You are on page 1of 8

Solution Manual for Linux+ and LPIC-1 Guide to Linux Certification, 5th Edition Jason Eckert

Solution Manual for Linux+ and LPIC-1 Guide to


Linux Certification, 5th Edition Jason Eckert

To download the complete and accurate content document, go to:


https://testbankbell.com/download/solution-manual-for-linux-and-lpic-1-guide-to-linux-
certification-5th-edition-jason-eckert/

Visit TestBankBell.com to get complete for all chapters


Guide to Linux+, Fifth Edition
Chapter 6 Solutions

Review Questions
1. BTRFS filesystems do not need to be checked for errors as they are resilient to data corruption.
True or False?
Answer: False

2. Which of the following describes a computer that is used to access an iSCSI hard disk across the
network?
a. iSCSI target
b. iSCSI requestor
c. iSCSI initiator
d. iSCSI terminator
Answer: c

3. You want to view log files to get information about a problem that occurred during a Linux
installation. In which directory will you likely find the log files?
a. /root/log
b. /sys/log
c. /var/log
d. /etc/log
Answer: c

4. Which of the following RAID levels is not fault tolerant?


a. RAID 0
b. RAID 1
c. RAID 4
d. RAID 5
Answer: a

5. Which command can you use during a system rescue to switch from the root of the live OS to the
root of the Linux system installed on the hard disk?
a. mount
b. sysimage
c. chroot
d. rescue
Answer: c

6. Which of the following is not a type of RAID?


a. hardware RAID
b. software RAID
c. firmware RAID
d. serial RAID
Answer: d

7. Where is the /proc filesystem stored?


a. in RAM
b. on the hard disk drive in the / directory
c. on the hard disk drive in the /etc directory
d. on the hard disk drive in the /var directory
Answer: a
8. When configuring a virtual hard disk file, which term refers to the feature that allows the virtual
hard disk file to expand dynamically as space is requested by the guest operating system?
a. thick provisioning
b. Type 1
c. thin provisioning
d. Type 2
Answer: c

9. DM-MPIO can be configured to provide multiple, redundant connections to data stored on a SAN.
True or False?
Answer: False

10. What component of a Linux server is used to connect to a Fibre Channel SAN?
a. FC initiator
b. FC target
c. FC HBA
d. WWPN
Answer: c

11. Which type of RAID can be entirely configured during the Linux installation process?
a. hardware RAID
b. software RAID
c. firmware RAID
d. serial RAID
Answer: b

12. What command can be used to create a ZFS volume called test from the space on /dev/sdb and
/dev/sdc that functions like RAID level 1?
a. zpool create test /dev/sdb /dev/sdc
b. zpool create test mirror /dev/sdb /dev/sdc
c. zpool create test raidz /dev/sdb /dev/sdc
d. zpool create test raidz2 /dev/sdb /dev/sdc
Answer: b

13. To which directory will the test ZFS volume from the previous question be mounted by the ZFS
system?
a. /mnt/test
b. /media/test
c. /zfs/test
d. /test
Answer: d

14. Linux servers are typically installed in a rack using rackmount server hardware. Which of the
following describes the minimum height of a rackmount server?
a. 1U
b. Series A
c. Type A
d. Level 5
Answer: a

15. Which of the following commands can quickly determine whether your network hardware was
detected properly following a Linux installation?
a. cat /proc/modules/network
b. lspci
c. lshw -class network
d. dmesg
Answer: c

16. ZFS volumes are mounted at boot time from entries within /etc/fstab by default. True or False?
Answer: False

17. Which of the following could result in a segmentation fault (fatal signal 11) during a Fedora
installation?
a. RAM problems
b. overclocked CPU
c. faulty hardware components
d. all of the above
Answer: d

18. When viewing the output of the lsmod command, you notice several modules that start with vmw.
What does this indicate?
a. Linux is running as a guest operating system.
b. Device drivers need to be installed on your system.
c. There is no virtual memory in your system.
d. The system is running the KVM hypervisor.
Answer: a

19. What type of redundant storage configuration is most common for hosting the operating system
and applications on a server?
a. RAID 5
b. ZFS
c. RAID 1
d. SAN + DM-MPIO
Answer: c

20. Which of the following commands can be used on a modern Linux system to view hardware
information that was captured at the beginning of the boot process?
a. less /var/log/boot.log
b. less /var/log/messages
c. less /var/log/syslog
d. journalctl -k
Answer: d

Hands-on Projects

Project 6-1
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: Not available.
Step 5: Not available.
Step 6: Not available.
Step 7: Not available.
Step 8: Not available.
Step 9: Not available.
Step 10: Not available.
Step 11: Not available.
Step 12: Not available.
Step 13: Not available.
Step 14: Not available.
Step 15: Not available.
Step 16: Not available.
Step 17: Not available.

Project 6-2
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: Not available.
Step 5: Not available.
Step 6: Yes.
Step 7: No.
Step 8: Not available.
Step 9: Not available.
Step 10: Not available.
Step 11: The lost+found directory was also created because the filesystem type is ext4.
Step 12: It should be approx. 3GB because RAID 5 uses the equivalent of one disk device (1GB) for
storing parity information.
Step 13: Yes.
Step 14: Yes.
Step 15: Not available.
Step 16: Yes, because the system is recalculating the missing data using parity information.
Step 17: Not available.
Step 18: Not available.
Step 19: Not available.
Step 20: Not available.
Step 21: Not available.
Step 22: Not available.

Project 6-3
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: Not available.
Step 5: Not available.
Step 6: Not available.
Step 7: No.
Step 8: Not available.
Step 9: Yes – the first disk should list corruption.
Step 10: Not available.
Step 11: Yes.
Step 12: Not available.
Step 13: Not available.
Step 14: Not available.
Step 15: No, because they are only subdirectories and not ZFS subfilesystems.
Step 16: Yes, because they are ZFS subfilesystems and managed by ZFS.
Step 17: Not available.
Step 18: Not available.
Step 19: Not available.
Step 20: Not available.
Project 6-4
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: Not available.
Step 5: Not available.
Step 6: Not available.
Step 7: No.
Step 8: Not available.
Step 9: Not available.
Step 10: Yes.
Step 11: Not available.
Step 12: Not available.
Step 13: Not available.
Step 14: Not available.
Step 15: Not available.
Step 16: Not available.
Step 17: Not available.
Step 18: Not available.
Step 19: Not available.
Step 20: The btrfsck command.
Step 21: Not available.

Project 6-5
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: Normally, the CPU is detected correctly within virtualization software.
Step 5: Not available.
Step 6: Answers will vary, but yes, each module can be associated with the appropriate hardware device.
Virtualized modules should be present and there should be modules for ZFS, RAID and BTRFS present.
Step 7: Not available.
Step 8: Yes, dummy should be listed.
Step 9: The files in these directories are used to load modules manually at boot time.
Step 10: Not available.
Step 11: Yes, dummy should be listed.
Step 12: They should correspond to the hardware listed within this project.
Step 13: The information is equivalent.
Step 14: Each entry represents system and software loading events during boot time.
Step 15: The information is equivalent.
Step 16: Not available.

Project 6-6
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: Not available.
Step 5: Not available.
Step 6: No.
Step 7: Not available.
Step 8: Not available.
Step 9: Not available.
Step 10: Yes – the files should be the ones created in previous chapter projects within the root user’s home
directory.
Step 11: You should receive a warning indicating that the password contains a common dictionary word,
but it still allows you to set the password as you are the root user.
Step 12: Not available.
Step 13: Not available.
Step 14: Yes, because you changed the password during system rescue.
Step 15: Not available.
Step 16: Not available.

Project 6-7
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: Not available.
Step 5: Not available.
Step 6: Not available.
Step 7: Not available.
Step 8: Not available.
Step 9: Not available.
Step 10: Not available.
Step 11: Not available.
Step 12: Not available.
Step 13: Not available.
Step 14: Not available.
Step 15: Not available.
Step 16: Not available.
Step 17: Not available.
Step 18: Not available.
Step 19: Not available.
Step 20: Not available.
Step 21: Not available.
Step 22: Not available.
Step 23: Not available.
Step 24: A /boot partition was created because the LVM was used. Yes, the / filesystem is a LV.
Step 25: Not available.
Step 26: Not available.
Step 27: Not available.

Discovery Exercises

Discovery Exercise 1
Answers will vary depending on configuration.
Solution Manual for Linux+ and LPIC-1 Guide to Linux Certification, 5th Edition Jason Eckert

Discovery Exercise 2
Not available.

Discovery Exercise 3
Not available.

Discovery Exercise 4
Not available.

Discovery Exercise 5
Answers will vary. It depends on what problems were researched on Web sites or forums.

Discovery Exercise 6
With physical access to a Linux server, anyone could boot the system from a DVD and perform a system
rescue to change the root user’s password to compromise the system. All servers, regardless of operating
system (Windows, UNIX, Linux, Macintosh) are vulnerable to this type of security breach and should be
locked in a server closet as a result.

Visit TestBankBell.com to get complete for all chapters

You might also like