1c�����c��c���� c���c����c�����c��c��!&!c�����cc

2�c u������������������� ������������� ���������������� ����������������������c�c%�����c���c����c��c��c������c��c���c��,c4�c3��3���.c��c�� �-�c4c ��������c�.3�c��c�� �-�5c��c3��3���.c�����c ��������c��c��6���c���c ��������c����3��7c����c� c�c�����c�����cc3����c3��c4����3��5c��c�����c���c��c���c �c����c3����c ��.3�c4c���c�-�3��c#"'�7c"'�c� c85cc

9�c u����������������� �����������������������c�c4�c%���c�����7c�����c�3 ���c��c!-��c�����c3��c��c����c�� �-��c:3 ��c��c�����c�����c��c �����c��c�3 ����c���c����c.��c���c��c�3 ��c���c�� �-�cc

;�c u����������� ������c�6���1c�� c��c�������c���c��c����c����c�������.c����c��c�������c������c���� �cc

<�c u��������� ��������� �������� ��������� ����u���� �� ��� ������������� �

��� ��������c�c=�����/���c �c���c����������c�� �� ��c����������c����cc����c� c�����/���c���c �c�c���c������c�����c��c���c����c��c�����c��������/����c���c�������c�� �� ��.c��cc�����c���c���c�������c��c �������/����c�c��3���� c3���������c����c��3����� c �c��������c� c���3�������c���c�c ���c�.c�� ������c��c���c������c��c6���c��� � c���c �c3��������cc

>�c u����������� ����������c�c+c��������c����c.��c��c33�.c��3��c����������c��������.c�����c��cc�����c�����c��c����c3����.c�.3�c��c��������c���c��c��������.c�33���� c�.c ?"c �����,c@&A(+&�B:=A?:!c�c�������c���C����c��cc3�������c����c�������c�!%+:"�c�c3������cc �����c����c���cc������c��c��c�c�����c�3������c ��c���c3���� �c����c%'&!AD=cE!�c�c��� ��c���c����.c����c��cc������c�-��c��cc������c��c������c�����c#�!#Ec�c�����c���c����.c����c���� c��cc������c�c��c���c3������ c����c!��c�.3�c��c��������c3������cc3������c�.3�c��c������c������c�c���cc

Page 97: Linux QANS Nov10

���������c='�c=:""c�c���c����c��������c�����c ��c���c����c����c��c���c3������c������c��c��c�����c+� c��c��c���c���.c��������c�����c�c���cc����c�����c���������cc

4��cu���������� ����������������������������� ���������c+�c�� �-c���3c��c����c����c����c��c�����c���c�����c���c�������.c�� c�� �-��.3�c��,c�c������,c���� cc����c��c3�����c����c����cc���c��c���cA�c���c���c���c���c�����c=�� cc���c��c3��c� c�c���c �����c�� �-c�.3�c���c���c ����c�c����3,c�����c��c���c���c���c3�����c����c��c���c�������c!��c���c�����c�c���c���c���c���c����c=�� c���.c���c3��c� c�c���.c���4�������7c ����c��c����c�����c��c����7c����c !F4�7�5*c �����4� 7( 7@��5c�c��,c+c�����c��������c�c�� c��c���cc��c��c�������c��c��3�����cc��-�c�����c���ccc���3����c��c��.c��c3����c��.7c� c���3���c���c�� ���.���c ��c���c������c��c���� c� c�c�33���� c�.c��������.c���c ����cc

44�cu�����������������������c�c+c@&A(+&�cA=�!Fc��c@&A(+&�cE!�c�c��������c�����c����c����.c����cc ���c�����.�c%���c��c�������c�c����c���c��cc�c:=A?:!cA=�!F7c����c�����c�.c���.c��c���c��c���c����c��c���c�������cA�c.��c���c���c�cA=�!Fc@&A(+&�c���� c��c:=A?:!7c.��c.c��������c����cc.���c����c ����7c�����cAc�c���c���c��c�-3���c��c���c��� �c@����.cE�.c�cc�.3�c��cc��������c���������c���C����c� c �c��������.c���c���c���c��cc�����c+��c������c3�����3����c��cc3����.c��.c��������c���c3��c���c='�c=:""c3��3���.�cc

4��cu���������������� ������������������ �� �������������� �����������������������c�c%��������c �3�� ���.c�����c��c���c���c��6���c �3�� c�3��c���c�����c��c���c ����c���c�-�3��7c3���� ���B��������c3�c�.c��c���� c�.c3���� ���c34�c����c��c.c���c34c�c���������c �3�� ���.c��c3��cc

4��cu���������������������c�������c��c���� c3���� ���c����� c��c�� ��c��c�������c��������.c����c��cc ����c+c�������c�c�-����� c����.c����cc ���� ��������c�3������c�����c4����7c�����7c�3 ��c��c �����5�c�������c��c�-����� c���������.c��c��������c��c���c��c���c ���� ��������c�3�������c+c�������c�cc ���c��6���c ������.c����� c����cc3�������c�����cA�c����c��������cc3������c�������B�.3�c��c�������c�c��� c����c���c�����c���c�.3�c��c�������c��c�����7�3 ��7 �����c� cC���.c��������c�����.7c�������c�cc��c��c ?"c�������c+c�������c�cc�������c��c���c����������c��cc���������c%��c������,c4�+c ���c������c�����c���.c@ !:�'c������cc�������c�����cc�������c���c��c+c ���c��������c�����c�����c�� c� c���c����c���cc���c�����cc�������c���cc

4��cu������������ ������� ��� ������������������������������ ��� �����c�c@�������c��c�����3c�.�c��c��� ��c�.�c����c�����c��C����c�������c��c���3���.c����c��c3����c���c�����c��c���cC���.�c�����c �3�� ���c��c���c�����c��c��c��c���.c�-3������cc

42�cu��������������� �������� ���������c�cA� �-c��������c���c���c���c��c��c���� c���.c����c�� �-�7c�������c��������c���c�����cc

49�cu���������� ��� ������ ������������ ��������c4;�cu���������������c�c+�c���3��c��ccC���.c��c��c���� ccc�����cG���c��c����c

���c����c�����c����c���c����������cG���c�cc3�����3��� c ?"cC���.c�����c�c�� c��c�����c �c����c���c��c����c�����c+c����c�c����cc����c���c��c ���1�c3�.����.c���c�.c3���cG���c�cc��� c�.c��c3�����c �c��cc3�������c�����c��c.��c��c���cC���.cC����c������cG���c��c��c��c�� c��c�������c���c����c������c���c����c ������.�cc

Page 98: Linux QANS Nov10

������� ������������ !�

4�c ë �������� ���������������������������� ������������� �"���������� ���#�u����� ������

�� ����� ��������

���c�42c ��c��c����cc���c���c������.c �3�.c���c�� c��cc�����c���c�42c����c���c��c �3�.c���c��c�������c����c��c���c3������ c�����cc

��c u� � ����������������� ������c���c � c���c���c���c �c �������.�c���c � c� c � �!(c���c��c����� c����c���c ���c�c����� �cc

��c ë ��� ��������� ������� ���� �������#�ë ��� ������� ������������ ���� ��� �� ������� #�$�� ������ ���������� ���������� ����������������� ���� ���������"�����

����%%%%%%%%%��������#�c/��cc���c/��c������.c����c.��c��c�-����c���c�������c��cc���3��� c����c����c���c��c�.c���c��c �3�.cc�����cc

��c ë ���������������� �������� �� ��������������������������������� ���������� ���� ���������������������������#�u����� ����������� ������� ���������������

� ���� �� ������� �����������������c�����cc���c�����c����� c�����c.���c3��c�����c��c��� cc����� c���c�����c���c����� c.��c��c�������c���c� c �3�.c��c����c3���cc

2�c ë ��� �������� �������������&���������� �������� �� ���� ��������� ��#�u����

� ����������� ������� ������������������� ��#�c����cc���c����c����� c �3�.cc����.c����c����c���c��c3��c���c���c3������ c����� �cc

9�c ë ������� ���������������� �����&����������� ������� �'��� ��������� ���� �� ������������� ���������&�����&� ��&� �&������������������ �����������#�u���� ��� ��

�� ����� ��������������� ������������ ��������������#�c:�c���c�%c�3����ccA�c�� ��c��c�����cc����c��cc �������.c.��c���c��c���c�%c�3�����cc

;�c u����� ������������� ���������(�"��������������������� ������������������������

�������������������'��%%%%%%%%%%%#�c�.3�cc���c����c�������c��c���c3�������c�����c ������c���c�.3�c��c����c���c�c�����c �3�.� �cc

<�c u����������������� ������� ��� ������������������� ������������ ��������

%%%%%%%%%%�c��3cc���c��3c������.c���cc������c��c��c�������c3�����c���c�c .������.c�3 �� �cc

>�c u����������������� ������������������������c��c���c�����c��c �3�.cc�.c �����7c.���c����c �����c�� � c���3��c��c.���c�����c��c �3�.�cc

Page 99: Linux QANS Nov10

4��cë ������� ����� ��������������� #�������������������������������������)�*�����#���#�u����� �������� ����� ��������c��c-�c(.����3���c��������cc���c����� c��c���c-c�����c��c�-����cc�����c����c���c����c��������c����c��c������ c����c���c������c(.����3����cc

44�cë �������� ���������� ������� ���������������������)�*�����#���#�u����� ������

����� ������cc��c��c(.����3���cc���c�c�����c����c��c��c �3�.c���c�������c� c���c�c�� �����c3������c�����c����c��c�-�����cc

4��cë ������� ����������� ���������������� �����������'�� ��������� ����#�u����

���������� ����� �������c��cc���c��c��c���c/c�� �����c����c��c��c���3��c.���c������c�c���c��c����cc�������c���cc

4��cu�������� ��������� �������� ������������������ ��� �����������c.��� cc���c.��� c ����c�c��3������c���c�������c.���c����������c� c����c��c��c3������ c���c�����cc

4��cë ����������������������� ��� ������������� ���+",,,�������� ��#�u��������������������

� ������� ������������� �� ���������������-",,,�������� ����c3���cc���c3���c��-�c������c����c ��� �c����c����c�C���.c�/� c3�����c���c �����c������c��c���c3����c�c47���c�����cc

42�cë �� ���������� ����� ��������������� ���� ��������������� ��� ������#�u����

� �������� ����� �������� ������������c��c��c��cc���c��c����� c�c�� c��c���c�����������c�������cA�c���c��7c.��c��c����������c.���c����c��c���c��cc.���c����� c����c� �����c�������7c����c.��c���c���c� c���c���c��c.��c����c������c��c���c3�������.c ����� c����� c����c� �����cc

49�cu������� �������������������� �����������������c����cc��������c.��c�����c"���-7c���.c���c���c������c�c����� �c���c�c���c�3�����c������c��c�����cc�����cc

4;�cu����� �������� ����� ������� ������������������ ��������������������������������

���������'����������� �����c��3C���cc���c��3C���c����� c�c�� c��c���cc��3���c��c���c���c��c���cC���c.��c���c��c����� ���c���c�����c��c������ c3��c� c�����c��c�� c3���cc

cc

c

c

Page 100: Linux QANS Nov10

��������������� ���� �������������� ���

4�c ���������������������������������������������������������������������c�c ����c�����.c�c����� c����c���c�-�������7c�����cc .����c�����.c4��c��� c��6���5c�c�� � c�����c���c�-�������c�c���� �c

��c � �� �� ��������������������������c�cA�c.��c���cc����������c��c��6���c4��5c����7c.��c��c �c��c�.c�������c�c����� �cD������.cc����c�����.c�cc�c�-������7c� c.��c��c����c��c����c�c�-�������c�.c3���� ���c��c�����.���c��c����c

��c u������� ������������� ��������������������������� �������������c�cD=:c�������� cB��B����B���c���c������c� cB��B����B���c���c��������c

��c u���'����%�$*.!.ë%/!0��c�cA�1c�c�����������c������c���c���c��c���c ���������c�����c���� c��c�����c���c�������c������c���c�� � c ���������c��c����� �c

2�c � �� �� ��������������������������c�c#����c���c��6���c����c����c��@A#c���c3��������� �3�� ���c�� �7c����c���c���c����c���� c�3�����c

9�c � �� �� ���������������������������c�c&��c� ������c��c���c�� � c �������.c���c��1c������ c���c

;�c u����� �������� �c�cA�c���cc���c��c������ c��� c��������c<�c � �� �� ��������������� ����������������� �������c�c:�c ��3��45c>�c u����� ������� ������� �c�cA�c��3���c���c���c��c.����c��cc�����c�����.�c

*�������������������������� ���

4�c � �� �� ������� ������'��� ���������c�c����cH �!""c��c u���'������� ������� ������ ���� ���'�������c�c ��c��c u���'������� ������� ������ ��������� �������������c�c���c��c � �� �� ������� ��������������������� ���� �'������c�c3� c2�c � �� �� ����� ����������c�c��c9�c � �� �� ����� �����12����2��3�(����(��c4#c � �� �� ������� ���� ��� ������������(�� ����5#c � �� �� ����������������������� �� ��� ����(������� ��� ��6�������������#� ��(��7ë ����������'�(��7��6�������������#� �7�

8#c � �� �� ��� ���� ���"���������������������������������(���-,#c� �� �� ���������� ��������������������������������(����������������������--#c� �� �� ���������� �������������������������� ����(�������������9�-:#c� �� �� ���������� ���������������������� �������������������� ���������������(������(���������9�

-;#cu��������/$����(�0���������� �����$���������� ��� ������#�!�/$������������� ��,�� �

<==;=#�

-+#c� �� �� ��������������������������� ������(����-=#c� �� �� ���� ������ ������(����������-<#c� �� �� ������� ����� ����������������� ��������(����(���-4#c� �� �� ���� ������������ ������"��������������������� ��(������,�-5#c� �� �� ����������� ������������������ �����(�#&�� ����(����� �

Page 101: Linux QANS Nov10

-8#c� �� �� ��������� ����������������������� �����������������(�>-"�>:������ � �#�>,����� ��������������#�

:,#cu���'������� ����� ����������������������������������(����?� ����� �@������A����

:-#c� �� �� ��� ��������� ������ ��������������������(�(�"�(��"�(��"�(��"�(��"�(���::#c� �� �� �������� ��������� ��������������������������(�(������������������ ������������������ �������"�(������������������ �������������������������������"������ ���������� ��"�(

�������������������������������������������� ��"������ ��������"�(����������������� ��

�����������"�(������������������ �������������"�(������������������ ����������������

:;#c� �� �� ��� �* ������ ���� ����� �����������������������(�B�������� ��� ������� �"�(��������� ��� ���������"�����( �������� ��� ������ �#�

:+#c� �� �� ������� �������������� �������������������� �������������������(�>C�:=#cu���'�������� �� ��������������(����'����������������������(����?� ����� �@������

?���������@������?� ����� �@�?���������@����

:<#c� �� �� ���������� ��� ������������(�� ��?�������������@����?����@�� �?���������@�� ���

:4#c� �� �� ��������������� ������������(������?� ����� �@�� �?���������@�� ���:5#c� �� ��������������������� ��������������������(������?��������@����?� ������(�����(-@D�?���������@EE�?� ������(�����(:@D�?���������@EE������

:8#c� �� �� ����������� ����������������������������(������?��������(����@�;,#c� �� �� ����������������� ���������������������(������� �(����FD�?�C� ���� ���������������@�

;-#c� �� ������ ����� ������ ����(�0��������������� �� ���������������������������(��-=�(��:,#�$����������������"�� ����������������� ����������� ������������������

��� �����G�� ��� �"������������������> ��� ��� ����������������� �������������� ��� �#�

cc

c

c

c

c

c

c

c

c

c

c

Page 102: Linux QANS Nov10

������$�������������� ���!���!��������(�-�

cë �������� ���������������������������� ������������� �"���������� ���#�u����� �������� ����

� �������

���c�42c ��c��c����cc���c���c������.c �3�.c���c�� c��cc�����c���c�42c����c���c��c �3�.c���c��c�������c����c��c���c3������ c�����c

u� � ����������������� �����c���c � c���c���c���c �c �������.�c���c � c� c � �!(c���c��c����� c����c���c ���c�c����� �c

ë ��� ��������� ������� ���� �������#�ë ��� ������� ������������ ���� ��� �� ������� #�

$�� ������ ���������� ���������� ����������������� ���� ���������"���������%%%%%%%%%�

�������#c/��cc���c/��c������.c����c.��c��c�-����c���c�������c��cc���3��� c����c����c���c��c�.c���c��c �3�.cc�����c

ë ���������������� �������� �� ��������������������������������� ���������� ��

�� ���������������������������#�u����� ����������� ������� ���������������� ���� �� ��

����� ����������������c�����cc���c�����c����� c�����c.���c3��c�����c��c��� cc����� c���c�����c���c����� c.��c��c�������c���c� c �3�.c��c����c3���c

ë ��� �������� �������������&���������� �������� �� ���� ��������� ��#�u����� ������

����� ������� ������������������� ��#c����cc���c����c����� c �3�.cc����.c����c����c���c��c3��c���c���c3������ c����� �c

ë ������� ���������������� �����&����������� ������� �H��� ��������� ���� �� ������������

� ���������&�����&� ��&� �&������������������ �����������#�u���� ��� ���� ����� ������

��������� ������������ ��������������#c:�c���c�%c�3����ccA�c�� ��c��c�����cc����c��cc �������.c.��c���c��c���c�%c�3�����c

u����� ������������� ���������(�"��������������������� ���������������������������������������

����H��%%%%%%%%%%%#c�.3�c

Page 103: Linux QANS Nov10

c���c����c�������c��c���c3�������c�����c ������c���c�.3�c��c����c���c�c�����c �3�.� �c

u����������������� ������� ��� ������������������� ������������ ��������%%%%%%%%%%c��3cc���c��3c������.c���cc������c��c��c�������c3�����c���c�c .������.c�3 �� �c

u����������������� �����������������������c��c���c�����c��c �3�.cc�.c �����7c.���c����c �����c�� � c���3��c��c.���c�����c��c �3�.�c

ë ������� ����� ��������������� #�������������������������������������)�*�����#���#�

u����� �������� ����� �������c��c-�c(.����3���c��������cc���c����� c��c���c-c�����c��c�-����cc�����c����c���c����c��������c����c��c������ c����c���c������c(.����3����c

ë �������� ���������� ������� ���������������������)�*�����#���#�u����� ������ ����

� ������c��c��c(.����3���cc���c�c�����c����c��c��c �3�.c���c�������c� c���c�c�� �����c3������c�����c����c��c�-�����c

ë ������� ����������� ���������������� �����������H�� ��������� ����#�u������������

�� ����� ������c��cc���c��c��c���c/c�� �����c����c��c��c���3��c.���c������c�c���c��c����cc�������c���c

u�������� ��������� �������� ������������������ ��� ����������c.��� cc���c.��� c ����c�c��3������c���c�������c.���c����������c� c����c��c��c3������ c���c�����c

ë ����������������������� ��� ������������� ���+",,,�������� ��#�u��������������������� ������

� ������������� �� ���������������-",,,�������� ���c3���cc���c3���c��-�c������c����c ��� �c����c����c�C���.c�/� c3�����c���c �����c������c��c���c3����c�c47���c�����c

Page 104: Linux QANS Nov10

ë �� ���������� ����� ��������������� ���� ��������������� ��� ������#�u����� ������

�� ����� �������� �����������c��c��c��cc���c��c����� c�c�� c��c���c�����������c�������cA�c���c��7c.��c��c����������c.���c����c��c���c��cc.���c����� c����c� �����c�������7c����c.��c���c���c� c���c���c��c.��c����c������c��c���c3�������.c ����� c����� c����c� �����c

u������� �������������������� ����������������c����cc��������c.��c�����c"���-7c���.c���c���c������c�c����� �c���c�c���c�3�����c������c��c�����cc�����c

u����� �������� ����� ������� ������������������ �������������������������������������

����H����������� ����cc��3C���cc���c��3C���c����� c�c�� c��c���cc��3���c��c���c���c��c���cC���c.��c���c��c����� ���c���c�����c��c������ c3��c� c�����c��c�� c3���c

$�� ������ ���������� ������� ��������� �"������ ��������� ����������� ���������

�� ���.cc���c�����c���c���c��cc3�������c���c�c������ cc�� �������c

$�� ������ ����� ���� ���������H������������ ���������� ��������������� ����� ���#�

u����� �������� ����� ������c3�����cc���c3�����c����� c�����c���c����cB���B� ��c� c�����c��c3��� c��cI-Ic��c���cB���B3� c�����c

* ��!����� ��"�� ���������������� ��� ��"�������� ������� ������ �� ���������� ��#�u����

� �������� ����� ������� ������������ ������c3� c���cc���c3� c����� c�c�� c��c�����c.���c3��� �cA�c.��c �c���c3����.cc������7c.���c3��� c����c��c����� �c

0���� ����������������������� ��������������� ����� �������������� ������!� ������������������

������� ���������� ����������� ��������%%%%%%%%%%%�c����cc����c���c��3c� c����c��������c3���� �c���c�3�����.c��c�����c���c3������.c��cc�������c3�����c

Page 105: Linux QANS Nov10

u����� �������� ����� �������� ��������������������������������� �� ��H���H�����������

��������������������� ������������&� ��&���&��� �������� ��#c�c��cB����B���B����B$����cc���c��c�3����c�� c����c�c�����c��c���c����c�����c���� c��c������������c�� ���c���c��c��c��� �� c����c���c�c����� c��c3����.cc3�����c��c��������c

c

c

c c

c

c

c

c

c

c

c

*�������������������������� ���

�.c ���cJcK��.c��7c���;c

4�c � �� �� ������� ������'��� ���������c�c����cH �!""c��c u���'������� ������� ������ ���� ���'�������c�c ��c��c u���'������� ������� ������ ��������� �������������c�c���c��c � �� �� ������� ��������������������� ���� �'������c�c3� c2�c � �� �� ����� ����������c�c��c9�c � �� �� ����� �����12����2��3�(����(��c4#c � �� �� ������� ���� ��� ������������(�� ����5#c � �� �� ����������������������� �� ��� ����(������� ��� ��6�������������#� ��(��7ë ����������'�(��7��6�������������#� �7�

8#c � �� �� ��� ���� ���"���������������������������������(���-,#c� �� �� ���������� ��������������������������������(����������������������--#c� �� �� ���������� �������������������������� ����(�������������9�-:#c� �� �� ���������� ���������������������� �������������������� ���������������(������(���������9�

-;#cu��������/$����(�0���������� �����$���������� ��� ������#�!�/$������������� ��,�� �

<==;=#�

Page 106: Linux QANS Nov10

-+#c� �� �� ��������������������������� ������(����-=#c� �� �� ���� ������ ������(����������-<#c� �� �� ������� ����� ����������������� ��������(����(���-4#c� �� �� ���� ������������ ������"��������������������� ��(������,�-5#c� �� �� ����������� ������������������ �����(�#&�� ����(����� �-8#c� �� �� ��������� ����������������������� �����������������(�>-"�>:������ � �#�>,����� ��������������#�

:,#cu���'������� ����� ����������������������������������(����?� ����� �@������A����

:-#c� �� �� ��� ��������� ������ ��������������������(�(�"�(��"�(��"�(��"�(��"�(���::#c� �� �� �������� ��������� ��������������������������(�(������������������ ������������������ �������"�(������������������ �������������������������������"������ ���������� ��"�(

�������������������������������������������� ��"������ ��������"�(����������������� ��

�����������"�(������������������ �������������"�(������������������ ����������������

:;#c� �� �� ��� �* ������ ���� ����� �����������������������(�B�������� ��� ������� �"�(��������� ��� ���������"�����( �������� ��� ������ �#�

:+#c� �� �� ������� �������������� �������������������� �������������������(�>C�:=#cu���'�������� �� ��������������(����'����������������������(����?� ����� �@������

?���������@������?� ����� �@�?���������@����

:<#c� �� �� ���������� ��� ������������(�� ��?�������������@����?����@�� �?���������@�� ���

:4#c� �� �� ��������������� ������������(������?� ����� �@�� �?���������@�� ���:5#c� �� ��������������������� ��������������������(������?��������@����?� ������(�����(-@D�?���������@EE�?� ������(�����(:@D�?���������@EE������

:8#c� �� �� ����������� ����������������������������(������?��������(����@�;,#c� �� �� ����������������� ���������������������(������� �(����FD�?�C� ���� ���������������@�

;-#c� �� ������ ����� ������ ����(�0��������������� �� ���������������������������(��-=�(��:,#�$����������������"�� ����������������� ����������� ������������������

��� �����G�� ��� �"������������������> ��� ��� ����������������� �������������� ��� �#�

c

c

c

c

c

c

c

c

c

Page 107: Linux QANS Nov10

������$�������������� ���!���!��������(�:c

cu���������������������������� ������������������� ��������� ��������c��������cc��c ��������c���c�����c�����c��c����c���c��c ����� c��c.���c.���7c�-����c���c��������c�����c

u����� ��������������� ���� ����������� ������������� ����� ���c�3� c��cc���c�3� c����� c�c�� c��c�����c���c3��� c���� c��cc����3�c:�c���c��c�3����c��c������c���c3��� c����c���c����3�c

u����� ������ ����� �������� ������������ �� ������������������������������#��� � ������

���������H�� ��������� �����c��� cB����cJc�3��c��cLc����3��3��cc���c��� c����� c�c�� c��c�����cc���c��c���c����c� c ���������c������� c��c�����c���c���c�c����c3�3� c��c���c�3��c������.ccc���c��c����c��c����� �c� c���c���3��c�c�� c��cc����c���� c����3��3���c

u��������� ������������� ������������ ����������������������� ������������c����cH �!""cc���c���c� c3��c��c���c����c.��c��c����c�c�� c��c���c �!""c�����������c�������c���c��c����c��c���c����c����� c��c3����c���c���c����c��c�.c������c�.c3���� ���c���c������Ic���c����cH�c���������7c�.3���c����cH �!""c����c �3�.c���c���c��c.���c�����c

u��������� ��� ��������������������� ������� ��� ������������������� ������������ ������������

� ���������������������������� ������������� ���

!D�$�����

*D�Iáá0J��

KD��Já�

�D�JJ0/�

�D�JIác!c�c���c��c��c�c=% c�����c��c3���� �c���c ����������c���������c������c��c���c������c��c�����c.��c��c3���������c���c����������c+����c7c�7c�7c� c c��c��c��� c����c���c����c��c����c��c����c������cA��� c�c���c�3�� ����c�����c�������c��c�������������.c�� c�������c�������c���c% �=�c�c���c"���-c%���c .���c �� � �c�= c3���� �c ����c���c���������7c� c==�@c�c���c������c3�������c���c�����c����c

$��� ������������ ����������� �� �3��������� ����� ������ ��� ������������K� ��� ��G�

�#�!������ ����������� ���#�

�#�0���� ������� ������������ �#�

�#�0���� ������� ������������ ������������� ����������#�

Page 108: Linux QANS Nov10

�#�J ������������� ���������������� �������������#�

c cc����c.��c��cMcLc���c�� ��������7c��c�� �����c����c���c�� � c���3��c� c�� � c������c���c���3��c���� c��c�� c��c���c����c���c

ë ������� �������� ���� ����������������������� ������ ��� ������������������ ��� ����� ���

�������� �����#�ë ��� ���������� �������������������������������������� ������� �� ���� �

� ����������� ������������������ ���#�u����� ����������� ������� �����������������

K� ��� ��G�

�#������������������������

�#��������������������������

�#�����������������

�#����������������cc cc���c�c�����c����c���c���c����c������� c��c���c�������c:���c���c�c�� �����c����c �3�.c���c���� c �������.c���������c

ë �����������&���������� ��� ������ ��������� �#�ë ����������� ��� �������#�u������ ����

� ��� ��K� ��� ��G�

�#�.�� ��������� ����������� �� �������� ������ �������#�

�#�L��������� �������������������� �#�

�#����������������� �������#�

�#������������������� �����������������������������������#cc cc���c���.c�.c��c������cc3�������c�c��c �����c��c� c�������c���c���c����c����c���c��c������c���c�����.c����c����c����3�c

ë ��������������������� �� ����K�(.M)������� ������� ��������#�u������ ����� ���������

���������

K� ��� ��G�

�#�.������������������ ����������� ��� ������K�(.M)#�

�#�L�������� ����� ������� �� ����� ���K�(.M)��������(����#�

�#�L��������� ����� ������� ��������� ���K�(.M)#�

�#�L�������� ����� ������� �� ����� ���K�(.M)��������( ���#cc cc������c.��c��c�� c�.c��c���c����c������� c��c���c#��&'(7c.��c���c����c�����c���c#��&'(�c

Page 109: Linux QANS Nov10

u����� ��������������������� �"�� �������� �������������������������������������������������

�������%%%%%%%%%%%%%#c�.��� ��cc����c�������cc���c3�������c.��c���c����c3����.c��c������c�.��� ���c���c��c����c������c3����.c��c�/�c��c���c�� ���c�.��� ���c

������$�������������� ���!���!��������(�;c

cu��������� ������� ������� ��������� �������������������� ����������������������

������ �����

�����/cc:���c�����/c����c�3�� cc6��c� c3��c��c��c���c�������� �c

0����������"�� ���������� ��� ������������������������ �%%%%%����� ��� ������ ���� �#c��3.cc���c����c���c���c����c��c������c�3cc����c�c��c���cc��3.c��c���c����c��c������c�������c���ccc���33.c ���c

u��������� ������������������ ���� ������������$/������������ ���������������������

���������� ���� ������

!D�á)*�

*D�JIá�

KD���K/�

�D�I0�

�D��00/cc#c�c���c��c��cc��#@c�����c��c���cA@c ���c��c�� ��� ��c������c �����c���c���������c3�����c+����c7c�7c 7c� c�c���c���������c"���-c�����7c���c����c�����c �c���c3���� �cA@c ����c���c (�7c��c ��7c����c�c�� c���c����c� c3����c�����c���c������' c��������c+�c=% c�����c�c���c����c�����c���c"���-c���������c%�@c�cc����c�����c�����c���c����c3��3��c��c�����c� c��������c����������c�.c�������c��c��c��7c� c���@c�c���c���c����c

u��������� ������������� ����� ����������� ����������������������������� ��������

� ����H������� ������������

!D�/!)�

*D����%��������

KD����� �

�D������������

�D����cc#c�c���c� ��c3��� c3����c����c���c������c3��� c����c��cc����c�����c��������c

Page 110: Linux QANS Nov10

+����c7c�7c� c�c��c3����c��c��� c3����7c���c����c��c����c3���c���c3��� c����c��cc����c�����c��������c+����c c3����c��c�c����� c3�����c

u������������������� ��������������������� ���"������ ������� �� �������������� ��� ���

��� ���������#�

K� ��� ��G�

�#�!��������L$�#�

�#�!���������������������#�

�#�K��������������H��� ��������� ��#�

�#����������������H��� ��������� ��#cc�cc���c��� c����� c����c��c���c.���c �����c���c���c���Ic����c �������.�c���c����c �������.c�c���c����� 7c�������7c����c.��c��c���c��c�3�����c

ë ������� ���������������� ��� ��������� ������� �����(����#�u���� �����������

������������ �� �������

K� ���M���

�#�/�������������������������������� ������������������������

�#�/�������������������������������������������

�#�������������� ����������������(� � ��FED��������������������������������� ������

�#�������������� ������������&��������������������������������� �����cc�cc���c���������c�.c��c�� c��c����c���c����c���c.��c��c��������c�����3��c����� c���c���� c��c�-����� c�����.�cA�c����c����c����� c���c.��c���� c���C�����.c���c��c���7c����cc���3�c�����c��c����c����������c�������7c��c���c����c����� c���.c����7c�����c���c����� c ������.c�c���c����� c�����c

ë ����������� ��������� ����� ������������������������#�u������������������� ������

&���&���������������������������

K� ��� ��G�

�#�0���� ����� ����������������#�

�#�0���������������� �� ��#�

�#�0������� �����������������#�

�#�0������� �����������������������������������#cc�cc���c3��� c���� c���c���c��c����c������c����������c��c� ��c3��� �c

u����� ������������������������ �"�� ��������� �� ���������������� �������� ���������

���������#�u����� ����� ��� ��� ������� ��������� ������������������������������� ��

�������)�!����

Page 111: Linux QANS Nov10

K� ��� ��G�

�#�&���&)�!���

�#�&���&� �&)�!���

�#�&���&� �&)�!���

�#�$����������������� ��������������������� ��������������#cc�cc���c �����c�������c���c33�������c �����������c�c��cc �������.c��� c���c���c33�������c��c���cB��B ��c �������.�c

u��������� ����� ����������� ���� ��������� ���� ���������������� ���������� ��

����� ������

!D�N�����

*D�#��������

KD�NI5<����

�D��������

�D���5<����cc+����,c�c�c���cNB�-������c����c����c.��c��c��c�����c��� ��c������c.��c���c��c��c����c�������c��c��cFc����c���c�������c+����c7c 7c� c�c��c��c����� c�����c+����c�c�c���c���cFc�����c������������c�����c

u����� ��������� ��� ��� ��������� ���� �(����������� ��� ����������K/L�������

!D����

*D������

KD������

�D������

�D�� ��cc+����,c�c�c���c����c����� c�c�� c��c�����cc6��Ic3������.c�����7c�c���c��c���c�����c��c�����c+����c7c 7c� c�c��c��� c����� c���c��c���c�� c��c�����c3����c�����������c+����c�c�c�c����� c����� �c

u������ ����� �������������������"�� ���� ���������������������� ��� ������������������

��� ���������������#�� ������ ��� ��������� ����������������� ��� ���� ��� ��"�� �� ���

����� � ������ ���

K� ��� ��G�

�#�$���������� ������� �� �#�

�#�$���������� �����������������������������������#�

�#�$���������� ������������������� � ���������������#�

�#�$���������� ������� � ��� ����������������������������#cc+����,c�c���c��c��c���c�c����� c��c������c�.c���c����� ���c�����c���c����c��c3���3�� c���c���c

Page 112: Linux QANS Nov10

3��� c���c���c����c�������c'���c.��c���c3���� � c��c.��c��c����� c��cc����c� c��c �c�.c ����������c �����c

c

������$�������������� ���!���!��������(�+c

0�����������������������������&���&����������#�u����� ������� �� ��������������������������������

� ������ ������

K� ��� ��G�

�#���������"�L$�"�O$�"�� ��������� ��"�� �����"�� ������

�#���������"�L$�"�O$�"�� �����"�� ��������� ��"�� ������

�#�L$�"���������"�O$�"�� ��������� ��"�� �����"�� ������

�#���������"�L$�"��� �������"�O$�"�� ��������� ��"�� ������

+����,c�c���c����c���� c��C���� c���c���c����c��c���cB���B3� c����c��c������7c:A�7cDA�7c�������7c����c �������.7c����� �c!��c��c����c���� c���c��c�3��� c�.cc�����c����c��c���.c��c��3�.�c

u����� ������� �� ����� ������������� �������� ���������������� ���� ��������� ���

�������������������������������� ������� ��������������� ������

K� ��� ��G�

�#����(��� ���

�#����(�.�&� ��&���������

�#����(�I�&� ��&���������

�#����(��&� ��&��������cc+����,c�c���c�c����� c�c�� c��c �3�.cc������c��c�����c���c�c�3����c����c���c�� ��c����c��c��c �3�.� cc�����c���c�&c�3����c���c�c��c������c ���c���c �������.c�����c+��c��c���c���c�c.���c����c �������.�c

$�� ������ ������������������ ��� ��������"�� �����������F�D�%%%%%%%%����������������� ��

�������� ��������#c+����,c������ccA�c.��c c�c������c�c���c���������c��c���c3��� c���� c��c���cB���B3� c����7c���c���c����c���c��c���c��c���c���c

ë ��������������� ����������&� ��&���&��� ����������� �� ������� �&� ��&� �&��� ��� �

� ������������� ���������&� ��&���&��� ��&� ��&� �#�u������������������� ����������� ���

K� ��� ��G�

�#�0���������� �����������&� ��&���&��� ������� ����� ����������� ���

&� ��&� �&��� �&��� �#�

�#�0���������� �����������&� ��&���&��� ������� ����� ����������� ���&� ��&� �&��� �#�

�#�0���������� �����������&� ��&���&��� ������� ����� ����������� ���&� ��&� �&#�

�#�0���� �������������������������� ������������� ������������������������������������� ��#c

Page 113: Linux QANS Nov10

c+����,cc����c����c���c��c����� c��c����cc �������.7c��cc �������.c��c���c��c���c�-��c����cc�� �������.c�c����� c���c���c����c��c��c���� �c

u����� ������� �� �������������� ��������������������������������������������������

&���&������������

K� ��� ��G�

�#�K��������������� ����������H��� ��������� ���� ���������������������������#�

�#�K��������������H��� ��������� ���

�#�L�������������� ������� �������������� ���� �������� ���#�

�#�!������������� ����������������� ��#cc+����,cc�����c�c��c��� c��c����c���c���Ic����c �������.c��c���c����c����� �c&����7c���c3������ c����c���c��c3�����c��c.���c.����c

ë ������������� �� ����� ��������������(��� ���*���������������� ��� � �#�u�����������

�� ������

K� ��� ��G�

�#�ë �������� �������������� ���� �� ��H����� ��������������������� �����#�

�#�ë �������� ��������� ��H��� ��������� ������������������� ��������������� ��#�

�#�ë �������� ����������&���&������������������������������� ��� ��H����� ���#�

�#�0���������������������������������������������� ��#cc+����,cc���c��� c����� c ��c���c���cc3��� c��c����.c����� c�������c���c����c����c��� c��c��c���c3� c����� c��c���cc3��� �c

ë ������� ���������������������� �������<,�������� �������#�u����� ������� �� ����

� �������������� �������������K� ��� ��G�

�#����(�<,������� ���P�����

�#����(�������� ���P�����

�#����(�������� ���P�����

�#����(�������� ���P����cc+����,cc���c �����c3��c������c����c����c3�c�c99c�����c���c��c�3����c�c�� c��c3����.cc ��������c�������c

c

c

c

c

Page 114: Linux QANS Nov10

������$�������������� ���!���!��������(�=c

cu���������������������������� ��� �����������

K� ��� ��G�

�#�&���&������

�#�&���&������

�#�&���&���� ���

�#�&���&����#� ��cc+����,cc���cB���B3� c����c������c��c���c����������c��c���c���c�.c���c����c.���c.����cA�cc���c������c�c���c������� c��c���c����7c����c���c���c�����c���c���c

u������ �� ������������ ������� �������������� ������

!D����

*D����(���

KD�������

�D����

�D����(��cc+����45,c�7c#c�c���c��c��c�� ��c��c��c���c��c �����cc �������.�c+����cc�c���������7c�����c���c��c����� c�������c�.c3������c���c����c���c �����cc �������.7c��c����c���.c �����c�����c+����c c� c�c3����c��cc�����-�����c����� �c

u������������ ������ �������������������������������� ����

!D������������

*D�������

KD�/������ ��)�����

�D�I!0;:�

�D������K �������cc+����45,c�c�c���c� ��c3����������c����c�c������c��c��c"���-c �����������c+����c7c�7c� c�c��c�� ��c3����������7c���c �c���c����c����c��c �����������c���c���� c�c� �c�.c&� c��c� c�� c��c��c ����������c����c����c���c ���������c@�������c(���c� c .���c#���� ��c��c����c� �c�.c���� �3��.c���3����c+����c c�c���cc����7c���cc����c.���c�.3��c 3��������.7c%+���c�c���c����c.���c�.3�c�� c��c��� ��c><�c

u������������ ���������� ��������� �����������������H������������F�D� ��������������� �"�

���"������ ��������� ����

QK� �������� ������������R�

!D�&���&�� ��

*D�&����

KD�&�� ��

�D�&����

�D�&� ���

c

Page 115: Linux QANS Nov10

+����45,c+7c�7c!c�c �3�����cB��B3���c����c��c���c3�������c���3c��c�����c���c��c��������c���c�����c����c���c���c�����c��c3���7c���c���3��c�����c�������c���c����c.����c@������cB��3c��c��c���c3�������c3������c������c������c��c���c����c��c���cB��3c �������.c����c�����������c���c����c.����c@�����cB����c���c��c��c���c�c����.c�����c���c.���c��������c��c�3�� �7c�������c.��c��c���c���c��c��3�c���cB����c�������.c����c����c�����c���c+����c�c� c c��c���c3�����7cc���cB3���c3������c��c���c����c.���c�c���������� c��c&+(����c3��� c��c���c�� c ����7c� c���cB���c�������.c�c�����.c���c���c.���c�����������.c� 7c���������7c���c���c���c.��c��c3���c��cc ��������c3��������c

u�������������� �������������������� �������� �� �������� � ������ ���������� �����

������"�� ������������������������������������������� ���������#�u���� ��������� ��

������ ��� ��������������������� ��������������������%%%%%%%%%cc���c��c����3c#������c�����c����c��c����3c�c���c����c��3c��c3������c.���c����3c�����.�c

u����������������� ������� ���� ������ ���� �� ��� ���c+����,c��������c���c��������c����� c��c��c�� c��c������c���c�������c��c�����c����c

$�� ������ ������������������������ �������� ����������������������������� ���� �����"�

� �� ���������%%%%%%%%%%%�#cc+����,c�����.c2c���c�����.c����� c �3�.c���c����� c.��c���c3�������.c������ �c�.c3���c��c�c�������c��c27c���.c���c��c����c����� c����c��c �3�.� �c

u����� ����������� ������� �������� �����������c+����,c ���c���c ���c����� c �3�.c���c.���c����c������� c��c���c������c����c�������c�.c����c���c����� c���� ����.c����c�������c.���c���3����7c.��c����c��c���c����c�����c

u�������������������������� ��������� ���� �������� ���������������c+����,c�c"���-c��c��c������ c��c���c3�������7c���ccBc�����c����c������c��c����c� cc�3c3��������c

u������������������������� ������������������� ��c+����,cB��B���B����c�.c �����7c���c���c.���c���c�cB��B���B�����c

M������� �� ��������� � ����"���������� �����������������(�������������

!D�S��������

*D�S����

KD�!á/�

�D�KTTcc

Page 116: Linux QANS Nov10

+����,c+c�cK� ���3�c�c���c���.c�������� �c���3�c���� �cK�c� c#OOc��c���3����c3���������c�������c+�����c �����c@��c��c3�� c��c���c�����c����c���c�����c�����c���c��c���c������c��c��("c

c

c

c

Page 117: Linux QANS Nov10

If you are preparing for interviews for linux admin jobs you should be familiar with below concepts..

1) Port number of different servers {cat /etc/services}2) Linux Installation(through FTP,HTTP,NFS)3) Boot process4) Diff b/w ext3 and ext25) RAID LEVELS and Selection of raid6) backup methods7) Package management such as Yum server8) Kernel Tuning9) IPTABLES10) TCP WRAPPERS11) DIFFERENT RUN LEVELS 12) USER AND GROUP MANAGEMENT13) QUOTA SETTING(user and group)14) DIFF B/W CRON AND AT15) BASIC SHELL SCRIPTING16) Troubleshooting different issues.17) Tell me why we should hire you?18) DAILY ACTIVITES IN YOUR CURRENT COMPANY19) RECENTLY SOLVED CRITICAL ISSUE20) LVM (Very Imp)21) vertias Volume manager22) cluster basic like HAD , GAB , LLT , HEARTBEAT , CONFIG FILES , RESOURSE , SERVICE GROUPS etc23 ) kernel panic troubleshooting24) Process management 25)Configuration part of NFS , NIS , Samba , DHCP , DNS,Apache, Sendmail etc.26)Remote administration experience.

Linux Interview Questions and Answers

You need to see the last fifteen lines of the files dog, cat and horse. What command should you use?tail -15 dog cat horse

The tail utility displays the end of a file. The -15 tells tail to display the last fifteen lines of each specified file.

Who owns the data dictionary? The SYS user owns the data dictionary. The SYS and SYSTEM users are created when the database is created.

You routinely compress old log files. You now need to examine a log from two months ago. In order to view its contents without first having to decompress it, use the _________ utility. zcat

The zcat utility allows you to examine the contents of a compressed file much the same way that cat displays a file.

Page 118: Linux QANS Nov10

You suspect that you have two commands with the same name as the command is not producing the expected results. What command can you use to determine the location of the command being run? which

The which command searches your path until it finds a command that matches the command you are looking for and displays its full path.

You locate a command in the /bin directory but do not know what it does. What command can you use to determine its purpose. whatis

The whatis command displays a summary line from the man page for the specified command.

You wish to create a link to the /data directory in bob's home directory so you issue the command ln /data /home/bob/datalink but the command fails. What option should you use in this command line to be successful. Use the -F option

In order to create a link to a directory you must use the -F option.

When you issue the command ls -l, the first character of the resulting display represents the file's ___________. type

The first character of the permission block designates the type of file that is being displayed.

What utility can you use to show a dynamic listing of running processes? __________ top

The top utility shows a listing of all running processes that is dynamically updated.

Where is standard output usually directed? to the screen or display

By default, your shell directs standard output to your screen or display.

You wish to restore the file memo.ben which was backed up in the tarfile MyBackup.tar. What command should you type? tar xf MyBackup.tar memo.ben

This command uses the x switch to extract a file. Here the file memo.ben will be restored from the tarfile MyBackup.tar.

You need to view the contents of the tarfile called MyBackup.tar. What command would you use?tar tf MyBackup.tar

The t switch tells tar to display the contents and the f modifier specifies which file to examine.

You want to create a compressed backup of the users' home directories. What utility should you use?

Page 119: Linux QANS Nov10

tar

You can use the z modifier with tar to compress your archive at the same time as creating it.

What daemon is responsible for tracking events on your system? syslogd

The syslogd daemon is responsible for tracking system information and saving it to specified log files.

You have a file called phonenos that is almost 4,000 lines long. What text filter can you use to split it into four pieces each 1,000 lines long? split

The split text filter will divide files into equally sized pieces. The default length of each piece is 1,000 lines.

You would like to temporarily change your command line editor to be vi. What command should you type to change it? set -o vi

The set command is used to assign environment variables. In this case, you are instructing your shell to assign vi as your command line editor. However, once you log off and log back in you will return to the previously defined command line editor.

What account is created when you install Linux? root

Whenever you install Linux, only one user account is created. This is the superuser account also known as root.

What command should you use to check the number of files and disk space used and each user's defined quotas?

repquota

The repquota command is used to get a report on the status of the quotas you have set including the amount of allocated space and amount of used space.

Linux Interview Questions and Answers

In order to run fsck on the root partition, the root partition must be mounted as readonly

You cannot run fsck on a partition that is mounted as read-write.

In order to improve your system's security you decide to implement shadow passwords. What command should you use? pwconv

The pwconv command creates the file /etc/shadow and changes all passwords to 'x' in the /etc/passwd file.

Bob Armstrong, who has a username of boba, calls to tell you he forgot his password. What command should you use to reset his command?

Page 120: Linux QANS Nov10

passwd boba

The passwd command is used to change your password. If you do not specify a username, your password will be changed.

The top utility can be used to change the priority of a running process? Another utility that can also be used to change priority is ___________? nice

Both the top and nice utilities provide the capability to change the priority of a running process.

What command should you type to see all the files with an extension of 'mem' listed in reverse alphabetical order in the /home/ben/memos directory. ls -r /home/ben/memos/*.mem

The -c option used with ls results in the files being listed in chronological order. You can use wildcards with the ls command to specify a pattern of filenames.

What file defines the levels of messages written to system log files? kernel.h

To determine the various levels of messages that are defined on your system, examine the kernel.h file.

What command is used to remove the password assigned to a group? gpasswd -r

The gpasswd command is used to change the password assigned to a group. Use the -r option to remove the password from the group.

What command would you type to use the cpio to create a backup called backup.cpio of all the users' home directories? find /home | cpio -o > backup.cpio

The find command is used to create a list of the files and directories contained in home. This list is then piped to the cpio utility as a list of files to include and the output is saved to a file called backup.cpio.

What can you type at a command line to determine which shell you are using? echo $SHELL

The name and path to the shell you are using is saved to the SHELL environment variable. You can then use the echo command to print out the value of any variable by preceding the variable's name with $. Therefore, typing echo $SHELL will display the name of your shell.

What type of local file server can you use to provide the distribution installation materials to the new machine during a network installation?A) InetdB) FSSTNDC) DNSD) NNTPE) NFS E - You can use an NFS server to provide the distribution installation materials

Page 121: Linux QANS Nov10

to the machine on which you are performing the installation. Answers a, b, c, and d are all valid items but none of them are file servers. Inetd is the superdaemon which controls all intermittently used network services. The FSSTND is the Linux File System Standard. DNS provides domain name resolution, and NNTP is the transfer protocol for usenet news.

If you type the command cat dog & > cat what would you see on your display? Choose one: a. Any error messages only.b. The contents of the file dog.c. The contents of the file dog and any error messages.d. Nothing as all output is saved to the file cat.

d

When you use & > for redirection, it redirects both the standard output and standard error. The output would be saved to the file cat.

You are covering for another system administrator and one of the users asks you to restore a file for him. You locate the correct tarfile by checking the backup log but do not know how the directory structure was stored. What command can you use to determine this? Choose one:a. tar fx tarfile dirnameb. tar tvf tarfile filenamec. tar ctf tarfiled. tar tvf tarfile

d

The t switch will list the files contained in the tarfile. Using the v modifier will display the stored directory structure.

You have the /var directory on its own partition. You have run out of space. What should you do? Choose one:a. Reconfigure your system to not write to the log files.b. Use fips to enlarge the partition.c. Delete all the log files.d. Delete the partition and recreate it with a larger size.

d

The only way to enlarge a partition is to delete it and recreate it. You will then have to restore the necessary files from backup.

You have a new application on a CD-ROM that you wish to install. What should your first step be? Choose one:a. Read the installation instructions on the CD-ROM.b. Use the mount command to mount your CD-ROM as read-write.c. Use the umount command to access your CD-ROM.d. Use the mount command to mount your CD-ROM as read-only.

d

Before you can read any of the files contained on the CD-ROM, you must first mount the CD-ROM.

Page 122: Linux QANS Nov10

When you create a new partition, you need to designate its size by defining the starting and ending _____________. cylinders

When creating a new partition you must first specify its starting cylinder. You can then either specify its size or the ending cylinder.

What key combination can you press to suspend a running job and place it in the background?ctrl-z

Using ctrl-z will suspend a job and put it in the background.

The easiest, most basic form of backing up a file is to _____ it to another location. copy

The easiest most basic form of backing up a file is to make a copy of that file to another location such as a floppy disk.

What type of server is used to remotely assign IP addresses to machines during the installation process? A) SMBB) NFSC) DHCPD) FTE) HTTP

C - You can use a DHCP server to assign IP addresses to individual machines during the installation process. Answers a, b, d, and e list legitimate Linux servers, but these servers do not provide IP addresses. The SMB, or Samba, tool is used for file and print sharing across multi-OS networks. An NFS server is for file sharing across Linux net-works. FTP is a file storage server that allows people to browse and retrieve information by logging in to it, and HTTP is for the Web.

Which password package should you install to ensure that the central password file couldn't be stolen easily? A) PAMB) tcp_wrappersC) shadowD) securepassE) ssh

C - The shadow password package moves the central password file to a more secure location. Answers a, b, and e all point to valid packages, but none of these places the password file in a more secure location. Answer d points to an invalid package.

When using useradd to create a new user account, which of the following tasks is not done automatically.Choose one:a. Assign a UID.b. Assign a default shell.c. Create the user's home directory.d. Define the user's home directory.

Page 123: Linux QANS Nov10

c

The useradd command will use the system default for the user's home directory. The home directory is not created, however, unless you use the -m option.

You want to enter a series of commands from the command-line. What would be the quickest way to do this? Choose Onea. Press enter after entering each command and its argumentsb. Put them in a script and execute the scriptc. Separate each command with a semi-colon (;) and press enter after the last commandd. Separate each command with a / and press enter after the last command

c

The semi-colon may be used to tell the shell that you are entering multiple commands that should be executed serially. If these were commands that you would frequently want to run, then a script might be more efficient. However, to run these commands only once, enter the commands directly at the command line.

You attempt to use shadow passwords but are unsuccessful. What characteristic of the /etc/passwd file may cause this? Choose one:a. The login command is missing.b. The username is too long.c. The password field is blank.d. The password field is prefaced by an asterisk.

c

The password field must not be blank before converting to shadow passwords.

When you install a new application, documentation on that application is also usually installed. Where would you look for the documentation after installing an application called MyApp?Choose one:a. /usr/MyAppb. /lib/doc/MyAppc. /usr/doc/MyAppd. In the same directory where the application is installed.

c

The default location for application documentation is in a directory named for the application in the /usr/doc directory.

What file would you edit in your home directory to change which window manager you want to use? A) XinitB) .xinitrcC) XF86SetupD) xstartE) xf86init

Page 124: Linux QANS Nov10

Answer: B - The ~/.xinitrc file allows you to set which window man-ager you want to use when logging in to X from that account. Answers a, d, and e are all invalid files. Answer c is the main X server configuration file.

What command allows you to set a processor-intensive job to use less CPU time? A) psB) niceC) chpsD) lessE) more

Answer: B - The nice command is used to change a job's priority level, so that it runs slower or faster. Answers a, d, and e are valid commands but are not used to change process information. Answer c is an invalid command.

While logged on as a regular user, your boss calls up and wants you to create a new user account immediately. How can you do this without first having to close your work, log off and logon as root? Choose one:a. Issue the command rootlog.b. Issue the command su and type exit when finished.c. Issue the command su and type logoff when finished.d. Issue the command logon root and type exit when finished.

Answer: b You can use the su command to imitate any user including root. You will be prompted for the password for the root account. Once you have provided it you are logged in as root and can do any administrative duties.

There are seven fields in the /etc/passwd file. Which of the following lists all the fields in the correct order? Choose one:a. username, UID, GID, home directory, command, commentb. username, UID, GID, comment, home directory, commandc. UID, username, GID, home directory, comment, commandd. username, UID, group name, GID, home directory, commentAnswer: b The seven fields required for each line in the /etc/passwd file are username, UID, GID, comment, home directory, command. Each of these fields must be separated by a colon even if they are empty.

Which of the following commands will show a list of the files in your home directory including hidden files and the contents of all subdirectories?Choose one:a. ls -c homeb. ls -aR /home/usernamec. ls -aF /home/usernamed. ls -l /home/username

Answer: b The ls command is used to display a listing of files. The -a option will cause hidden files to be displayed as well. The -R option causes ls to recurse down the directory tree. All of this starts at your home directory.

Page 125: Linux QANS Nov10

In order to prevent a user from logging in, you can add a(n) ________at the beginning of the password field. Answer: asterick

If you add an asterick at the beginning of the password field in the /etc/passwd file, that user will not be able to log in.

You have a directory called /home/ben/memos and want to move it to /home/bob/memos so you issue the command mv /home/ben/memos /home/bob. What is the results of this action?Choose one:a. The files contained in /home/ben/memos are moved to the directory /home/bob/memos/memos.b. The files contained in /home/ben/memos are moved to the directory /home/bob/memos.c. The files contained in /home/ben/memos are moved to the directory /home/bob/.d. The command fails since a directory called memos already exists in the target directory.

Answer: a When using the mv command to move a directory, if a directory of the same name exists then a subdirectory is created for the files to be moved.

Which of the following tasks is not necessary when creating a new user by editing the /etc/passwd file? Choose one:a. Create a link from the user's home directory to the shell the user will use.b. Create the user's home directoryc. Use the passwd command to assign a password to the account.d. Add the user to the specified group.

Answer: a There is no need to link the user's home directory to the shell command. Rather, the specified shell must be present on your system.

You issue the following command useradd -m bobm But the user cannot logon. What is the problem?Choose one:a. You need to assign a password to bobm's account using the passwd command.b. You need to create bobm's home directory and set the appropriate permissions.c. You need to edit the /etc/passwd file and assign a shell for bobm's account.d. The username must be at least five characters long.

Answer: a The useradd command does not assign a password to newly created accounts. You will still need to use the passwd command to assign a password.

You wish to print the file vacations with 60 lines to a page. Which of the following commands will accomplish this? Choose one:a. pr -l60 vacations | lprb. pr -f vacations | lpr

Page 126: Linux QANS Nov10

c. pr -m vacations | lprd. pr -l vacations | lpr

Answer: a The default page length when using pr is 66 lines. The -l option is used to specify a different length.

Which file defines all users on your system? Choose one:a. /etc/passwdb. /etc/usersc. /etc/passwordd. /etc/user.conf

Answer: a The /etc/passwd file contains all the information on users who may log into your system. If a user account is not contained in this file, then the user cannot log in.

Which two commands can you use to delete directories? A) rmB) rm -rfC) rmdirD) rdE) rd -rf

Answer(s): B, C - You can use rmdir or rm -rf to delete a directory. Answer a is incorrect, because the rm command without any specific flags will not delete a directory, it will only delete files. Answers d and e point to a non-existent command.

Which partitioning tool is available in all distributions? A) Disk DruidB) fdiskC) Partition MagicD) FAT32E) System Commander

Answer(s): B - The fdisk partitioning tool is available in all Linux distributions. Answers a, c, and e all handle partitioning, but do not come with all distributions. Disk Druid is made by Red Hat and used in its distribution along with some derivatives. Partition Magic and System Commander are tools made by third-party companies. Answer d is not a tool, but a file system type. Specifically, FAT32 is the file system type used in Windows 98.

Which partitions might you create on the mail server's hard drive(s) other than the root, swap, and boot partitions? [Choose all correct answers]A) /var/spoolB) /tmpC) /procD) /binE) /home

Answer(s): A, B, E - Separating /var/spool onto its own partition helps to ensure that if something goes wrong with the mail server or spool, the output cannot overrun the file system. Putting /tmp on its own partition prevents

Page 127: Linux QANS Nov10

either software or user items in the /tmp directory from overrunning the file system. Placing /home off on its own is mostly useful for system re-installs or upgrades, allowing you to not have to wipe the /home hierarchy along with other areas. Answers c and d are not possible, as the /proc portion of the file system is virtual-held in RAM-not placed on the hard drives, and the /bin hierarchy is necessary for basic system functionality and, therefore, not one that you can place on a different partition.

When planning your backup strategy you need to consider how often you will perform a backup, how much time the backup takes and what media you will use. What other factor must you consider when planning your backup strategy? _________

what to backup Choosing which files to backup is the first step in planning your backup strategy.

What utility can you use to automate rotation of logs? Answer: logrotate The logrotate command can be used to automate the rotation of various logs.

In order to display the last five commands you have entered using the history command, you would type ___________ .

Answer: history 5 The history command displays the commands you have previously entered. By passing it an argument of 5, only the last five commands will be displayed.

What command can you use to review boot messages? Answer: dmesg The dmesg command displays the system messages contained in the kernel ring buffer. By using this command immediately after booting your computer, you will see the boot messages.

What is the minimum number of partitions you need to install Linux? Answer: 2 Linux can be installed on two partitions, one as / which will contain all files and a swap partition.

What is the name and path of the main system log? Answer: /var/log/messages By default, the main system log is /var/log/messages.

Of the following technologies, which is considered a client-side script? A) JavaScriptB) JavaC) ASPD) C++

Answer: A - JavaScript is the only client-side script listed. Java and C++ are complete programming languages. Active Server Pages are parsed on the server with the results being sent to the client in HTML

when you create a user in linux , the default

settings comes from -------------

1) /etc/skel.

Page 128: Linux QANS Nov10

2)name the DNS records

2) Mx records.

3)What is the difference between hard links and soft links

3) Hard links for files only and soft links are for both directoris and files.

4)what is the difference between name base and ip base

virtual hosting

4) in ip base you are running more than one web site on the same server

machine,and in name base you have to put more than one DNS record for your IP

address in the DNS.

5)where are the kernel parameters stored in linux

5) in /boot.

6) you want to deploy linux on identical machines , which

method you will use

Unattendend Installation Method With the help of PXE Server & NFS server.

7)Name of the file which describe the kickstart installation

Anaconda ks.cfg

8) How you give another Ip address on the same NIC

(network card)

copy a file in /etc/sysconfig/network-script/ifcfg-eth0 to ifcfg-eth0:1 .

9)you defined samba shares and you want these shares to

be available on network , you don't want to restart samba

server

which command you will use ??

Page 129: Linux QANS Nov10

Service SMB restart

10)you want to monitor systems on your network ,what

utility you will use

TOP and ps

11) you want to backup a test.bak file on 11 PM every

Sunday what you will do?

Edit the cron tab entry

12) can you define the linux boot process

1. BIOS: The Basic Input/Output System is the lowest level interface between

the computer and peripherals.

The BIOS performs integrity checks on memory and seeks instructions on

the Master Boor Record (MBR) on the floppy drive or hard drive.

2. The MBR points to the boot loader (GRUB or LILO: Linux boot loader).

3. Boot loader (GRUB or LILO) will then ask for the OS label which will identify

which kernel to run and where it is located (hard drive and partition

specified). The installation process requires to creation/identification of

partitions and where to install the OS. GRUB/LILO are also configured

during this process. The boot loader then loads the Linux operating

system.

4. The first thing the kernel does is to execute init program. Init is the

root/parent of all processes executing on Linux.

5. The first processes that init starts is a script /etc/rc.d/rc.sysinit

6. Based on the appropriate run-level, scripts are executed to start various

processes to run the system and make it functional

Boot process takes place in 4 scenes with 4 main characters.

Scene 1

when the computer is switched on,it automatically invokes BIOS[a ROM chip

embedded in the motherboard].The BIOS will start the processor and perform a

Page 130: Linux QANS Nov10

POST[power on self test] to check whether the connected device are ready to use

and are working properly.

Once the POST is completes BIOS will jump to a specified location in the RAM and

check for the booting device.The boot sector is always the first sector of the hard

disk and BIOS will load the MBR into the memory.

Scene 2

Here the boot loader takes the control of the booting process.LILO or GRUB are

the boot loaders commonly available. It will help the user to select various boot

options.Depending on the boot option selected the kernel is loaded.

scene 3

After kernel is loaded the kernel will take the control of the booting process and it

will initialize all the hardwares including I/O processors etc.kernel then creates a

root device and mounts the partitions.

Scene 4

INIT is loaded.

13)what is initrd

initrd image is the initial ram disk image While the system getting booted the kernel image will

get loaded into the main memory.

14)can you name of the actual kernel in linux

vmlinuxz.

15) how you get the kernel version

uname -r .

16)how you change run levels in linux

Page 131: Linux QANS Nov10

/etc/inittab

17) you want /dev/hda10 mounted whenever your system

boots what you will do

put the entry in fstab with proper drivers and mount point(/dev/hda10 mount

point ext2/3 defaults 0 0).

18) you want bind to be run at boot time ,which command

you will use

chkconfig.

19)which utility will give you information about running

process at run time

top command and ps -el.

20) you want to know if nfs package is installed on your

system

rpm -qa nfs and you can check export file in /etc.

21) what is the difference between rpm , yum and RHEN

rpm required dependency software and yum can install automatically with

dependancy

22) what is a proc directory

/proc directory are not real files--they are hooks to look at information available to the kernel.

23) what is the difference between current directory and

home directory

home directory is one over which user have complete controland it is its default working

directory when its logs in.while the current directory is the users current directorywhich may or

may not be his home directory.

24)what is exit status in linux

You can use $? to find out the exit status of command($ echo $?).

25)you have a dual boot system with windows XP and

Page 132: Linux QANS Nov10

Fedora Linux , you want to access windows partition which

is on fat32 file system , what you will do ??

1.Differences between TCP and UDP

TCP

1)TCP -Transmission control protocol

2)TCP is a connection oriented protocol.

3)Three way handshake happens between client and server.

4)TCP is a reliable data transfer

5)slow transmission of data compare to UDP.

6)TCP is used to send file like database,where reliability play the first role

UDP

1)UDP -User Datagram protocol

2)UDP is connectionless protocol

3)NO 3 way handshake

4)NOt a reliable data transer

5)Faster than TCP

6)used to send data like video,audio

1. DNS (Domian name server )

DNS resolves hostname to IP address (forward lookup),

resolves IP address to hostname (reverse lookup), it allows machines to logically grouped by

name domain, provides email routing.

DNS port: 53

dameon: named

What utility can you use to automate rotation of logs?

Logrotate

Any user who is listed in the /etc/shutdown.allow file will be able to run the shutdown command without being root.

As the system administrator you have created a directory containing some scripts

that you have written. You want to have all your users to be able to run this

scripts. Which file should you edit to ensure that the scripts will run without your

users having to type the complete path to the script?

Page 133: Linux QANS Nov10

Choose one:

a. ~/.profile

b. /etc/profile

c. /etc/bash

d. ~/.bash

b. /etc/profile

What are the files to be used in the network installation of linux

os?/etc/sysconfig/network,/etc/resolv.conf,/etc/hosts

: What is the command to see the installed rpm's in the linux

system.you can view the installed rpm in your linux box by :

rpm -qa | grep rpm name

Please explain the file structure of linux?root - The home directory for the root user home - Contains the user's home directories along with directories for services ftp HTTP samba george bin - Commands needed during bootup that might be needed by normal users sbin - Like bin but commands are not intended for normal users. Commands run by LINUX. proc - This filesystem is not on a disk. It is a virtual filesystem that exists in the kernels imagination which is memory. 1 - A directory with info about process number 1. Each process has a directory below proc. usr - Contains all commands, libraries, man pages, games and static files for normal operation. bin - Almost all user commands. some commands are in /bin or /usr/local/bin. sbin - System admin commands not needed on the root filesystem. e.g., most server programs. include - Header files for the C programming language. Should be below /user/lib for consistency. lib - Unchanging data files for programs and subsystems local - The place for locally installed software and other files. man - Manual pages info - Info documents doc - Documentation tmp X11R6 - The X windows system files. There is a directory

Page 134: Linux QANS Nov10

similar to usr below this directory. X386 - Like X11R6 but for X11 release 5 boot - Files used by the bootstrap loader, LILO. Kernel images are often kept here. lib - Shared libraries needed by the programs on the root filesystem modules - Loadable kernel modules, especially those needed to boot the system after disasters. dev - Device files etc - Configuration files specific to the machine. skel - When a home directory is created it is initialized with files from this directory sysconfig - Files that configure the linux system for devices. var - Contains files that change for mail, news, printers log files, man pages, temp files file lib - Files that change while the system is running normally local - Variable data for programs installed in /usr/local. lock - Lock files. Used by a program to indicate it is using a particular device or file log - Log files from programs such as login and syslog which logs all logins and logouts. run - Files that contain information about the system that is valid until the system is next booted spool - Directories for mail, printer spools, news and other spooled work. tmp - Temporary files that are large or need to exist for longer than they should in /tmp. catman - A cache for man pages that are formatted on demand mnt - Mount points for temporary mounts by the system administrator. tmp - Temporary files. Programs running after bootup should use /var/tmp. The Linux system contains thousand of files located withinmany directories. All directories are organized in atree-structure like manner.

* The 'trunk' of the tree is the root directory. * The root directory is simply identified as a "/". * All other directories 'branch' off from the trunk.

The following lists the most common directories and theirintended contents.

* / - root directory * /home - where directories are contained for each user,example: * /usr - pronounced 'user' and contains Linux commandsand utilities o /bin - binary executable programs o /lib - program libraries, similar to Windows'dll' files o /sbin - more executable programs and Linuxutilities for administrative purposes o /doc - documentation o /src - source code to programs * /tmp - temporary work files

Page 135: Linux QANS Nov10

* /etc - configuration files o /rc.d - scripts used during boot and shutdownprocess o /sysconfig - default configuration files o /sysconfig/network-scripts - network scripts o /sysconfig/daemons - special programs that runin background, such as print spooling * /bin - binary executable programs that all users need * /dev - device files that control drives, terminals andany equipment attached to the server * /var - user specific files o /log - log files containing system usage and errors o /spool - where spooled files are stored duringprint spooling process o /mail - where Email files are stored untilretrieved by client Email program * /proc - system files * /root - root's home directory * /opt - other options * /sbin - more executable programs and utilities

What is Kernel? Explain the task it performs.AnswerKernel is used in UNIX like systems and is considered to be the heart of the operating system. It is responsible for communication between hardware and software components. It is primarily used for managing the systems resources as well.

Kernel Activities:

The Kernel task manager allows tasks to run concurrently.

Managing the computer resources: Kernel allows the other programs to run and use the resources. Resources include i/o devices, CPU, memory.

Kernel is responsible for Process management. It allows multiple processes to run simultaneously allowing user to multitask.

Kernel has an access to the systems memory and allows the processes to access the memory when required.

Processes may also need to access the devices attached to the system. Kernel assists the processes in doing so.

For the processes to access and make use of these services, system calls are used.

Linux - What does nslookup do? Explain its two modes - August 21, 2008 at 22:00 pm by Rajmeet Ghai

What does nslookup do? Explain its two modes.AnswerNslookup is used to find details related to a Domain name server. Details like IP addresses of a machine, MX records, servers etc. It sends a domain name query packet to the corresponding DNS.

Nslookup has two modes. Interactive and non interactive. Interactive mode allows the user to interact by querying information about different hosts and domains.

Non interactive mode is used to fetch information about the specified host or domain.

Interactive mode:

Nslookup [options] [server]

Page 136: Linux QANS Nov10

What is Linux and why is it so popular?AnswerLinux is an operating system that uses UNIX like Operating system. However, unlike UNIX, Linux is an open source and free software. Linux was originally created by Linus Torvalds and commonly used in servers.

Popularity of Linux is because of the following reasons

It is free and open source. We can download Linux for free and customize it as per our needs.

It is very robust and adaptable.

Immense amount of libraries and utilities

What is 'inode'?

Each file in UNIX has a unique number called as an inode. Using this number the file information like user, group, ownership and access mode information can be found. A files inode number can be found using the following command:

Ls –i

If the inode number is known, the following command can be used to get details of the file:

Ls –l

What is use of sed command?

Sed command in UNIX is commonly used for processing of files. Sed stands for Stream Editor which parses text files and used for making textual transformations to a file. The command specified to Sed, is applied on the file line by line.

Example:

To replace all matching occurrences of some text to another.

sed -e 's/olddata/newdata/g' inputFileName > outputFileName

Here, g is global which replaces ALL occurrences.

What are the main differences between RHEL4 & RHEL5?

Answer: Difference between RHEL 4 and RHEL 5 : 1) In RHEL 4 SELinux Block only 13 services, But on RHEL 5 SElinux Block 80 services.

2) RHEL 4 have ext2 filesystem, but RHEL 5 we have ext3 filesystem that support Journal.

3) RHEL 4 have no virtualization Feature, but in RHEL 5 we have virtualization with Hypervisor-V.

4) In RHEL 4 we have no Yum, But in RHEL 5 we have Yum available.

Any many more....... need more time to describe it

(or)

rhel4 rhel5 no yum server yum server selinux Advanced selinux secure more secure no cdkey cd key

Page 137: Linux QANS Nov10

--- virtualization mim 256 mb ram 512 ram --- better support for Red Hat Directory Ext4 (on latest version)

What is the difference between Telnet and SSH?

Answer: SSH using PORT 22 and telnet using Port 23 ssh is a secured shell, where telnet is not a secured one.when you ssh to trasnfer data between a system, the data will be send in the encrypted form, where the hacker cannot encode or decode it. While you telnet,the data send between the system is alphabetical format(ASCII), where every one can understand. More over as per network security, telnet and ftp are prohibited. Always, trust SSL based data transfer.

How to recover a deleted file in linux ?

Answer: Determine the partition in which the file you wish to recover was located by using the command pwd (present work directory) and unmount the current directory by using the command umount. Use the "debugfs" command. The "debugfs" command is used to handle most major errors and bugs that can occur in Linux by using #debugfs /usr/directory name.Use the "lsdel" once you have begun the debug of the file system. Recover those files you wish to undelete and take backup of that file.

What is the minimum number of partitions you need to install Linux?

Answer: Well in my opinion is case if minimum nukber of partition is asked then better answer would be / /boot /swap

1)How do you find out what’s your shell? - echo $SHELL2)What’s the command to find out today’s date? - date

3)How do you find out the current directory you’re in? - pwd4)How do you find out your own username? - whoami/who am i5)How do you send a mail message to somebody? - mail [email protected] -s ‘Your subject’ -c ‘[email protected]

6)What’s the command to find out users on the system? - who/users7)How do you remove a file? - rm8)How do you remove a - rm -rf9)How do you count words, lines and characters in a file? - wc10)How do you search for a string inside a given file? - grep string filename

11)How do you search for a string inside a directory? - grep string *

Page 138: Linux QANS Nov10

12)How do you search for a string in a directory with the subdirectories recursed? - grep -r string *13)What are PIDs? - They are process IDs given to processes. A PID can vary from 0 to 65535.14)How do you list currently running process? - ps15)How do you stop a process? - kill pid

16)How do you find out about all running processes? - ps -ag17)How do you stop all the processes, except the shell window? - kill 018)How do you fire a process in the background? - ./process-name &19)How do you refer to the arguments passed to a shell script? - $1, $2 and so on. $0 is your script name.20)What’s the conditional statement in shell scripting? - if {condition} then … fi

21)How do you do number comparison in shell scripts? - -eq, -ne, -lt, -le, -gt, -ge22)How do you test for file properties in shell scripts? - -s filename tells you if the file is not empty, -f filename tells you whether the argument is a file, and not a directory, -d filename tests if the argument is a directory, and not a file, -w filename tests for writeability, -r filename tests for readability, -x filename tests for excitability23)How do you do Boolean logic operators in shell scripting? - ! tests for logical not, -a tests for logical and, and -o tests for logical or.24)How do you find out the number of arguments passed to the shell script? - $#25)What’s a way to do multilevel if-else’s in shell scripting? - if {condition} then {statement} elif {condition} {statement} fi

26)How do you write a for loop in shell? - for {variable name} in {list} do {statement} done27)How do you write a while loop in shell? - while {condition} do {statement} done28)How does a case statement look in shell scripts? - case {variable} in {possible-value-1}) {statement};; {possible-value-2}) {statement};; esac29)How do you read keyboard input in shell scripts? - read {variable-name}30)How do you define a function in a shell script? - function-name() { #some code here return }

31)How does getopts command work? - The parameters to your script can be passed as -n 15 -x 20.Inside the script, you can iterate through the getopts array as while getopts n:x option, and the variable $option contains the value of the entered option.

1)What is the difference between TFTP and FTP servers?

A)Both are file transfer servers but slight difference is TFTP server uses UDP

protocol and FTP uses TCP protocol. TFTP is good for slow connection paths.

Page 139: Linux QANS Nov10

2)What is the port no for FTP?

A)20 for Data and 21 for Control(normally when an interviewer ask's ftp port number

just say 21.

3)What is the port no for TFTP?

A)69.

4) How to restrict users to their home directories?

A)By setting up "chroot_local_user=YES".

5)How to restrict total number of users accessing FTP server?

A1) If Vsftpd is running under xinted service, then you can use xineted to get per-

service per IP connection limits or

A2) If you run vsftpd in "standalone" mode with the "setting listen=YES", then

you can investigate the setting (e.g.) : "max_clients=10"

6)I want to copy multiple files with out prompting for any info, how can I do that

one?

A)Simply do "ftp -i ftpserver" this command will suppress any info displayed on ftp

server.

or you can just type prompt ftp prompt to suppress info messages have a look here.

7) Some times Local users cannot log in. How to resolve this issue?

A) Check "local_enable=YES" in your /etc/vsftpd/vsftpd. conf to allow local users

to log in.

8) How do we integrate with LDAP( Lightweight Directory Access Protocol )

users and login?

A) Use vsftpd's( Very Secure FTPD) PAM(Pluggable Authentication Modules)

integration to do this, and have PAM authenticate against an LDAP repository.

Page 140: Linux QANS Nov10

9) Can we host different ftp sites on single machine, I mean virtual hosting

concept like Apache?

A1) Yes. If you integrate vsftpd with xinetd, you can use xinetd to bind to several

different IP addresses. For each IP address, get xinetd to launch vsftpd with a

different config file. This way, you can get different behavior per virtual address.

A2) Alternatively, run as many copies as vsftpd as necessary, in standalone

mode. Use "listen_address=x.x.x.x" to set the virtual IP.

10) How to restrict different users with different permissions in vsftpd

A) By setting up "user_config_dir" entry in "vsftpd.conf".

11)How to change vsftpd default port?

A)By setting "listen_port" option in "vsftpd.conf".

12) Vsftpd is reporting times as GMT times and not local times!. How to resolve

this?

A) This behavior can be changed with the setting "use_localtime=YES".

13) How to disable certain FTP commands?

A) There are some individual settings (e.g. dirlist_enable) or you can specify a

complete set of allowed commands with "cmds_allowed".

14) How does vsftpd support per-IP limits?

A1) If you are running vsftpd standalone, there is a "max_per_ip" setting.

A2) Yes. If you are running vsftpd via xinetd, there is an xinetd config variable

"per_source".

15) How Does vsftpd can do bandwidth limiting?

A) settings such as "anon_max_rate" and "local_max_rate" can be used to set

this limits.

Page 141: Linux QANS Nov10

16) How to restrict some IP's not use my FTP server?

A1) vsftpd can integrate with tcp_wrappers (if built with this support). It is enabled

with the setting "tcp_wrappers=YES".

17) Does vsftpd support IPv6?

A) Yes, as of "version 1.2.0".

18) Help! I'm getting messages along the lines of "500 OOPS: vsf_sysutil_bind"

when trying to do downloads (particularly lots of small files).

A) "vsftpd-1.2.1" should sort this out.

19) Can we use vsftpd to hiding or denying certain files?

A) Yes. Look at the hide_file and deny_file options.

20)How you can check if there is any syntax error in vsftpd.conf file?

A)Just type vsftpd with out quoats.A common misconception: the place/protocol you use to fetch your emailis the same place/protocol that you use to send your email: - sending email uses SMTP - reading email uses POP3 or IMAP - they can be completely separate machines

http://wiki.mutt.org/?MailConcept

Q: T/F, unlike POP3, SMTP can be used to both send and receive email.Q: T/F, unlike SMTP, POP3 can be used to both receive and send email.

- may be completely different servers - though note POP-before-SMTP (SMTP-after-POP) requires coupling:

http://tools.ietf.org/html/rfc2476 (section 3.3)

"Requiring a POP [POP3] authentication (from the same IP address) within some amount of time (for example, 20 minutes) prior to the start of a message submission session has also been used, but this does impose restrictions on clients as well as servers which may cause difficulties. Specifically, the client must do a POP authentication before an SMTP submission session, and not all clients are capable and configured for this. Also, the MSA must coordinate with the POP server, which may be difficult. There is also a window

Page 142: Linux QANS Nov10

during which an unauthorized user can submit messages and appear to be a prior authorized user."

Q: Describe briefly how POP-before-SMTP works to authenticate an SMTP session.

MUA - Mail User Agent (email client) - the user's interface to the protocols - "presentation layer" - usually gives access to functionality of both MTA and MRA/MAA - but may not itself implement any protocols (may read/write file system)

http://en.wikipedia.org/wiki/Mail_user_agent "An e-mail client, also called a Mail User Agent (MUA), is a computer program that is used to read and send e-mail.

Originally, the MUA was intended to be a simple program to read the user's mail messages, which the mail delivery agent (MDA) in conjunction with the mail transfer agent (MTA) would transfer into a local mailbox.

The most important mailbox formats are mbox and Maildir. These rather simple protocols for locally storing e-mails make import, export and backup of mailfolders quite easy.

E-mails to be sent would be handed over to the MTA, perhaps via a mail submission agent [MSA], therefore an MUA would not have to provide any transport-related functions.

*Since the various Microsoft Windows versions intended for home use never *provided an MTA, most modern MUAs have to support protocols like POP3 *and Internet Message Access Protocol (IMAP) to communicate with a remote *MTA located at the e-mail providers machine." - user agents (MUAs) are user-visible email clients of all descriptions - e.g. mutt, "mail", "Mail", "mailx", pine, elm - e.g. KMail, Eudora, MS Outlook - e.g. web-browser email (Netscape Messenger,Mozilla,Thunderbird) - e.g. webmail, Horde, SqurrelMail

http://en.wikipedia.org/wiki/List_of_mail_servers#POP.2FIMAP

Q: Briefly describe the function of a mail system MUA.

MSA - Mail Submission Agent http://tools.ietf.org/html/rfc2476 "acts as a submission server to accept messages from MUAs, and either delivers them or acts as an SMTP client to relay them to an MTA."

- enforce policy (no open relay)

Page 143: Linux QANS Nov10

- enforce standards (no forged headers, etc.) - enforce filtering (SpamAssassin, etc.) - may modify messages (section 8 of RFC)

http://en.wikipedia.org/wiki/List_of_mail_servers#Mail_filtering

Q: Briefly describe the function of a mail system MSA.

MTA - Mail Transfer Agent (mail server, mail exchange server) "A process which conforms to [SMTP-MTA], which acts as an SMTP server to accept messages from an MSA or another MTA, and either delivers them or acts as an SMTP client to relay them to another MTA."

http://en.wikipedia.org/wiki/Mail_transfer_agent "It receives messages from another MTA (relaying), a mail submission agent (MSA) that itself got the mail from a mail user agent (MUA), or directly from an MUA, thus acting as an MSA itself. The MTA works behind the scenes, while the user usually interacts with the MUA. The delivery of e-mail to a user's mailbox typically takes place via a mail delivery agent (MDA); many MTAs have basic MDA functionality built in, but a dedicated MDA like procmail can provide more sophistication."

- transfers email between machines (other MTAs) via SMTP - Internet-facing, open ports: security issues - sendmail, postfix, qmail, exim - may have MDA ability to transfer email to user's mailbox

http://en.wikipedia.org/wiki/List_of_mail_servers#SMTP

Q: Briefly describe the function of a mail system MTA.

MDA - Mail Delivery Agent http://en.wikipedia.org/wiki/Mail_delivery_agent "A Mail Delivery Agent (MDA) is software that accepts incoming e-mail messages and distributes them to recipients' individual mailboxes (if the destination account is on the local machine), or forwards back to an SMTP server (if the destination is on a remote server). A mail delivery agent is not necessarily a mail transfer agent (MTA), although on many systems the two functions are implemented by the same program." - Unix/Linux: /bin/mail, procmail

Q: Briefly describe the function of a mail system MDA.

MRA/MAA - Mail Retrieval Agent / Mail Access Agent http://tools.ietf.org/html/rfc1939 - POP3 port 110 http://tools.ietf.org/html/rfc3501 - IMAP-V4-R1 port 143

- often built-in to mail clients (MUAs) - can be stand-alone - e.g. fetchmail gets the mail; MUA reads mail from file system

Q: Briefly describe the function of a mail system MRA/MAA.

Mail server comparison

Page 144: Linux QANS Nov10

---------------------- http://en.wikipedia.org/wiki/List_of_mail_servers - see comparison near bottom

- PUSH protocols - sending email: MTA - SMTP - PULL protocols - reading email: MRA/MAA - POP3, IMAP

MDAs write local mailboxes; they may not implement Internet protocols (unless they have to forward off-machine without benfit of an MTA).

Single-user PCs often don't run separate MTA or MRA/MAA programs. Your chose of mail reader (e.g. Pine, Elm, Outlook) itself PULLs your incoming email from a remote server (acting as an MRA/MAA) and then PUSHes your outgoing email to the remote server (acting as an MTA).

Q: What is the difference between a PUSH protocol and a PULL protocol?Q: T/F, SMTP is a PUSH protocol.Q: T/F, POP3 is a PUSH protocol.Q: T/F, HTTP is a PUSH protocol.

A History of MTAs-----------------

I. Incoming - delivering your incoming email via SMTP:

* Sending email into Unix/Linux machines: Unix/Linux was traditionally multi-user and ran its own MTA (e.g. sendmail) that accepted incoming SMTP connections. Remote systems could use SMTP to drop off your email with your local MTA (sendmail), and the MTA would hand the email to an MDA (/bin/mail, procmail) to put it in your mailbox in the local file system. Your MUA (e.g. /usr/ucb/Mail) would read the mail from your inbox (no need for POP3 or IMAP in any MUA). There are a few different conventions for inbox formats so that many different MUAs can read your email, all without knowing POP or IMAP.

- sendmail (running as root!) has had many security patches - the first Morris Internet worm (Nov 1988) used sendmail security holes - http://en.wikipedia.org/wiki/Morris_worm

Q: Why don't many Unix MUAs need to know how to run POP or IMAP?

Current single-user Unix/Linux PCs often have a local-only MTA that handles the sending and delivery of local on-machine email but doesn't accept SMTP from off-site. (Best to keep ports closed on Internet-facing machines!)

On recent single-user Unix/Linux workstations, the MUAs mimic their Windows counterparts and include MRA/MAA features. Your chosen MUA (e.g. Elm, Pine, Mutt) is responsible for fetching your email via POP3 or IMAP (this is an MRA/MAA function); or, you use an intermediate MRA/MAA program such as "fetchmail" and your MUA reads the mail out of the local file system after the MRA/MAA has put it there.

Page 145: Linux QANS Nov10

- no Internet-facing MTA means fewer open ports and fewer attacks - don't run an Internet-facing MTA if you don't need it

* Sending email into MS Windows machines (or not): Windows had (has?) no MTA - you can't send an email to a Windows PC using SMTP. Your personal Windows MUA has to fetch the email itself via POP3 or IMAP and keep a copy in the local file system.

- no open ports for incoming email; no open mail port security issues

* Note that MUAs that implement POP/IMAP typically store the email in the local file system in a format that only that MUA can handle. (Thunderbird can't use an Outlook mail folder, and vice-versa.) The concept of a common inbox format usable by different MUAs was lost.

Q: T/F, the standards for inbox formats developed under Unix were adopted by MUAs on PCs, so that different MUAs can read the same inbox.

II. Outgoing - sending your outgoing email via SMTP:

* Unix/Linux machines have traditionally each had their own MTA (sendmail) that could directly deliver email on the Internet using MX record lookup.

Every local Unix MUA would put email into a directory where the MTA (sendmail) would eventually pick it up and transfer it, retrying as necessary. No MUA needed to know how to do SMTP; only the MTA did that.

You could optionally tell your machine's MTA not to send mail directly to its destination via SMTP over the Internet, but to use a remote "smart" MTA that could accept your outgoing email and figure out how to deliver it. (You have to use such a "smart" host here at Algonquin; since, you cannot connect to any off-campus SMTP servers.) The MTA on your machine would use SMTP to drop off the queued mail at the smart host, and the smart host would do the MX record lookup and final SMTP delivery.

Since the local Unix MTAs were separately scheduled programs, you could queue email from a MUA into the file system even when your machine was not connected to the Internet. The MUA or local MTA would queue up your email in the file system until your MTA was finally able to make a connection to deliver it off-machine. (In the days of modems, the Internet connection was often made late at night when rates were lower.)

Q: Why don't most Unix MUAs need to know SMTP?

Page 146: Linux QANS Nov10

Current single-user Unix/Linux PCs now have MUAs that mimic their Windows counterparts - the MUAs ignore the file system and the local MTA and expect you to give the name of a remote "smart" MTA to which all email will be sent via SMTP for actual delivery.

The Algonquin Linux lab has both types of mail systems: Command-line email (e.g. the "mail" command) queues up mail for the local MTA (sendmail) to send. (This is currently broken.) GUI MTAs (e.g. Thunderbird, Mozilla) ignore the local file system and the local MTA and use a "smart" remote MTA (e.g. outmail.algonquincollege.com) to deliver the mail. (This supposedly still works.)

* MS Windows has no local MTA - no program exists whose job it is just to deliver queued email. Each MUA has to know how to do its own SMTP connection and each MUA has to be configured (separately!) with the address of a smart MTA to which it connects. MUAs on Windows machines all contain networking code to drop off email at some "smart" MTA that does the actual delivery. There is no local MTA queue and much duplication of SMTP code in all the MUAs.

On Windows, it is up to each MUA to deal with what happens if the message being composed can't be dropped off right away at the remote smart MTA. Better MUAs will queue the email for later transmission. Poor MUAs will tell you that your mail can't be sent.

Q: Why do MUAs on Windows all need to know how to talk SMTP?

Q: Unix/Linux mail user agents didn't need to know how to talk to SMTP servers - you never had to configure your "outgoing mail" preferences. All the Windows MUAs need to be configured with a mail server. Why?

How to compile Apache?

2)Users come to you and they will be saying mail server is very slow, what are the necessary steps you

will take to resolve this issue?

3)Which are the configuration files associate with DNS server and client?

4)Where you will provide ISP details for your network?

Page 147: Linux QANS Nov10

5)How you will configure Squid proxy?

6)How you will block pron sites using Squid proxy?

7)Give me details how to configure mail support for NAGIOS?

8)Can you use NAGIOS to send SMS? how to do that?

9)What is web-min?

A) Webmin is a web-based system configuration tool for OpenSolaris, Linux and other Unix-like

systems.

10)How you will do kernel compilation? Explain each step?

11)What is the difference between SGID, SUID and sticky bit?

12)How to restrict users to set password with complexity ?

13)How do you monitor system performance?

14)Which are the configuration files of FTP server?

15)What are the different types of FTP servers?

16)What is the difference between active FTP and passive FTP?

17)How you will configure FTP in DMZ?

18)What is the use of htaccess file?

19)how do you configure website authentication for user logins?

Page 148: Linux QANS Nov10

20)Give me the steps to configure sendmail.

21)How to block particular network not to access my sendmail server?

22)How to send duplex/half duplex etc to the network card?

23)Can a web server have multiple ip add? if yes why? if no why?

24)How to configure multiple ip address for a web server?

25)What is the difference between VMWare and XEN?

)XEN : Xen is an open-source virtualization solution. The Xen hypervisor acts as a thin layer between

the hardware and the operating system, allowing multiple virtual servers to run simultaneously on a

single physical server. Each virtual server acts independently of the others, with its own allocated area

of RAM and virtual disks.

VMware : VMware is a company that provides virtualization software for x86-compatible computers

26)Explain me the difference between ext2 and ext3

27)How do you configure route in Linux server?

28)How do you make routes permanent in Linux server?

29)Why you want to change your job?

31)what is the difference between soft link and hard link?

32)How to get info about the files which are not accessed from last 30days?

Q2) Write a command to find all of the files which have been accessed within the last 30 days.A1) The Command is , find / -atime +30A2) # find / -type f -mtime +30 A3) find / -type f -mtime -30A4) find / -type f -atime -30 = accessedfind / -type f -ctime -30 = changedfind / -type f -ctime -30 = modified

Page 149: Linux QANS Nov10

Q3) How to schedule cron backup to run on 4th saturday of month??A1) crontab -e** ** ** ** /5Q4) how to see unallocated hard disk space on linuxA1) simply type cat /proc/partitionsA2) df -h /dev/devicenamedevice name could be hda,sdaQ5) find out what file systems supported by kernel?A1) # fdisk /dev/hdxoption: tit will show the supported FS in the kernelA2) cat /proc/filesystemswill show all the file system types that the kernel canhandle currently. Be aware that kernel will load thenecessary modules automatically if it have, for a new filesystem type present in a new device you plug into it andthen the output of the above command will vary.A3) you can give following commands#fdisk then press t this command will show all the file system with code supported by the current linux kernel.Q6) how do u extract files from iso cd images in linux?A1) From ISO MAGICA2) mount -o loopA3) mount -t iso9660 -o ro,loop=/dev/loop0 /home/ste/cd.iso /mnt/isoQ7) how do u find remote machine operating system and version?A1) XProbeA2) by ssh to that machine then give command #uname -rA3) for OS,cat /etc/issue and version, uname –rQ8) how do you port scaning with netcat command?A1) nc -z Q9) how do find all failed login attempts via ssh?A1) check network connectivity check correct ipaddressping ipaddressA2) 'who' or 'w' is the command used to find the users who logged in The system and their attempts, with the help of some optionsA3) Failed ssh logs are either written in /var/log/messages, or/var/log/secure (configurable in /etc/syslog.conf). I amassuming that the failed login attempts are recorded in/var/log/secure:grep ' authentication failure' /var/log/secure | sed -e's/^\(.*\)\(rhost.*\)$/\2/p' | tr -s " " | cut -f2 -d"=" |cut -f1 -d" " | sort -n | uniq -cWill show you the count, and the IP/hostname of machines that tried to access the system via sshA4) The command is ,cat /var/log/messages | grep "Failed password"

Page 150: Linux QANS Nov10

it will show all the user which is not able to login.Q10) How do display error messages instantly when command fails?A1) Suppose you are trying to cat a non existing file:cat /etc/shado 2>/dev/null || echo “Failed to open file”command 2 "echo" is executed only if command 1 "cat" returnsa non-zero exit status# cat /etc/shado 2>/dev/null || echo "Failed to open file"Failed to open file#Q11) How do find hard disk revolutions speed?A1) A typical desktop hard disk rotate at 7,200 revolutions perminute (RPM). A typical server hard disk spin at 10,000 or15,000 rpm to achieve sequential media transfer speeds. Youcan use hard disk model number to obtain disk RPM. Forexample, a typical Seagat disk Model # ST373455SS canprovide following information:* ST - Brand identity* 3 - Form Factor (3 = 3.5")* 73 - Disk size / Capacity in GB i.e. 73GB* 4 - Reserved for future use* 5 - RPM ( 5 = 15k and 0 = 10K)* 5 - Generation* SS - Indicates interface i.e Serial Attached SCSIHow do I find out hard disk model and serial number?Use any one of the following command from shell prompt tofind out hard disk model number:$ cat /proc/scsi/scsiOR use scsi_id command to querys a SCSI device via the SCSIINQUIRY vital product data (VPD) page 0x80 or 0x83 and usesthe resulting data to generate a value that is unique acrossall SCSI devices that properly support page 0x80 or page 0x83.$ /sbin/scsi_id -g -p 0x80 -s /block/sddOR$ sudo grep -i sdd /var/log/boot.logOR use sginfo / scsiinfo command from sg3_utiles package, enter:# sginfo -a /dev/sdd | moreQ12) when zombie process fully cleared?A1) When the server gets restarted!A2) Do a ps and identify the zombie processes# ps -el | grep 'Z'Occasionally, these processes are in such a state that theonly way to get rid of them is to reboot to clear them.In most cases, you can get rid of a zombie by normal means,"kill -15 zombie PPID", "kill -9 zombie PPID".Q13) how do you configure linux system as a router?A1) Give the following commandecho 1 > /proc/sys/net/ipv4/ip_forwardA2) above anwser also write,but must me know this,vi /etc/sysctl.conf# Controls IP packet forwarding

Page 151: Linux QANS Nov10

net.ipv4.ip_forward = 1save &sysctl –pQ14) Which priority has the process?how do u view?A1) nice command is used to find the priorityA2) Each process has a niceness value associated with it, whichis what the kernel uses to determine which processes requiremore processor time than others. The higher the nice value,the lower the priority of the process. In other words, the“nicer” the program, the less CPU it will try to take fromother processes; programs that are less nice tend to demandmore CPU time than other programs that are nicer.The priority is noted by a range of -20 (the highest) to 20(the lowest). Using ps, you can see the current nice valueof all programs:# ps axlF UID PID PPID PRI NI VSZ RSS WCHAN STAT TTY TIME COMMAND4 0 1 0 16 0 2648 112 - S ? 0:01 init [3]1 0 2 1 34 19 0 0 ksofti SN ? 0:02 [ksoftirqd/0]5 0 3 1 10 -5 0 0 worker S< ? 0:00 [events/0]You can see that init has a nice value of 0, while otherkernel tasks associated with PID 2 and 3 have a nice valueof 19 and -5 respectively.Typically, a program inherits its nice value from itsparent; this prevents low priority processes from spawninghigh priority childrenQ15) Any one example of uninteruptable sleeping process?A1) init (PID 1)Q16) how many limitations of under directories in ext2/3 linuxfile system?A1) Ext2 Limits============Max file size: 2-64 TiBMax number of files: 10 raised 18Max filename length: 255 charactersMax volume size: 16-32 TiBAllowed characters in filenames: Any byte except NULL and '/'Ext3 Limits===========Max file size: 2 TiBMax number of files: Variable, allocated at creation time[1]Max filename length: 255 bytesMax volume size: 2 TiB – 16 TiBAllowed characters in filenames: All bytes except NULLQ17) what is a superblock ?A1) A superblock is a record of the characteristics of afilesystem, including its size, the block size, the empty

Page 152: Linux QANS Nov10

and the filled blocks and their respective counts, the sizeand location of the inode tables, the disk block map andusage information, and the size of the block groups.Q18) what is the command to check network interfaces in our system?how to set etho to 10 full duplex speed?A1) ifconfig, ifconfig -a, ip dev ls, ethtool -s eth0 speed 10 duplex fullto watch the info on eth0 ( mii-diag --watch eth0 )Q19) what is the UID and GID of root user? Can a normal user canchange the ownership of a file? what is the command tochange ownership of a file?A1) the root UID/GID is 0 (zero). which is why he can able tointervene in all normal users files even though he don'thad permission. A normal user will don't have the permissionto change ownership of file. The command to change ownershipis < chown user.user file >Q20) what is soft mount and hard mount? i have to make permanentnfs mount permanent what shall i do?A1) to make permanent nfs mount, write it into /etc/fstabServer nfsmount mountpoint filesystem defaults 0 0192.168.0.1 /var/ftp/pub /mnt nfs defaults 0 0A2) This is a UNIX terminology as to what the client does whenit can't talk to an NFS Server. If you just mount a filesystem without specifying hard or soft, the default is ahard mount. Hard mounts are preferable because of thestateless nature of NFS. If a client sends an I/O request tothe server (such as an ls -la), and the server getsrebooted, the client will wait until the server comes backon line. This preserves data transfers in the event of aserver failure. There are disadvantages to this, as a simplemount request could hang. A soft link will return with anerror and fail. This kills the wait time, but can causeproblems with data transfers. To make permanent nfs mount, the above answer is rightQ21) what is major and minor?A1) Major number============A number indicating which device driver should be used toaccess a particular device. All devices controlled by thesame device driver have a common major device number.Minor number============A number serving as a flag to a device driver.The minordevice numbers are used to distinguish between differentdevices and their controllers.Eg:# ls -l /dev/sda1brw-rw---- 1 root disk 8, 1 2008-09-04 08:28 /dev/sda1rigel:~# ls -l /dev/sda2brw-rw---- 1 root disk 8, 2 2008-09-04 08:28 /dev/sda2You can see the major and minor device number (8,1) and

Page 153: Linux QANS Nov10

(8,2) in the ls listing for /dev/sdax# ls -l /dev/scd0brw-rw---- 1 root cdrom 11, 0 2008-09-04 08:28 /dev/scd0You can see the major and minor device number (11,0)in thels listing for /dev/scd0Q22) what is the command to make a process to run in thebackground from foreground?A1) To make the command run in the background suppose the Command is "command_name" then the syntax for the same will be such as follows;[root@neo root]# command_name &Q23) 1.what is Kernel parameters?2.how many cpu have use in your machine?A1) Kernal parameters are nothing but all the parameters in/etc/system hear we can edit according to our requrement.to check the how many cpus in the machine jus type this command #psrinfoto check the cpu speec #psrinfo –vA2) 1.kernel parametersparameters provide mechanisms to adjust the functiong of linux kernel.the sysctl command used to view kernel parameters.2.simply type in root# cat /proc/cpuinfoQ24) 1.I want to change runlevel but the Users shall not be disturbed?how?2.Disk have 5gb disk utilization even though files unable to reate, why?3.what are the internal and external command in linux?4.sar command o/p?5.how list the open files?6.what is kernel compiling?7.How do u See complete configuration in ur system?8.how will u make a daily updates with cron daily?9.which port is associated with ttys0?10.specific some problems linux admin(if u are linuxadmin)faced And how did u overcome it?A1) 1. For changing the runlevel you should have to go in/etc/inittab. There you can change the runlevel what youwant.It will not affecting current user. After restartingsystem your system will boot in which run level you have set. 3. Internel command means whichever command are builtin thesystem BIOS. And External command means Which arenonbuiltin.It outside the shell. It require shell.4. VMstat & sar are showing the free memory of the system.5. ls command is use list a file & cat & vi is to open a file.6.A2) 1) Same answer as above2) Question not understood, may be ACLs3) It is not BIOS, A built-in (internal/resident) command is one that iscontained within the bash tool set and execute faster than external commands.An non-built-in (external/non-resident) command is a command

Page 154: Linux QANS Nov10

outside the shell and requires a $PATH (environmentvariable) to findit. 4)Displays the activity for the CPU# sarLinux 2.6.18-6-686 (server.domain.local) 09/16/200811:31:56 AM LINUX RESTART5) # lsof6)The Linux kernel is a complex program which provides theunderlying services to the rest of a Linux distribution. Butit is easy to add new features or improvements to it,requiring a kernel recompiling. There are three reasons fora kernel compile. Firstly, you may have some hardware thatis so new that there's no kernel module for it in on yourdistribution CD. Secondly, you may have come across somekind of bug which is fixed in a revision of the operatingsystem. Lastly, you may have some new software whichrequires a newer version of the operating system. 7)A vague question8) Suppose we have a daily update script called dailyupdate.shCopy the script to /etc/cron.daily/# cp dailyupdate.script /etc/cron.daily/Make the file executable# chmod +x /etc/cron.daily/dailyupdat.sh9) COM110) Depends...A3) 4) Detailed sar outputLinux 2.6.18-6-686 (server.domain.local) 09/16/200811:31:56 AM LINUX RESTART11:35:01 AM CPU %user %nice %system %iowait %steal %idle11:45:01 AM all 0.71 0.00 0.19 0.18 0.00 98.9211:55:02 AM all 1.53 0.00 0.19 0.26 0.00 98.02Average: all 1.12 0.00 0.19 0.22 0.00 98.47A4) 1. use init , at runtime.2. disk quota has been set and reached for the current user.3. same as above4. same as above5. same as above6. lay man definition, adding support for required hardwareand modules in the Linux kernel.7. sysreport, question too generalized, 8. same as above9. same as above10. :)Q25) what is user mode & kernel mode?A1) KERNEL-MODEThe kernel-mode programs run in the background, making sureeverything runs smoothly - things like printer drivers,display drivers, drivers that interface with the monitor,

Page 155: Linux QANS Nov10

keyboard, mouse, etc. These programs all run in such a waythat you don't notice them.When the computer boots up, Windows calls the KERNEL, themain kernel-mode program that allows all the other programsto run, even the user-mode programs.USER-MODEThese are the programs that you run when you want specificprograms - e.g., MS Paint, MS Word, and Calculator. Theseare heavily restricted, as to not crash the system. Windowsuses memory-protection services offered by the processor toprevent malicious programs from interfering with the rest ofthe system and corrupting it.A2) A process can run in two modes:1.User Mode. 2.Kernel Mode.1.User Mode:=>A mode of the CPU when running a program.=>In this mode ,the user process has no access to thememory locations used by the kernel.When a program isrunning in User Mode, it cannot directly access the kerneldata structures or the kernel programs.2.Kernal Mode:=>A mode of the CPU when running a program.=>In this mode, it is the kernel that is running on behalfof the user process and directly access the kernel datastructures or the kernel programs.Once the system callreturns,the CPU switches back to user mode.When you execute a C program,the CPU runs in user mode tillthe system call is invoked.In this mode,the user process hasaccess to a limited section of the computer's memory and canexecute a restricted set of machineinstructions.however,when the process invokes a systemcall,the CPU switches from user mode to a more privileged mode the kernel. In this mode ,it is thekernel that runs on behalf of the user process,but it hasaccess to any memory location and can execute any machineInstruction. After the system call has returned,the CPUswitches back to user mode.A3) KERNEL-MODEKernel mode, also referred to as system mode, is one of thetwo distinct modes of operation of the CPU in Linux. Whenthe CPU is in kernel mode, it is assumed to be executingtrusted software, and thus it can execute any instructionsand reference any memory addresses (i.e., locations inmemory). The kernel (which is the core of the operatingsystem and has complete control over everything that occursin the system) is trusted software, but all other programsare considered untrusted software.USER-MODEUser mode is the normal mode of operating for programs, webbrowsers etc. They don't interact directly with the kernel,

Page 156: Linux QANS Nov10

instead, they just give instructions on what needs to bedone, and the kernel takes care of the rest. Kernel mode, onthe other hand, is where programs communicate directly withthe kernel. A good example of this would be device drivers.A device driver must tell the kernel exactly how to interactwith a piece of hardware, so it must be run in kernel mode.Because of this close interaction with the kernel, thekernel is also a lot more vulnerable to programs running inthis mode, so it becomes highly crucial that drivers areproperly debugged before being released to the publicQ26) what is the diff b/w ext2 and ext3?A1) ext3 is the advanced version of ext2ext2+journaling=ext3this journaling feature is very much useful whileretrieving data and writing data into a File SystemLatest versions of all Linux flavors are coming with ext3compatible file systems.A2) ext 2 & ext3 are the two file systems in linux.ext 2 willtake more time while logon the system. this is bcoz ext2will check all harddisk peripherals at the time of switch onyour sytem. But ext3 is less time consuming,bcoz instead ofchecking all harddisk peripherals it will check only thebootloader peripherals.Q27) what is initrd image?A1) initrd image is the initial ram disk image While the system getting booted the kernel image will get loaded into the main memory after POST to improve I/O performance.this initrd image will contain the same version number of kernel and if we face any error in booting regardingthis initrd we can reinstall it with 'mkinitrd' commandA2) initial RAM disk (initrd) is a temporary root file system that is mounted during system boot to support the two-state boot process. The initrd contains various executables and drivers that permit the real root file system to be mounted, after which the initrd RAM disk is unmounted and its memory freed. In many embedded Linux systems, the initrd is the final root file systemA3) initrd image is a image file which has initial modules whichare loaded in to the kernel while booting.Q28) what is jumbi process? OracleA1) its a dead process it's parent process has been killed abruptly.A2) zoombie process or defunct process. - Process that finish execution Or we can say the process died but still it has entry in the process table. A process finished execution but parent of that process is Not ready to accept the exit status from it . At that time process go to zoombie state.Q29) My machine is running half duplex mode how to change halfduplex to full duplex? ORACLEA1) [root@ns2 ~]# mii-tool -Vmii-tool.c 1.9 2000/04/28 00:56:08 (David Hinds)eth0: negotiated 100baseTx-FD flow-control, link ok

Page 157: Linux QANS Nov10

[root@ns2 ~]# ethtool -s eth0 duplex half autoneg off[root@ns2 ~]# mii-tool -Vmii-tool.c 1.9 2000/04/28 00:56:08 (David Hinds)eth0: 100 Mbit, half duplex, no link[root@ns2 ~]# mii-tool -Vmii-tool.c 1.9 2000/04/28 00:56:08 (David Hinds)eth0: 100 Mbit, half duplex, link okQ30) some one is asking my machine is slow what is your steps? ORACLEA1) The increase in the size of SWAP partition may show you thelittle effect in increasing the system speed and better runin Single user mode rather than GUI modeA2) use top command, then check which process use the most resource and find the problem.A3) Re-read all process#killall –HUPQ31) what is mean by system calls INFOTECHA1) A system call is the mechanism used by an applicationprogram to request service from the operating system.On Unix-based and POSIX-based systems, popular systemcalls are open, read, write, close, wait, exec, fork, exit,and kill. Many of today's operating systems have hundreds ofsystem calls. For example, Linux has 319 different systemcalls. FreeBSD has about the same (almost 330).Tools such as strace and truss report the system calls madeby a running process.Q32) What is trusted/untrusted operating systemA1) As per my perspective , I used to say any/all UNIX flavorsrather than MS WINDOWSBecause of 1. File/Directory permission (Action:Read/Write/Execute, permissions can be given on behalf of the particular User/group/Others).2. All the unix configuration as files rather than Registry (windows)a. which cause the application to fail when a newer or incompatible dynamic library is installed.b. Some times you may need to restart the entire system to update the changes with registry. 3. Linux Strong password protection. It won't get booted (Drop you @ the GUI) without the successful authentication (even though you don't have any more users rather than admin/root).In Linux setting password to the admin/root users is must during the installation itself.Where as in windows, let allow you to leave the password as blank for admin/other user, System also booting without authenticating.4. Linux is open source, free under GNU. It doesn't mean that its only free to install or use, but in fact you can have these source codes and they are allowing you to change it and redistribute it.

Page 158: Linux QANS Nov10

Windows is Lincesed os. Windows is developed by Microsoft.5. Linux is more secure, windows is less secure than linux in case of virus, worms.Because in Linux all the files/directory won't get executable permission, Perhaps you need to set it manually. Though by default all the incoming trojen, virus, malwares and worms won't affect the system.6. DistributionLinux : Linux has many distributors like Radhat, mandrake, Corel etcWindows : whereas windows has only Micrsoft.7. Run LevelLinux works on both GUI & Console mode (Checkout the various run levels runlevel 0 - runlevel 6 Generally known as init level)).Windows : Only GUI.8. By default LINUX have multiuser, multitasking, multiprocessing, multiprogramming features. Perhaps this will not be available on windows(Except some versions), In that case you need to PAY & BUY the extra features in windows.9. You can play around the Linux through LIVE CDS on a Windows machine. Only is a live CD that runs over windows, in RAM, and doesn't change your system at all..the other is an install disk. I've used the live CD on two XP machines and they both ran flawlessly. When youwant to quit, just go to logout under system tools, and shut down.Linux will turn itself off, eject the disk, and turn of your PC.Remove the disk, boot up, and you're running your Windows again.This is the way we are checking the newly bought NIC/others hardwares support with all the Linux distributors. Once it got detected, its very easy to get the device driver names and other details about that new hardwares, then compile the new kernelimage (bzImage) on your own build version systems.Q33) Working in Linux/Unix platform, if any command dose not work, say # ls reports as command not found.what to do? GOOGLEA1) Need to check the path first body ....A2) reinstall that shellA3) Check whether PATH variable as got the entry /binIt should be something like this=========================[root@bc ~]# echo $PATH/usr/kerberos/sbin:/usr/kerberos/bin:/bin:/sbin:/usr/bin=========================

Page 159: Linux QANS Nov10

Q34) in unix how to change old name to new nameA1) mv // for rename the file in the samedirectorymv // for rename andmove the file in other diretory.A2) 1. open the file /etc/sysconfig/network and change the parameter HOSTNAME= to new name.2. restart the network services.3. open the file vi /etc/hosts, and change the old name to new name. 127.0.0.1 localhost.localdomain localhost A3) mv eg:-[root@localhost]# touch file1 //created a file named file1root@localhost]# ls //displays the file createdfile1[root@localhost]# mv file1 file2 //command to rename file1[root@localhost]# ls //displays the renamed filefile2A4) see there is no rename command in unix , so what u can use is "move" (mv) command mv "(absolute path) old file name" "new file nameA5) rename Q35) what is the standard output in a file as well as disply it on the terminal options like A)pr B) tail C) tee D)nlA1) tail as it display ten current line tail -f option with thistail -f -n 100A2) I think, framing the question should be like "What is the command used to write to the standard output as well as to a file simultaneously ?Answer) tee It is a command that deals with pipes in unix. It redirects the output of a command to an other command and at the same time it redirects to a file also.Q36) what is command like " #(cd unixos; pwd) " tell me OUTPUTA1) first it will change the directory to unixos and then givesthe output as //unixosA2) it is two commands runnung one by one.first the cd unixos command will be executed,then the present working directory will work.so the output will be showing the presentworking dirctory that is unixos dir.A3) WRONG when I hit this command no output or error is printedQ37) in unix how to change old name to new name

what is DNS?

why we required CHROOT package? can you explain it?

Page 160: Linux QANS Nov10

What is the location for DHCP server default leased configs file?

what is the command and syntax to check DNS server named.conf file errors?

What is the command and syntax to check DNS server zone files config errors?

How do you update DNS zone file entries with out restarting named demon?

What are the services/demons will restart when you restart NFS service?

how do you update NFS sharing details with out restarting NFS server?

What are the advantages of NIS?

Can you explain me about LVM and how you configure LVM?

What is the difference between LVM1 and LVM2?

What is Amanda server and where is it used?

Can you explain me corntab?

How to resize LVM?

Can you explain me about RAID5?

How many RAID devices are there in RHEL5 by default?

Min how many Raid devices will participate in RAID5?

How do you do Kernel patching and what is the command?

Can you explain me about in details how you do kernel recompilation?

Can you explain what is the use fo access file in sendmail and what is its location?

Can you explain me what is the advantage of local-hosts file and virtusertable in sendmail?

How you will specify static IP's in DHCP server?

how do you update NIS users with out restarting the NIS server?

What is the partation no for LVM?

What is the partation no for RAID?

What is the port no for DNS?

Can we change default port no for DNS? if yes, how?

How many RAID device we can create in RHEL4?

Can you explain me Disk quota in detail and configuration details?

How to increase RAID devices after it excied max limit?

1) How to creat swap if you dont have free partation?

this is some what tricky question if you are new to Linux Administration

here is the command to create swap if you dont have free partation

before doing this you have switchoff the swap

Page 161: Linux QANS Nov10

swapoff -a

dd if=/dev/zero of=/root/swapfile bs=1k count=1024

swapon filename

2)How to see swap details?

cat /proc/swap

free

3)How to see/get info about RAM in ur system

free

cat /proc/meminfo

4)What is the difference between ext2 and ext3

I)ext3=ext2+journaling

"journaling" is an add-on to a filesystem that records changes as they are made.

II)ext2 files system is fast

III)less disk writes

IV)ext2 file system in less stable/secure

V)ext2 file system required to run fsck command if the system get crashed

5)How to convert ext2 file system to ext3?

tune2fs -j /dev/hda1

6)How convert ext3 file system to ext2

tune2fs -O^has-journal /dev/hda1

7)What is default block/chunk size for PV

4MB

Page 162: Linux QANS Nov10

8)what is the command to update the diskquota on file system

mount -o remount,rw /home

9)What is the partation type number for swap,RAID,LVM?

82(swap),fd(RAID),8e(LVM)2)Can we install HPUX( (Hewlett Packard UniX) on Vmware?A)No. Because HPUX can be installed only on PA-RISC or Itanium and Vmware can not emulate this hardware)What is the difference between IPchains and IPtables?IPchains : Ipchains is a utility for Linux that System Administrators can use to create and modify the ruleset that is used for their host based firewall. These rules are used by a system to decide whether or not it is going to allow a specific remote connection.IP tables : Iptables is a generic table structure that defines rules and commands as part of the netfilter framework that facilitates What is INODE limit? If the file system reaches that limits how to resolve that?A)Inode is a unique number given to a file in Unix OS. Every file in Unix has a inode number. unix treats directories/folders as a file so they are also having a inode value.12)How to extend LV(Louis Vuitton)?13)How to see how many VG's are there?14)Explain the process of configure Apache.15)How many types of chains are there in IPtables and what are they explain each?16)What is super block?17)What is INODE limit? If the file system reaches that limits how to resolve that?A)Inode is a unique number given to a file in Unix OS. Every file in Unix has a inode number. unix treats directories/folders as a file so they are also having a inode value.18)What are ACL's in Linux how to implement it in Linux?19)How to take backup to Tape-drives?20)How to rectify if tape drive file(hardware file) is missing?21)What is the difference between RAID01 and RAID10?22)When using RAID in which cases will you use RAID1 and which cases you will use RAID5?23)How to implement password less SSH logins?24)How a user can change a password?25)How can you get info that my last command executed properly?

)How do you find out what’s your shell? - echo $SHELL2)What’s the command to find out today’s date? - date

3)How do you find out the current directory you’re in? - pwd4)How do you find out your own username? - whoami/who am i5)How do you send a mail message to somebody? - mail [email protected] -s ‘Your subject’ -c ‘[email protected]

6)What’s the command to find out users on the system? - who/users7)How do you remove a file? - rm8)How do you remove a - rm -rf9)How do you count words, lines and characters in a file? - wc10)How do you search for a string inside a given file? - grep string filename

11)How do you search for a string inside a directory? - grep string *12)How do you search for a string in a directory with the subdirectories recursed? - grep -r string *

Page 163: Linux QANS Nov10

13)What are PIDs? - They are process IDs given to processes. A PID can vary from 0 to 65535.14)How do you list currently running process? - ps15)How do you stop a process? - kill pid

16)How do you find out about all running processes? - ps -ag17)How do you stop all the processes, except the shell window? - kill 018)How do you fire a process in the background? - ./process-name &19)How do you refer to the arguments passed to a shell script? - $1, $2 and so on. $0 is your script name.20)What’s the conditional statement in shell scripting? - if {condition} then … fi

21)How do you do number comparison in shell scripts? - -eq, -ne, -lt, -le, -gt, -ge22)How do you test for file properties in shell scripts? - -s filename tells you if the file is not empty, -f filename tells you whether the argument is a file, and not a directory, -d filename tests if the argument is a directory, and not a file, -w filename tests for writeability, -r filename tests for readability, -x filename tests for excitability23)How do you do Boolean logic operators in shell scripting? - ! tests for logical not, -a tests for logical and, and -o tests for logical or.24)How do you find out the number of arguments passed to the shell script? - $#25)What’s a way to do multilevel if-else’s in shell scripting? - if {condition} then {statement} elif {condition} {statement} fi

26)How do you write a for loop in shell? - for {variable name} in {list} do {statement} done27)How do you write a while loop in shell? - while {condition} do {statement} done28)How does a case statement look in shell scripts? - case {variable} in {possible-value-1}) {statement};; {possible-value-2}) {statement};; esac29)How do you read keyboard input in shell scripts? - read {variable-name}

1. What is sed? - sed is stream editor, a Unix tool for working with streams of text data. See the

awful truth about sed.

2. How do you substitute strings with sed? - Use ’s/old/new’ command, so sed

’s/hello/goodbye/’ would substitute the occurrence of the word hello to goodbye.

3. How do you inject text with sed? - & in the substitution string defines the pattern found in

the search string. As an example, here’s us trying to find a word ‘hello’ and replacing it with

‘hello and how are you’:

echo ‘hello there’ | sed ’s/^hello/& and how are you/’

4. Can I find several patterns and refer to them in the replacement string? - Yes, use

(pattern) and then refer to your patterns as \1, \2, \3 and so on.

Page 164: Linux QANS Nov10

5. If the string is ‘old old old’ and I run ’s/old/new’, I get ‘new old old’ as the result. I

need ‘new new new‘. - You forgot the global modifier, which would replace every occurrence

of the pattern with the substitution. ’s/old/new/g‘ will work.

6. But I want ‘old old new’ from the previous example. - Just use the numeric modifier

saying you want the third occurrence to be replaced. ’s/old/new/3‘ will work.

7. I wrote a rather complex sed script. How do I save and run it? - Assuming that your

file is named myscript1.sed, you can invoke sed -f myscript1.sed.

8. How do I delete trailing whitespaces from each line? - sed ’s/[ \t]*$//’ Here we’re

replacing any occurrence of a space or a tab with nothing. Check sed one-liners for more

examples.

9. How do you print just a few first lines of the file? - sed 1q will give you just the first line,

sed 10q the first 10 lines.

10.How do you replace a pattern only if it’s found, so that it’s executed faster? - Nest

the replacement statement: sed ‘/old/ s/old/new/g’ file.txt

What is LILO?

LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory, and tell the system which partition and hard drive to boot from.

What is the main advantage of creating links to a file instead of copies of the file?

A: The main advantage is not really that it saves disk space (though it does that too) but, rather, that a change of permissions on the file is applied to all the link access points. The link will show permissions of lrwxrwxrwx but that is for the link itself and not the access to the file to which the link points. Thus if you want to change the permissions for a command, such as su, you only have to do it on the original. With copies you have to find all of the copies and change permission on each of the copies.

what is the command for finding the higest memory occupied file in linux? Top command will show the memory occupied by a file.When topis showing the output press shift+m to show the file or

process which is using larger memory.

difference between nfs soft and hard mouniting points?

hard mount option:- If the client fails to access theserver,then connection hang it, after the system up then itaccess the server.

Soft:- If the client failed to connect the server it

immediately gives the error report, and close the connection.

Hard mounting : Providing entry in /etc/fstab is called hardmounting. Using hard mounting when client system boots atbooting time client will try to mount the entry in/etc/fstab if the server is down client pc willnot bootuntil the server is up. mounting at boot time is called hardmounting.

Soft mounting : Providing entry in /etc/auto.master and/etc/auto.misc is called soft mounting. When client sys bootit will try to mount if unable to mount just gives the errormessage and it will continue the boot process. Mounting atboot time or by user request is called soft mounting

Page 165: Linux QANS Nov10

in redhat Linux wat is the command to check at ahich date and

time file was created?

stat filename

ls -ltr" gives you detail information of files and

directories.

I know ssh, telnet, dns,apache all are worked on TCP/UDP but i

want to know any one service which are working on UDP only?

Netstat

cat /etc/services |grep udpI want to built a fire wall using iptables. My condition is " inbound to 192.168.0.2 with a port of 80 from 172.168.0.1 should accept" iptables -I INPUT -s 172.168.0.1 -p tcp --dport 80 -d 192.168.0.2 -j ACCEPThow many limitations of under directories in ext2/3 linux file

system?

Ext2 Limits============Max file size: 2-64 TiBMax number of files: 10 raised 18Max filename length: 255 charactersMax volume size: 16-32 TiBAllowed characters in filenames: Any byte except NULL and '/'

Ext3 Limits===========Max file size: 2 TiBMax number of files: Variable, allocated at creation time[1]Max filename length: 255 bytesMax volume size: 2 TiB – 16 TiB

Allowed characters in filenames: All bytes except NULL

what are the linux boot files?

Grub.conf2.Vmlinuz

3.initrd.img

soft mount is to mount for limited time or temporary,whereas hard mount is mount permanently.

what is soft mount and hard mount? i have to make permanent nfs mount permanent what shall i do?To make nfs permanent mount go to /etc/fstab & put the entry& run a cmd to make it mount permanent #mount -a.to make permanent nfs mount, write it into /etc/fstabserver<ip> nfsmount mountpoint filesystem defaults 0 0192.168.0.1 /var/ftp/pub /mnt nfs defaults 0 0how do find all failed login attempts via ssh?tail -f /var/log/secure | grep Failed lastb" is the command to find all failed login attempts how do u find remote machine operating system and version?#nmap -A -v station1what is the diff b/w ext2 and ext3?ext3 is the advanced version of ext2

Page 166: Linux QANS Nov10

ext2+journaling=ext3this journaling feature is very much useful whileretrieving data and writing data into a File SystemLatest versions of all Linux flavors are coming with ext3compatible file systems.ext 2 & ext3 are the two file systems in linux.ext 2 willtake more time while logon the system. this is bcoz ext2will check all harddisk peripherals at the time of switch onyour sytem. But ext3 is less time consuming,bcoz instead ofchecking all harddisk peripherals it will check only thebootloader peripherals.AvailabilityIntegritySpeedeasy transition

In ext2 filesystem, the filesystem is not mounted until itsconsistency is checked by e2fsck program. the amount of timetaken to run e2fsck program is determined by the size offile system. The more files you have on the file system, thelonger the consistency check takes. ext3 does not require a file system check even after aunclean shutdown. the time to recover an ext3 file systemafter an unclean shutdown does not depend on size, rather itdepends on size of "journal" used to maintain consistency.

the default journal takes about a second to recover. What is an inode?

An inode is a data structure holding information about filesin a Linux file system. There is an inode for each file, anda file is uniquely identified by the file system on which itresides and its inode number on that system.what is the command to make a process to run in the background from foreground?when the process is running, press "control+Z" . Now at thecommand prompt , type "bg"what is a superblock ?A superblock is a record of the characteristics of afilesystem, including its size, the block size, the emptyand the filled blocks and their respective counts, the sizeand location of the inode tables, the disk block map andusage information, and the size of the block groups.how do you configure linux system as a router?vi /etc/sysctl.conf

# Controls IP packet forwardingnet.ipv4.ip_forward = 1

save &

sysctl -p 1st answer is correct till you boot your Linux machine, oncerebooted, its gone coz the /proc is a fs that is resident onmemory, thus if you want to forward your packets permanentlythen you have to alter the net.ipv4.ip_forward parameter toreflect the changes each time machine is booted. # sysctl -pmakes it effective without reboot. follow following command

Page 167: Linux QANS Nov10

1.) vi /etc/sysctl.conf

# Controls IP packet forwardingnet.ipv4.ip_forward = 1

save (:wq!)

You should have a Two physical LAN card, if You have't two Lan cat. You have to creat virtual Lan card

2.) cp -arvf /etc/sysconfig/network-scripts/ifcfg-eth0 /etc/sysconfig/network-scripts/ifcfg-eth0:1

3.) Set a diffrent Class IP in virtual Lan card

4.) start network service /etc/init.d/network restartwhat is the UID and GID of root user? Can a normal user can change the ownership of a file? what is the command to change ownership of a file?the root UID/GID is 0 (zero). which is why he can able tointervene in all normal users files even though he don'thad permission. A normal user will don't have the permissionto change ownership of file. The command to change ownershipis < chown user.user file >What u know abt tar Command? tar command is file archiving cmd and extracting cmd in linux.

create tar -cvf /tmp/ram.tar /etc/passwdthis command makes compress the /etc/passwd datas and storedin /tmp/ram.tar

Extract tar -xvf /tmp/ram.tarextract the data in existing file is /tmp/ram.tarHow do you read ext2/3 file system in windows?Using Software Winscp ,we can access Linux machine fromWindows.it is an windows software.through SAMBA, we can share the linux partition or directory, for windows.How to monitor ports in a linux machine, with single command?netstat -anpc

a:all listening ports and established connectionsn:numeric host:port valuesp:programsc:continuous monitor What is the status code 403,404 represented in apache server403 represent forbidden error, means if files misses some selinux security context is missing.

404 represent that their is a cgi script missing or web pages missing.Difference between swap partition and swap file?Swap partition maintained seperate partition.same swap partition can be used in two OS within single machine.If system crashes their is a chance to recover itor may not be corrupt the partition.

Page 168: Linux QANS Nov10

Less fragmented.

where as swap file takes very less space. we can increase the space very easily, compared to swap partition.SWap file system fragmented.If system crashes their is a huge chance to lost the swap file system.what is nis server?Network Information Services is well known as NIS serverwhich is based on Linux and Unix environment network. NISServer create the user name and password to share across thenetwork for centralize authentication. The best thing isthat passwords can change be changed on NIS server not onclient desktop systems.How can I only see the first 14 lines of a file?head -n14 filenameCompare between SYS V launched processes and Xinetd processes in Linux.Answer is based on RHEL

SYS V processes xinetd processes

1) daemons (run in background) processes started on request 2) Managed by "service" Managed by "xinetd" daemonwrapper command

3) Script files in "/etc/rc.d" script files in /etc/xinetd.ddirectory directorywhat is the command to make a process to run in the foreground from background?FgHow to FTP user access other directory except his own home directory ?specify the user in /etc/vsftpd/user_list.then in /etc/vsftpd/vsftpd.conf ,add userlist_deny=NO,,,,then restart d service......... set d selinux for theaccessing home directory..........what are the Linux-based security tools?. Clam AntiVirus It is an open source (GPL) anti-virus toolkit for UNIX,designed especially for e-mail scanning on mail gateways.

2. SpamAssassin It is a computer program released under the Apache License2.0 used for e-mail spam filtering based on content-matchingrules.

3. Chkrootkit is a powerful tool to scan your Linux serverfor trojans

4. rkhunter (Rootkit Hunter) is a Unix-based tool that scansfor rootkits, backdoors and possible local exploits what is a command to display top 10 users who are using Huge Space?du -s /home/* | sort -nr |head -10In which File is Static IP address given so that it becomes Permanent ?just go to system-config-network

and type ip addressor

Page 169: Linux QANS Nov10

govi /etc/sysconfig/network-scripts/ifcfg-eth0

edit in this file it will become permanent.what are the features of Linux?The following feature of linux:-Some of its features include:1)Virtual memory, allowing the system to use disk room the same as RAM memory.

2)Networking with TCP/IP and other protocols.

3)Multiple user capability.

4)Protected mode so programs or user's can't access

5)unauthorized areas.

6)Shared libraries

7)True multitasking

8)X - A graphical user interface similar to windows, but supports remote sessions over a network.

9)Advanced server functionality:- FTP server Telnet server BOOTP server DHCP server Samba server DNS server SNMP services Mail services Network file sharing much, much more...

Support of filesystems that other operating systems use such as DOS (FAT), Windows95,98 (FAT32), Windows NT, 2000 (NTFS), Apple, minix, and others

some one is asking my machine is slow what is your steps?The increase in the size of SWAP partition may show you thelittle effect in increasing the system speed and better runin Single user mode rather than GUI modeuse top command, then check which process use the most resource and find the problem. Re-read all process#killall –HUPuse ps aux command and check which process is using much space and check is there any partition is going to be full disk check by df -HT command

Page 170: Linux QANS Nov10
Page 171: Linux QANS Nov10

Linux Interview Questions and Answers You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a file. The -15 tells tail to display the last fifteen lines of each specified file.

Who owns the data dictionary? The SYS user owns the data dictionary. The SYS and SYSTEM users are created when the database is created.

You routinely compress old log files. You now need to examine a log from two months ago. In order to view its contents without first having to decompress it, use the _________ utility. zcat The zcat utility allows you to examine the contents of a compressed file much the same way that cat displays a file.

You suspect that you have two commands with the same name as the command is not producing the expected results. What command can you use to determine the location of the command being run? which The which command searches your path until it finds a command that matches the command you are looking for and displays its full path.

You locate a command in the /bin directory but do not know what it does. What command can you use to determine its purpose. whatis The whatis command displays a summary line from the man page for the specified command.

You wish to create a link to the /data directory in bob's home directory so you issue the command ln /data /home/bob/datalink but the command fails. What option should you use in this command line to be successful. Use the -F option In order to create a link to a directory you must use the -F option.

When you issue the command ls -l, the first character of the resulting display represents the file's ___________.

Page 172: Linux QANS Nov10

type The first character of the permission block designates the type of file that is being displayed.

What utility can you use to show a dynamic listing of running processes? __________ top The top utility shows a listing of all running processes that is dynamically updated.

Where is standard output usually directed? to the screen or display By default, your shell directs standard output to your screen or display.

You wish to restore the file memo.ben which was backed up in the tarfile MyBackup.tar. What command should you type? tar xf MyBackup.tar memo.ben This command uses the x switch to extract a file. Here the file memo.ben will be restored from the tarfile MyBackup.tar.

You need to view the contents of the tarfile called MyBackup.tar. What command would you use? tar tf MyBackup.tar The t switch tells tar to display the contents and the f modifier specifies which file to examine.

You want to create a compressed backup of the users' home directories. What utility should you use? tar You can use the z modifier with tar to compress your archive at the same time as creating it.

What daemon is responsible for tracking events on your system? syslogd The syslogd daemon is responsible for tracking system information and saving it to specified log files.

You have a file called phonenos that is almost 4,000 lines long. What text filter can you use to split it into four pieces each 1,000 lines long? split

Page 173: Linux QANS Nov10

The split text filter will divide files into equally sized pieces. The default length of each piece is 1,000 lines.

You would like to temporarily change your command line editor to be vi. What command should you type to change it? set -o vi The set command is used to assign environment variables. In this case, you are instructing your shell to assign vi as your command line editor. However, once you log off and log back in you will return to the previously defined command line editor.

What account is created when you install Linux? root Whenever you install Linux, only one user account is created. This is the superuser account also known as root.

What command should you use to check the number of files and disk space used and each user's defined quotas? repquota The repquota command is used to get a report on the status of the quotas you have set including the amount of allocated space and amount of used space.

In order to run fsck on the root partition, the root partition must be mounted as readonly You cannot run fsck on a partition that is mounted as read-write.

In order to improve your system's security you decide to implement shadow passwords. What command should you use? pwconv The pwconv command creates the file /etc/shadow and changes all passwords to 'x' in the /etc/passwd file.

Bob Armstrong, who has a username of boba, calls to tell you he forgot his password. What command should you use to reset his command? passwd boba The passwd command is used to change your password. If you do not specify a username, your password will be changed.

Page 174: Linux QANS Nov10

The top utility can be used to change the priority of a running process? Another utility that can also be used to change priority is ___________? nice Both the top and nice utilities provide the capability to change the priority of a running process.

What command should you type to see all the files with an extension of 'mem' listed in reverse alphabetical order in the /home/ben/memos directory. ls -r /home/ben/memos/*.mem The -c option used with ls results in the files being listed in chronological order. You can use wildcards with the ls command to specify a pattern of filenames.

What file defines the levels of messages written to system log files? kernel.h To determine the various levels of messages that are defined on your system, examine the kernel.h file.

What command is used to remove the password assigned to a group? gpasswd -r The gpasswd command is used to change the password assigned to a group. Use the -r option to remove the password from the group.

What command would you type to use the cpio to create a backup called backup.cpio of all the users' home directories? find /home | cpio -o > backup.cpio The find command is used to create a list of the files and directories contained in home. This list is then piped to the cpio utility as a list of files to include and the output is saved to a file called backup.cpio.

What can you type at a command line to determine which shell you are using? echo $SHELL The name and path to the shell you are using is saved to the SHELL environment variable. You can then use the echo command to print out the value of any variable by preceding the variable's name with $. Therefore, typing echo $SHELL will display the name of your shell.

What type of local file server can you use to provide the distribution installation materials to the new machine during a network installation? A) Inetd B) FSSTND

Page 175: Linux QANS Nov10

C) DNS D) NNTP E) NFS E - You can use an NFS server to provide the distribution installation materials to the machine on which you are performing the installation. Answers a, b, c, and d are all valid items but none of them are file servers. Inetd is the superdaemon which controls all intermittently used network services. The FSSTND is the Linux File System Standard. DNS provides domain name resolution, and NNTP is the transfer protocol for usenet news.

If you type the command cat dog & > cat what would you see on your display? Choose one: a. Any error messages only. b. The contents of the file dog. c. The contents of the file dog and any error messages. d. Nothing as all output is saved to the file cat. d When you use & > for redirection, it redirects both the standard output and standard error. The output would be saved to the file cat.

You are covering for another system administrator and one of the users asks you to restore a file for him. You locate the correct tarfile by checking the backup log but do not know how the directory structure was stored. What command can you use to determine this? Choose one: a. tar fx tarfile dirname b. tar tvf tarfile filename c. tar ctf tarfile d. tar tvf tarfile d The t switch will list the files contained in the tarfile. Using the v modifier will display the stored directory structure.

You have the /var directory on its own partition. You have run out of space. What should you do? Choose one: a. Reconfigure your system to not write to the log files. b. Use fips to enlarge the partition. c. Delete all the log files. d. Delete the partition and recreate it with a larger size. d

Page 176: Linux QANS Nov10

The only way to enlarge a partition is to delete it and recreate it. You will then have to restore the necessary files from backup.

You have a new application on a CD-ROM that you wish to install. What should your first step be? Choose one: a. Read the installation instructions on the CD-ROM. b. Use the mount command to mount your CD-ROM as read-write. c. Use the umount command to access your CD-ROM. d. Use the mount command to mount your CD-ROM as read-only. d Before you can read any of the files contained on the CD-ROM, you must first mount the CD-ROM.

When you create a new partition, you need to designate its size by defining the starting and ending _____________. cylinders When creating a new partition you must first specify its starting cylinder. You can then either specify its size or the ending cylinder.

What key combination can you press to suspend a running job and place it in the background? ctrl-z Using ctrl-z will suspend a job and put it in the background.

The easiest, most basic form of backing up a file is to _____ it to another location. copy The easiest most basic form of backing up a file is to make a copy of that file to another location such as a floppy disk.

What type of server is used to remotely assign IP addresses to machines during the installation process? A) SMB B) NFS C) DHCP D) FT E) HTTP C - You can use a DHCP server to assign IP addresses to individual machines during the installation process. Answers a, b, d, and e list legitimate Linux servers, but these servers do not provide IP addresses. The SMB, or Samba, tool is used for file and print sharing

Page 177: Linux QANS Nov10

across multi-OS networks. An NFS server is for file sharing across Linux net-works. FTP is a file storage server that allows people to browse and retrieve information by logging in to it, and HTTP is for the Web.

Which password package should you install to ensure that the central password file couldn't be stolen easily? A) PAM B) tcp_wrappers C) shadow D) securepass E) ssh C - The shadow password package moves the central password file to a more secure location. Answers a, b, and e all point to valid packages, but none of these places the password file in a more secure location. Answer d points to an invalid package.

When using useradd to create a new user account, which of the following tasks is not done automatically. Choose one: a. Assign a UID. b. Assign a default shell. c. Create the user's home directory. d. Define the user's home directory. c The useradd command will use the system default for the user's home directory. The home directory is not created, however, unless you use the -m option.

You want to enter a series of commands from the command-line. What would be the quickest way to do this? Choose One a. Press enter after entering each command and its arguments b. Put them in a script and execute the script c. Separate each command with a semi-colon (;) and press enter after the last command d. Separate each command with a / and press enter after the last command c The semi-colon may be used to tell the shell that you are entering multiple commands that should be executed serially. If these were commands that you would frequently want to run, then a script might be more efficient. However, to run these commands only once, enter the commands directly at the command line.

Page 178: Linux QANS Nov10

You attempt to use shadow passwords but are unsuccessful. What characteristic of the /etc/passwd file may cause this? Choose one: a. The login command is missing. b. The username is too long. c. The password field is blank. d. The password field is prefaced by an asterisk. c The password field must not be blank before converting to shadow passwords.

When you install a new application, documentation on that application is also usually installed. Where would you look for the documentation after installing an application called MyApp? Choose one: a. /usr/MyApp b. /lib/doc/MyApp c. /usr/doc/MyApp d. In the same directory where the application is installed. c The default location for application documentation is in a directory named for the application in the /usr/doc directory.

What file would you edit in your home directory to change which window manager you want to use? A) Xinit B) .xinitrc C) XF86Setup D) xstart E) xf86init Answer: B - The ~/.xinitrc file allows you to set which window man-ager you want to use when logging in to X from that account. Answers a, d, and e are all invalid files. Answer c is the main X server configuration file.

What command allows you to set a processor-intensive job to use less CPU time? A) ps B) nice C) chps D) less E) more Answer: B - The nice command is used to change a job's priority level, so that it runs

Page 179: Linux QANS Nov10

slower or faster. Answers a, d, and e are valid commands but are not used to change process information. Answer c is an invalid command.

While logged on as a regular user, your boss calls up and wants you to create a new user account immediately. How can you do this without first having to close your work, log off and logon as root? Choose one: a. Issue the command rootlog. b. Issue the command su and type exit when finished. c. Issue the command su and type logoff when finished. d. Issue the command logon root and type exit when finished. Answer: b You can use the su command to imitate any user including root. You will be prompted for the password for the root account. Once you have provided it you are logged in as root and can do any administrative duties.

Google Search

Linux Interview Questions and Answers There are seven fields in the /etc/passwd file. Which of the following lists all the fields in the correct order? Choose one: a. username, UID, GID, home directory, command, comment b. username, UID, GID, comment, home directory, command c. UID, username, GID, home directory, comment, command d. username, UID, group name, GID, home directory, comment Answer: b The seven fields required for each line in the /etc/passwd file are username, UID, GID, comment, home directory, command. Each of these fields must be separated by a colon even if they are empty.

Which of the following commands will show a list of the files in your home directory including hidden files and the contents of all subdirectories? Choose one: a. ls -c home b. ls -aR /home/username c. ls -aF /home/username d. ls -l /home/username Answer: b The ls command is used to display a listing of files. The -a option will cause hidden files

Page 180: Linux QANS Nov10

to be displayed as well. The -R option causes ls to recurse down the directory tree. All of this starts at your home directory.

In order to prevent a user from logging in, you can add a(n) ________at the beginning of the password field. Answer: asterick If you add an asterick at the beginning of the password field in the /etc/passwd file, that user will not be able to log in.

You have a directory called /home/ben/memos and want to move it to /home/bob/memos so you issue the command mv /home/ben/memos /home/bob. What is the results of this action? Choose one: a. The files contained in /home/ben/memos are moved to the directory /home/bob/memos/memos. b. The files contained in /home/ben/memos are moved to the directory /home/bob/memos. c. The files contained in /home/ben/memos are moved to the directory /home/bob/. d. The command fails since a directory called memos already exists in the target directory. Answer: a When using the mv command to move a directory, if a directory of the same name exists then a subdirectory is created for the files to be moved.

Which of the following tasks is not necessary when creating a new user by editing the /etc/passwd file? Choose one: a. Create a link from the user's home directory to the shell the user will use. b. Create the user's home directory c. Use the passwd command to assign a password to the account. d. Add the user to the specified group. Answer: a There is no need to link the user's home directory to the shell command. Rather, the specified shell must be present on your system.

You issue the following command useradd -m bobm But the user cannot logon. What is the problem? Choose one: a. You need to assign a password to bobm's account using the passwd command. b. You need to create bobm's home directory and set the appropriate permissions. c. You need to edit the /etc/passwd file and assign a shell for bobm's account. d. The username must be at least five characters long.

Page 181: Linux QANS Nov10

Answer: a The useradd command does not assign a password to newly created accounts. You will still need to use the passwd command to assign a password.

You wish to print the file vacations with 60 lines to a page. Which of the following commands will accomplish this? Choose one: a. pr -l60 vacations | lpr b. pr -f vacations | lpr c. pr -m vacations | lpr d. pr -l vacations | lpr Answer: a The default page length when using pr is 66 lines. The -l option is used to specify a different length.

Which file defines all users on your system? Choose one: a. /etc/passwd b. /etc/users c. /etc/password d. /etc/user.conf Answer: a The /etc/passwd file contains all the information on users who may log into your system. If a user account is not contained in this file, then the user cannot log in.

Which two commands can you use to delete directories? A) rm B) rm -rf C) rmdir D) rd E) rd -rf Answer(s): B, C - You can use rmdir or rm -rf to delete a directory. Answer a is incorrect, because the rm command without any specific flags will not delete a directory, it will only delete files. Answers d and e point to a non-existent command.

Which partitioning tool is available in all distributions? A) Disk Druid B) fdisk C) Partition Magic D) FAT32 E) System Commander Answer(s): B - The fdisk partitioning tool is available in all Linux distributions. Answers a, c, and e all handle partitioning, but do not come with all distributions. Disk Druid is

Page 182: Linux QANS Nov10

made by Red Hat and used in its distribution along with some derivatives. Partition Magic and System Commander are tools made by third-party companies. Answer d is not a tool, but a file system type. Specifically, FAT32 is the file system type used in Windows 98.

Which partitions might you create on the mail server's hard drive(s) other than the root, swap, and boot partitions? [Choose all correct answers] A) /var/spool B) /tmp C) /proc D) /bin E) /home Answer(s): A, B, E - Separating /var/spool onto its own partition helps to ensure that if something goes wrong with the mail server or spool, the output cannot overrun the file system. Putting /tmp on its own partition prevents either software or user items in the /tmp directory from overrunning the file system. Placing /home off on its own is mostly useful for system re-installs or upgrades, allowing you to not have to wipe the /home hierarchy along with other areas. Answers c and d are not possible, as the /proc portion of the file system is virtual-held in RAM-not placed on the hard drives, and the /bin hierarchy is necessary for basic system functionality and, therefore, not one that you can place on a different partition.

When planning your backup strategy you need to consider how often you will perform a backup, how much time the backup takes and what media you will use. What other factor must you consider when planning your backup strategy? _________ what to backup Choosing which files to backup is the first step in planning your backup strategy.

What utility can you use to automate rotation of logs? Answer: logrotate The logrotate command can be used to automate the rotation of various logs.

In order to display the last five commands you have entered using the history command, you would type ___________ . Answer: history 5 The history command displays the commands you have previously entered. By passing it an argument of 5, only the last five commands will be displayed.

What command can you use to review boot messages? Answer: dmesg The dmesg command displays the system messages contained in the kernel ring buffer.

Page 183: Linux QANS Nov10

By using this command immediately after booting your computer, you will see the boot messages.

What is the minimum number of partitions you need to install Linux? Answer: 2 Linux can be installed on two partitions, one as / which will contain all files and a swap partition.

What is the name and path of the main system log? Answer: /var/log/messages By default, the main system log is /var/log/messages.

Of the following technologies, which is considered a client-side script? A) JavaScript B) Java C) ASP D) C++ Answer: A - JavaScript is the only client-side script listed. Java and C++ are complete programming languages. Active Server Pages are parsed on the server with the results being sent to the client in HTML

Page 184: Linux QANS Nov10

Linux admin interview questions

1. How do you take a single line of input from the user in a shell script?

2. Write a script to convert all DOS style backslashes to UNIX style slashes in a list of files.

3. Write a regular expression (or sed script) to replace all occurrences of the letter ‘f’, followed by any number of characters, followed by the letter ‘a’, followed

by one or more numeric characters, followed by the letter ‘n’, and replace what’s found with the string “UNIX”.

4. Write a script to list all the differences between two directories.

5. Write a program in any language you choose, to reverse a file.

6. What are the fields of the password file?

7. What does a plus at the beginning of a line in the password file signify?

8. Using the man pages, find the correct ioctl to send console output to an arbitrary pty.

9. What is an MX record?

10. What is the prom command on a Sun that shows the SCSI devices?

11. What is the factory default SCSI target for /dev/sd0?

12. Where is that value controlled?

13. What happens to a child process that dies and has no parent process to wait for it and what’s bad about this?

14. What’s wrong with sendmail? What would you fix?

15. What command do you run to check file system consistency?

16. What’s wrong with running shutdown on a network?

17. What can be wrong with setuid scripts?

18. What value does spawn return?

19. Write a script to send mail from three other machines on the network to root at the machine you’re on. Use a ‘here doc’, but include in the mail message the name of the machine the mail is sent from and the disk utilization statistics on each machine?

20. Why can’t root just cd to someone’s home directory and run a program called a.out sitting there by typing “a.out”, and why is this good?

21. What is the difference between UDP and TCP?

Page 185: Linux QANS Nov10

22. What is DNS?

23. What does nslookup do?

24. How do you create a swapfile?

25. How would you check the route table on a workstation/server?

26. How do you find which ypmaster you are bound to?

27. How do you fix a problem where a printer will cutoff anything over 1MB?

28. What is the largest file system size in solaris? SunOS?

29. What are the different RAID levels?

^Back to Top

Interview questions for Linux admin

1. Advantages/disadvantages of script vs compiled program.

2. Name a replacement for PHP/Perl/MySQL/Linux/Apache and show main differences.

3. Why have you choosen such a combination of products?

4. Differences between two last MySQL versions. Which one would you choose and when/why?

5. Main differences between Apache 1.x and 2.x. Why is 2.x not so popular? Which one would you choose and when/why?

6. Which Linux distros do you have experience with?

7. Which distro you prefer? Why?

8. Which tool would you use to update Debian / Slackware / RedHat / Mandrake / SuSE ?

9. You’re asked to write an Apache module. What would you do?

10. Which tool do you prefer for Apache log reports?

11. Your portfolio. (even a PHP guest book may work well)

12. What does ‘route’ command do?

13. Differences between ipchains and iptables.

14. What’s eth0, ppp0, wlan0, ttyS0, etc.

15. What are different directories in / for?

Page 186: Linux QANS Nov10

16. Partitioning scheme for new webserver. Why?

^Back to Top Read more at TechInterviews.com

Unix/Linux programming interview questions

Question 1: What is the major advantage of a hash table? (Asked by Silicon Magic Corp. people)

Answer: The major advantage of a hash table is its speed. Because the hash function is to take a range of key values and transform them into index values in such a way that the key values are distributed randomly across all the indices of a hash table.

Question 2: What are the techniques that you use to handle the collisions in hash tables?(Asked by Silicon Magic Corp. people)

Answer: We can use two major techniques to handle the collisions. They are open addressing and separate chaining. In open addressing, data items that hash to a full

array cell are placed in another cell in the array. In separate chaining, each array element consist of a linked list. All data items hashing to a given array index are

inserted in that list.

Question 3: In Unix OS, what is the file server? (Asked by Silicon Magic Corp. people)

Answer: The file server is a machine that shares its disk storage and files with other machines on the network.

Question 4: What is NFS? What is its job?(Asked by Silicon Magic Corp. people)

Answer: NFS stands for Network File System. NFS enables filesystems physically residing on one computer system to be used by other computers in the network,

appearing to users on the remote host as just another local disk.

Question 5: What is CVS? List some useful CVS commands.(Asked by Silicon Magic Corp.people)

Anser: CVS is Concurrent Version System. It is the front end to the RCS revision control system which extends the notion of revision control from a collection of files in a single directory to a hierarchical collection of directories consisting of revision

controlled files. These directories and files can be combined together to form a software release.

There are some useful commands that are being used very often. They are

cvs checkout cvs update

cvs add cvs remove cvs commit

Page 187: Linux QANS Nov10

^Back to Top

Unix/Linux administration interview questions

What is LILO?

LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory, and tell the system which partition and hard drive to boot from.

What is the main advantage of creating links to a file instead of copies of the file?

A: The main advantage is not really that it saves disk space (though it does that too) but, rather, that a change of permissions on the file is applied to all the link access

points. The link will show permissions of lrwxrwxrwx but that is for the link itself and not the access to the file to which the link points. Thus if you want to change the

permissions for a command, such as su, you only have to do it on the original. With copies you have to find all of the copies and change permission on each of the copies.

Write a command to find all of the files which have been accessed within the last 30 days.

find / -type f -atime -30 > December.files

This command will find all the files under root, which is ‘/’, with file type is file. ‘-atime -30′ will give all the files accessed less than 30 days ago. And the output will

put into a file call December.files.

What is the most graceful way to get to run level single user mode?

A: The most graceful way is to use the command init s. If you want to shut everything down before going to single user mode then do init 0

first and from the ok prompt do a boot -s.

What does the following command line produce? Explain each aspect of this line. $ (date ; ps -ef | awk ‘{print $1}’ | sort | uniq | wc -l ) >>

Activity.log

A: First let’s dissect the line: The date gives the date and time as the first command of the line, this is followed by the a list of all running processes in long form with UIDs listed first, this is the ps -ef. These are fed into the awk which filters out all but the UIDs; these UIDs are piped into sort for no discernible reason and then onto uniq

(now we see the reason for the sort - uniq only works on sorted data - if the list is A, B, A, then A, B, A will be the output of uniq, but if it’s A, A, B then A, B is the

output) which produces only one copy of each UID.

These UIDs are fed into wc -l which counts the lines - in this case the number of distinct UIDs running processes on the system. Finally the results of these two

commands, the date and the wc -l, are appended to the file "Activity.log". Now to answer the question as to what this command line produces. This writes the date and

time into the file Activity.log together with the number of distinct users who have

Page 188: Linux QANS Nov10

processes running on the system at that time. If the file already exists, then these items are appended to the file, otherwise the file is created.

^Back to Top

Read more at TechInterviews.com

Solaris interview questions

1. List the files in current directory sorted by size ? - ls -l | grep ^- | sort -nr

2. List the hidden files in current directory ? - ls -a1 | grep "^\."

3. Delete blank lines in a file ? - cat sample.txt | grep -v ‘^$’ > new_sample.txt

4. Search for a sample string in particular files ? - grep .Debug. *.confHere grep uses the string .Debug. to search in all files with extension..conf. under current

directory.

5. Display the last newly appending lines of a file during appendingdata to the same file by some processes ? - tail .f Debug.logHere tail shows the newly

appended data into Debug.log by some processes/user.

6. Display the Disk Usage of file sizes under each directory in currentDirectory ? - du -k * | sort .nr (or) du .k . | sort -nr

7. Change to a directory, which is having very long name ? - cd CDMA_3X_GEN*Here original directory name is .

.CDMA_3X_GENERATION_DATA..

8. Display the all files recursively with path under current directory ? - find . -depth -print

9. Set the Display automatically for the current new user ? - export DISPLAY=`eval ‘who am i | cut -d"(" -f2 | cut -d")" -f1′`Here in above command, see

single quote, double quote, grave ascent is used. Observe carefully.

10. Display the processes, which are running under yourusername ? - ps .aef | grep MaheshvjHere, Maheshvj is the username.

11. List some Hot Keys for bash shell ? - Ctrl+l . Clears the Screen. Ctrl+r . Does a search in previously given commands in shell. Ctrl+u - Clears the typing

before the hotkey. Ctrl+a . Places cursor at the beginning of the command at shell. Ctrl+e . Places cursor at the end of the command at shell. Ctrl+d . Kills the shell.

Ctrl+z . Places the currently running process into background.

12. Display the files in the directory by file size ? - ls .ltr | sort .nr .k 5

13. How to save man pages to a file ? - man <command> | col .b > <output-file>Example : man top | col .b > top_help.txt

Page 189: Linux QANS Nov10

14. How to know the date & time for . when script is executed ? - Add the following script line in shell script.eval echo "Script is executed at `date`" >> timeinfo.infHere, .timeinfo.inf. contains date & time details ie., when script is

executed and history related to execution.

15. How do you find out drive statistics ? - iostat -E

16. Display disk usage in Kilobytes ? - du -k

17. Display top ten largest files/directories ? - du -sk * | sort -nr | head

18. How much space is used for users in kilobytes ? - quot -af

19. How to create null file ? - cat /dev/null > filename1

20. Access common commands quicker ? - ps -ef | grep -i $@

21. Display the page size of memory ? - pagesize -a

22. Display Ethernet Address arp table ? - arp -a

23. Display the no.of active established connections to localhost ? - netstat -a | grep EST

24. Display the state of interfaces used for TCP/IP traffice ? - netstat -i

25. Display the parent/child tree of a process ? - ptree <pid> Example: ptree 1267

26. Show the working directory of a process ? - pwdx <pid> Example: pwdx 1267

27. Display the processes current open files ? - pfiles <pid> Example: pfiles 1267

28. Display the inter-process communication facility status ? - ipcs

29. Display the top most process utilizing most CPU ? - top .b 1

30. Alternative for top command ? - prstat -a

Basic shell scripting questions By admin | July 22, 2007

1. How do you find out what’s your shell? - echo $SHELL

2. What’s the command to find out today’s date? - date

3. What’s the command to find out users on the system? - who

4. How do you find out the current directory you’re in? - pwd

5. How do you remove a file? - rm

Page 190: Linux QANS Nov10

6. How do you remove a < in files the all with>- rm -rf

7. How do you find out your own username? - whoami

8. How do you send a mail message to somebody? - mail

[email protected] -s ‘Your subject’ -c ‘[email protected]

9. How do you count words, lines and characters in a file? - wc

10. How do you search for a string inside a given file? - grep string filename

11. How do you search for a string inside a directory? - grep string *

12. How do you search for a string in a directory with the subdirectories recursed? -

grep -r string *

13. What are PIDs? - They are process IDs given to processes. A PID can vary from 0

to 65535.

14. How do you list currently running process? - ps

15. How do you stop a process? - kill pid

16. How do you find out about all running processes? - ps -ag

17. How do you stop all the processes, except the shell window? - kill 0

18. How do you fire a process in the background? - ./process-name &

19. How do you refer to the arguments passed to a shell script? - $1, $2 and so on. $0

is your script name.

20. What’s the conditional statement in shell scripting? - if {condition} then … fi

21. How do you do number comparison in shell scripts? - -eq, -ne, -lt, -le, -gt, -ge

22. How do you test for file properties in shell scripts? - -s filename tells you if the file

is not empty, -f filename tells you whether the argument is a file, and not a

directory, -d filename tests if the argument is a directory, and not a file, -w

filename tests for writeability, -r filename tests for readability, -x filename tests

for executability

23. How do you do Boolean logic operators in shell scripting? - ! tests for logical not, -

a tests for logical and, and -o tests for logical or.

24. How do you find out the number of arguments passed to the shell script? - $#

25. What’s a way to do multilevel if-else’s in shell scripting? - if {condition} then

{statement} elif {condition} {statement} fi

26. How do you write a for loop in shell? - for {variable name} in {list} do {statement}

done

27. How do you write a while loop in shell? - while {condition} do {statement} done

28. How does a case statement look in shell scripts? - case {variable} in {possible-

value-1}) {statement};; {possible-value-2}) {statement};; esac

Page 191: Linux QANS Nov10

29. How do you read keyboard input in shell scripts? - read {variable-name}

30. How do you define a function in a shell script? - function-name() { #some code

here return }

31. How does getopts command work? - The parameters to your script can be passed

as -n 15 -x 20. Inside the script, you can iterate through the getopts array as while

getopts n:x option, and the variable $option contains the value of the entered

option.

Page 192: Linux QANS Nov10

For interactive and self-paced preparation of exam RH253, try our practice exams. Practice exams also include self assessment and reporting features 1

RedHat Linux Exam-RH253

RedHat Linux Networking and Security Administration

http://www.certsking.com/RH253.html

www.certsking.com

Total Questions: 10

Page 193: Linux QANS Nov10

For interactive and self-paced preparation of exam RH253, try our practice exams. Practice exams also include self assessment and reporting features 2

Question: 1

You work as a Linux Technician for Tech Perfect Inc. You want to protect your server from intruders who exploit services that are started with TCP Wrappers. Which of the following files will help you protect the server? Each correct answer represents a part of the solution. Choose two. A. hosts.deny B. hosts.allow C. lilo.conf D. httpd.conf

Answer: A, B

Question: 2

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two. A. DoS attack B. Broadcast storm C. Password sniffing D. IP spoofing

Answer: C, D

Question: 3

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are configuring a Linux server that will be used as a Web server. The TCP/IP configuration of the server is shown in the following tablE. All services are denied through the hosts.deny file. You want to permit access to the Web services on the local subnet. How will you accomplish the task? A. Remove all entries from the hosts.deny file. In the hosts.allow file, append the entry httpD. 192.168.1.100/24 B. Remove all entries from the hosts.deny file. In the hosts.allow file, append the entry 192.168.1.100/24:httpd C. Remove all entries from the hosts.deny file. D. In the hosts.allow file, append the entry httpD. 192.168.1.100/24

Answer: D

Page 194: Linux QANS Nov10

For interactive and self-paced preparation of exam RH253, try our practice exams. Practice exams also include self assessment and reporting features 3

Question: 4

Which of the following files are used by Samba to log messages? Each correct answer represents a complete solution. Choose two. A. /usr/doc/samba B. /var/log/samba C. /etc/smb.conf D. /var/log/messages

Answer: B, D

Question: 5

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel? A. Stunnel B. IPTables C. OpenSSH D. IPChains

Answer: B

Question: 6

Which of the following configuration files is used to configure Samba? A. /etc/hosts B. /etc/samba/smb.conf C. /etc/hosts.allow D. /etc/samba.conf

Answer: B

Page 195: Linux QANS Nov10

For interactive and self-paced preparation of exam RH253, try our practice exams. Practice exams also include self assessment and reporting features 4

Question: 7

Which command is used to connect securely to a remote Linux server? A. RLOGIN B. RSH C. TELNET D. SSH

Answer: D

Question: 8

A user named Rick wants to connect to the remote host with the IP address 192.168.1.1. Which of the following commands will he use? A. SSH -r 192.168.1.1 rick B. SSH -l rick 192.168.1.1 C. SSH -n 192.168.1.1 D. SSH -l 192.168.1.1

Answer: B

Question: 9

Which of the following commands is used to transfer files between servers? A. SSH B. MOUNT C. TELNET D. FTP

Answer: D

Question: 10

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You have configured a client computer to receive an IP address from the DHCP server. There is only one network card installed on the computer. You want to verify that the computer has received the IP address from the DHCP server. Which of the following steps will you take to accomplish the task?

Page 196: Linux QANS Nov10

For interactive and self-paced preparation of exam RH253, try our practice exams. Practice exams also include self assessment and reporting features 5

Each correct answer represents a part of the solution. Choose two. A. Run the NETSTAT -flush command. B. Run the /ETC/INIT.D/NETWORK RESTART command. C. Reboot the PING eth0 command. D. Run the /SBIN/IFCONFIG eth0 command.

Answer: B, D

Question: 11

You work as a Network Administrator for Rick International. The company has a TCP/IPbased network. You have configured a Linux server on the network. This server will provide file and print services. Which of the following services will you enable on the server in order to provide these services to the Windows clients on the network? A. LDAP B. DHCP C. Samba D. SMB

Answer: C

Question: 12

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task? Each correct answer represents a complete solution. Choose two. A. nc -v -n 208.100.2.25 80 B. nmap -v -O www.we-are-secure.com C. nc 208.100.2.25 23 D. nmap -v -O 208.100.2.25

Answer: B, D

Question: 13

You work as a System Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Linux system. You want to stop nscd service in run levels 2, 3, and 5 on your system. Which of the following commands will you use to accomplish the task?

Page 197: Linux QANS Nov10

For interactive and self-paced preparation of exam RH253, try our practice exams. Practice exams also include self assessment and reporting features 6

A. chkconfig -level 235 nscd off B. chkconfig --list nscd C. chkconfig --runlevel 235 nscd off D. chkconfig --level 235 nscd off

Answer: D

Question: 14

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linuxbased network. He is working as a root user on the Linux operating system. He recognizes that his operating system is showing some errors during boot. Now, he wants to get the information which processes are being started at bootup and during normal operation. Which of the following files can he use to accomplish his task? A. /etc/inetd.conf B. /etc/inittab C. /etc/services D. /etc/mtab

Answer: B

Question: 15

Which of the following services enables Linux users to connect to the resources in the Microsoft network? A. Samba B. Apache C. Squid D. Sendmail

Answer: A

Page 198: Linux QANS Nov10

For interactive and self-paced preparation of exam RH253, try our practice exams. Practice exams also include self assessment and reporting features 7

Thank You For Trying Our Demo

RedHat Linux Exam-RH253

http://www.certsking.com/RH253.html

RedHat Linux Networking and Security Administration

If you have any questions or difficulties regarding this product, feel free to contact Us.

For interactive and self-paced preparation of exam RH253, try our practice exams. Practice exams also include self assessment and reporting features!