Home > System Tutorial > LINUX > body text

What is the connection between Linux and Unix? Interpreting the Linux kernel version number

王林
Release: 2024-01-26 22:24:36
forward
1298 people have browsed it

linux期末复习

linux期末复习

first

1.The relationship between Linux and unix is ​​()d.linux is a unix-like operating system

2. The Linux system is a () operating system d. Multi-user, multi-tasking

3.The system configuration file of XWindow is ()d./etc/X11/xorg.conf

4. The following () command can only start a simple XWindow window d.xinit

5 The following statement about shell is incorrect () a. The socket program between the user and the Linux kernel

6.() command can switch the ordinary user to the super user c.su

7. The following statement about the Linux kernel version is incorrect () "1.3.2" means a stable release version

8. The following () kernel version belongs to the test version b.2.3.4

9. The following () command cannot start the XWindow system c.xwindow

10 Among the following commands, the one that can restart the computer is ()d.reboot

11 The following () settings do not require superuser permissions b to change the type of desktop environment

12 In Linux, if you choose to use the second virtual console, you should press the () key Alt F2

13Linux development time originated from ()b.1991

14The operating system is a program that manages computer hardware and software for users. The following three main functions that do not belong to it are () c. User interface

15/root directory is ()a. the super user’s home directory

the second time

1. The installation software package provided by RedHatLinux, the default packaging format is d.rpm

2. Which of the following statements about shutdown–k is correct () a. Send a warning message to all users

3. Which command below can display the contents of a text file? ()b.mored.vi

4. Which command below is used to start Xwindow? ()b.startx

5. In order to ensure the security of the system, today's Linux systems usually encrypt the /etc/passwd password file and save it as () file b./etc/shadow

6. The following description of user groups is incorrect ()

a. User group administrators can create user accounts, set or change account passwords, and all other things related to users and groups

7. Among the following commands, the Linux command to display the current version and other system information is , and the command that cannot be used to view the content of text files is () b.ls

8. The following () file saves user account information c./etc/shadow

9. Among the following options, which command can crash ()d.init0

10Use the () command to merge two files into one file d.cat

11 When deleting a software package using rpm, the command option that should be used is () b.-e

12When upgrading an installed software package with rpm, the command option that should be used is ()d.–U

13. When using rpm to install a software package, the command option that should be used is ()c.-i

14Which command can convert an ordinary user into a super user? ()a.su

15That command can copy all files in the /dir1 directory, including all subdirectories, to the /dir2 directory ()

c.cp–r./dir1/*./dir2

16How to obtain information about installed RPM software packages? ()c.rpm-ql

17 For the following command: $catnametest1test2>name, the correct statement is ()d. Merge test1test2 into name

18 Regarding the pwd command, which of the following statements is wrong? ()

1.Copy system output

2. Shut down your system

3.Copy recently processed documents

19 Use the "useraddjerry" command to add a user. What is the home directory of this user? ()b./home/jerry20 user’s account information is stored in ()b./etc/shadowc./etc/passwd

the third time

1. The configuration file corresponding to the init process is named (). This process is the first process of the Linux process, and its process number is always 1d./etc/inittab

2. Does Linux support the following file systems? ()a.vfatb.minixc.xfs

3What are the unique identifiers of Linux files and directories? ()d.inodes

4 If an attribute is drwxrwxrwx, the permissions of this file are () a. root can delete files in this directory b. The file owner has the right to delete files in this directory

5 Regarding the link description below, the error is () b. Both hard links and symbolic links form a new inode

6The one below is the standard term for the /usr file system ()c. It is used to store executable programs, system management tools and library files

7 The following command cannot be used to create an EXT3 file system ()c.mkdfs.ext3

8 Among the following ways to mount a CD, the incorrect one is () a.mount/mnt/cdrom

9 If you get a message that a running command is denied, which command can you use to change its permissions so that it can run normally? ()a.chmod

10 The file system type used by the disc is ()d.ISO9660

11 Which statement about fsck is correct () a. It needs to be executed before backing up the entire file system d. It needs to be executed in single-user mode

12 Regarding the /etc file system, which one is the standard usage (). Used to store configuration files for system management

13 Regarding symbolic links, what is correct? () It can be linked to a device file. It can be linked to a file that does not exist. It can be linked to a file on a different file system. It can be linked to a directory.

14 Use files to create a swap partition. Which of the following is its advantage () a. It is easier to implement

15 In the following device file, the device file representing the first logical partition of the second IDE hard disk is ()d./dev/hdb516. In the following device file, the device file representing the second SCSI hard disk is The device file of the first logical partition is () b./dev/sdb517. If you want to load a Windows95 partition of /dev/hdb1 to the /mnt/win95 directory, what command do you need to run? ()b.mount–tvfat/dev/hdb1/mnt/win95

18 For manual mounting of the Linux file system, the configuration work is completed in the () file d./etc/fstab

19When loading CDROM, the default file system type is that ()iso9660

20 The access permission of file exerl is rw-r--r--. First, reduce the execution permission of all users and the write permission of users in the same group. The correct command below is () a.chmoda xg wexerl

the fourth time

1 Which of the following descriptions about run levels is correct? ()a. Run levels 0-6 or S respectively specify the services/daemon processes that run when the system boots. c. You can switch from single-user mode to multi-user mode

2 When deleting a software package with the help of rpm, the command option that should be used is ()a.-e

3 When upgrading an installed software package with rpm, the command option that should be used is ()d.-U

4 When installing a software package with the help of rpm, the command option that should be used is ()d.-i

5What does startup run level 3 mean? ()c.Multi-user mode with network function

6How to obtain information about installed RPM software packages? ()d.rpm-ql

7 When the Linux kernel performs hardware measurements and activates the swap partition, which of the following programs is run? ()c./sbin/init8 When booting into linux, which of the following directories contains the scripts that will be run? ()c./etc/rc.d/init.d

9What are the effects of creating a sticky bit (sticky) for the /tmp directory listed below? ()d. It allows the owner of a file or directory to connect and rename its file or directory

10 To check whether the telnet software package is installed in the current Linux system, the installation command is (B)

b.rpm-qtelnet

11 To know the installed RPM package information, you should view the contents of the (C) file c./var/log/rpmpkg

12Please select the correct description about /etc/fstab? (D)d. Used to manage file system information

13 Please select the correct command to upgrade the samba-B.0.5aJp2-8.i386.rpm software package (D)

d.rpm-uhv.samba-B.0.5aJp2-8.i386.rpm

14 Please select the correct description (C) about /etc/inittab. It is used to set the running level after starting the system

15 Please select the one with an incorrect description of the run level in the LINUX system. (C)c. Run level 2 is not defined

16 Please choose the appropriate command to measure the c drive or video memory usage (D)d.top

17Which function does run level 2 perform? (B)b. Multi-user mode does not have nfs support

18 Choose the correct command to find the name of the relevant package in all installed RPM packages (C) c.rpm–qa|grepsamb19 Choose the correct description of the /proc file system (ACD) a. You can get the system Some information about the running process c./proc file system can provide many parameters of the system core d./proc is a virtual file system

20Generally, which Linux utility is responsible for loading the core? (C)c.grub

the fifth time

1.The process priority range in Linux is ()a.-20 to 19

2. Which of the following commands displays each process in the system in detail ()

b.ps–ef

c.ps–aux

3. Use the () command to cancel the execution of task scheduling.

d.crontab–r

4.What command is used to measure cpuID?()

b.more/proc/cpuinfood.dmesg|grepCPU

5. In Linux, () is the basic unit of system resource allocation and the basic scheduling unit of CPU operation

a.Process

6. When logging into Linux, a shell with a unique process ID number will be called. What is this ID? ()

b.PID

7. The terminal window of the desktop environment can be expressed as ()

a.pts/0

8. One or more related()s being executed form a job

linux显示目前的版本等系统信息的命令是_命令提示符版本升级_显示版本信息用什么命令

c.Process

9.openssh uses the port number () by default

b.22

10.SSH is a contract, it has two versions () and ()

b.SSH2d.SSH1

11.The default port of Webmin service is ()

b.10000

12. Which computer can be pinged by a host with an IP address of 172.16.55.69 and a subnet segment of 255.255.248.0? ()

b.172.16.50.87d.172.16.48.35

13. Which of the following descriptions about xinetd is correct ()

c. All three of the above are correct

14. Which of the following descriptions about xinetd is correct? ()

b. Its configuration file is /etc/xinetd.conf

c.xinetd can work with TCP_Wraper to control access to a certain network service

d. It will call other daemons when necessary

15. In the following description of the ICMP contract, the correct one is ()

c.ICMP contract transmits control messages to the sending host based on network communication conditions

16. Which of the following descriptions of the file /etc/sysconfig/network-scripts/ifcfg-eth0 is correct ()

d. It is a system script file

17. Which of the following is wrong? ()

c.SMTP is a contract used in network management

d.ipv4 is a way to solve the problem of insufficient addresses

18. Which of the following commands can see the IP address? ()

a.nslookup,

c.ping,

19. Which of the following TCP/IP descriptions is wrong? ()

b. Composed only of TCP layer and IP layer

d. Encrypt information before transmission

20. The command that can be used to activate the network card eth0 is ()

b.ifupeth0

c.ifconfigeth0up

In the vi editor, the command "dd" is used to delete the current

a. Row

Please select one

that has an incorrect description of the run level in the LINUX system

b. Run level 2 is not defined

In order to temporarily allow tom users to log in to the system, the following () method can be used

d. Change the account expiration date of tom user

To change the owner of a file, you can use the () command

d.chown

The default configuration file for all user logins is (

d./etc/profile

When logging in as root, the () command can change the password of user larry

b.passwdlarry

Use "rm–i", the system will prompt you to confirm

b.Whether it is really deleted

After executing the command chmodo rwfile, the permissions of the file file change to

c. Other users can read and write file files

Please select an error description about LINUX

b.(runlevel)6 is stop mode

linux显示目前的版本等系统信息的命令是_显示版本信息用什么命令_命令提示符版本升级

If you want to manually run the /home/cd/start script file at 10 pm today, you can use the following command to execute it

a.at10amtomorrow-f/home/cd/start

In the shellThe Linux command to display the current version and other system information is . When treating the following strings as ordinary strings, you need to use "" as a wildcard character

d.Backslash()

What are the correct meanings of the -v parameter of the tar command

d. Use verbose mode

Which command can be used to find lines containing only four characters in the file TESTFILE

c.grep‘^….$’TESTFILE

What are the commands to display the user's home directory?

a.echo$HOME

How to use the letters "new" to replace the letters "old" when opening a file with vi? ()

b.:1,$s/old/new/g

What characters need to be used to separate multiple commands in one line? (

a.;

Among the 7 levels of Linux running, the multi-user text mode with full functions, its running level is

a.3

In BASH, if you want to set some permanent parameters, such as PATH, you do not need to reset it every time you log in. You can set the parameters in ()

a.$HOME/.bash_profile

b.$HOME/.bashrc

Who provides most of the management tools including Linux distribution

c.GNU

What are the commands to determine the file type of myfile?

b.filemyfile

Which of the following commands can be used to redirect the output of the pipeline to the standard output and the specified file

a.tee

Which statement about (umount) is incorrect

c.You can eject the floppy drive before loading

To restart the Linux system, among the following operation commands, the incorrect one is

b.restart

What are the characters used to separate directory names and file names

a.slash(/)

When a directory is used as a mount point, the original files in the directory

d. Hidden and will be restored after the mounted device is uninstalled

To compress the myfile.txt file in the current directory into myfile.txt.tar.gz, the implemented command is d.tar-zcvfmyfile.txt.tar.gzmyfile.tx

What are the advantages of open core source code

b. You can download the latest core code from the Internet

Using standard output redirection (>) like ">file01" can make the data of file file01

b.Overwritten

The system configuration file is in the () directory

a./etc

Which of the following statements is correct

a. Generally, the Linux system can be installed from a bootable CDROM

C. Under DOS, you can use the rawwrite command to create the installation c drive

In the vi editor, that command can move the cursor to line 200

:200

There is a line student:;600:23,14,W5 in /etc/group. I don’t know how many users are in the students group.

The command below is a full-screen text editor

b.vi

When using vi to edit read-only text, the command to force file reading and exit is c.:wq!

linux显示目前的版本等系统信息的命令是_显示版本信息用什么命令_命令提示符版本升级

The command below can be used to complete the task of executing a certain program at 4:00am on the 1st of every month

d.cron

Which of the following Linux path structures is invalid in the local file system? ()

a.//usrzhangmemo

b.usrzhangmemod.usr/zhang/memo

Please select the correct description of the standard variable PS2

b. is a continuous prompt variable

What combination of commands can count how many users log in to the system

b.who|wc

c.who|wc–l

That command can display the size of the c drive space where the file system is loaded

c.df

That command can display the size of the c drive space occupied by files and directories

c.du

In vi, the () command inserts text starting from the first non-blank character on the line where the cursor is located

a.I

Choose two error descriptions about system maintenance b. Do not use system logs because it will cause excessive load

The default file system of RHEL4AS is

EXT3

Use the useradd command to create a new user. If you want to specify the user's home directory, you need to use the () option

-d

Which description of Linux commands below is correct

b.Case sensitive

What does the command "tailmyfile" mean? ()

.It displays the last 10 lines of myfile

That command is used to display the file names in /home and its subdirectories

a.ls–R/home

If you use cron to schedule a scheduled process, you should use that command to edit the configuration file

crontab-e

Unless otherwise specified, cp assumes that the file to be copied is in the directory below

Current directory

Which command among the following options can achieve regular backup () b.crontab

Assume that you are currently in the command mode of vi and the line needs to enter the insert mode. Among the following shortcut keys, the one that cannot be implemented is () b.1

Which option below is used to explain Linux commands? ()

b.User socket

When running in multi-user mode, how many virtual user terminals can be switched with CONTROL ALT F*

c.6

What conditions are necessary to successfully log in to the LINUX system

a.A valid user IDb.A default user SHELLc.A user's home directory

To list all files starting with "vsftpd" in the /etc directory, the following commands cannot be implemented ()

ls/etc/vsftpd

There is a shell script prog in the current directory /home|lisa. Its permissions are rwxr-xr-x. If you run prog in the command, you will get "commandnotfound". What is the correct following ()

c. You need to break into ./prog to execute this program b. The path /home/lisa is not included in the PATH environment variable

In recent years, HPCCluster running the Linux operating system has emerged rapidly. It has low node prices, easy expansion, and can achieve a higher cost performance. right

There are too many distributions, the market is chaotic, and the lack of unified standards is a shortcoming of Linux at present. right

RedHatEnterpriseLinux is a version provided for enterprise users, and technical support is chargeable. right

Linux can run on almost all computer platforms, including PCs, PC servers, UNIX servers, midrange computers, and mainframes. mistake

Linux is open source in accordance with the GNU public copyright contract. Anyone can change and use the source code at will without any declaration. mistake

The tar command can perform () a. compression, archiving and decompression of files

The operation that the usermod command cannot implement is ()c. Delete the specified account and corresponding home directory

The following description of the Linux user account is correct (the Linux user account must have a password before logging into the system or the passwd file can only be accessed by the system administrator). A correct one

That command will cause the user to change from the current directory to his/her home directory

In Linux systems, what is the default shell a.bash

What multitasking allows users to do () (run multiple applications or share files at the same time) correctly

If you just added a user named kara to the system, by default, the user group to which kara belongs is d.kara. If the current directory is /home/sea/china, then the parent directory of "china" Is that directory? a./home/sea

Assignment 3

What kind of functions does Apache not support? ()c.NFSd.AppleTalk

How many network addresses can a Class B network have at most? c.16382

What are the aliases of IP? ()d. Allow multiple IP addresses to be bound to one network card

Ip address 211.21.210.20, what type of network does it belong to? If the network segment is 255.255.255.0, what is its broadcast address? ()b.Category C211.21.210.255

Which of the following descriptions about xinetd is correct? () a.xinetd can work with TCP_Wraper to control access to a certain network service b. Its configuration file is /etc/xinetd.confc. It will call other daemons when necessary

Which of the following options is not Apache's host-based access control directive? ()b.ALL

Which of the following descriptions of subnet segments is correct? ()b. It is used to separate the host address and the network address

Which contract below uses two or more ports? ()c.FTP

Which of the following descriptions about Apache is wrong? () a. The default port is 8080

The following description of Apache () is wrong a. The service port cannot be changed b. The default port is 8080c. It can only be one

domain names provide services

The following () is Apache’s basic configuration file c.httpd.conf

The command to start the Apache server is ()d.servicehttpdstart

In apache's user name-based access control, what are the commands to generate user password files? ()a.htpasswd

For the Apache server, what are the default users for the provided child processes? ()b.nobody

The directory where the user's personal homepage is stored is set by which parameter of the file httpd.conf? ()d.UserDir

The command used to set the absolute path of the document directory tree in Apache is ()a.DocumentRoot

What are the commands used to set the administrator's email address to be displayed on the browser when an error occurs on the Apache server? ()a.ServerAdmin

The command to set the maximum number of Apache connections is ()b.MaxClients

The command to set the maximum number of idle processes in Apache is ()d.MaxSpareServers

Please select the correct description about Apache from below () a. Includes a component that can encrypt information before transmission d. Can set a password for a directory

Assignment 5

The function support module of the iptables service is installed in the () folder. c./lib/iptables

The service management script of the iptables service is (). b./etc/init.d/iptables

The configuration file of the iptables service is (), with the help of this configuration file, you can specify the function module to be loaded.

d./etc/sysconfig/iptables-config

What can be done with IP disguise? () a. Hosts connected to linux can access the Internet linux delete command, although they do not have a public ipd. It allows multiple hosts on a network to share an ip address

John plans to build a firewall deep in Linux on his LAN to prevent the Internet from directly entering the LAN and vice versa. He cannot use packet filtering or SOCKS programs on the firewall, but he wants to provide LAN users with only a few Internet services and contracts, which of the following best describes the type of firewall John should use? () c. Traditional proxy

What type of firewall service does Linuxkernel provide? ()a.Packetfilteringfirewall

NAT types do not include a. Proxy server NAT

Choose the appropriate description about ip masquerading from below () a. Its function is like a NAT system: converting internal ip addresses to external ip addresses d. It is a tool to connect the internal network to the Internet

Among the packet matching parameters of the following iptables command, () is used to express the source address. c.–s

Among the following iptables command parameters, the user implements adding chain rules (). d.–A

The following description of the connection form between the DMZ zone and the server is incorrect (). b. The firewall has only one DMZ socket, so the firewall can only connect to one server

The following description about using service services to manage firewalls is incorrect (). d. When starting the firewall with the help of service service, the function support module to be loaded can be specified in the /etc/iptables-config configuration file

The following description about building a TCP connection is incorrect () d. The client actively initiates an access request to the Web server. The source port used by the client is TCP80

The following description of the firewall function implementation method is incorrect (). a. Firewall cannot implement the function of proxy server

The following description of the firewall is incorrect (). d. Firewalls can only be placed at the boundary of the network and can only be implemented using hardware products

The following commands to start the iptables firewall are ()c.serviceiptablesstartd./etc/rc.d/init.d/iptablesstart

Among the following addresses, the one that is not a private network address is () b.172.32.0.0/16

In the following rule chain, the one that does not belong to the nat table is ()d.INPUT

Among the following software or operating systems, the firewall function cannot be implemented (). c. Antivirus software

The user can access the web page, but cannot log in to the online banking system, indicating that the port () on the firewall is not open. d.TCP443

The above is the detailed content of What is the connection between Linux and Unix? Interpreting the Linux kernel version number. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:itcool.net
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template