|1. According to the command help, what does the -G do with the|
|Assigns a user to a new list of supplementary groups.|
Use the usermod command with the -G switch to assign a user to
a new list of supplementary, or secondary group. Using -G will
replace the user’s current list of secondary groups with the new
list used with the command.
|2. According to the command help, which switch can you use with|
the killall command to kill a process group instead of just a
Use -g with the killall command to kill a process group. To find
the correct switch to use, type: killall -h or killall –help
|3. As a part of your daily maintenance, you scan for and kill any|
zombie processes on the system.
-Use the ps aux command to find zombie processes
-Kill the zombie processes
kill -9 1301
kill -9 1570
kill -9 1980
Zombie processes have a Z in the STAT column of the ps aux
|4. An assistant administrator has been modifying permissions on|
the /hr directory. You want to quickly change the permissions
on /hr to match the permission settings documented in your
company’s security policy.
User = read, write, execute
Group = read, execute
Other = read, execute
chmod 755 /hr
|5. Brenda Cassini (bcassini) has recently married. You want to|
update her user account to reflect her new last name.
Complete the following tasks:
-Rename the user account to bpalmer.
-Change the comment field to read Brenda Palmer.
-Change the home directory to /home/bpalmer, moving the
contents of the old home directory to the new location.
usermod -c “Brenda Palmer” -d /home/bpalmer -m -l bpalmer
|6. Brenda Cassini (bcassini) is taking over the payroll|
documentation for Will Adams (wadams).
Give the bcassini user ownership of the /hr/payroll file.
chown bcassini /hr/payroll
ls -l /hr
Linux Pro Practice Cert
Study online at quizlet.com/_6ht3mv
|7. A change in company policy requires users of the hr group to make changes to the files in the /hr|
Give the write group permission to the files in the /hr directory (in addition to any other permissions
chmod g+w /hr/*
ls -la /hr
|8. Corey Flynn (cflynn) currently belongs to several groups. Due to some recent restructuring, he no|
longer needs to be a member of the hr group.
-Remove cflynn from the hr group.
-Preserve all other group memberships.
usermod -G mgmt1.it
|9. Currently all the Sales people in your company belong to a group called sales. The VP of Sales wants|
two Sales groups: western sales division and eastern sales division.
Rename the sales group to western_sales_division.
-Create the eastern_sales_division group.
-Assign aespinoza as the only member of the eastern_sales_division group.
|10. The /dev/sdb2 volume is mounted to an uncommon mount point directory: /root/newdrive. You need to|
remove the volume from the /root/newdrive mount point and remount it to the /mnt/drive2 directory.
Unmount /dev/sdb2 from /root/newdrive
Mount /dev/sdb2 to /mnt/drive2
unmount the volume
from the mount point
Use mount /dev/sdb2
/mnt/drive2 to mount
|11. During a random security audit, you found that ownership (and group ownership) for the /hr directory is|
set to Will Adams (wadams). For security reasons, you need to change the ownership. You want to give
ownership to Brenda Cassini (bcassini), the office manager, and you want to give group ownership to the
hr group for all files in the directory. Once you do this, though, you have to reset group ownership on the
/hr/personnel file to mgmt1.
Give bcassini ownership of the /hr directory and all of its contents.
Give hr group ownership of the /hr directory and all of its contents.
Return group ownership of the /hr/personnel file to mgmt1.
chown -R bcassini:hr
|12. Earlier in the day you created a user account for Brenda Cassini (bcasini). When she goes|
to log on, she can’t. You realize that you misspelled her user name as bcasini.
Change the user account name from bcasini to bcassini.
Change the home directory to /home/bcassini.
You are logged on as wadams, so you will have to perform these tasks as the root user. The
root password is 1worm4b8.
usermod -l bcassini bcasini
usermod -d /home/bcassini
|13. An employee in another department recently provided several important files for your|
current assignment. The files are compressed in a tar file. Today you need to extract each
file and begin to use the files.
Task: Extract the files in /proj_files.tar.gz into the /projects directory.
tar -xzf /proj_files.tar.gz -C /projects
|14. The /etc/shells file contains a list of shells that are available on the current system. View|
the contents of the file and answer the following question.
Of the shells listed below, which are not available on the system?
Use cat /etc/shells to view the
contents of the file. You should
notice that /bin/ksh is not in the list
of available shells.
|15. Every seven years, your company provides a 6 week sabbatical for every employee. Vera|
Edwards (vedwards), Corey Flynn (cflynn), and Bhumika Kahn (bkahn) are leaving today,
while Maggie Brown (mbrown), Brenda Cassini (bcassini), and Arturo Espinoza (aespinoza)
are just returning.
The company security policy mandates that user accounts for employees gone for longer
than two weeks be disabled.
-Lock (disable) the following user accounts:
-Unlock (enable) the following user accounts:
usermod -l vedwards
usermod -l cflynn
usermod -l bkhan
usermod -u mbrown
usermod -u bcassini
usermod -u aespinoza
|16. The /hr directory is used by members of the Human Resources team to keep important employee|
documents. Over time, you notice that permissions set on each file have become inconsistent. You
want to make sure that all files in the /hr directory have the same permissions set.
Task: Configure permissions on all files in the /hr directory as follows:
User and group owners should have read and write permissions to the files.
The other group should have no permissions on any file.
chmod 660 /hr/*
ls -la /hr
|17. The hr group currently owns the /hr/personnel file; however, the mgmt1 group should own the file to|
protect employee privacy.
Change the group ownership of the /hr/personnel file from hr to mgmt1.
|18. The IT manager has asked you to setup dual boot capabilities on this Linux system so the user can|
boot to either Windows 7 or Linux, with Windows 7 being the default boot option. There is an
external hard drive connected to this system with Windows 7 installed on it. In this lab, you will
configure GRUB 2 to add a Windows 7 menu option and make it the default boot option.
-Change the default menu option for the GRUB2 boot loader to Windows 7.
-Use the grub2-mkconfig command to make the 30_os-prober script find the Windows 7 operating
system on the external hard drive and add it as an entry in the boot menu.
-Reboot the machine and select the Windows 7 option from the boot menu.
select windows 7 option
|19. The IT manager in your organization has asked you to change the GRUB_TIMEOUT parameter from 5|
seconds to 10 seconds to give the users more time to make a menu selection from the GRUB menu
before the default operating system is booted. Once you have changed the GRUB_TIMEOUT
parameter from 5 seconds to 10 seconds, reboot the operating system to see the changes made to
the wait time from the GRUB menu. After rebooting the operating system, login with the username
root and password 1worm4b8.
-Change the GRUB_TIMEOUT parameter from 5 seconds to 10 seconds
-Reboot the operating system to see the changes made to the wait time from the GRUB menu
-Login with the username root and password 1worm4b8
hange first line of file to
|20. The IT manager in your organization has asked you to install the fontconfig-3.10.87-|
5.fc24.rpm package, which is located in the /home/wadams/Downloads directory.
-Switch to the root user, using 1worm4b8 for the root user password. (You must have
root user permissions to install packages.)
-Install the package, fontconfig-3.10.87-5.fc24.rpm package, which is located in the
|21. The IT manager in your organization has asked you to install the pulseaudio|
Install the pulseaudio-equalizer.noarch package.
dnf install pulseaudio-equalizer.noarch
|22. Linda Blaine (lblaine) and Rhonda Conger (rconger) are temporary employees who|
have been auditing your organization’s financial documents. Their user accounts are
members of the auditors group. They have completed their work and have moved on to
new assignments. You need to remove their user accounts and home directories, and
the auditors group from the system.
-Delete the following user accounts and their corresponding home directories:
-Delete the auditors group.
userdel -r lblaine
userdel -r rconger
|23. The Linux sever, that you are the system administrator of, is not functioning properly.|
To begin your troubleshooting process, you want to set the default target to
rescue.target. Rescue.target is a special target unit that will run a base system and a
-Use the systemctl command to make rescue.target the default boot target.
systemctl set-default rescue.target
|24. Maggie Brown (mbrown) and Corey Flynn (cflynn) have recently been hired in the|
Human Resources department. You have already created the two user accounts.
Add the hr group as a secondary group for the mbrown and cflynn user accounts.
usermod -G hr mbrown
usermod -G hr cflynn
|25. Peter Lacy (placy) has taken an extended leave from the company for personal reasons. However,|
he was working on a critical project code named White Horse with several other employees. The
project leader requested that you move any White Horse documents in Peter Lacy’s home
directory to the home directory of Brenda Cassini (bcassini). You are logged on as wadams.
-Switch to the root user, using 1worm4b8 for the root user password. (You must have root user
permissions to move other people’s files.)
-Move the following files in placy’s home directory to bcassini’s home directory.
1worm4b8 (this is the
provided password, it
doesn’t show on screen.)
Use ls -l /home/bcassini to
verify new location files.
The mv command moves
files, however you have to
log in as the root user first
in order to move other
|26. The power has gone out in your facility. You have a UPS (uninterruptible power source) that|
protects your system and provides enough power to allow you to shut down safely.
-shut down the system immediately using the command line.
shutdown h now
|27. RunSnakeRun.noarch is a Python GUI package installed on the server that your organization is no|
longer using. The IT manager in your organization has asked you to uninstall the
RunSnakeRun.noarch package by using the dnf command.
Use the dnf command to uninstall the RunSnakeRun.noarch package.
|28. The Sales team uses the /sales directory to store documents related to sales, contacts, and|
orders. Currently, permissions on the directory only allow the user and group owners to view the
contents of the directory. Users who are not part of the group owner are unable to list the
contents of the directory.
As part of a new company policy to increase teamwork, you want to allow all users to be able to
see the /sales directory and list its contents. You also want to let all users open, but not change,
any document inside that directory.
Allow the other group to browse the /sales directory.
Modify permissions on all files in the /sales directory to allow members of the other group to
view but not change the file.
chmod o+rx /sales
chmod o+r /sales/*
|29. Salman Chawla (schawla) forgot his password, and needs to access his resources on the computer.|
-Change the password for the schawla user account to G20oly04.
-Make sure the password is encrypted in the shadow file
su -c “passwd schawla”
|30. Salman Chawla (schawla) is no longer part of the sales team and is awaiting reassignment to a new|
position. In the meantime, you do not want him to have access to sales resources.
Remove user schawla from all secondary group memberships.
usermod -G “” schawla
|31. Sam Chan (schan) has reached his user quota limit. Rather than delete some of his files, he wants more|
space. Your manager has approved an increase in his quota limit.
Task: Increase the hard and soft block limits on the schan user account to 1048576 kb (1Gb).
edquota -u schan
i (to insert)
Edit hard and soft
:wq (to save and exit)
Use repquota -a to
generate the report and
confirm the changes.
|32. Someone created duplicate versions of three project documents. To avoid version control problems,|
you want to delete the duplicate files.
Task: Delete the following files:
– rm -f
– rm -f
– rm -f
Use ls -l /projects to
|33. The system is running hard disk quotas for users and groups.|
Task: Disable the quotas on the root directory (/).
|34. Terry Haslam (thaslam) was dismissed from the organization. His colleagues have harvested the files|
they need from his home and other directories. Your company security policy states that upon
dismissal, users accounts should be removed in their entirety.
Remove the thaslam user account and the home directory from the system.
userdel -r thaslam
|35. There is a C debugger package installed on the server that your organization is no longer using. The IT|
manager in your organization has asked you to uninstall the ddd-C-Debug-2.8.15-3.cd15 package.
-Uninstall the ddd-C-Debug-2.8.15-3.cd15 package
-Verify that the package ddd-C-Debug-2.8.15-3.cd15 is uninstalled
|rpm -e ddd-C-Debug-|
|36. There is a kernel tools package installed on the server. The IT manager in your organization has asked|
you to upgrade the package using the new package version kernel-tools-10.21.2015-54.fc21.rpm
package, which is located in the /root directory.
Upgrade the kernel tools package using the new package version kernel-tools-10.21.2015-54.fc21.rpm.
|rpm -Uv kernel-tools-|
|37. This system was moved from a location where it was connected to the 192.168.2.0 network. The new|
location is in the 172.22.0.0 network. The user in the new location has tried to change the network
interface configuration to connect to the new network, but has not been able to get connected.
Use the vi command line text editor to open the /etc/sysconfig/network-scripts/ifcfg-ens0 file and
complete the following tasks:
Assign to ens0 the last valid host IP address in the 172.22.0.0 network
For the netmask setting, enter the standard Class B subnet mask
For the broadcast address setting, enter the last address in the 172.22.0.0 network.
For the gateway address setting, enter the first valid host IP address in the 172.22.0.0 network
After saving the interface configuration file, down the ens0 network interface, then bring it up again
to acquire the new configuration from the ifcfg file
From the command line, add the gateway address to the routing table as the default gateway.
Note: If you need to login to the system or do any tasks that require root user privileges, the root
user’s name is root and the password is 1worm4b8.
hange IPADDR line to
Change NETMASK line
line to 172.22.255.255
Change GATEWAY line
ip link set ens0 down
ip lnk set ens0 up
ip route add default via
|38. To prevent the users from using too much disk space, you have implemented hard and soft quotas on|
the root directory (/). Today you noticed that the quotas are turned off.
Task: Re-enable quotas for the root directory (/).
|39. Use fdisk -l to answer the following questions about the|
|Which physical disk is the swap area on?|
Which disk partition is the swap area on?
What is the beginning cylinder for the swap area?
What is the allocated size of the swap area in blocks?
Which physical disk is the boot disk on?
Which disk partition is the boot disk on?
fdisk -l displays the partition table on the device.
Identify the swap volume by looking for 83 Linux swap at the end of
an entry line.
-/dev/sda5 is the 1st physical disk
-/dev/sda5 is the 5th partition on the disk
-9668 is the beginning cylinder for the swap area
-473632 is the allocated size of the swap area in blocks
Identify the boot volume by looking for the asterisk (*) in the BOOT
-/dev/sda1 is the first physical disk.
-/dev/sda1 is the first partition on the disk.
|40. Use ps aux | less to answer the following questions:||What is the PID for the hald process?|
What is the state of the ps aux process?
What is the percentage of memory used by PID 2156?
Which command invoked PID 1857?
|41. The user bcassini sent a document called baby1 to the printer. The|
document is a large photo file that is taking up the printing
resources. Jobs behind baby1 cannot print.
Find the baby1 print job job number.
Delete the baby1 print job from the print queue.
|42. Use repquota -a to answer the following questions:||Which user does not have a quota limit?|
What is the hard block limit for most users?
What is the soft block limit for most users?
What is the highest set hard block limit?
Which user has the highest set hard block limit?
|43. Users have complained that the 7 day default grace period for|
soft limits is too short.
Increase the block and file (inode) grace period for users from 7
to 30 days.
edquota -u -t
i (to edit)
:wq (to save and exit)
|44. Use the df -h command to answer the following questions:||How much space is used on /dev/sda2?|
How much space is still available on /dev/sda2?
What percentage of space is used on /dev/sda1?
The df command shows you the amount of free space you
have left on mounted drives. Using the -h option allows you
to see the output in human-readable form.
|45. Use the ls -l command to view detailed information for the|
following directories and files to answer the following questions?
|Who is the owner for the /sales/orders file?|
Who is the group owner for the /projects/darkhorse file?
Who is the owner for the /projects directory?
Who is the group owner for the /hr directory?
|46. Use the quota command to review the quota|
information for the wadams user account.
Answer the following questions:
What is the blocks quota?
What is the blocks limit?
What is the files quota?
What is the files limit?
|47. View the contents of the /root/.bash_profile file.|
What is the last word in the file?
The last word in the file is PATH. Use the cat /root/.bash_profile command to
view the contents of the file.
|48. View the currently set environmental variables|
to find the values below.
|HOME -> /root|
LANG -> en_US.UTF-8
SHELL -> /bin/bash
TERM -> linux
Use the set command to view a list of variables, or use the echo $ variable
command to show each variable individually. For example, use the echo
$SHELL command to see the value for SHELL.
|49. View the /etc/group file to answer the following|
|Which of the following user accounts is not a member of the mgmt1 group?|
Which of the following users belongs to the devel group?
What is the sales group ID?
What is the name of the group with the ID of 503?
|50. View the /etc/passwd file to answer the|
following questions: (Type the answers exactly
as they appear in the file.)
|What is the UID for the schawla user account?|
What is the full user’s name (GECOS field) for the rcronn user account?
What is the primary group ID for the ftp user account?
What is the path of the home directory for the
root user account?
|51. View various files in the /proc directory to find the answers to the|
|What is the CPU speed (in MHz)? Enter the exact total|
(including decimal places).
How much physical memory does the system have (in kB)?
Look for the MemTotal line in the corresponding file.
What is the Linux kernel version? Enter the version in the
format of n.n.n.n.-n.
|52. The VP of Marketing has told you that Paul Denunzio will join the|
company as a market analyst in two weeks. You need to create a
new user account for him.
-Create the pdenunzio user account.
-Include the full name, Paul Denunzio, as a comment for the user
-Set the password to eye8cereal.
useradd -c “Paul Denunzio” pdenunzio
|53. The VP of Sales promoted Salman Chawla (schawla) to Regional|
Sales Director. He will now need the rights and permissions
assigned to the mgmt2 and hr groups. You are logged on as root.
-Identify all groups to which the schawla user belongs.
-Add mgmt2 and hr as secondary groups to the schawla user, but
make sure the user is still a member of all current groups.
usermod -aG mgmt2,hr schawla
|54. What does the -M switch do with the useradd command?||Prevents the home directory from being created regardless of|
Entering useradd -h or useradd –help shows you that the -M
switch with the useradd command prevents the home
directory from being created, regardless of the system
|55. What is the name of the hidden directory in /hr?||sanford|
-Type ls -a /hr
Hidden directories and files begin with a period and are not
shown with the normal ls command. Use ls -a to view all
current directory contents.
|56. What is your current working directory?||/home/wadams|
-Type pwd to show current working directory
|57. While working on your Linux server, you want to change to single user mode. You will change to|
single user mode using the systemctl command and rescue.target. Rescue.target is a special
target unit that will run a base system in single user mode and a rescue shell.
-Use the systemctl command to make rescue.target the current target.
-After changing to rescue.target, log back in as root using the password 1worm4b8
systemctl isolate rescue.target
|58. While working on your Linux server, you want to enable anaconda.service and disable|
vmtoolsd.service using the systemctl command.
-Use the systemctl command to enable anaconda.service.
-Use the systemctl command to disable vmtoolsd.service.
|59. While working on your Linux server, you want to practice starting, stopping, and restarting a|
service using the systemctl command. In this simulation start, stop, and restart the
-Use the systemctl command to start bluetooth.service.
-Use the systemctl command to stop bluetooth.service.
-Use the systemctl command to restart bluetooth.service.
|60. The White Horse project is complete. Everything produced under the code name has been|
backed up and removed from the system. You now want to remove the White Horse directory
structure from your system.
Task: Delete the /home/wadams/wh directory and all of its contents.
rm -rf wh
(-r) deletes directories and all
(-f) deletes without prompting
|61. Will Adams (wadams) owns and maintains a database file in /home/wadams called contacts.db.|
The file holds contact information for perspective clients. Brenda Cassini (bcassini) and Vera
Edwards (vedwards) want to access and add contact information to the file to share the data
among the three users.
Task: Create hard link files to /home/wadams/contacts.db as follows:
-Use contacts_link as the hard link name
-Create the file in the following directories:
|62. You are logged on as Will Adams (wadams), and your working directory it /home/wadams. Use|
the du command to answer the following questions:
|How big is the /home/wadams|
What is the largest directory in
What is the size of the
|63. You are preparing to manage a new project code named White Horse. You need to prepare|
directories for White Horse documents. You are logged in as user wadams.
-Create a directory called wh directly inside /home/wadams.
-Create three following directories in /home/wadams/wh:
(to make directory called wh)
(to put directories in the one
you just made)
|64. You are the administrator of a server and have root privileges. The IT Manager asked you to|
install the cups package to enable printing on the server. Use dnf to install cups. After the
installation is complete, print the sales document in /home/wadams.
Install the cups package
Print the sales document in /home/wadams
dnf install cups
|65. You have a Linux workstation that you use at home for browsing the Internet, playing music, and|
writing letters. When you run your MP3 player, it sometimes pauses in playback. You have heard
that you might be able to alleviate the problem by raising the priority of the program. You
decide to set the SUID bit to automatically run the program as root and thereby raise its
Set the SUID bit for the /usr/bin/xmms program. Do not change any other permissions on the
chmod u+s /usr/bin/xmms
chmod 4755 /usr/bin/xmms
|66. You have a Linux workstation that you use at home. You are the only user of this computer.|
You want to improve security by removing the SUID and SGID from some files.
Remove the SUID from the following files:
Remove the SGID from the following files:
Do not change any other permissions on the files.
chmod u-s /usr/bin/gpasswd
chmod u-s /usr/bin/newgrp
chmod g-s /usr/bin/wall
chmod g-s /usr/bin/write
|67. You have informed users that you need to bring the machine down at the end of the day to|
perform routine maintenance. However, prior to shutting the system down, you want to
give users fifteen minutes to save data and exit the system.
-Use a 15 minute delay before shutting down
-Use It is time for a shutdown! as a message to all logged-in users
shutdown -h +15 It is time for a
|68. You have just added a custom script to change and export the SHELL environmental|
variable as the C-shell. However, you decided to change from the C-shell to tsch.
-Open /etc/pref_shell in vim
-Modify the environmental variable line SHELL=/bin/csh to read SHELL=/bin/tcsh
|-Type vi /etc/pref_shell to open the|
-Press a to edit
-Move the cursor to the line
SHELL=/bin/csh and insert a t to
make the line read SHELL=/bin/tcsh
-Type :wq to save changes and exit
|69. You just got a new PowerMate input device that you want to use on your computer. You|
don’t think that the PowerMate driver was compiled into the kernel of your Linux
Insert the powermate module into the kernel.
|70. You need to install a new application from DVD; however, the DVD drive (/dev/dvd or|
/dev/sr0) is not mounted.
Mount the DVD-ROM drive to the /media/dvd directory.
|Use mount /dev/dvd /media/dvd to|
mount the DVD drive.
Use ls /media/dvd to verify that
you can access the application
|71. You need to send a backup copy of the /etc directory across the network.|
-Create a compressed archive of the /sales directory and all its contents
-Save the file in the root directory (/) with the name /salesbkp.tar.gz
tar -zcf /salesbkp.tar.gz /sales
Using the tar commands with the -cf
switches to create a new archive file. Use –
z as the preceding option to compress the
|72. You need to temporarily connect to a different network. You need to change the IP|
configuration manually for the ens0 network interface. You also need to add a new
default gateway for this network so you can be routed to the Internet.
Complete the following tasks in the Linux operating system from the Command Line
From the command line, use the ip addr command with the necessary options to
remove the 192.168.0.123 address with the 24 bit subnet mask and then add the IP
address 172.22.1.71 with the 16 bit subnet mask for ens0.
From the command line, use the ip route add command with the necessary options
to set 172.22.0.1 as the default gateway.
Note: If you need to login to the system or do any tasks that require root user
privileges, the root user’s name is root and the password is 1worm4b8.
ip addr del 192.168.0.123/24 dev ens0
ip addr add 172.22.1.71/16 dev ens0
ip route add default via 172.22.0.1
|73. You need to use the vim editor to create a script file to change and export the|
SHELL environmental variable as the C-shell.
-Open the vim editor with a new file names /etc/pref_shell
-Add the following lines to the file
-Save and close
|-Type vi /etc/pref_shell|
-Press a to enter insert mode
-Press esc to exit insert mode
-Type : to enter back into command line
-Type wq to save the file and exit
|74. You need to view detailed information for the hr directory in the root (/) directory|
and answer the following questions?
|What is the directory size?|
What is the modified date?
-Mar 15 2009
-Type ls -l /
|75. Your company recently changed directions and decided to terminate three products. All of the|
necessary files have been backed up, archived, and deleted. Now, you need to remove the
directories from the /projects directory.
Tasks: Delete the following directories in the /projects directory:
– rmdir /projects/heartbt
– rmdir /projects/heartmon
– rmdir /projects/heartstrng
Use ls -l /projects to verify
|76. Your company uses a proprietary graphics program called imitator that is stored in the /root|
directory. Maggie Brown (mbrown) needs to create and modify images with the imitator program.
Task: Create a symbolic link file to /root/imitator as follows:
-Use imitator_link as the symbolic link name
-Create the file in /home/mbrown
ln -s /root/imitator
|77. You recently installed and formatted a new hard drive in your system. Its device file name is|
/dev/sdb1. Now you want to mount the volume.
-Create the /mnt/disk directory.
-Mount /dev/sdb1 to the /mnt/disk directory with the ext3 file system.
|Use the following commands:|
– mkdir /mnt/disk
– mount -t ext3 /dev/sdb1
Use mount command to
verify that the volume is
-Volumes are mounted to
-A common place to mounth
volumes is to a directory
inside of the /mnt directory
-Use the -t option to specify
the file system
|78. You recently upgraded your computer and added an extra 512 MB of RAM. Consequently, you|
want to increase your swap space by adding a new swap area. The second hard disk has an
unused partition (/dev/sdb2) that you want to format for the swap area.
-Create a swap partition on /dev/sdb2.
-Activate the swap partition.
|Use the following commands:|
– mkswap /dev/sdb2
– swapon /dev/sdb2
|79. Your manager asked you to remove the gameport module from the Linux print server. View the|
installed modules on the print server and remove the gameport driver from the kernel.
-View the installed modules and identify the gameport module.
-Remove the gameport driver module from the kernel.
|80. Your system administrator scheduled a system update that requires all machines to be running and all users to|
be logged out of the system.
Log out of the system, while leaving the system powered on.
|81. You share a number of files from your computer, and you’ve received a number of calls from users who say|
they can’t connect to the files. You check your computer and find that the Ethernet cable is unplugged. You’ve
plugged the Ethernet cable in, so now you need to start the network interface card.
Determine which network interface went down when it was unplugged.
Start the network interface from the command line.
|82. You use a special user account called administrator to log on to your computer; however, you think someone|
has learned your password. You are logged on as administrator.
Change your password to r8ting4str. The password for the administrator account is 7hevn9jan.
|83. You’ve encountered system problems that require you to reboot the system. You want to inform users that the|
system will shut down and reboot.
Send a command to reboot the system in 5 minutes.
|84. You’ve experienced some network connectivity issues, and you suspect it may be one of the NICs in your|
Stop the enp2s1 NIC as the first step to try to isolate the problem.
|85. You’ve installed a new hard drive and created a partition on the drive. Now you need to format the partition|
before you can save data on the new hard drive.
Format the /dev/sbd1 partition with the ext3 file system.
|Use any of the|
– mke2fs -j
– mkfs -t ext3
|86. You’ve installed a third hard drive and created two partitions on the drive. Now you need to format both|
Your task in this lab is to format the partitions with the ext4 file system.
|Use one of the|
to format the 1st
partition on the third
– mke2fs -t ext4
– mkfs -t ext4
– mkfs.ext4 /dev/sdc1
Repeat the command
as the other partition.
|87. You want the boot menu on this Linux system to wait until you make a selection before it boots. You|
need to modify the GRUB_TIMEOUT parameter to make this happen. Once you have changed this
parameter, reboot the operating system to see this change in the behavior of the GRUB menu. After
rebooting the operating system, login with the username root and password 1worm4b8.
-Modify the GRUB_TIMEOUT parameter
-Reboot the operating system to see the changes made to the wait time from the GRUB menu
-Login with the username root and password 1worm4b8
hange TIMEOUT to
|88. You want to change your default umask to give yourself and members of the groups to which you|
belong full permissions to the files and directories you create. You want to deny permissions for
everyone else. You are logged on as wadams.
Change your default umask value to give yourself and members of the groups to which you belong full
permissions to the files and directories that you create.