Sample questions for Exam #1

  1. Consider the following output of ls -l:
    total 28
    -rw-rw-r-- 2 eric eric 6 2012-02-07 16:28 test
    lrwxrwxrwx 1 eric eric 4 2012-02-07 16:29 tst -> test
    -rw-rw-r-- 2 eric eric 6 2012-02-07 16:28 twinkie
    
    When you try to `rm twinkie` to free up disk space, you are successful (the file disappears), but but you haven't freed up any space on your disk. How is this possible?

  2. You are a Product Manager and you want to share a certain folder, called ProjectX, with your team members with whom you share a defined user group on a UNIX system. These files are management-level sensitive documents that the entire group needs to work on the project. As such, you want to share them in such a way that the group has read-only access to the files, and everyone else has no access. Because some documents were created by previous managers before you arrived, you don't have ownership of all of the files.

    Using the numeric representation of permissions, write a command that will allow you to perform this operation on the ProjectX directory that resides in /org/projects/ProjectX. Keep in mind that you do not own all of the files.

  3. What are 3 of the advantages of using the sudo command?

  4. a) What is a boot loader and what is its purpose?
    b) Give examples of some of the options a boot loader might give a user.
    c) What is the modern Linux boot loader?
    d) How is the boot loader called in the booting process?

  5. When would you want to use pvmove? Why is it important that you not just jump straight to using pvresize?

  6. List three security measures that a sys admin should take to ensure protection of their system. Also mention one way to circumvent those measures.

  7. When building a data center, what elements should be considered?

  8. What part of a UNIX file carries the map of where the data is located for that particular file?

  9. A process with PID 11235 ends with exit code 0. Describe the state of the 11235 and the actions of its parent which result in 11235 ending and its entry in the process table being removed. What changes if 11235's parent dies first?

  10. List the various runlevels and their meanings for init.

  11. What are the three typical product lines for a computer vendor and how are they different from a system administrator's perspective?

  12. Why is it more complicated to manage multiple computers with slightly different hardware configurations than to manage identical machines?

  13. Explain what a suid program does exactly, and give an example of such a program.

  14. List and briefly describe the partitions on a typical disk.

Additional suggested questions from prior years:
  1. What are the effective permissions on a file with the attributes 754?

  2. Name five consideration in designing a "solid service."

  3. What are some of the reasons a system admin would want to use a fully automated install procedure for new machines?

  4. What is the purpose of hdparm?

  5. Why do servers belong in a data center?

  6. What does a fork(the process, not the utensil) do?

  7. Discuss an alternative to giving users that need to make system changes root access. Describe the pros and cons of using an alternative.

  8. What is the biggest feature difference between the ext2 and ext3 filesystems?

  9. What's the difference between UNIX and Linux? Are they the same thing or are they different?

  10. Give the definition of a signal, including three of its uses. Name a signal that cannot be blocked.

  11. Write a script that is set to run once a week on Sunday at midnight as a cronjob and rotates the messages log from messages -> messages.1 -> messages.2 and then deletes the log after the second week.

  12. What are the benefits of automating the installation process?

  13. During the boot process, how does the operating system know which services it needs to run at different runlevels? How does it determine the order in which these services are started?

  14. Why is it a good idea to put some partitions (such as /var, /home, and swap) on a separate drive from other data files and programs? What about /tmp? Give specific reasons for each of the filesystems listed.

  15. When logged in as root, why is it important to use the full path of programs you run?

  16. a) What are the differences between the various 6 run levels?
    b) Generically state (without leaving out detail) the actions performed when changing between run-levels. Note: your discussion should include discussion or /etc/rc.d/

  17. Name some reasons to keep servers in a data center.

  18. Create an fstab entry that will add a hard drive connected as a slave on the second ide, and mount it to /home.

  19. Why would you want to use (or allow someone else to use) the sudo command? and what are some advantages by using sudo over su?

  20. What is n+1 redundancy and why should it be used? Give an example of n+1 redundancy.

  21. Why should you include the complete path when running su?

  22. What are the standard device file names for the third IDE device and the second SCSI device?

  23. How would you change your default editor (e.g., for use with crontab -e)?

  24. What is the difference between /bin, /usr/bin, and /usr/local/bin in terms of their usage or the files they contain?

  25. What are the differences between IDE/ATA, SCSI, and SATA?

  26. Consider a file on your / partition with two hard links to it, by the names of file1 and file2. What happens when root runs mv file1 /tmp, where /tmp is a different partition?



Last revised: 14 February 2012, Prof. Davison.