1. Linux shells are used to enter commands to perform functions in your Linux distribution. Describe the shells which are available. Which one would be your preference?
2. Three file-viewing commands (head, tail, and less) are used to display a portion of a file. These are especially useful when you have a very large text file you want to view and you want to narrow you display of it.
Provide me one or more command syntax examples using each of the three file-viewing commands. You must provide me using at least one command option (ex. with head command you can specify the number of lines to display using “-n num” option).
3. What are some reasons why bash is considered a defacto standard shell on Linux distributions?
4. ps command is use to list processs running on your Linux system. Provide five examples using the ps command
ps-ef – lists all currently running processes
ps-u – lists all processes belonging to a specific username
ps-p – lists all processes belonging to a specific User ID (UID)
ps-forest – lists all processes in hierarchical form
ps-l – lists all threads for a particular process
5. Discuss USB capabilities you can configure in your Linux distribution
6. proc directory is a virtual filesystems that provides information about hardware, running processes, etc.. Lists at least three files located in /proc that you can reference to determine the hardware resources for devices installed on your Linux distribution.
7. Linux server will run at a specific run level for the following reasons:
1) transition to a power off or restart
2) provide limited capabilities to restrict users when performing system maintenance
3) provided full services including graphical user interface
Explain which run levels would be active depending on which type of Linux distribution you have running (ex. Fedora, Red Hat, or Debian)
8. If you changed permissions of a file using command “chmod 0755 filename”, what permisions will the owner, group, and others have when accessing filename? Will owner still be able to update permissions on filename? Why?
9. What is the chown command used for? Provide and describe examples using the command.
10. X Windows (protocol used to display graphical images from Linux server) has three main display managers (XDM, KDM, and GDM). Discuss the differences and similarities between them as discussed in your LabSims 4.2. Also, mention if you have a personal preference for one display manager and why.
11. Since Linux is an international operating system you can configure it to support a specific region. Discuss how you can configure its character set, keyboard layout, and date/time display formats for a specific region (or country) of your choice.
12. Discuss commands and tools used to manage CUPS environment on your Linux distribution. For example:
How would you restart CUPS? Which directory on your Linux distribution would you find files representing print jobs?
13. The gpasswd command is used to change a Linux user password. What are the differences between this Linux gpasswd password changing command and UNIX passwd password changing command?
14. The syslogd daemon maintains logfiles on Linux distribution. Discuss how you would use the syslogd daemon to maintain a log file.
15. When creating user account using useradd how is the default group determined? Is there a default group users are added automatically unless specified in the useradd command ?
16. Section 11.0 in LabSims discusses internet and transport layer protocols which are configurable in Linux. Compare and contrast the following protocols including discussing their respective uses with Linux distributions:
17. Discuss two network configuration (DHCP and static IP address). Lists the pros and cons of using each network configuration.
18. Discuss how you would configure your Linux distribution to perform name resolution using DNS.
19. Discuss in detail several effective local security practices to harden your Linux distribution.
20. Discuss what is SSH and the advantages and disadvantages of using it on your Linux distribution
21. Discuss how you can control SSH access and security considerations