Networking Chapter 2 1 If you plan to have multiple users accessing your system, you should 

subject Type Homework Help
subject Pages 7
subject Words 1811
subject Authors Michael Palmer

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
CHAPTER 2: EXPLORING THE UNIX/LINUX FILE SYSTEMS AND FILE
SECURITY
TRUE/FALSE
1. A disadvantage of ufs is that it does not support journaling.
2. A directory is a special kind of file that can contain other files and directories.
3. As a general rule, the swap partition should be the same size as the amount of RAM in your computer.
4. If you plan to have multiple users accessing your system, you should consider having a /var partition
in which to store some or all of the nonkernel operating system programs that are accessed by users.
5. The command cd source uses relative path addressing.
6. UNIX/Linux systems interpret a single dot character to mean the current working directory.
7. The rm -r command can be used to delete a directory that is not empty.
MULTIPLE CHOICE
1. The UNIX file system (ufs) supports ____, which automatically move data on damaged portions of
disks to areas that are not damaged.
a.
hot fixes
c.
recovery fixes
b.
backups
d.
extents
2. In Linux, the native file system is the ____, which is installed by default.
a.
ufs
c.
ReiserFS
b.
ext fs
d.
jfs
3. A(n) ____ is used to reduce file fragmentation, because a block of contiguous disk storage can be
reserved for a file.
a.
partition
c.
journal
page-pf2
b.
node
d.
extent
4. The root of a file system is denoted by the ____.
a.
dot (.)
c.
forward slash (/)
b.
dot dot (..)
d.
backward slash (\)
5. The two most popular hard disk interfaces are IDE and ____.
a.
ATA
c.
EIDE
b.
SCSI
d.
RAID
6. The ____ partition acts like an extension of memory, so that UNIX/Linux have more room to run large
programs.
a.
backup
c.
virtual
b.
primary
d.
swap
7. ____ are programs that perform operations such as copying files, listing directories, and
communicating with other users.
a.
Extents
c.
Applications
b.
Utilities
d.
Services
8. If you plan to have multiple users access a system, you can create a ____ partition, which is the home
directory for all users’ directories.
a.
/root
c.
/usr
b.
/etc
d.
/home
9. You can create a ____ partition to hold files that are created temporarily, such as files used for printing
documents (spool files) and files used to record monitoring and administration data, often called log
files.
a.
/tmp
c.
/var
b.
/usr
d.
/aux
10. The ____ directory contains executables, which are the programs needed to start the system and
perform other essential system tasks.
a.
/boot
c.
/dev
b.
/bin
d.
/etc
11. The ____ directory contains the kernel (operating system) images.
a.
/boot
c.
/dev
b.
/bin
d.
/etc
page-pf3
12. The term ____ refers to a “black hole”; any data sent to this device is gone forever.
a.
void
c.
null
b.
root
d.
console
13. The ____ directory contains configuration files that the system uses when the computer starts.
a.
/boot
c.
/dev
b.
/bin
d.
/etc
14. When using the mount command, you use the ____ option to specify a file system to mount.
a.
-f
c.
-t
b.
-d
d.
-m
15. The ____ is shorthand for the home directory, which typically has the same name as the user’s account
name.
a.
backward slash (\)
c.
dollar sign ($)
b.
forward slash (/)
d.
tilde (~)
16. If you have configured your prompt so that it does not show your working directory, you can use the
____ command to verify in what directory you are located, along with the directory path.
a.
pwd
c.
list
b.
who
d.
dir
17. To navigate the UNIX/Linux directory structure, you use the ____ command.
a.
nav
c.
mv
b.
cd
d.
jump
18. A(n) ____ path begins at the root level and lists all subdirectories to the destination file.
a.
root
c.
absolute
b.
primary
d.
relative
19. UNIX/Linux systems interpret ____ to mean the parent directory.
a.
dot (.)
c.
backward slash (\)
b.
dot (..)
d.
forward slash (/)
20. You use the ____ command to display a directory’s contents, including files and other directories.
a.
dir
c.
pwd
b.
d
d.
ls
page-pf4
21. The ____ command is used to create a new directory.
a.
cdir
c.
mkdir
b.
cd
d.
mk
22. You can change the pattern of permission settings by using the ____ command.
a.
chperm
c.
chsec
b.
chmod
d.
chown
COMPLETION
1. Most versions of UNIX and Linux support the ____________________ (ufs), which is the original
native UNIX file system.
2. Computer storage devices such as hard disks are called ____________________ devices.
3. To ____________________ a file system is to connect it to the directory tree structure.
4. You can use the -a option with the ls command to list ____________________ files.
5. A(n) ____________________ is a special character that can stand for any other character or, in some
cases, a group of characters.
6. Using the octal permission format, chmod ____________________ data, assigns read,write, and
execute to owner; execute to group; and execute to other.
page-pf5
MATCHING
Match each item with a statement below.
a.
/root
f.
/proc
b.
/usr
g.
/var
c.
/sbin
h.
/mnt
d.
/media
i.
/tmp
e.
/lib
1. houses kernel modules, security information, and the shared library images
2. mount points for temporary mounts by the system administrator reside in this directory
3. is a relatively new recommendation of the FHS
4. this directory occupies no space on the disk
5. home directory for the system administrator
6. programs that start the system, programs needed for file system repair, and essential network programs
are stored in this directory
7. temporary place to store data during processing cycle
8. houses software offered to users
9. holds subdirectories that often change in size
SHORT ANSWER
1. Why is it a good idea to partition your hard disk?
2. What is virtual memory?
3. What is an inode and what information does it contain?
page-pf6
4. What are device special files?
5. What is a pathname? How is a pathname specified in UNIX/Linux?
6. What command do you use to copy files in UNIX/Linux? How do you use this command?
7. What command do you use to delete files in UNIX/Linux? Describe the usage of this command.
page-pf7
8. Why would you want to set file permissions?
9. What is the role of GIDs in UNIX/Linux systems?
10. When configuring file permissions in UNIX/Linux systems, what is the role of the sticky bit?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.