one Fills up the topic:

1. In Linux, access the device as a file.

2. During the Linux kernel boot, read the file system to be loaded from the /etc/fstab file.

3. Each file in the Linux file system is identified by the I node.

4. All disk blocks consist of boot blocks, dedicated blocks, I node table blocks, and data storage blocks.

5. Links are divided into hard links and symbolic links.

6. The super block contains important file system information, such as the I-node table and the free block table.

D -rw-_r–_r– d-rw-_r– d-rw-_r–

8. Press Ctrl+ C to terminate the process started by the foreground.

9. If the network topology changes after static routes are configured, the system administrator needs to modify the route Settings.

10. The important tasks of network management are control and monitoring.

11. Partition disks in the Linux operating system into two types: file system partition and swap partition.

13. Before running the Shell program, grant the execution permission to the script file.

14. One of the tasks of system management is to be able to achieve the security protection, backup, recovery and update of programs and data in a distributed environment.

15. A system swap partition is an area that serves as virtual storage for the system.

16. The kernel is divided into four subsystems: process management system, memory management system, I/O management system and file management system.

17. Kernel configuration is an important operation performed by the system administrator when changing the system configuration hardware.

18. In installing Linux, use the Netconfig program to configure the network. The program prompts you to enter the host name, domain name, DNS server, IP address, gateway address, and subnet mask step by step.

19. Each user is uniquely identified by the user ID and user name.

20. RIP is the most common internal protocol and is commonly called dynamic Routing Information Protocol.

21. In Linux, everything is represented as a file, and the various ways of organizing files are called file systems.

22. DHCP implements dynamic IP address allocation.

23. The objects managed by the system network administrator are servers, users, server processes, and various resources of the system.

24. Network management usually consists of monitoring, transmission and management, among which the management part is the center of the whole network management.

25. If you want to remove device drivers that are not needed by the system, you must compile the kernel. If the kernel does not support device drivers on the system, you must upgrade the kernel.

26 The Ping command is often used to test the network connectivity because it can test whether the local system can reach a remote host.

27. The VI editor has two working modes: command mode and input mode.

28. You can run the ls -al command to view the permission of a file. The permission of a file is expressed in 10 bits and divided into four sections.

29. The difference between a process and a program lies in its dynamic, dynamic generation and termination. From generation to termination, a process can have the following basic states: running state, ready state and waiting state (blocked state).

30. DNS is actually a database of host information distributed on the Internet. Its function is to convert IP addresses to host names.

31 Apache is to achieve WWW server functions of the application, that is, usually said “browsing web server”, in the server to provide users with browsing Web services is Apache application.

32. There are two types of backup on Linux: system backup and user backup. The former refers to the backup of the operating system, while the latter refers to the backup of application programs and user files.

33. The file system type of the cd-rom standard is iso9660.

34. After lilo.conf is configured to take effect, run the lilo command and parameter.

35. When using the ls command, the argument -b should be used to display non-printed characters in octal form.

36. Linux uses a file system of type VFAT that supports Windows 9.x/2000 long filenames.

37. The command for limiting user disk usage is quota.

38 In Linux, the /etc directory is used to store configuration files and subdirectories required by the system.

39. Hard connections can only establish links to files. Symbolic links can be created across different file systems.

40. The socket file’s property bit is S.

41. The command to end the background process is kill.

42. A process can be run in two ways: independently or with a parent process.

43. Links are divided into hard Links and symbolic Links.

44. To display all processes running in Linux under super user, use ps-aux.

45. The property bit of the pipe file is P.

46. Taking the standard output of the former command as the standard input of the latter command is called a pipe.

47. The command and argument that specify execution rights for the script program is chmod a+x filename.

48. The Telnet command is used to log in remotely.

49. To send 10 packet packets to test connectivity with host abc.tuu.edu.cn, run the ping abc.tuu.edu.cn -c 10 command and parameter.

50. The process of the DNS server is named named. When it starts, the DNS partition database file defined in the named.conf file in the /etc directory is automatically loaded.

51. The Apache server process configuration file is httpd.conf.

52. In Linux, the command for generating a. Gz file after compressing the file is gzip.

53. To save the file contents to the test. TXT file using the vi editor, enter w test. TXT in command mode.

54 The command and parameter that displays a calendar year on standard output is cal-y.

55. In shell programming, the rule for using square brackets to indicate test conditions is that square brackets must be surrounded by Spaces.

56. Run the FSCK -a /dev/had5 command to check whether the installed file system is normal.

57. One tool for sharing user directories in Unix/Linux in a Windows9.x environment is the Samba server.

58. System administrators are responsible for system resource management, system performance management, equipment management, security management and system performance monitoring.

59 On Linux, run the nslookup command to test whether the DNS server can correctly resolve domain names.

60. On Linux, the hard disk (slave disk) in the second IDE channel is identified as HDB.

61. When the system administrator needs to upgrade the kernel version or change the system hardware configuration, the kernel should be recompiled.

62. If you only want to change the IP address of the system, modify the /etc/rc.d/rc.inet1 configuration file.

63. If you cannot set up a DNS server on the LAN but want users on the LAN to access each other using computer names, configure the /etc/hosts file.

64. In the VI editing environment, use the Esc key to switch mode.

65. Slackware Linux 9.0 typically uses the ext3 file system, which consists of four total disk blocks.

66. Archive and compress the /home/stud1/wang directory to generate the wang.tar.gz file and save the file to the /home directory. The tar command is in the format of tar ZCVF /home/wang.tar.gz /home/stud1/wang.

67. A pipeline is the standard output of the former command as the standard input of the latter.

68. When manually configuring the network, you can change the HOSTNAME by modifying the /etc/hostname file. To configure a domain name resolution client for the computer, you need to configure the /etc/resolv.conf file.

69. There are two ways to start a process: manual start and scheduling start. The commonly used scheduling start commands are at, Batch and crontab.

70. The domain name of test.bns.com.cn is bns.com.cn. If you want to configure a DNS server, you should define the working directory of the DNS database in the named.conf file.

The Sendmail system uses two main protocols: SMTP for sending mail and POP for receiving mail.

72. DHCP is short for Dynamic Host Configuration Protocol. It assigns IP addresses to hosts on the network.

73. There are many kinds of software packages used for proxy server, squid is used in the textbook.

74. The rm command can delete files or directories. The main difference is whether the recursive switch -r or -r is used.

75. The mv command can move and rename files and directories.

76. The hop count of the Routing Selection Protocol (RIP) indicates the number of gateways that must be passed before reaching the destination. The maximum distance accepted by RIP is 15 hops.

77. The ping command is used to test the network connectivity. The ping command is implemented through the Internet Control Information Protocol (ICMP).

78. The NFS protocol is used to share file systems between Unix (/ Linux) hosts.

79. In Linux, devices are accessed through special files.

The shell is not only an interpreter of user commands, it is also a powerful programming language. Bash is the default shell for Linux.

81. In >; >; The symbol appends the output redirect to the text.

82. The command to add a user is adduser or useradd.

83 Search for the string and run the grep command.

84. Use * to match several characters at a time.

85. The /sbin directory is used to store management programs used by system administrators.

two Multiple choice questions:

1. Among the following network protocols, the connection-oriented protocol is: A.

A transmission control protocol B User datagram protocol C Internet protocol D Internet control message protocol

2. In the file system loading parameters specified in the /etc/fstab file, parameter D is generally used for mobile devices such as cd-rom.

A defaults B sw C RW and ro D noauto

3. The Linux file permissions are 10 characters long and divided into four paragraphs. The third paragraph represents the content C.

A File type B Permission of the file owner

C Permissions of the group to which the file owner belongs D Permissions of other users

4. Terminate commands and operations that may be used by a foreground process B.

A kill B <CTRL>; +C C shut down D halt

5. When using the mkdir command to create a new directory, the option to create the parent directory first when the parent directory does not exist is D.

A -m B -d C -f D -p

6. The following description error about node I is A. (The inode is a data structure, and the parameters in VFS describe files.)

A I nodes and files are one – to – one

The B I node can describe the number of blocks occupied by the file

The ci node describes the file size and Pointers to data blocks

D converts the logical structure and physical structure of the file through node I

7. A file named rr.Z can be decompressed using the D command.

A tar B gzip C compress D uncompress

8. C has many functions of C language, also known as filters.

A csh

B tcsh

C AWK (awK details)

D sed

9. A host can communicate with another LAN through a local area network.

A Configure the DNS server

B Define a route to the local network

C Define a route to the gateway of the local network

D Define a local route to the destination network gateway

10. File D is required for establishing dynamic routes.

A /etc/hosts B /etc/HOSTNAME C /etc/resolv.conf D /etc/gateways

11. The network address of the LAN is 192.168.1.0/24, and the gateway address of the LAN is 192.168.1.1. When host 192.168.1.20 accesses the 172.16.1.0/24 network, route B is correctly configured.

A route add –net 192.168.1.0 gw 192.168.1.1 netmask 255.255.255.0 metric 1

B route add –net 172.16.1.0 gw 192.168.1.1 netmask 255.255.255.255 metric 1

C route add net 172.16.1.0 GW 172.16.1.1 Netmask 255.255.255.0 metric 1

D route add default 192.168.1.0 netmask 172.168.1.1 metric 1

12. In the following statement, the ifconfig command does not fall into the scope of D.

A Configure the loopback address. B Configure the IP address of the NIC

C Activates the network adapter D loads the nic into the kernel

13. What is wrong with the following description of the link?

A Hard link means that the I node number of the linked file points to the I node of the linked file

B Both hard and symbolic links produce a new I node

C Links are classified into hard links and symbolic links. D Hard links cannot link directory files

14. When you run the ping command on a host in the LAN to test the network connection, the host in the LAN can be connected to the host but cannot connect to the public network. The fault may be C.

A The host IP address is incorrect

B The gateway connecting to the LAN is not configured

C The LAN gateway or host gateway is incorrectly configured

D The DNS server on the LAN is incorrectly configured

15. The file that contains the mapping between host names and IP addresses is: B.

A /etc/HOSTNAME B /etc/hosts C /etc/resolv.conf D /etc/networks

D) no need to compile the kernel.

A Deletes unnecessary device drivers B Upgrades the kernel

D activates the NIC when C adds new hardware

17. There are four methods of variable assignment in shell, among which name=12 is called A.

A directly assigns the value B uses the read command

C Uses command line parameters D Uses command output

18. The D command intercepts the specified content from each line of a text file.

A cp B dd C fmt D cut

19. The following process type that is not Linux is D.

A Interactive process B Batch process C Daemon process D Ready process

20. Configure the Apache 1.3.19 server to change the configuration file to ___A______

A httpd.conf B access.conf C srm.conf D named.conf

21. The subsystem not included in the kernel is D.

A Process management system B Memory management system C I/O management system D Hardware management system

22. In daily management, the CPU usually affects system performance as follows: A.

The CPU is running at full capacity and the CPU is running at 30% efficiency

C The CPU efficiency is 50% D the CPU efficiency is 80%

23. If a computer has 128MB of memory, the swap partition size is usually C.

A 64MB B 128MB C 256MB D 512MB

24. The fifth step in the process of installing Linux is to let the user choose the installation method. If the user wants to install some components (software programs) and let the system install them automatically after the selection, the option should be D.

A full B expert C newbie D menu

25. Linux has three commands to view a file. If you want to view a file by moving the cursor up and down, use the C command.

A cat B more C less D menu

26. The following information is a list of running processes on a system using the ps — ef command. The D process is running the Internet Superserver, which listens for connections on Internet Sockets and calls the appropriate server to process the received information.

A root 1 4.0 0.0 344 204? S 17:09 0:00 init

B root 2 0.0 0.1 2916 1520? S 17:09 0:00 /sbin/getty

C root 3 0.0 0.2 1364 632? S 17:09 0:00 /usr/sbin/syslogd

D root 4 0.0 1344 1204? S 17:09 0:10 /usr/sbin/inetd

27. In the TCP/IP model, the application layer contains all the high-level protocols. Among the following application protocols, B is able to transfer files between local and remote hosts.

A telnet B FTP C SNMP D NFS

28. When we lose a connection to a remote network, we need to trace the route to see where the problem occurred on the network. The command for this purpose is C.

A ping B ifconfig C traceroute D netstat

29. A file named fido is modified with chmod 551 FIDo, and its permission is D.

A – rwxr-xr-x mto B – RWXR – r – C – r – r – r – D – r – xr – x – x

30. In the disk address table of node I, if the length of a file is from block 1 to block 11 in the disk address table, the file occupies block B.

A 256 B 266 C 11 D 256×10

(??) 31. Use the ls — al command to list the following files. D files are symbolic link files.

A -rw-rw-rw- 2 hel-s users 56 Sep 09 11:05 hello

B -rwxrwxrwx 2 hel-s users 56 Sep 09 11:05 goodbey

C drwxr–r– 1 hel users 1024 Sep 10 08:10 zhang

D lrwxr–r– 1 hel users 2024 Sep 12 08:12 cheng

32. The DOMAIN name system (DNS) resolves host names with A.

A IP address B MAC address C Network address D Host alias

33. WWW server is the most widely used on the Internet, it uses B structure.

A Server/workstation B B/S C Centralized D distributed

34. The Linux system sends messages to other users using the C command.

A less B mesg y C write D echo to

[note: mesg [y | n] all users decide whether to allow others to pass the message to its own terminal interface]

35. NFS is system C.

A file B disk C Network file D operation

36. The B command is used to back up files to tapes in the Linux security system.

A cp B tr C dir D cpio

Echo $PATH or echo $LD_LIBRARY_PATH or something like that would give us a bunch of paths tied together by colons. Tr converts the colons to return, so the paths are readable:

echo $PATH | tr “:” “\n”]

37. Linux file system files are grouped in their respective directories according to their role. For external device files, they should generally be placed in the C directory.

A /bin B /etc C /dev D /lib

38. The D command is used to write the information in the memory to the hard disk when the Linux system is restarted.

A # reboot B # halt C # reboot D # shutdown — r now

39. Network management provides the following functions: configuration management, A, performance management, security management, and billing management.

A Fault management B Routine backup management C Upgrade management D Email sending

40. A is correct about proxy servers.

A To use the existing public proxy server on the Internet, you only need to configure the client.

B The proxy server can only proxy HTTP requests from clients.

C The proxy server can be used by any host on the network.

D The client that uses the proxy server does not have its own IP address.

41. To shut down the Linux system without restarting it, run the B command.

A Ctrl+Alt+Del B halt C shutdown -r now D reboot

42. The command to convert an IP address to an Ethernet MAC address is C.

A ping B ifconfig C arp D traceroute

43. In command mode in the vi editor, type B to add a new line under the line where the cursor is currently located.

A <a>; B <o>; C <I>; D A

44. In the command mode of the vi editor, run the A command to delete the character near the cursor.

A <x>; B <d>; <w>; C <D>; D <d>; <d>;

45. In the command mode of the vi editor, you can run the C command to repeat the last operation on the edited text.

A arrow B arrow C <.>; D <*>;

46. Run the ls -al command to display the description of the ff file as follows. Therefore, the type of the ff file is A.

-rwxr-xr– 1 root root 599 Cec 10 17:12 ff

A common file B hard link C directory D symbolic link

47. The command for deleting files is D.

A mkdir B rmdir C mv D rm

48. The following names do not belong to the DNS server type: ____C_____

A Primary Master Server B Secondary Master Server

C samba D Cache_only Server

49. Network administrator to WWW server access, control access and operation control, these controls can be reflected in the A file.

A httpd.conf B lilo.conf C inetd.conf D resolv.conf

50. A mail forwarding agent is also called a mail forwarding server. It can use EITHER SMTP or C.

A FTP B TCP C UUCP D POP

51. There are two ways to start a Samba server process: standalone or parent, where the former is started as a standalone process in a C file.

A /usr/sbin/smbd B /usr/sbin/nmbd C rc.samba D /etc/inetd.conf

52. DHCP is short for dynamic host configuration protocol. Its function is to enable network administrators to manage a network system through a server and automatically assign ___D______ addresses to hosts in a network.

A network B MAC C TCP D IP

53. To ensure that the DHCP process is automatically started when the server is started, change DHCPD =no in file A to DHCPD =yes.

A rc.inet1 B lilo.conf C inetd.conf D httpd.conf

[Note: English original meaning: RC

A script file containing startup instructions for a program (application program or even an operating system)

Note: This file is automatically executed when the operating system starts up and contains a list of instructions (commands or other scripts) to run. ]

54. The command for archiving files is D.

A dd B cpio C gzip D tar

55. Change the file owner command to C.

A chmod B touch C chown D cat

56. The command to find A string in A given file that matches the specified condition is: A.

A grep B gzip C find D sort

57. The command to create a new file is D.

A chmod B more C cp D touch

58. In the following command, the text file contents cannot be displayed: D.

A more B less C tail D join

59. When anonymous FTP login is used, the user name is B.

A users B anonymous C root D guest

60. To see how the command logname is used in practice, type D for help.

A logname –man B logname/? C help logname D logname –help

61. If LILO is installed on the MBR, use the A command to uninstall LILO.

A lilo – u B lilo – c c lilo -v D lilo -v

62. When using ls — al to view files and directories, use the combination key D to view the contents rolled across the screen.

A Shift+Home B Ctrl+ PgUp C Alt+ PgDn D Shift+ PgUp

63. MC is C for unix-style operating systems.

A File editor/program compiler B Window tool for configuring the network

C Directory browser/file manager D Samba server management tool

64. The I node is a D long table that contains information about files.

A 8 bytes B 16 bytes C 32 bytes D 64 bytes

65. The three symbols of file permission read, write, and execute are A in order.

A rwx B xrw C rdx D srw

66. The length of a Linux file name cannot exceed C characters.

A 64 B 128 C 256 D 512

67. Processes have three states: C.

A Ready, executing and exiting states B Precise, fuzzy and random states

C running, ready and waiting states D Manual, automatic and free states

68. To start A process from the background, the command should end with the symbol A.

A & B @ C # D $

69. B is not part of the mail system.

A user agent B proxy server C transmission agent D delivery agent

70. In a Shell script, the command used to read the contents of various fields in a file and assign them to Shell variables is D.

A fold B join C tr D read

71. The crontab file consists of six fields separated by Spaces as follows: B.

A MIN HOUR DAY MONTH YEAR COMMAND

B MIN HOUR DAY MONTH DAYOFWEEK COMMAND

C COMMAND HOUR DAY MONTH DAYOFWEEK

D COMMAND YEAR MONTH DAY HOUR MIN

The crontab command enables the program to run periodically

72. There are two modes for file transfer using FTP: C.

A Word and binary B. TXT and Word Document

C ASCII and binary D ASCII and Rich Text Format

73. The permission of the out-of-group member of a file is read-only. The owner has full rights; If the group permission is read and write, the file permission is D.

A 467 B 674 C 476 D 764

74. During the DNS system test, set the named process ID to 53 and run the D command to notify the process to re-read the configuration file.

A kill –USR2 53 B kill –USR1 53 C kill -INT 63 D kill –HUP 53

75. The default answering port number of the Apache server is C.

A 1024 B 800 C 80 (http)D 8

The combined use of PHP and MySQL solves the problem of C.

A deals with the database access problem on Proxy B deals with the hacker’s illegal access problem on WWW server

C handles database access on WWW server

D handle database access problems on Sendmail system

77. OpenSSL is an A.

A. encryption SOFTWARE B. mail system C. database management system D. embedded scripting language

78. The configuration file for the Samba server is D.

A httpd.conf B inetd.conf C rc.samba D smb.conf

79. D. DNS server

A You do not need to configure clients for THE DNS server

B Only one active DNS server is required to establish the DNS server of a zone

C The named process needs to be started on the active DNS server, but not on the secondary DNS server

D The root. Cache file of the DNS server contains information about the root name server

80. To exit the shell in interactive mode, type C.

A <Esc>; B ^q C exit D quit

81. Install the Windows C: disk (hda1) in the /winsys directory of the Linux file system with command B.

A [email protected]:~#mount dev/had1 /winsys

B [email protected]:~#mount /dev/had1 /winsys

C [email protected]:~#mount /dev/had1 winsys

D [email protected]:~#mount dev/had1 winsys

82. Set the current directory of super user root to /usr/local. After entering the CD command, the current directory of user root is B.

A /home B /root C /home/root D /usr/local

83. The symbol for the character device file type is B.

A p B c C s D l

84. The command to install the CD/DVD-ROM (HDC) to the/MNT /cdrom directory of the file system is C.

A mount /mnt/cdrom B mount /mnt/cdrom /dev/hdc

C mount /dev/hdc /mnt/cdrom D mount /dev/hdc

85. C is used to uninstall the /dev/hdc disk.

A umount /dev/hdc B unmount /dev/hdc

C umount /mnt/cdrom /dev/hdc D unmount /mnt/cdrom /dev/hdc

86. There is a file file in /home/stud1/wang. D can be used to run the command in the background. This command outputs the contents of file to file.copy.

A cat file >; file.copy B cat >; file.copy C cat file file.copy & D cat file >; file.copy &

87. In the DNS configuration file, the host alias is: B.

A NS B CNAME C NAME D CN

88. To complete the forward and reverse lookup tasks for host names and IP addresses, run the following command: A.

A nslookup B arp C ifconfig D dnslook

89. A valid shell variable name is: C.

A -2-time B _2$3 C trust_no_1 D 2004file

A. what B. what C. what D. what 90.

A protocol for receiving mail B protocol for sending mail C protocol for sending mail D queue

92. Given a user stud1 whose user directory is /home/stud1. The D command displays all files in the current directory in pages, including file or directory names, user groups, users, file sizes, file or directory permissions, and file creation time.

A more ls – al B more – al ls C more < ls – al D ls – al | more

93. B is incorrect about the process scheduling command. At – Executes the program’s scheduling commands periodically

A Run the clear command at 11pm on the day. Run the at command: at 23:00 today clear

B Run the date command at 6:00 am on January 1 every year. Run the at command: at 6am Jan 1 date

C Run the date command at 11:00 p.m. every day. The value in the crontab file is 0 23 * * * date

D Run the clear command every hour. The value in the crontab file is 0 */1 * * * clear

94. Users user1 and user2 belong to the Users group. There is a file named file1 in user1, which has the permission of 644. If user2 wants to modify the file named file1 in user1, it has the permission of B.

A 744 B 664 C 646 D 746

?? 95. If you want to configure an anonymous FTP server, modify file C.

A /etc/gateway B /etc/ftpservers C /etc/ftpusers D /etc/inetd.conf

96. The Samba server process consists of two parts, B.

A named and sendmail B SMBD and NMBD C BOOTP and DHCPD D HTTPD and squid

97. To configure an NFS server, configure C files on the server side.

A /etc/rc.d/rc.inet1 B /etc/rc.d/rc.M C /etc/exports D /etc/rc.d/rc.S

98. You need to edit file B to ensure that the DHCP process is automatically started when the server is started.

A /etc/rc.d/rc.inet2 B /etc/rc.d/rc.inet1 C /etc/dhcpd.conf D /etc/rc.d/rc.S

99. When configuring the proxy server, if the working cache of the proxy server is set to 64MB, the configuration line is D.

A cache 64MB B cache_dir ufs /usr/local/squid/cache 10000 16 256

C cache_ mgr 64MB D cache_ mem 64MB

100. Security management involves security issues such as ensuring reliable network management and protecting network users and managed objects. C Security management.

A Configure device parameters. B Collect data related to network performance

C Control and maintain access rights D Monitor faults

101. The following command is correct.

A LS and SL B CAT and TAC C more and Erom D exit and Tixe

Cat is the command to display a folder, and tac is the reverse of cat. Cat is displayed from the first line to the last, tac is displayed from the last line to the first, and REV is displayed from the last character to the first character

102. The B command is used to save the disk and exit in the vi editor.

A :q B ZZ C :q! D :WQ

103. The following description of the /etc/fstab file is correct.

A fstab files can only describe file systems that belong to Linux B CD_ROM and floppy disks must be automatically loaded

C The file system described in the fstab file cannot be unmounted. D Load the file system according to the fstab file description during startup

104. When accessing a file by filename, the internal operation of the file system is through C.

A file Finds the file data access location in the directory. B File name Locate the file data and access the file.

C File name Search for node I in the directory and access file data through node I.

D file name Searches for the corresponding superblock in, searches for the corresponding node I in the superblock, and accesses file data through the node I

Linux operates on both storage and I/O devices as files, and C does not appear as files.

A directory B soft link C I node TABLE D network adapter

106. Regarding nodes I and superblocks, the following statement is incorrect for B.

A I node is A fixed length table B the number of superblocks in the file system is unique

The C I node contains all the information necessary to describe a file

D Super block records the disk location of the node table and free block table of I

107. D device is a character device.

A HDC B FD0 C hda1 D TTY1 (A,B,C are block devices)

108. The B directory holds the source code for Linux.

A /etc B /usr/src C /usr D /home

109. For file system installation and uninstallation, the following description is correct A.

A If the CD-ROM is not uninstalled, the CD-ROM drive cannot be opened. B The installation point of the file system can only be/MNT

C The system can install a CD-ROM device regardless of whether the CD-ROM drive is installed

D mount /dev/fd0/floppy In this command, the directory /floppy is automatically generated

110. B is not the difference between process and program.

A program is A set of ordered static instructions, process is A program execution process

B programs can only run in the foreground, while processes can run in the foreground or background

C programs can be stored for a long time, and processes are temporary

D Programs have no state, while processes are stateful

111. Exer1 has access to rw-r–r–, now add execute permission for all users and write permission for the same group.

A chmod a+x g+w exer1 B chmod 765 exer1

C chmod o+x exer1 D chmod g+w exer1

112. For archiving and compression commands, the following description is correct for C.

A Run the uncompress command to decompress the. Zip files generated by the compress command

B The unzip command and the gzip command can decompress files of the same type

C Tar archive files can be decompressed by using the gzip command

D The archive file using the tar command is also a compressed file

113. What is not a shell feature is C.

A pipe B input/output redirection C executes background process D handler command

114. The following operation on the shell variable FRUIT is correct: C.

$FRUIT=apple $FRUIT=apple

Echo $FRUIT = $FRUIT = $FRUIT = $FRUIT

3. Short-answer questions:

1. The Linux file system uses I node to convert the logical structure and physical structure of the file.

Reference answer:

Linux transforms the logical and physical structure of a file through the I node table.

The I node is a 64-byte long table containing file information, including file size, file owner, file access permission, file type and other important information. The most important element in the I node table is the disk address table. There are 13 block numbers in the disk address table, and the file reads the corresponding blocks in the order in which they appear in the disk address table. The Linux file system by putting the I connect nodes and the file name, when you need to read the file, the file system in the current directory to find the filename corresponding item in the table, the resulting the file that corresponds to the node number, I through the nodes of the disk address table I deposited the dispersed Richard blocks connected into a logical structure file.

2. Describes how to start and end a process, and how to view a process.

Reference answer:

There are two ways to start a process in Linux: Manual start and scheduled start.

(1) Manually start

The user issues a command on the input end to directly start a process. It can be divided into:

① Foreground startup: Directly enter commands in the SHELL to start.

② Background start: Start a process that is not urgent at present, such as the printing process.

(2) Scheduling starts

Based on the usage of system resources and processes, the system administrator can schedule tasks in advance and specify the time and occasion for running the tasks. Then the system automatically completes the tasks.

The commonly used process scheduling commands are at, batch, and crontab.

3. Describe the DNS domain name resolution process.

Reference answer:

First, the client issues a DNS request to translate the IP address or host name. The DNS server receives the request from the client:

(1) Check the cache of the DNS server, if the address or name of the request is found, that is, send a reply message to the client;

(2) if not found, then in the database to find, if found the address or name of the request, that is, to send a reply to the client information;

(3) if not checked, then to send the request to the root domain DNS server, and search for top-level domain in the root domain in sequence from the top to find secondary domain, the secondary domain for level 3, until you find to parse the address or the name of, or to the client’s network DNS server response message, the DNS server cache storage now after receipt of the reply, then, Send the results of the parsing to the client.

(4) If no, an error message is returned.

4. What are the responsibilities of a system administrator? What are the managed objects?

Reference answer:

A system administrator is responsible for system resource management, device management, system performance management, security management, and system performance monitoring. The objects managed are servers, users, server processes and various resources of the system.

5. Describes how to install the Slackware Linux system.

Reference answer:

(1) Repartition the hard disk. (2) Start the Linux system (using a CD, floppy disk, etc.).

(3) Create Linux primary partition and swap partition. (4) Use the setup command to install the Linux system.

(5) Format the Linux primary partition and swap partition (6) Install the Linux software package

(7) After installation, set up LILO boot program to start Linux system from hard disk, or make a floppy disk to start Linux system. Restart the Linux system.

6. What is static routing and what are its features? What is dynamic routing and what are its characteristics?

Reference answer:

Static routes are specified in the routing table designed and constructed by the system administrator. It is applicable to the network where the number of gateways is limited and the topology of the network does not change frequently. Its disadvantage is that it cannot dynamically adapt to the changes of network conditions. When the network conditions change, the network administrator must modify the routing table.

Dynamic routing is dynamically constructed by routing protocols. Routing protocols exchange routing information to update the routing table in real time. Dynamic routing can automatically learn the topology of the network and update the routing table. Its disadvantage is that routing broadcast update information will occupy a large amount of network bandwidth.

87. What commands are used to view and schedule processes?

Reference answer:

The process view commands are ps and top.

The process scheduling commands include at, crontab, batch, and kill.

8. How can I check and repair a damaged file system?

Reference answer:

To successfully repair a file system, you must have at least two primary file systems and uninstall the file system to be repaired.

Use the FSCK command to repair the damaged file system. FSCK checks the file system in five steps. Each step checks the connection characteristics of different parts of the system and verifies and modifies the previous step. When the FSCK command is executed, the check starts with the superblock, followed by the allocated disk block, pathname, directory connectivity, number of links, and free block linked list, i-Node.

9. Explain the role of the I node in the file system.

Reference answer:

In Linux file systems, information is stored in blocks. In order to find the location of a file in the storage space, a file is indexed by the I node. The I node contains all the information necessary to describe a file. So the I node is a data structure managed by the file system.

10. What are symbolic links and what are hard links? What is the difference between a symbolic link and a hard link?

Reference answer:

Links are divided into hard links and symbolic links.

Symbolic links establish links to files and directories. Symbolic links can cross file systems, that is, disk partitions. The file type bit of the symbolic link is L, and the link file has a new I node.

Hard links cannot cross file systems. It can only establish a link to a file. The file type bit of the hard link is -, and the I node of the hard link file is the same as that of the linked file.

11. When formatting Linux partitions, you need to select the disk cluster size (or I node density). Please describe the selection principle.

Reference answer:

The disk cluster (or I node density) is the basic unit of the file system scheduling file. The disk cluster size directly affects the efficiency of disk space scheduling. If the disk partition is large, the disk cluster should also be large. If the partition is small, select a smaller disk cluster. Experience values are usually used.

12. Describe the network file system NFS and its functions.

Reference answer:

Network file system is an application service at the application layer. It is mainly used to share files or directories between Linux and Linux systems or between Linux and Unix systems. Users can easily access remote file systems through NFS and make them part of the local file system. NFS eliminates the login process and facilitates user access to system resources.

13. A line in a /etc/fstab file reads as follows:

/dev/had5 /mnt/dosdata msdos defaults,usrquota 1 2

Please explain the meaning.

Reference answer:

(1) Column 1: the file system name to be loaded; (2) Column 2: the installation point of the file system;

(3) Column 3: type of file system; (4) Column 4: set parameters;

(5) Column 5: For the backup program to determine the number of days since the last backup;

(6) Column 6: Check the order of the file system at boot time.

The Apache server configuration file httpd.conf contains many contents. Please explain the following configuration items:

MaxKeepAliveRequests 200 (2) UserDir public_html

DefaultType text/plain (4) AddLanguare en.en

(5) the DocumentRoot “/ usr/local/HTTPD/htdocs”

AddType application/ x-httpd-php.php.php4

Reference answer:

(1) The maximum number of requests allowed per connection, which is 200; (2) set the directory for users to place web pages;

(3) Set the default format of the file type that the server does not know;

(4) Set up the transmission language file to the browser; (5) This directory is where Apache places web pages;

(6) Choose PHP4 as the server.

15. The /etc/rc.d/rc.inet1 file on a Linux host contains the following statement. Please correct the error and explain the content.

The/etc/rc) d/rc) rc.inet1:

ROUTE add –net default gw 192.168.0.101 netmask 255.255.0.0 metric 1

ROUTE add –net 192.168.1.0 gw 192.168.0.250 netmask 255.255.0.0 metric 1

Reference answer:

Fix errors:

(1) ROUTE should be changed to lowercase: ROUTE; (2) Netmask 255.255.0.0 should be changed to netmask 255.255.255.0;

(3) Change the subnet mask of the default route to netmask 0.0.0.0.

(4) The default route must be set at the end; otherwise, subsequent routes are invalid.

Explanation content:

(1) route: command for establishing a static routing table; (2) Add a new route.

(3) -net 192.168.1.0: network address to reach a target network;

(4) Default: establish a default route. (5) GW 192.168.0.101: gateway address;

Metric 1: Number of routers (hops) to the destination network.

16. Explain the following configuration of the Apache server:

Port 1080 (2) UserDir userdoc

DocumentRoot “/home/htdocs”

(4) <Directory /home/htdocs/inside>;

Options Indexes FollowSymLinks

AllowOverride None

Order deny,allow

deny from all

Allow the from 192.168.1.5

</Directory>;

(5) Server Type Standlone

Reference answer:

The Apache configuration line has the following meanings:

(1) Set the Apache server port number to 1080.

(2) Set the user webpage directory as userdoc;

(3) Set the root directory of the Apache server as /home/htdocs.

(4) Create a directory on the Apache server, /home/htdocs/inside, and this directory is only accessible to hosts whose IP address is 192.168.1.5.

(5) Define the Apache server to run as an independent process.

17. Describes the two login modes for file transfer through FTP. What’s the difference? What are the common FTP file transfer commands?

Reference answer:

(1) FTP has two login modes: anonymous login and authorized login. For anonymous login, the user name is anonymous and the password is any valid email address. In the authorization mode, the user name is the user account in the remote system and the password is the password in the remote system.

Difference: Only resources in the FTP directory can be accessed through anonymous login. By default, only resources can be downloaded. However, authorized login access permission is greater than anonymous login, and upload, download can be.

FTP file transfer there are two file transfer modes: ASCII mode and binary mode. ASCII mode is used to transfer text files. Binary mode is used to transfer other files.

(3) Commonly used FTP file transfer commands are bin, asc, put, get, mput, mget, prompt, and bye

Click here to learn more about dry goods