Frame 1
stop();
Frame 2
call("clear_Xthings");
Set("/:nr_in", _);
stop();
Frame 3
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?";
Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature.";
Question2 = "What is the major difference between a workstation and a server?";
Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network.";
Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?";
Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |.";
Question4 = "What command will show you the path of the directory you are currently working in?";
Answer4 = "The pwd command will show you the path of the directory you are currently in.";
Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?";
Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories.";
Question6 = "What is the purpose of awk?";
Answer6 = "It is a scripting language that provides complex pattern-matching facilities.";
Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?";
Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories.";
Question8 = "How can PAM be used to help restrict user access?";
Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password.";
Question9 = "Why is it dangerous to constantly log in as the root user?";
Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so.";
Question10 = "What command can be used to execute a single command with alternative permission?";
Answer10 = "The sudo command can be used to execute a single command with alternative permission.";
Question11 = "What utility allows you to edit disk quota information?";
Answer11 = "The edquota utility allows you to edit disk quota information.";
Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?";
Answer12 = "The chage command allows you to modify account settings relating to account expiration.";
Question13 = "What character does Linux use to symbolize the root directory?";
Answer13 = "The root directory is Linux is represented by /.";
Question14 = "Why would a RAID array be useful and what is it?";
Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data.";
Question15 = "What programs does Linux use to write to optical media?";
Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord.";
Question16 = "What is the purpose of the nice command?";
Answer16 = "It allows you to run a program with a specified priority.";
Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?";
Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection.";
Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?";
Answer18 = "The route add command is used to add an entry to the routing table.";
Question19 = "What is the purpose of creating a baseline?";
Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in.";
Question20 = "What does the output of the uptime utility show?";
Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes).";
Question21 = "What type of information is typically included in installation log files?";
Answer21 = "The names of packages installed and error messages";
Question22 = "How many serial ATA devices can fit on a single serial ATA chain?";
Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)";
Question23 = "What command is used to create a filesystem?";
Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer.";
Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?";
Answer24 = "Ghostscript";
Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?";
Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code.";
Question26 = "What software component determines whether Linux supports a given SCSI host adapter?";
Answer26 = "The Linux kernel";
Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?";
Answer27 = "In the BIOS, which is stored on a chip on the motherboard";
Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?";
Answer28 = "ls /usr/local/bin";
Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?";
Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't.";
Question30 = "How can you identify processes that consume an inordinate amount of CPU time?";
Answer30 = "The top utility or the ps utility with appropriate switches";
Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?";
Answer31 = "Type lilo to install a new boot loader that reflects your modifications.";
Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?";
Answer32 = "traceroute";
Question33 = "What system associates IP addresses with hostnames?";
Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers";
Question34 = "What's the most common type of local network hardware today?";
Answer34 = "Ethernet";
Question35 = "What program displays information on the jobs in a print queue?";
Answer35 = "lpq";
Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?";
Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions.";
Question37 = "What methods are most commonly used to shut down a Linux system?";
Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this.";
Question38 = "What types of problems most often generate kernel oops messages?";
Answer38 = "Hardware malfunctions and kernel bugs";
Question39 = "What do the Exim and Postfix programs have in common?";
Answer39 = "They're both SMTP mail servers.";
Question40 = "When should you set the root password?";
Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation.";
Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?";
Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition.";
Question42 = "What is accomplished by the command chmod a+x scriptfile?";
Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable.";
Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?";
Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password.";
Question44 = "When you configure a system to use a static IP address, what information do you enter manually?";
Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address";
Question45 = "What command can you use to discover how much space is being used by files in a specified directory?";
Answer45 = "du";
Question46 = "How can you locate stray files belonging to a user when deleting that user's account?";
Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504.";
Question47 = "In what two forms does Linux swap space generally come?";
Answer47 = "A dedicated swap partition or a swap file within a regular filesystem";
Question48 = "What pull protocols are most commonly used for e-mail retrieval?";
Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)";
Question49 = "Where do network servers typically record error messages?";
Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file";
Question50 = "What OSs can GRUB boot?";
Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS";
Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?";
Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally.";
Question52 = "Which common package management systems include support for dependency tracking?";
Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems";
Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?";
Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation.";
Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?";
Answer54 = "Samba";
Question55 = "Where can the GRUB boot loader code be installed?";
Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well.";
Question56 = "What function does the fsck program serve?";
Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)";
Question57 = "When a user reports a problem in a vague way, what should you do?";
Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself.";
Question58 = "What user IDs (UIDs) do ordinary user accounts use?";
Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher.";
Question59 = "What types of manipulations can you perform on a password base to make it more secure?";
Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words.";
Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?";
Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins.";
Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?";
Answer61 = "ifconfig eth0";
Question62 = "How do man pages and HOWTO documents differ?";
Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics.";
Question63 = "What is the most common choice of software to implement as a Web server in Linux?";
Answer63 = "Apache";
Question64 = "What type of mouse is ideal for use in Linux?";
Answer64 = "A three-button mouse; many X programs assume three buttons are available.";
Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?";
Answer65 = "apt-get";
Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?";
Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC.";
Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?";
Answer67 = "Reconfigure the kernel and recompile it from source code.";
Question68 = "What modes does the Vi editor support, and what are they for?";
Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text).";
Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?";
Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet.";
Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?";
Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS.";
Question71 = "Who should have access to password files stored on a floppy disk?";
Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files.";
Question72 = "Where is a good place to keep an administrator's logbook?";
Answer72 = "In a paper notebook near the computer";
Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?";
Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly.";
Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?";
Answer74 = "$ (preceding the variable name)";
Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?";
Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem.";
Question76 = "What method does the locate command use to find files?";
Answer76 = "It searches a database that it updates periodically via cron jobs.";
Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?";
Answer77 = "PC Card, aka PCMCIA";
Question78 = "What happens to a process if its parent is killed or exits?";
Answer78 = "It's adopted by another process (typically init).";
Question79 = "Why might you create a separate partition for /usr/local?";
Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks";
Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?";
Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A.";
Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?";
Answer81 = "mt";
Question82 = "What devices must be terminated in a SCSI chain?";
Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)";
Question83 = "What command is used to submit a print job in Linux?";
Answer83 = "lpr";
Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?";
Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)";
Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?";
Answer85 = "startx";
Question86 = "What does the mv command accomplish?";
Answer86 = "It moves or renames a file or directory.";
Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?";
Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic";
Question88 = "What file directs the Linux boot process after the kernel has loaded?";
Answer88 = "/etc/inittab";
Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?";
Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections.";
Question90 = "What major Linux distribution uses binary tarballs for package distribution?";
Answer90 = "Slackware";
Question91 = "What are the two most common busses that connect to plug-in cards?";
Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus.";
Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?";
Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers.";
Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?";
Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like";
Question94 = "What happens when you try to run a program that requires a library that's not installed?";
Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)";
Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?";
Answer95 = "hdparm, specifically its -X parameter";
Question96 = "What boot methods are commonly used by Linux installers?";
Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows.";
Question97 = "How much damage can intruders do if they are given physical access to a computer?";
Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer.";
Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?";
Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number.";
Question99 = "What does the /etc/inetd.conf file control?";
Answer99 = "The inetd server, which launches other servers only when those servers are needed";
Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?";
Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups";
Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?";
Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)";
Question102 = "What conditions must be met to use DHCP?";
Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network.";
Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?";
Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security.";
Question104 = "What are the names of two power management protocols common on laptop computers?";
Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)";
Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?";
Answer105 = "Ask your network administrator. Do not configure a system with a random IP address.";
Question106 = "Is the 2.6.9 kernel a development or a stable kernel?";
Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series.";
Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?";
Answer107 = "Delete george's accounts.";
Question108 = "When should you use shadow passwords?";
Answer108 = "Almost always; shadow passwords substantially improve local security.";
Question109 = "Who may change the owner of a file?";
Answer109 = "The file's current owner or root";
Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?";
Answer110 = "Patch and recompile your Linux kernel.";
Question111 = "What is necessary to give users the choice of using KDE or GNOME?";
Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts.";
Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?";
Answer112 = "A switch";
Question113 = "Where can you go to find out if your video card is supported by Linux?";
Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers.";
Question114 = "How do you tell kill what process you want to terminate?";
Answer114 = "You pass kill the target process's process ID (PID) number.";
Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?";
Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible.";
Question116 = "What does the TERM environment variable control?";
Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning";
Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?";
Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options.";
Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?";
Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display.";
Question119 = "What does the modprobe command do?";
Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends.";
Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?";
Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage.";
Question121 = "How do you tell Linux to install from a network server?";
Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution.";
Question122 = "What command removes a print job from a print queue?";
Answer122 = "lprm";
Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?";
Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely";
Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?";
Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this.";
Question125 = "In what file is group membership recorded?";
Answer125 = "/etc/group";
Question126 = "What command do you use to switch the current runlevel?";
Answer126 = "telinit";
Question127 = "Under what circumstances is Telnet a good remote administration tool?";
Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise.";
Question128 = "How do you create a user cron job?";
Answer128 = "Use the crontab program.";
Question129 = "Why might you want to delay creating user accounts until after installation?";
Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation.";
Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?";
Answer130 = "setserial";
Question131 = "What are the most important general-purpose log files on most Linux systems?";
Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)";
Question132 = "What three factors does X use to compute the refresh rate you'll see?";
Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution";
Question133 = "What type of information does the df command return?";
Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems";
Question134 = "What are the settings for serial ATA disks?";
Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically.";
Question135 = "Why are SUID root programs rare?";
Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program.";
Question136 = "What are some common sources of emergency disk sets?";
Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM";
Question137 = "You want to kill a process by name. What command can you use to do this?";
Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill.";
Question138 = "What backup medium is best suited to long-term archival storage, and why?";
Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)";
Question139 = "What tools are most commonly used to install or remove Debian packages?";
Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these";
Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?";
Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller.";
Question141 = "What kernel should you use to obtain support for many USB devices?";
Answer141 = "2.2.18 or later, or 2.4.0 or later";
Question142 = "What is the function of the tail command?";
Answer142 = "It displays the last few lines (10 by default) of a file.";
Question143 = "What types of errors will leave traces in system log files?";
Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes.";
Question144 = "What type of software can block access to any or all network ports on a computer?";
Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)";
Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?";
Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions.";
Question146 = "What does the cp command accomplish?";
Answer146 = "It copies one or more files.";
Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?";
Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question.";
Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?";
Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion.";
Question149 = "What is the best way to stop a server that was started through a SysV startup script?";
Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop.";
Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?";
Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job.";
stop();
stop();
Instance of Symbol 90 MovieClip "answer" in Frame 3
onClipEvent (load) {
_visible = false;
}
Frame 4
stop();
Instance of Symbol 107 MovieClip "answer" in Frame 4
onClipEvent (load) {
_visible = false;
}
Frame 5
stop();
Instance of Symbol 111 MovieClip "answer" in Frame 5
onClipEvent (load) {
_visible = false;
}
Frame 6
stop();
Instance of Symbol 115 MovieClip "answer" in Frame 6
onClipEvent (load) {
_visible = false;
}
Frame 7
stop();
Instance of Symbol 119 MovieClip "answer" in Frame 7
onClipEvent (load) {
_visible = false;
}
Frame 8
stop();
Instance of Symbol 123 MovieClip "answer" in Frame 8
onClipEvent (load) {
_visible = false;
}
Frame 9
stop();
Instance of Symbol 127 MovieClip "answer" in Frame 9
onClipEvent (load) {
_visible = false;
}
Frame 10
stop();
Instance of Symbol 131 MovieClip "answer" in Frame 10
onClipEvent (load) {
_visible = false;
}
Frame 11
stop();
Instance of Symbol 135 MovieClip "answer" in Frame 11
onClipEvent (load) {
_visible = false;
}
Frame 12
stop();
Instance of Symbol 139 MovieClip "answer" in Frame 12
onClipEvent (load) {
_visible = false;
}
Frame 13
stop();
Instance of Symbol 143 MovieClip "answer" in Frame 13
onClipEvent (load) {
_visible = false;
}
Frame 14
stop();
Instance of Symbol 147 MovieClip "answer" in Frame 14
onClipEvent (load) {
_visible = false;
}
Frame 15
stop();
Instance of Symbol 151 MovieClip "answer" in Frame 15
onClipEvent (load) {
_visible = false;
}
Frame 16
stop();
Instance of Symbol 155 MovieClip "answer" in Frame 16
onClipEvent (load) {
_visible = false;
}
Frame 17
stop();
Instance of Symbol 159 MovieClip "answer" in Frame 17
onClipEvent (load) {
_visible = false;
}
Frame 18
stop();
Instance of Symbol 163 MovieClip "answer" in Frame 18
onClipEvent (load) {
_visible = false;
}
Frame 19
stop();
Instance of Symbol 167 MovieClip "answer" in Frame 19
onClipEvent (load) {
_visible = false;
}
Frame 20
stop();
Instance of Symbol 171 MovieClip "answer" in Frame 20
onClipEvent (load) {
_visible = false;
}
Frame 21
stop();
Instance of Symbol 175 MovieClip "answer" in Frame 21
onClipEvent (load) {
_visible = false;
}
Frame 22
stop();
Instance of Symbol 179 MovieClip "answer" in Frame 22
onClipEvent (load) {
_visible = false;
}
Frame 23
stop();
Instance of Symbol 183 MovieClip "answer" in Frame 23
onClipEvent (load) {
_visible = false;
}
Frame 24
stop();
Instance of Symbol 187 MovieClip "answer" in Frame 24
onClipEvent (load) {
_visible = false;
}
Frame 25
stop();
Instance of Symbol 191 MovieClip "answer" in Frame 25
onClipEvent (load) {
_visible = false;
}
Frame 26
stop();
Instance of Symbol 195 MovieClip "answer" in Frame 26
onClipEvent (load) {
_visible = false;
}
Frame 27
stop();
Instance of Symbol 199 MovieClip "answer" in Frame 27
onClipEvent (load) {
_visible = false;
}
Frame 28
stop();
Instance of Symbol 203 MovieClip "answer" in Frame 28
onClipEvent (load) {
_visible = false;
}
Frame 29
stop();
Instance of Symbol 207 MovieClip "answer" in Frame 29
onClipEvent (load) {
_visible = false;
}
Frame 30
stop();
Instance of Symbol 211 MovieClip "answer" in Frame 30
onClipEvent (load) {
_visible = false;
}
Frame 31
stop();
Instance of Symbol 215 MovieClip "answer" in Frame 31
onClipEvent (load) {
_visible = false;
}
Frame 32
stop();
Instance of Symbol 219 MovieClip "answer" in Frame 32
onClipEvent (load) {
_visible = false;
}
Frame 33
stop();
Instance of Symbol 223 MovieClip "answer" in Frame 33
onClipEvent (load) {
_visible = false;
}
Frame 34
stop();
Instance of Symbol 227 MovieClip "answer" in Frame 34
onClipEvent (load) {
_visible = false;
}
Frame 35
stop();
Instance of Symbol 231 MovieClip "answer" in Frame 35
onClipEvent (load) {
_visible = false;
}
Frame 36
stop();
Instance of Symbol 235 MovieClip "answer" in Frame 36
onClipEvent (load) {
_visible = false;
}
Frame 37
stop();
Instance of Symbol 239 MovieClip "answer" in Frame 37
onClipEvent (load) {
_visible = false;
}
Frame 38
stop();
Instance of Symbol 243 MovieClip "answer" in Frame 38
onClipEvent (load) {
_visible = false;
}
Frame 39
stop();
Instance of Symbol 247 MovieClip "answer" in Frame 39
onClipEvent (load) {
_visible = false;
}
Frame 40
stop();
Instance of Symbol 251 MovieClip "answer" in Frame 40
onClipEvent (load) {
_visible = false;
}
Frame 41
stop();
Instance of Symbol 255 MovieClip "answer" in Frame 41
onClipEvent (load) {
_visible = false;
}
Frame 42
stop();
Instance of Symbol 259 MovieClip "answer" in Frame 42
onClipEvent (load) {
_visible = false;
}
Frame 43
stop();
Instance of Symbol 263 MovieClip "answer" in Frame 43
onClipEvent (load) {
_visible = false;
}
Frame 44
stop();
Instance of Symbol 267 MovieClip "answer" in Frame 44
onClipEvent (load) {
_visible = false;
}
Frame 45
stop();
Instance of Symbol 271 MovieClip "answer" in Frame 45
onClipEvent (load) {
_visible = false;
}
Frame 46
stop();
Instance of Symbol 275 MovieClip "answer" in Frame 46
onClipEvent (load) {
_visible = false;
}
Frame 47
stop();
Instance of Symbol 279 MovieClip "answer" in Frame 47
onClipEvent (load) {
_visible = false;
}
Frame 48
stop();
Instance of Symbol 283 MovieClip "answer" in Frame 48
onClipEvent (load) {
_visible = false;
}
Frame 49
stop();
Instance of Symbol 287 MovieClip "answer" in Frame 49
onClipEvent (load) {
_visible = false;
}
Frame 50
stop();
Instance of Symbol 291 MovieClip "answer" in Frame 50
onClipEvent (load) {
_visible = false;
}
Frame 51
stop();
Instance of Symbol 295 MovieClip "answer" in Frame 51
onClipEvent (load) {
_visible = false;
}
Frame 52
stop();
Instance of Symbol 299 MovieClip "answer" in Frame 52
onClipEvent (load) {
_visible = false;
}
Frame 53
stop();
Instance of Symbol 303 MovieClip "answer" in Frame 53
onClipEvent (load) {
_visible = false;
}
Frame 54
stop();
Instance of Symbol 307 MovieClip "answer" in Frame 54
onClipEvent (load) {
_visible = false;
}
Frame 55
stop();
Instance of Symbol 311 MovieClip "answer" in Frame 55
onClipEvent (load) {
_visible = false;
}
Frame 56
stop();
Instance of Symbol 315 MovieClip "answer" in Frame 56
onClipEvent (load) {
_visible = false;
}
Frame 57
stop();
Instance of Symbol 319 MovieClip "answer" in Frame 57
onClipEvent (load) {
_visible = false;
}
Frame 58
stop();
Instance of Symbol 323 MovieClip "answer" in Frame 58
onClipEvent (load) {
_visible = false;
}
Frame 59
stop();
Instance of Symbol 327 MovieClip "answer" in Frame 59
onClipEvent (load) {
_visible = false;
}
Frame 60
stop();
Instance of Symbol 331 MovieClip "answer" in Frame 60
onClipEvent (load) {
_visible = false;
}
Frame 61
stop();
Instance of Symbol 335 MovieClip "answer" in Frame 61
onClipEvent (load) {
_visible = false;
}
Frame 62
stop();
Instance of Symbol 339 MovieClip "answer" in Frame 62
onClipEvent (load) {
_visible = false;
}
Frame 63
stop();
Instance of Symbol 343 MovieClip "answer" in Frame 63
onClipEvent (load) {
_visible = false;
}
Frame 64
stop();
Instance of Symbol 347 MovieClip "answer" in Frame 64
onClipEvent (load) {
_visible = false;
}
Frame 65
stop();
Instance of Symbol 351 MovieClip "answer" in Frame 65
onClipEvent (load) {
_visible = false;
}
Frame 66
stop();
Instance of Symbol 355 MovieClip "answer" in Frame 66
onClipEvent (load) {
_visible = false;
}
Frame 67
stop();
Instance of Symbol 359 MovieClip "answer" in Frame 67
onClipEvent (load) {
_visible = false;
}
Frame 68
stop();
Instance of Symbol 363 MovieClip "answer" in Frame 68
onClipEvent (load) {
_visible = false;
}
Frame 69
stop();
Instance of Symbol 367 MovieClip "answer" in Frame 69
onClipEvent (load) {
_visible = false;
}
Frame 70
stop();
Instance of Symbol 371 MovieClip "answer" in Frame 70
onClipEvent (load) {
_visible = false;
}
Frame 71
stop();
Instance of Symbol 375 MovieClip "answer" in Frame 71
onClipEvent (load) {
_visible = false;
}
Frame 72
stop();
Instance of Symbol 379 MovieClip "answer" in Frame 72
onClipEvent (load) {
_visible = false;
}
Frame 73
stop();
Instance of Symbol 383 MovieClip "answer" in Frame 73
onClipEvent (load) {
_visible = false;
}
Frame 74
stop();
Instance of Symbol 387 MovieClip "answer" in Frame 74
onClipEvent (load) {
_visible = false;
}
Frame 75
stop();
Instance of Symbol 391 MovieClip "answer" in Frame 75
onClipEvent (load) {
_visible = false;
}
Frame 76
stop();
Instance of Symbol 395 MovieClip "answer" in Frame 76
onClipEvent (load) {
_visible = false;
}
Frame 77
stop();
Instance of Symbol 399 MovieClip "answer" in Frame 77
onClipEvent (load) {
_visible = false;
}
Frame 78
stop();
Instance of Symbol 403 MovieClip "answer" in Frame 78
onClipEvent (load) {
_visible = false;
}
Frame 79
stop();
Instance of Symbol 407 MovieClip "answer" in Frame 79
onClipEvent (load) {
_visible = false;
}
Frame 80
stop();
Instance of Symbol 411 MovieClip "answer" in Frame 80
onClipEvent (load) {
_visible = false;
}
Frame 81
stop();
Instance of Symbol 415 MovieClip "answer" in Frame 81
onClipEvent (load) {
_visible = false;
}
Frame 82
stop();
Instance of Symbol 419 MovieClip "answer" in Frame 82
onClipEvent (load) {
_visible = false;
}
Frame 83
stop();
Instance of Symbol 423 MovieClip "answer" in Frame 83
onClipEvent (load) {
_visible = false;
}
Frame 84
stop();
Instance of Symbol 427 MovieClip "answer" in Frame 84
onClipEvent (load) {
_visible = false;
}
Frame 85
stop();
Instance of Symbol 431 MovieClip "answer" in Frame 85
onClipEvent (load) {
_visible = false;
}
Frame 86
stop();
Instance of Symbol 435 MovieClip "answer" in Frame 86
onClipEvent (load) {
_visible = false;
}
Frame 87
stop();
Instance of Symbol 439 MovieClip "answer" in Frame 87
onClipEvent (load) {
_visible = false;
}
Frame 88
stop();
Instance of Symbol 443 MovieClip "answer" in Frame 88
onClipEvent (load) {
_visible = false;
}
Frame 89
stop();
Instance of Symbol 447 MovieClip "answer" in Frame 89
onClipEvent (load) {
_visible = false;
}
Frame 90
stop();
Instance of Symbol 451 MovieClip "answer" in Frame 90
onClipEvent (load) {
_visible = false;
}
Frame 91
stop();
Instance of Symbol 455 MovieClip "answer" in Frame 91
onClipEvent (load) {
_visible = false;
}
Frame 92
stop();
Instance of Symbol 459 MovieClip "answer" in Frame 92
onClipEvent (load) {
_visible = false;
}
Frame 93
stop();
Instance of Symbol 62 MovieClip "answer" in Frame 93
onClipEvent (load) {
_visible = false;
}
Frame 94
stop();
Instance of Symbol 465 MovieClip "answer" in Frame 94
onClipEvent (load) {
_visible = false;
}
Frame 95
stop();
Instance of Symbol 469 MovieClip "answer" in Frame 95
onClipEvent (load) {
_visible = false;
}
Frame 96
stop();
Instance of Symbol 473 MovieClip "answer" in Frame 96
onClipEvent (load) {
_visible = false;
}
Frame 97
stop();
Instance of Symbol 477 MovieClip "answer" in Frame 97
onClipEvent (load) {
_visible = false;
}
Frame 98
stop();
Instance of Symbol 481 MovieClip "answer" in Frame 98
onClipEvent (load) {
_visible = false;
}
Frame 99
stop();
Instance of Symbol 485 MovieClip "answer" in Frame 99
onClipEvent (load) {
_visible = false;
}
Frame 100
stop();
Instance of Symbol 489 MovieClip "answer" in Frame 100
onClipEvent (load) {
_visible = false;
}
Frame 101
stop();
Instance of Symbol 493 MovieClip "answer" in Frame 101
onClipEvent (load) {
_visible = false;
}
Frame 102
stop();
Instance of Symbol 497 MovieClip "answer" in Frame 102
onClipEvent (load) {
_visible = false;
}
Frame 103
stop();
Instance of Symbol 501 MovieClip "answer" in Frame 103
onClipEvent (load) {
_visible = false;
}
Frame 104
stop();
Instance of Symbol 505 MovieClip "answer" in Frame 104
onClipEvent (load) {
_visible = false;
}
Frame 105
stop();
Instance of Symbol 509 MovieClip "answer" in Frame 105
onClipEvent (load) {
_visible = false;
}
Frame 106
stop();
Instance of Symbol 513 MovieClip "answer" in Frame 106
onClipEvent (load) {
_visible = false;
}
Frame 107
stop();
Instance of Symbol 517 MovieClip "answer" in Frame 107
onClipEvent (load) {
_visible = false;
}
Frame 108
stop();
Instance of Symbol 521 MovieClip "answer" in Frame 108
onClipEvent (load) {
_visible = false;
}
Frame 109
stop();
Instance of Symbol 525 MovieClip "answer" in Frame 109
onClipEvent (load) {
_visible = false;
}
Frame 110
stop();
Instance of Symbol 529 MovieClip "answer" in Frame 110
onClipEvent (load) {
_visible = false;
}
Frame 111
stop();
Instance of Symbol 533 MovieClip "answer" in Frame 111
onClipEvent (load) {
_visible = false;
}
Frame 112
stop();
Instance of Symbol 537 MovieClip "answer" in Frame 112
onClipEvent (load) {
_visible = false;
}
Frame 113
stop();
Instance of Symbol 541 MovieClip "answer" in Frame 113
onClipEvent (load) {
_visible = false;
}
Frame 114
stop();
Instance of Symbol 545 MovieClip "answer" in Frame 114
onClipEvent (load) {
_visible = false;
}
Frame 115
stop();
Instance of Symbol 549 MovieClip "answer" in Frame 115
onClipEvent (load) {
_visible = false;
}
Frame 116
stop();
Instance of Symbol 553 MovieClip "answer" in Frame 116
onClipEvent (load) {
_visible = false;
}
Frame 117
stop();
Instance of Symbol 557 MovieClip "answer" in Frame 117
onClipEvent (load) {
_visible = false;
}
Frame 118
stop();
Instance of Symbol 561 MovieClip "answer" in Frame 118
onClipEvent (load) {
_visible = false;
}
Frame 119
stop();
Instance of Symbol 565 MovieClip "answer" in Frame 119
onClipEvent (load) {
_visible = false;
}
Frame 120
stop();
Instance of Symbol 569 MovieClip "answer" in Frame 120
onClipEvent (load) {
_visible = false;
}
Frame 121
stop();
Instance of Symbol 573 MovieClip "answer" in Frame 121
onClipEvent (load) {
_visible = false;
}
Frame 122
stop();
Instance of Symbol 577 MovieClip "answer" in Frame 122
onClipEvent (load) {
_visible = false;
}
Frame 123
stop();
Instance of Symbol 581 MovieClip "answer" in Frame 123
onClipEvent (load) {
_visible = false;
}
Frame 124
stop();
Instance of Symbol 585 MovieClip "answer" in Frame 124
onClipEvent (load) {
_visible = false;
}
Frame 125
stop();
Instance of Symbol 589 MovieClip "answer" in Frame 125
onClipEvent (load) {
_visible = false;
}
Frame 126
stop();
Instance of Symbol 593 MovieClip "answer" in Frame 126
onClipEvent (load) {
_visible = false;
}
Frame 127
stop();
Instance of Symbol 597 MovieClip "answer" in Frame 127
onClipEvent (load) {
_visible = false;
}
Frame 128
stop();
Instance of Symbol 601 MovieClip "answer" in Frame 128
onClipEvent (load) {
_visible = false;
}
Frame 129
stop();
Instance of Symbol 605 MovieClip "answer" in Frame 129
onClipEvent (load) {
_visible = false;
}
Frame 130
stop();
Instance of Symbol 609 MovieClip "answer" in Frame 130
onClipEvent (load) {
_visible = false;
}
Frame 131
stop();
Instance of Symbol 613 MovieClip "answer" in Frame 131
onClipEvent (load) {
_visible = false;
}
Frame 132
stop();
Instance of Symbol 617 MovieClip "answer" in Frame 132
onClipEvent (load) {
_visible = false;
}
Frame 133
stop();
Instance of Symbol 621 MovieClip "answer" in Frame 133
onClipEvent (load) {
_visible = false;
}
Frame 134
stop();
Instance of Symbol 625 MovieClip "answer" in Frame 134
onClipEvent (load) {
_visible = false;
}
Frame 135
stop();
Instance of Symbol 629 MovieClip "answer" in Frame 135
onClipEvent (load) {
_visible = false;
}
Frame 136
stop();
Instance of Symbol 633 MovieClip "answer" in Frame 136
onClipEvent (load) {
_visible = false;
}
Frame 137
stop();
Instance of Symbol 637 MovieClip "answer" in Frame 137
onClipEvent (load) {
_visible = false;
}
Frame 138
stop();
Instance of Symbol 641 MovieClip "answer" in Frame 138
onClipEvent (load) {
_visible = false;
}
Frame 139
stop();
Instance of Symbol 645 MovieClip "answer" in Frame 139
onClipEvent (load) {
_visible = false;
}
Frame 140
stop();
Instance of Symbol 649 MovieClip "answer" in Frame 140
onClipEvent (load) {
_visible = false;
}
Frame 141
stop();
Instance of Symbol 653 MovieClip "answer" in Frame 141
onClipEvent (load) {
_visible = false;
}
Frame 142
stop();
Instance of Symbol 657 MovieClip "answer" in Frame 142
onClipEvent (load) {
_visible = false;
}
Frame 143
stop();
Instance of Symbol 661 MovieClip "answer" in Frame 143
onClipEvent (load) {
_visible = false;
}
Frame 144
stop();
Instance of Symbol 665 MovieClip "answer" in Frame 144
onClipEvent (load) {
_visible = false;
}
Frame 145
stop();
Instance of Symbol 669 MovieClip "answer" in Frame 145
onClipEvent (load) {
_visible = false;
}
Frame 146
stop();
Instance of Symbol 673 MovieClip "answer" in Frame 146
onClipEvent (load) {
_visible = false;
}
Frame 147
stop();
Instance of Symbol 677 MovieClip "answer" in Frame 147
onClipEvent (load) {
_visible = false;
}
Frame 148
stop();
Instance of Symbol 681 MovieClip "answer" in Frame 148
onClipEvent (load) {
_visible = false;
}
Frame 149
stop();
Instance of Symbol 685 MovieClip "answer" in Frame 149
onClipEvent (load) {
_visible = false;
}
Frame 150
stop();
Instance of Symbol 689 MovieClip "answer" in Frame 150
onClipEvent (load) {
_visible = false;
}
Frame 151
stop();
Instance of Symbol 693 MovieClip "answer" in Frame 151
onClipEvent (load) {
_visible = false;
}
Frame 152
stop();
Instance of Symbol 697 MovieClip "answer" in Frame 152
onClipEvent (load) {
_visible = false;
}
Frame 153
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?";
Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature.";
Question2 = "What is the major difference between a workstation and a server?";
Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network.";
Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?";
Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |.";
Question4 = "What command will show you the path of the directory you are currently working in?";
Answer4 = "The pwd command will show you the path of the directory you are currently in.";
Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?";
Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories.";
Question6 = "What is the purpose of awk?";
Answer6 = "It is a scripting language that provides complex pattern-matching facilities.";
Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?";
Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories.";
Question8 = "How can PAM be used to help restrict user access?";
Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password.";
Question9 = "Why is it dangerous to constantly log in as the root user?";
Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so.";
Question10 = "What command can be used to execute a single command with alternative permission?";
Answer10 = "The sudo command can be used to execute a single command with alternative permission.";
Question11 = "What utility allows you to edit disk quota information?";
Answer11 = "The edquota utility allows you to edit disk quota information.";
Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?";
Answer12 = "The chage command allows you to modify account settings relating to account expiration.";
Question13 = "What character does Linux use to symbolize the root directory?";
Answer13 = "The root directory is Linux is represented by /.";
Question14 = "Why would a RAID array be useful and what is it?";
Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data.";
Question15 = "What programs does Linux use to write to optical media?";
Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord.";
Question16 = "What is the purpose of the nice command?";
Answer16 = "It allows you to run a program with a specified priority.";
Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?";
Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection.";
Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?";
Answer18 = "The route add command is used to add an entry to the routing table.";
Question19 = "What is the purpose of creating a baseline?";
Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in.";
Question20 = "What does the output of the uptime utility show?";
Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes).";
Question21 = "What type of information is typically included in installation log files?";
Answer21 = "The names of packages installed and error messages";
Question22 = "How many serial ATA devices can fit on a single serial ATA chain?";
Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)";
Question23 = "What command is used to create a filesystem?";
Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer.";
Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?";
Answer24 = "Ghostscript";
Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?";
Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code.";
Question26 = "What software component determines whether Linux supports a given SCSI host adapter?";
Answer26 = "The Linux kernel";
Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?";
Answer27 = "In the BIOS, which is stored on a chip on the motherboard";
Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?";
Answer28 = "ls /usr/local/bin";
Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?";
Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't.";
Question30 = "How can you identify processes that consume an inordinate amount of CPU time?";
Answer30 = "The top utility or the ps utility with appropriate switches";
Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?";
Answer31 = "Type lilo to install a new boot loader that reflects your modifications.";
Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?";
Answer32 = "traceroute";
Question33 = "What system associates IP addresses with hostnames?";
Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers";
Question34 = "What's the most common type of local network hardware today?";
Answer34 = "Ethernet";
Question35 = "What program displays information on the jobs in a print queue?";
Answer35 = "lpq";
Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?";
Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions.";
Question37 = "What methods are most commonly used to shut down a Linux system?";
Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this.";
Question38 = "What types of problems most often generate kernel oops messages?";
Answer38 = "Hardware malfunctions and kernel bugs";
Question39 = "What do the Exim and Postfix programs have in common?";
Answer39 = "They're both SMTP mail servers.";
Question40 = "When should you set the root password?";
Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation.";
Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?";
Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition.";
Question42 = "What is accomplished by the command chmod a+x scriptfile?";
Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable.";
Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?";
Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password.";
Question44 = "When you configure a system to use a static IP address, what information do you enter manually?";
Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address";
Question45 = "What command can you use to discover how much space is being used by files in a specified directory?";
Answer45 = "du";
Question46 = "How can you locate stray files belonging to a user when deleting that user's account?";
Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504.";
Question47 = "In what two forms does Linux swap space generally come?";
Answer47 = "A dedicated swap partition or a swap file within a regular filesystem";
Question48 = "What pull protocols are most commonly used for e-mail retrieval?";
Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)";
Question49 = "Where do network servers typically record error messages?";
Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file";
Question50 = "What OSs can GRUB boot?";
Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS";
Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?";
Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally.";
Question52 = "Which common package management systems include support for dependency tracking?";
Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems";
Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?";
Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation.";
Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?";
Answer54 = "Samba";
Question55 = "Where can the GRUB boot loader code be installed?";
Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well.";
Question56 = "What function does the fsck program serve?";
Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)";
Question57 = "When a user reports a problem in a vague way, what should you do?";
Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself.";
Question58 = "What user IDs (UIDs) do ordinary user accounts use?";
Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher.";
Question59 = "What types of manipulations can you perform on a password base to make it more secure?";
Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words.";
Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?";
Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins.";
Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?";
Answer61 = "ifconfig eth0";
Question62 = "How do man pages and HOWTO documents differ?";
Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics.";
Question63 = "What is the most common choice of software to implement as a Web server in Linux?";
Answer63 = "Apache";
Question64 = "What type of mouse is ideal for use in Linux?";
Answer64 = "A three-button mouse; many X programs assume three buttons are available.";
Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?";
Answer65 = "apt-get";
Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?";
Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC.";
Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?";
Answer67 = "Reconfigure the kernel and recompile it from source code.";
Question68 = "What modes does the Vi editor support, and what are they for?";
Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text).";
Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?";
Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet.";
Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?";
Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS.";
Question71 = "Who should have access to password files stored on a floppy disk?";
Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files.";
Question72 = "Where is a good place to keep an administrator's logbook?";
Answer72 = "In a paper notebook near the computer";
Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?";
Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly.";
Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?";
Answer74 = "$ (preceding the variable name)";
Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?";
Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem.";
Question76 = "What method does the locate command use to find files?";
Answer76 = "It searches a database that it updates periodically via cron jobs.";
Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?";
Answer77 = "PC Card, aka PCMCIA";
Question78 = "What happens to a process if its parent is killed or exits?";
Answer78 = "It's adopted by another process (typically init).";
Question79 = "Why might you create a separate partition for /usr/local?";
Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks";
Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?";
Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A.";
Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?";
Answer81 = "mt";
Question82 = "What devices must be terminated in a SCSI chain?";
Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)";
Question83 = "What command is used to submit a print job in Linux?";
Answer83 = "lpr";
Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?";
Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)";
Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?";
Answer85 = "startx";
Question86 = "What does the mv command accomplish?";
Answer86 = "It moves or renames a file or directory.";
Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?";
Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic";
Question88 = "What file directs the Linux boot process after the kernel has loaded?";
Answer88 = "/etc/inittab";
Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?";
Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections.";
Question90 = "What major Linux distribution uses binary tarballs for package distribution?";
Answer90 = "Slackware";
Question91 = "What are the two most common busses that connect to plug-in cards?";
Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus.";
Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?";
Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers.";
Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?";
Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like";
Question94 = "What happens when you try to run a program that requires a library that's not installed?";
Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)";
Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?";
Answer95 = "hdparm, specifically its -X parameter";
Question96 = "What boot methods are commonly used by Linux installers?";
Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows.";
Question97 = "How much damage can intruders do if they are given physical access to a computer?";
Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer.";
Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?";
Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number.";
Question99 = "What does the /etc/inetd.conf file control?";
Answer99 = "The inetd server, which launches other servers only when those servers are needed";
Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?";
Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups";
Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?";
Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)";
Question102 = "What conditions must be met to use DHCP?";
Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network.";
Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?";
Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security.";
Question104 = "What are the names of two power management protocols common on laptop computers?";
Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)";
Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?";
Answer105 = "Ask your network administrator. Do not configure a system with a random IP address.";
Question106 = "Is the 2.6.9 kernel a development or a stable kernel?";
Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series.";
Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?";
Answer107 = "Delete george's accounts.";
Question108 = "When should you use shadow passwords?";
Answer108 = "Almost always; shadow passwords substantially improve local security.";
Question109 = "Who may change the owner of a file?";
Answer109 = "The file's current owner or root";
Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?";
Answer110 = "Patch and recompile your Linux kernel.";
Question111 = "What is necessary to give users the choice of using KDE or GNOME?";
Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts.";
Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?";
Answer112 = "A switch";
Question113 = "Where can you go to find out if your video card is supported by Linux?";
Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers.";
Question114 = "How do you tell kill what process you want to terminate?";
Answer114 = "You pass kill the target process's process ID (PID) number.";
Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?";
Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible.";
Question116 = "What does the TERM environment variable control?";
Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning";
Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?";
Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options.";
Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?";
Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display.";
Question119 = "What does the modprobe command do?";
Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends.";
Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?";
Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage.";
Question121 = "How do you tell Linux to install from a network server?";
Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution.";
Question122 = "What command removes a print job from a print queue?";
Answer122 = "lprm";
Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?";
Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely";
Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?";
Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this.";
Question125 = "In what file is group membership recorded?";
Answer125 = "/etc/group";
Question126 = "What command do you use to switch the current runlevel?";
Answer126 = "telinit";
Question127 = "Under what circumstances is Telnet a good remote administration tool?";
Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise.";
Question128 = "How do you create a user cron job?";
Answer128 = "Use the crontab program.";
Question129 = "Why might you want to delay creating user accounts until after installation?";
Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation.";
Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?";
Answer130 = "setserial";
Question131 = "What are the most important general-purpose log files on most Linux systems?";
Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)";
Question132 = "What three factors does X use to compute the refresh rate you'll see?";
Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution";
Question133 = "What type of information does the df command return?";
Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems";
Question134 = "What are the settings for serial ATA disks?";
Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically.";
Question135 = "Why are SUID root programs rare?";
Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program.";
Question136 = "What are some common sources of emergency disk sets?";
Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM";
Question137 = "You want to kill a process by name. What command can you use to do this?";
Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill.";
Question138 = "What backup medium is best suited to long-term archival storage, and why?";
Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)";
Question139 = "What tools are most commonly used to install or remove Debian packages?";
Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these";
Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?";
Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller.";
Question141 = "What kernel should you use to obtain support for many USB devices?";
Answer141 = "2.2.18 or later, or 2.4.0 or later";
Question142 = "What is the function of the tail command?";
Answer142 = "It displays the last few lines (10 by default) of a file.";
Question143 = "What types of errors will leave traces in system log files?";
Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes.";
Question144 = "What type of software can block access to any or all network ports on a computer?";
Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)";
Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?";
Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions.";
Question146 = "What does the cp command accomplish?";
Answer146 = "It copies one or more files.";
Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?";
Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question.";
Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?";
Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion.";
Question149 = "What is the best way to stop a server that was started through a SysV startup script?";
Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop.";
Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?";
Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job.";
stop();
stop();
Instance of Symbol 90 MovieClip "answer" in Frame 153
onClipEvent (load) {
_visible = false;
}
Frame 154
stop();
Instance of Symbol 107 MovieClip "answer" in Frame 154
onClipEvent (load) {
_visible = false;
}
Frame 155
stop();
Instance of Symbol 111 MovieClip "answer" in Frame 155
onClipEvent (load) {
_visible = false;
}
Frame 156
stop();
Instance of Symbol 115 MovieClip "answer" in Frame 156
onClipEvent (load) {
_visible = false;
}
Frame 157
stop();
Instance of Symbol 119 MovieClip "answer" in Frame 157
onClipEvent (load) {
_visible = false;
}
Frame 158
stop();
Instance of Symbol 123 MovieClip "answer" in Frame 158
onClipEvent (load) {
_visible = false;
}
Frame 159
stop();
Instance of Symbol 127 MovieClip "answer" in Frame 159
onClipEvent (load) {
_visible = false;
}
Frame 160
stop();
Instance of Symbol 131 MovieClip "answer" in Frame 160
onClipEvent (load) {
_visible = false;
}
Frame 161
stop();
Instance of Symbol 135 MovieClip "answer" in Frame 161
onClipEvent (load) {
_visible = false;
}
Frame 162
stop();
Instance of Symbol 139 MovieClip "answer" in Frame 162
onClipEvent (load) {
_visible = false;
}
Frame 163
stop();
Instance of Symbol 143 MovieClip "answer" in Frame 163
onClipEvent (load) {
_visible = false;
}
Frame 164
stop();
Instance of Symbol 147 MovieClip "answer" in Frame 164
onClipEvent (load) {
_visible = false;
}
Frame 165
stop();
Instance of Symbol 151 MovieClip "answer" in Frame 165
onClipEvent (load) {
_visible = false;
}
Frame 166
stop();
Instance of Symbol 155 MovieClip "answer" in Frame 166
onClipEvent (load) {
_visible = false;
}
Frame 167
stop();
Instance of Symbol 159 MovieClip "answer" in Frame 167
onClipEvent (load) {
_visible = false;
}
Frame 168
stop();
Instance of Symbol 163 MovieClip "answer" in Frame 168
onClipEvent (load) {
_visible = false;
}
Frame 169
stop();
Instance of Symbol 167 MovieClip "answer" in Frame 169
onClipEvent (load) {
_visible = false;
}
Frame 170
stop();
Instance of Symbol 171 MovieClip "answer" in Frame 170
onClipEvent (load) {
_visible = false;
}
Frame 171
stop();
Instance of Symbol 175 MovieClip "answer" in Frame 171
onClipEvent (load) {
_visible = false;
}
Frame 172
stop();
Instance of Symbol 179 MovieClip "answer" in Frame 172
onClipEvent (load) {
_visible = false;
}
Frame 173
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?";
Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature.";
Question2 = "What is the major difference between a workstation and a server?";
Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network.";
Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?";
Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |.";
Question4 = "What command will show you the path of the directory you are currently working in?";
Answer4 = "The pwd command will show you the path of the directory you are currently in.";
Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?";
Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories.";
Question6 = "What is the purpose of awk?";
Answer6 = "It is a scripting language that provides complex pattern-matching facilities.";
Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?";
Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories.";
Question8 = "How can PAM be used to help restrict user access?";
Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password.";
Question9 = "Why is it dangerous to constantly log in as the root user?";
Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so.";
Question10 = "What command can be used to execute a single command with alternative permission?";
Answer10 = "The sudo command can be used to execute a single command with alternative permission.";
Question11 = "What utility allows you to edit disk quota information?";
Answer11 = "The edquota utility allows you to edit disk quota information.";
Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?";
Answer12 = "The chage command allows you to modify account settings relating to account expiration.";
Question13 = "What character does Linux use to symbolize the root directory?";
Answer13 = "The root directory is Linux is represented by /.";
Question14 = "Why would a RAID array be useful and what is it?";
Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data.";
Question15 = "What programs does Linux use to write to optical media?";
Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord.";
Question16 = "What is the purpose of the nice command?";
Answer16 = "It allows you to run a program with a specified priority.";
Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?";
Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection.";
Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?";
Answer18 = "The route add command is used to add an entry to the routing table.";
Question19 = "What is the purpose of creating a baseline?";
Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in.";
Question20 = "What does the output of the uptime utility show?";
Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes).";
Question21 = "What type of information is typically included in installation log files?";
Answer21 = "The names of packages installed and error messages";
Question22 = "How many serial ATA devices can fit on a single serial ATA chain?";
Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)";
Question23 = "What command is used to create a filesystem?";
Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer.";
Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?";
Answer24 = "Ghostscript";
Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?";
Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code.";
Question26 = "What software component determines whether Linux supports a given SCSI host adapter?";
Answer26 = "The Linux kernel";
Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?";
Answer27 = "In the BIOS, which is stored on a chip on the motherboard";
Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?";
Answer28 = "ls /usr/local/bin";
Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?";
Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't.";
Question30 = "How can you identify processes that consume an inordinate amount of CPU time?";
Answer30 = "The top utility or the ps utility with appropriate switches";
Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?";
Answer31 = "Type lilo to install a new boot loader that reflects your modifications.";
Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?";
Answer32 = "traceroute";
Question33 = "What system associates IP addresses with hostnames?";
Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers";
Question34 = "What's the most common type of local network hardware today?";
Answer34 = "Ethernet";
Question35 = "What program displays information on the jobs in a print queue?";
Answer35 = "lpq";
Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?";
Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions.";
Question37 = "What methods are most commonly used to shut down a Linux system?";
Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this.";
Question38 = "What types of problems most often generate kernel oops messages?";
Answer38 = "Hardware malfunctions and kernel bugs";
Question39 = "What do the Exim and Postfix programs have in common?";
Answer39 = "They're both SMTP mail servers.";
Question40 = "When should you set the root password?";
Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation.";
Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?";
Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition.";
Question42 = "What is accomplished by the command chmod a+x scriptfile?";
Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable.";
Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?";
Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password.";
Question44 = "When you configure a system to use a static IP address, what information do you enter manually?";
Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address";
Question45 = "What command can you use to discover how much space is being used by files in a specified directory?";
Answer45 = "du";
Question46 = "How can you locate stray files belonging to a user when deleting that user's account?";
Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504.";
Question47 = "In what two forms does Linux swap space generally come?";
Answer47 = "A dedicated swap partition or a swap file within a regular filesystem";
Question48 = "What pull protocols are most commonly used for e-mail retrieval?";
Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)";
Question49 = "Where do network servers typically record error messages?";
Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file";
Question50 = "What OSs can GRUB boot?";
Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS";
Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?";
Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally.";
Question52 = "Which common package management systems include support for dependency tracking?";
Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems";
Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?";
Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation.";
Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?";
Answer54 = "Samba";
Question55 = "Where can the GRUB boot loader code be installed?";
Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well.";
Question56 = "What function does the fsck program serve?";
Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)";
Question57 = "When a user reports a problem in a vague way, what should you do?";
Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself.";
Question58 = "What user IDs (UIDs) do ordinary user accounts use?";
Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher.";
Question59 = "What types of manipulations can you perform on a password base to make it more secure?";
Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words.";
Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?";
Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins.";
Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?";
Answer61 = "ifconfig eth0";
Question62 = "How do man pages and HOWTO documents differ?";
Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics.";
Question63 = "What is the most common choice of software to implement as a Web server in Linux?";
Answer63 = "Apache";
Question64 = "What type of mouse is ideal for use in Linux?";
Answer64 = "A three-button mouse; many X programs assume three buttons are available.";
Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?";
Answer65 = "apt-get";
Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?";
Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC.";
Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?";
Answer67 = "Reconfigure the kernel and recompile it from source code.";
Question68 = "What modes does the Vi editor support, and what are they for?";
Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text).";
Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?";
Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet.";
Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?";
Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS.";
Question71 = "Who should have access to password files stored on a floppy disk?";
Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files.";
Question72 = "Where is a good place to keep an administrator's logbook?";
Answer72 = "In a paper notebook near the computer";
Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?";
Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly.";
Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?";
Answer74 = "$ (preceding the variable name)";
Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?";
Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem.";
Question76 = "What method does the locate command use to find files?";
Answer76 = "It searches a database that it updates periodically via cron jobs.";
Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?";
Answer77 = "PC Card, aka PCMCIA";
Question78 = "What happens to a process if its parent is killed or exits?";
Answer78 = "It's adopted by another process (typically init).";
Question79 = "Why might you create a separate partition for /usr/local?";
Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks";
Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?";
Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A.";
Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?";
Answer81 = "mt";
Question82 = "What devices must be terminated in a SCSI chain?";
Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)";
Question83 = "What command is used to submit a print job in Linux?";
Answer83 = "lpr";
Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?";
Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)";
Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?";
Answer85 = "startx";
Question86 = "What does the mv command accomplish?";
Answer86 = "It moves or renames a file or directory.";
Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?";
Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic";
Question88 = "What file directs the Linux boot process after the kernel has loaded?";
Answer88 = "/etc/inittab";
Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?";
Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections.";
Question90 = "What major Linux distribution uses binary tarballs for package distribution?";
Answer90 = "Slackware";
Question91 = "What are the two most common busses that connect to plug-in cards?";
Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus.";
Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?";
Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers.";
Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?";
Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like";
Question94 = "What happens when you try to run a program that requires a library that's not installed?";
Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)";
Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?";
Answer95 = "hdparm, specifically its -X parameter";
Question96 = "What boot methods are commonly used by Linux installers?";
Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows.";
Question97 = "How much damage can intruders do if they are given physical access to a computer?";
Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer.";
Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?";
Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number.";
Question99 = "What does the /etc/inetd.conf file control?";
Answer99 = "The inetd server, which launches other servers only when those servers are needed";
Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?";
Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups";
Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?";
Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)";
Question102 = "What conditions must be met to use DHCP?";
Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network.";
Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?";
Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security.";
Question104 = "What are the names of two power management protocols common on laptop computers?";
Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)";
Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?";
Answer105 = "Ask your network administrator. Do not configure a system with a random IP address.";
Question106 = "Is the 2.6.9 kernel a development or a stable kernel?";
Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series.";
Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?";
Answer107 = "Delete george's accounts.";
Question108 = "When should you use shadow passwords?";
Answer108 = "Almost always; shadow passwords substantially improve local security.";
Question109 = "Who may change the owner of a file?";
Answer109 = "The file's current owner or root";
Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?";
Answer110 = "Patch and recompile your Linux kernel.";
Question111 = "What is necessary to give users the choice of using KDE or GNOME?";
Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts.";
Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?";
Answer112 = "A switch";
Question113 = "Where can you go to find out if your video card is supported by Linux?";
Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers.";
Question114 = "How do you tell kill what process you want to terminate?";
Answer114 = "You pass kill the target process's process ID (PID) number.";
Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?";
Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible.";
Question116 = "What does the TERM environment variable control?";
Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning";
Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?";
Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options.";
Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?";
Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display.";
Question119 = "What does the modprobe command do?";
Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends.";
Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?";
Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage.";
Question121 = "How do you tell Linux to install from a network server?";
Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution.";
Question122 = "What command removes a print job from a print queue?";
Answer122 = "lprm";
Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?";
Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely";
Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?";
Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this.";
Question125 = "In what file is group membership recorded?";
Answer125 = "/etc/group";
Question126 = "What command do you use to switch the current runlevel?";
Answer126 = "telinit";
Question127 = "Under what circumstances is Telnet a good remote administration tool?";
Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise.";
Question128 = "How do you create a user cron job?";
Answer128 = "Use the crontab program.";
Question129 = "Why might you want to delay creating user accounts until after installation?";
Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation.";
Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?";
Answer130 = "setserial";
Question131 = "What are the most important general-purpose log files on most Linux systems?";
Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)";
Question132 = "What three factors does X use to compute the refresh rate you'll see?";
Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution";
Question133 = "What type of information does the df command return?";
Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems";
Question134 = "What are the settings for serial ATA disks?";
Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically.";
Question135 = "Why are SUID root programs rare?";
Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program.";
Question136 = "What are some common sources of emergency disk sets?";
Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM";
Question137 = "You want to kill a process by name. What command can you use to do this?";
Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill.";
Question138 = "What backup medium is best suited to long-term archival storage, and why?";
Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)";
Question139 = "What tools are most commonly used to install or remove Debian packages?";
Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these";
Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?";
Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller.";
Question141 = "What kernel should you use to obtain support for many USB devices?";
Answer141 = "2.2.18 or later, or 2.4.0 or later";
Question142 = "What is the function of the tail command?";
Answer142 = "It displays the last few lines (10 by default) of a file.";
Question143 = "What types of errors will leave traces in system log files?";
Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes.";
Question144 = "What type of software can block access to any or all network ports on a computer?";
Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)";
Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?";
Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions.";
Question146 = "What does the cp command accomplish?";
Answer146 = "It copies one or more files.";
Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?";
Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question.";
Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?";
Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion.";
Question149 = "What is the best way to stop a server that was started through a SysV startup script?";
Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop.";
Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?";
Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job.";
stop();
stop();
Instance of Symbol 183 MovieClip "answer" in Frame 173
onClipEvent (load) {
_visible = false;
}
Frame 174
stop();
Instance of Symbol 187 MovieClip "answer" in Frame 174
onClipEvent (load) {
_visible = false;
}
Frame 175
stop();
Instance of Symbol 191 MovieClip "answer" in Frame 175
onClipEvent (load) {
_visible = false;
}
Frame 176
stop();
Instance of Symbol 195 MovieClip "answer" in Frame 176
onClipEvent (load) {
_visible = false;
}
Frame 177
stop();
Instance of Symbol 199 MovieClip "answer" in Frame 177
onClipEvent (load) {
_visible = false;
}
Frame 178
stop();
Instance of Symbol 203 MovieClip "answer" in Frame 178
onClipEvent (load) {
_visible = false;
}
Frame 179
stop();
Instance of Symbol 207 MovieClip "answer" in Frame 179
onClipEvent (load) {
_visible = false;
}
Frame 180
stop();
Instance of Symbol 211 MovieClip "answer" in Frame 180
onClipEvent (load) {
_visible = false;
}
Frame 181
stop();
Instance of Symbol 215 MovieClip "answer" in Frame 181
onClipEvent (load) {
_visible = false;
}
Frame 182
stop();
Instance of Symbol 219 MovieClip "answer" in Frame 182
onClipEvent (load) {
_visible = false;
}
Frame 183
stop();
Instance of Symbol 223 MovieClip "answer" in Frame 183
onClipEvent (load) {
_visible = false;
}
Frame 184
stop();
Instance of Symbol 227 MovieClip "answer" in Frame 184
onClipEvent (load) {
_visible = false;
}
Frame 185
stop();
Instance of Symbol 231 MovieClip "answer" in Frame 185
onClipEvent (load) {
_visible = false;
}
Frame 186
stop();
Instance of Symbol 235 MovieClip "answer" in Frame 186
onClipEvent (load) {
_visible = false;
}
Frame 187
stop();
Instance of Symbol 239 MovieClip "answer" in Frame 187
onClipEvent (load) {
_visible = false;
}
Frame 188
stop();
Instance of Symbol 243 MovieClip "answer" in Frame 188
onClipEvent (load) {
_visible = false;
}
Frame 189
stop();
Instance of Symbol 247 MovieClip "answer" in Frame 189
onClipEvent (load) {
_visible = false;
}
Frame 190
stop();
Instance of Symbol 251 MovieClip "answer" in Frame 190
onClipEvent (load) {
_visible = false;
}
Frame 191
stop();
Instance of Symbol 255 MovieClip "answer" in Frame 191
onClipEvent (load) {
_visible = false;
}
Frame 192
stop();
Instance of Symbol 259 MovieClip "answer" in Frame 192
onClipEvent (load) {
_visible = false;
}
Frame 193
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?";
Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature.";
Question2 = "What is the major difference between a workstation and a server?";
Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network.";
Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?";
Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |.";
Question4 = "What command will show you the path of the directory you are currently working in?";
Answer4 = "The pwd command will show you the path of the directory you are currently in.";
Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?";
Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories.";
Question6 = "What is the purpose of awk?";
Answer6 = "It is a scripting language that provides complex pattern-matching facilities.";
Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?";
Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories.";
Question8 = "How can PAM be used to help restrict user access?";
Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password.";
Question9 = "Why is it dangerous to constantly log in as the root user?";
Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so.";
Question10 = "What command can be used to execute a single command with alternative permission?";
Answer10 = "The sudo command can be used to execute a single command with alternative permission.";
Question11 = "What utility allows you to edit disk quota information?";
Answer11 = "The edquota utility allows you to edit disk quota information.";
Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?";
Answer12 = "The chage command allows you to modify account settings relating to account expiration.";
Question13 = "What character does Linux use to symbolize the root directory?";
Answer13 = "The root directory is Linux is represented by /.";
Question14 = "Why would a RAID array be useful and what is it?";
Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data.";
Question15 = "What programs does Linux use to write to optical media?";
Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord.";
Question16 = "What is the purpose of the nice command?";
Answer16 = "It allows you to run a program with a specified priority.";
Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?";
Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection.";
Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?";
Answer18 = "The route add command is used to add an entry to the routing table.";
Question19 = "What is the purpose of creating a baseline?";
Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in.";
Question20 = "What does the output of the uptime utility show?";
Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes).";
Question21 = "What type of information is typically included in installation log files?";
Answer21 = "The names of packages installed and error messages";
Question22 = "How many serial ATA devices can fit on a single serial ATA chain?";
Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)";
Question23 = "What command is used to create a filesystem?";
Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer.";
Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?";
Answer24 = "Ghostscript";
Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?";
Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code.";
Question26 = "What software component determines whether Linux supports a given SCSI host adapter?";
Answer26 = "The Linux kernel";
Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?";
Answer27 = "In the BIOS, which is stored on a chip on the motherboard";
Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?";
Answer28 = "ls /usr/local/bin";
Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?";
Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't.";
Question30 = "How can you identify processes that consume an inordinate amount of CPU time?";
Answer30 = "The top utility or the ps utility with appropriate switches";
Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?";
Answer31 = "Type lilo to install a new boot loader that reflects your modifications.";
Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?";
Answer32 = "traceroute";
Question33 = "What system associates IP addresses with hostnames?";
Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers";
Question34 = "What's the most common type of local network hardware today?";
Answer34 = "Ethernet";
Question35 = "What program displays information on the jobs in a print queue?";
Answer35 = "lpq";
Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?";
Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions.";
Question37 = "What methods are most commonly used to shut down a Linux system?";
Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this.";
Question38 = "What types of problems most often generate kernel oops messages?";
Answer38 = "Hardware malfunctions and kernel bugs";
Question39 = "What do the Exim and Postfix programs have in common?";
Answer39 = "They're both SMTP mail servers.";
Question40 = "When should you set the root password?";
Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation.";
Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?";
Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition.";
Question42 = "What is accomplished by the command chmod a+x scriptfile?";
Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable.";
Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?";
Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password.";
Question44 = "When you configure a system to use a static IP address, what information do you enter manually?";
Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address";
Question45 = "What command can you use to discover how much space is being used by files in a specified directory?";
Answer45 = "du";
Question46 = "How can you locate stray files belonging to a user when deleting that user's account?";
Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504.";
Question47 = "In what two forms does Linux swap space generally come?";
Answer47 = "A dedicated swap partition or a swap file within a regular filesystem";
Question48 = "What pull protocols are most commonly used for e-mail retrieval?";
Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)";
Question49 = "Where do network servers typically record error messages?";
Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file";
Question50 = "What OSs can GRUB boot?";
Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS";
Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?";
Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally.";
Question52 = "Which common package management systems include support for dependency tracking?";
Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems";
Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?";
Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation.";
Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?";
Answer54 = "Samba";
Question55 = "Where can the GRUB boot loader code be installed?";
Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well.";
Question56 = "What function does the fsck program serve?";
Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)";
Question57 = "When a user reports a problem in a vague way, what should you do?";
Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself.";
Question58 = "What user IDs (UIDs) do ordinary user accounts use?";
Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher.";
Question59 = "What types of manipulations can you perform on a password base to make it more secure?";
Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words.";
Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?";
Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins.";
Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?";
Answer61 = "ifconfig eth0";
Question62 = "How do man pages and HOWTO documents differ?";
Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics.";
Question63 = "What is the most common choice of software to implement as a Web server in Linux?";
Answer63 = "Apache";
Question64 = "What type of mouse is ideal for use in Linux?";
Answer64 = "A three-button mouse; many X programs assume three buttons are available.";
Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?";
Answer65 = "apt-get";
Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?";
Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC.";
Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?";
Answer67 = "Reconfigure the kernel and recompile it from source code.";
Question68 = "What modes does the Vi editor support, and what are they for?";
Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text).";
Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?";
Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet.";
Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?";
Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS.";
Question71 = "Who should have access to password files stored on a floppy disk?";
Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files.";
Question72 = "Where is a good place to keep an administrator's logbook?";
Answer72 = "In a paper notebook near the computer";
Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?";
Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly.";
Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?";
Answer74 = "$ (preceding the variable name)";
Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?";
Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem.";
Question76 = "What method does the locate command use to find files?";
Answer76 = "It searches a database that it updates periodically via cron jobs.";
Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?";
Answer77 = "PC Card, aka PCMCIA";
Question78 = "What happens to a process if its parent is killed or exits?";
Answer78 = "It's adopted by another process (typically init).";
Question79 = "Why might you create a separate partition for /usr/local?";
Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks";
Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?";
Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A.";
Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?";
Answer81 = "mt";
Question82 = "What devices must be terminated in a SCSI chain?";
Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)";
Question83 = "What command is used to submit a print job in Linux?";
Answer83 = "lpr";
Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?";
Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)";
Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?";
Answer85 = "startx";
Question86 = "What does the mv command accomplish?";
Answer86 = "It moves or renames a file or directory.";
Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?";
Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic";
Question88 = "What file directs the Linux boot process after the kernel has loaded?";
Answer88 = "/etc/inittab";
Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?";
Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections.";
Question90 = "What major Linux distribution uses binary tarballs for package distribution?";
Answer90 = "Slackware";
Question91 = "What are the two most common busses that connect to plug-in cards?";
Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus.";
Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?";
Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers.";
Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?";
Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like";
Question94 = "What happens when you try to run a program that requires a library that's not installed?";
Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)";
Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?";
Answer95 = "hdparm, specifically its -X parameter";
Question96 = "What boot methods are commonly used by Linux installers?";
Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows.";
Question97 = "How much damage can intruders do if they are given physical access to a computer?";
Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer.";
Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?";
Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number.";
Question99 = "What does the /etc/inetd.conf file control?";
Answer99 = "The inetd server, which launches other servers only when those servers are needed";
Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?";
Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups";
Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?";
Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)";
Question102 = "What conditions must be met to use DHCP?";
Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network.";
Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?";
Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security.";
Question104 = "What are the names of two power management protocols common on laptop computers?";
Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)";
Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?";
Answer105 = "Ask your network administrator. Do not configure a system with a random IP address.";
Question106 = "Is the 2.6.9 kernel a development or a stable kernel?";
Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series.";
Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?";
Answer107 = "Delete george's accounts.";
Question108 = "When should you use shadow passwords?";
Answer108 = "Almost always; shadow passwords substantially improve local security.";
Question109 = "Who may change the owner of a file?";
Answer109 = "The file's current owner or root";
Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?";
Answer110 = "Patch and recompile your Linux kernel.";
Question111 = "What is necessary to give users the choice of using KDE or GNOME?";
Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts.";
Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?";
Answer112 = "A switch";
Question113 = "Where can you go to find out if your video card is supported by Linux?";
Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers.";
Question114 = "How do you tell kill what process you want to terminate?";
Answer114 = "You pass kill the target process's process ID (PID) number.";
Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?";
Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible.";
Question116 = "What does the TERM environment variable control?";
Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning";
Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?";
Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options.";
Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?";
Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display.";
Question119 = "What does the modprobe command do?";
Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends.";
Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?";
Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage.";
Question121 = "How do you tell Linux to install from a network server?";
Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution.";
Question122 = "What command removes a print job from a print queue?";
Answer122 = "lprm";
Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?";
Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely";
Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?";
Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this.";
Question125 = "In what file is group membership recorded?";
Answer125 = "/etc/group";
Question126 = "What command do you use to switch the current runlevel?";
Answer126 = "telinit";
Question127 = "Under what circumstances is Telnet a good remote administration tool?";
Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise.";
Question128 = "How do you create a user cron job?";
Answer128 = "Use the crontab program.";
Question129 = "Why might you want to delay creating user accounts until after installation?";
Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation.";
Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?";
Answer130 = "setserial";
Question131 = "What are the most important general-purpose log files on most Linux systems?";
Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)";
Question132 = "What three factors does X use to compute the refresh rate you'll see?";
Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution";
Question133 = "What type of information does the df command return?";
Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems";
Question134 = "What are the settings for serial ATA disks?";
Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically.";
Question135 = "Why are SUID root programs rare?";
Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program.";
Question136 = "What are some common sources of emergency disk sets?";
Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM";
Question137 = "You want to kill a process by name. What command can you use to do this?";
Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill.";
Question138 = "What backup medium is best suited to long-term archival storage, and why?";
Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)";
Question139 = "What tools are most commonly used to install or remove Debian packages?";
Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these";
Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?";
Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller.";
Question141 = "What kernel should you use to obtain support for many USB devices?";
Answer141 = "2.2.18 or later, or 2.4.0 or later";
Question142 = "What is the function of the tail command?";
Answer142 = "It displays the last few lines (10 by default) of a file.";
Question143 = "What types of errors will leave traces in system log files?";
Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes.";
Question144 = "What type of software can block access to any or all network ports on a computer?";
Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)";
Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?";
Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions.";
Question146 = "What does the cp command accomplish?";
Answer146 = "It copies one or more files.";
Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?";
Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question.";
Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?";
Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion.";
Question149 = "What is the best way to stop a server that was started through a SysV startup script?";
Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop.";
Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?";
Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job.";
stop();
stop();
Instance of Symbol 263 MovieClip "answer" in Frame 193
onClipEvent (load) {
_visible = false;
}
Frame 194
stop();
Instance of Symbol 267 MovieClip "answer" in Frame 194
onClipEvent (load) {
_visible = false;
}
Frame 195
stop();
Instance of Symbol 271 MovieClip "answer" in Frame 195
onClipEvent (load) {
_visible = false;
}
Frame 196
stop();
Instance of Symbol 275 MovieClip "answer" in Frame 196
onClipEvent (load) {
_visible = false;
}
Frame 197
stop();
Instance of Symbol 279 MovieClip "answer" in Frame 197
onClipEvent (load) {
_visible = false;
}
Frame 198
stop();
Instance of Symbol 283 MovieClip "answer" in Frame 198
onClipEvent (load) {
_visible = false;
}
Frame 199
stop();
Instance of Symbol 287 MovieClip "answer" in Frame 199
onClipEvent (load) {
_visible = false;
}
Frame 200
stop();
Instance of Symbol 291 MovieClip "answer" in Frame 200
onClipEvent (load) {
_visible = false;
}
Frame 201
stop();
Instance of Symbol 295 MovieClip "answer" in Frame 201
onClipEvent (load) {
_visible = false;
}
Frame 202
stop();
Instance of Symbol 299 MovieClip "answer" in Frame 202
onClipEvent (load) {
_visible = false;
}
Frame 203
stop();
Instance of Symbol 303 MovieClip "answer" in Frame 203
onClipEvent (load) {
_visible = false;
}
Frame 204
stop();
Instance of Symbol 307 MovieClip "answer" in Frame 204
onClipEvent (load) {
_visible = false;
}
Frame 205
stop();
Instance of Symbol 311 MovieClip "answer" in Frame 205
onClipEvent (load) {
_visible = false;
}
Frame 206
stop();
Instance of Symbol 315 MovieClip "answer" in Frame 206
onClipEvent (load) {
_visible = false;
}
Frame 207
stop();
Instance of Symbol 319 MovieClip "answer" in Frame 207
onClipEvent (load) {
_visible = false;
}
Frame 208
stop();
Instance of Symbol 323 MovieClip "answer" in Frame 208
onClipEvent (load) {
_visible = false;
}
Frame 209
stop();
Instance of Symbol 327 MovieClip "answer" in Frame 209
onClipEvent (load) {
_visible = false;
}
Frame 210
stop();
Instance of Symbol 331 MovieClip "answer" in Frame 210
onClipEvent (load) {
_visible = false;
}
Frame 211
stop();
Instance of Symbol 335 MovieClip "answer" in Frame 211
onClipEvent (load) {
_visible = false;
}
Frame 212
stop();
Instance of Symbol 339 MovieClip "answer" in Frame 212
onClipEvent (load) {
_visible = false;
}
Frame 213
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?";
Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature.";
Question2 = "What is the major difference between a workstation and a server?";
Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network.";
Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?";
Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |.";
Question4 = "What command will show you the path of the directory you are currently working in?";
Answer4 = "The pwd command will show you the path of the directory you are currently in.";
Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?";
Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories.";
Question6 = "What is the purpose of awk?";
Answer6 = "It is a scripting language that provides complex pattern-matching facilities.";
Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?";
Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories.";
Question8 = "How can PAM be used to help restrict user access?";
Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password.";
Question9 = "Why is it dangerous to constantly log in as the root user?";
Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so.";
Question10 = "What command can be used to execute a single command with alternative permission?";
Answer10 = "The sudo command can be used to execute a single command with alternative permission.";
Question11 = "What utility allows you to edit disk quota information?";
Answer11 = "The edquota utility allows you to edit disk quota information.";
Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?";
Answer12 = "The chage command allows you to modify account settings relating to account expiration.";
Question13 = "What character does Linux use to symbolize the root directory?";
Answer13 = "The root directory is Linux is represented by /.";
Question14 = "Why would a RAID array be useful and what is it?";
Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data.";
Question15 = "What programs does Linux use to write to optical media?";
Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord.";
Question16 = "What is the purpose of the nice command?";
Answer16 = "It allows you to run a program with a specified priority.";
Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?";
Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection.";
Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?";
Answer18 = "The route add command is used to add an entry to the routing table.";
Question19 = "What is the purpose of creating a baseline?";
Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in.";
Question20 = "What does the output of the uptime utility show?";
Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes).";
Question21 = "What type of information is typically included in installation log files?";
Answer21 = "The names of packages installed and error messages";
Question22 = "How many serial ATA devices can fit on a single serial ATA chain?";
Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)";
Question23 = "What command is used to create a filesystem?";
Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer.";
Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?";
Answer24 = "Ghostscript";
Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?";
Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code.";
Question26 = "What software component determines whether Linux supports a given SCSI host adapter?";
Answer26 = "The Linux kernel";
Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?";
Answer27 = "In the BIOS, which is stored on a chip on the motherboard";
Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?";
Answer28 = "ls /usr/local/bin";
Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?";
Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't.";
Question30 = "How can you identify processes that consume an inordinate amount of CPU time?";
Answer30 = "The top utility or the ps utility with appropriate switches";
Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?";
Answer31 = "Type lilo to install a new boot loader that reflects your modifications.";
Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?";
Answer32 = "traceroute";
Question33 = "What system associates IP addresses with hostnames?";
Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers";
Question34 = "What's the most common type of local network hardware today?";
Answer34 = "Ethernet";
Question35 = "What program displays information on the jobs in a print queue?";
Answer35 = "lpq";
Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?";
Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions.";
Question37 = "What methods are most commonly used to shut down a Linux system?";
Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this.";
Question38 = "What types of problems most often generate kernel oops messages?";
Answer38 = "Hardware malfunctions and kernel bugs";
Question39 = "What do the Exim and Postfix programs have in common?";
Answer39 = "They're both SMTP mail servers.";
Question40 = "When should you set the root password?";
Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation.";
Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?";
Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition.";
Question42 = "What is accomplished by the command chmod a+x scriptfile?";
Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable.";
Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?";
Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password.";
Question44 = "When you configure a system to use a static IP address, what information do you enter manually?";
Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address";
Question45 = "What command can you use to discover how much space is being used by files in a specified directory?";
Answer45 = "du";
Question46 = "How can you locate stray files belonging to a user when deleting that user's account?";
Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504.";
Question47 = "In what two forms does Linux swap space generally come?";
Answer47 = "A dedicated swap partition or a swap file within a regular filesystem";
Question48 = "What pull protocols are most commonly used for e-mail retrieval?";
Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)";
Question49 = "Where do network servers typically record error messages?";
Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file";
Question50 = "What OSs can GRUB boot?";
Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS";
Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?";
Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally.";
Question52 = "Which common package management systems include support for dependency tracking?";
Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems";
Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?";
Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation.";
Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?";
Answer54 = "Samba";
Question55 = "Where can the GRUB boot loader code be installed?";
Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well.";
Question56 = "What function does the fsck program serve?";
Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)";
Question57 = "When a user reports a problem in a vague way, what should you do?";
Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself.";
Question58 = "What user IDs (UIDs) do ordinary user accounts use?";
Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher.";
Question59 = "What types of manipulations can you perform on a password base to make it more secure?";
Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words.";
Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?";
Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins.";
Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?";
Answer61 = "ifconfig eth0";
Question62 = "How do man pages and HOWTO documents differ?";
Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics.";
Question63 = "What is the most common choice of software to implement as a Web server in Linux?";
Answer63 = "Apache";
Question64 = "What type of mouse is ideal for use in Linux?";
Answer64 = "A three-button mouse; many X programs assume three buttons are available.";
Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?";
Answer65 = "apt-get";
Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?";
Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC.";
Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?";
Answer67 = "Reconfigure the kernel and recompile it from source code.";
Question68 = "What modes does the Vi editor support, and what are they for?";
Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text).";
Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?";
Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet.";
Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?";
Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS.";
Question71 = "Who should have access to password files stored on a floppy disk?";
Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files.";
Question72 = "Where is a good place to keep an administrator's logbook?";
Answer72 = "In a paper notebook near the computer";
Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?";
Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly.";
Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?";
Answer74 = "$ (preceding the variable name)";
Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?";
Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem.";
Question76 = "What method does the locate command use to find files?";
Answer76 = "It searches a database that it updates periodically via cron jobs.";
Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?";
Answer77 = "PC Card, aka PCMCIA";
Question78 = "What happens to a process if its parent is killed or exits?";
Answer78 = "It's adopted by another process (typically init).";
Question79 = "Why might you create a separate partition for /usr/local?";
Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks";
Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?";
Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A.";
Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?";
Answer81 = "mt";
Question82 = "What devices must be terminated in a SCSI chain?";
Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)";
Question83 = "What command is used to submit a print job in Linux?";
Answer83 = "lpr";
Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?";
Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)";
Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?";
Answer85 = "startx";
Question86 = "What does the mv command accomplish?";
Answer86 = "It moves or renames a file or directory.";
Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?";
Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic";
Question88 = "What file directs the Linux boot process after the kernel has loaded?";
Answer88 = "/etc/inittab";
Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?";
Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections.";
Question90 = "What major Linux distribution uses binary tarballs for package distribution?";
Answer90 = "Slackware";
Question91 = "What are the two most common busses that connect to plug-in cards?";
Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus.";
Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?";
Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers.";
Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?";
Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like";
Question94 = "What happens when you try to run a program that requires a library that's not installed?";
Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)";
Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?";
Answer95 = "hdparm, specifically its -X parameter";
Question96 = "What boot methods are commonly used by Linux installers?";
Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows.";
Question97 = "How much damage can intruders do if they are given physical access to a computer?";
Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer.";
Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?";
Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number.";
Question99 = "What does the /etc/inetd.conf file control?";
Answer99 = "The inetd server, which launches other servers only when those servers are needed";
Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?";
Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups";
Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?";
Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)";
Question102 = "What conditions must be met to use DHCP?";
Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network.";
Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?";
Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security.";
Question104 = "What are the names of two power management protocols common on laptop computers?";
Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)";
Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?";
Answer105 = "Ask your network administrator. Do not configure a system with a random IP address.";
Question106 = "Is the 2.6.9 kernel a development or a stable kernel?";
Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series.";
Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?";
Answer107 = "Delete george's accounts.";
Question108 = "When should you use shadow passwords?";
Answer108 = "Almost always; shadow passwords substantially improve local security.";
Question109 = "Who may change the owner of a file?";
Answer109 = "The file's current owner or root";
Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?";
Answer110 = "Patch and recompile your Linux kernel.";
Question111 = "What is necessary to give users the choice of using KDE or GNOME?";
Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts.";
Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?";
Answer112 = "A switch";
Question113 = "Where can you go to find out if your video card is supported by Linux?";
Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers.";
Question114 = "How do you tell kill what process you want to terminate?";
Answer114 = "You pass kill the target process's process ID (PID) number.";
Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?";
Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible.";
Question116 = "What does the TERM environment variable control?";
Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning";
Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?";
Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options.";
Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?";
Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display.";
Question119 = "What does the modprobe command do?";
Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends.";
Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?";
Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage.";
Question121 = "How do you tell Linux to install from a network server?";
Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution.";
Question122 = "What command removes a print job from a print queue?";
Answer122 = "lprm";
Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?";
Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely";
Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?";
Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this.";
Question125 = "In what file is group membership recorded?";
Answer125 = "/etc/group";
Question126 = "What command do you use to switch the current runlevel?";
Answer126 = "telinit";
Question127 = "Under what circumstances is Telnet a good remote administration tool?";
Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise.";
Question128 = "How do you create a user cron job?";
Answer128 = "Use the crontab program.";
Question129 = "Why might you want to delay creating user accounts until after installation?";
Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation.";
Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?";
Answer130 = "setserial";
Question131 = "What are the most important general-purpose log files on most Linux systems?";
Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)";
Question132 = "What three factors does X use to compute the refresh rate you'll see?";
Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution";
Question133 = "What type of information does the df command return?";
Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems";
Question134 = "What are the settings for serial ATA disks?";
Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically.";
Question135 = "Why are SUID root programs rare?";
Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program.";
Question136 = "What are some common sources of emergency disk sets?";
Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM";
Question137 = "You want to kill a process by name. What command can you use to do this?";
Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill.";
Question138 = "What backup medium is best suited to long-term archival storage, and why?";
Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)";
Question139 = "What tools are most commonly used to install or remove Debian packages?";
Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these";
Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?";
Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller.";
Question141 = "What kernel should you use to obtain support for many USB devices?";
Answer141 = "2.2.18 or later, or 2.4.0 or later";
Question142 = "What is the function of the tail command?";
Answer142 = "It displays the last few lines (10 by default) of a file.";
Question143 = "What types of errors will leave traces in system log files?";
Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes.";
Question144 = "What type of software can block access to any or all network ports on a computer?";
Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)";
Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?";
Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions.";
Question146 = "What does the cp command accomplish?";
Answer146 = "It copies one or more files.";
Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?";
Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question.";
Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?";
Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion.";
Question149 = "What is the best way to stop a server that was started through a SysV startup script?";
Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop.";
Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?";
Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job.";
stop();
stop();
Instance of Symbol 343 MovieClip "answer" in Frame 213
onClipEvent (load) {
_visible = false;
}
Frame 214
stop();
Instance of Symbol 347 MovieClip "answer" in Frame 214
onClipEvent (load) {
_visible = false;
}
Frame 215
stop();
Instance of Symbol 351 MovieClip "answer" in Frame 215
onClipEvent (load) {
_visible = false;
}
Frame 216
stop();
Instance of Symbol 355 MovieClip "answer" in Frame 216
onClipEvent (load) {
_visible = false;
}
Frame 217
stop();
Instance of Symbol 359 MovieClip "answer" in Frame 217
onClipEvent (load) {
_visible = false;
}
Frame 218
stop();
Instance of Symbol 363 MovieClip "answer" in Frame 218
onClipEvent (load) {
_visible = false;
}
Frame 219
stop();
Instance of Symbol 367 MovieClip "answer" in Frame 219
onClipEvent (load) {
_visible = false;
}
Frame 220
stop();
Instance of Symbol 371 MovieClip "answer" in Frame 220
onClipEvent (load) {
_visible = false;
}
Frame 221
stop();
Instance of Symbol 375 MovieClip "answer" in Frame 221
onClipEvent (load) {
_visible = false;
}
Frame 222
stop();
Instance of Symbol 379 MovieClip "answer" in Frame 222
onClipEvent (load) {
_visible = false;
}
Frame 223
stop();
Instance of Symbol 383 MovieClip "answer" in Frame 223
onClipEvent (load) {
_visible = false;
}
Frame 224
stop();
Instance of Symbol 387 MovieClip "answer" in Frame 224
onClipEvent (load) {
_visible = false;
}
Frame 225
stop();
Instance of Symbol 391 MovieClip "answer" in Frame 225
onClipEvent (load) {
_visible = false;
}
Frame 226
stop();
Instance of Symbol 395 MovieClip "answer" in Frame 226
onClipEvent (load) {
_visible = false;
}
Frame 227
stop();
Instance of Symbol 399 MovieClip "answer" in Frame 227
onClipEvent (load) {
_visible = false;
}
Frame 228
stop();
Instance of Symbol 403 MovieClip "answer" in Frame 228
onClipEvent (load) {
_visible = false;
}
Frame 229
stop();
Instance of Symbol 407 MovieClip "answer" in Frame 229
onClipEvent (load) {
_visible = false;
}
Frame 230
stop();
Instance of Symbol 411 MovieClip "answer" in Frame 230
onClipEvent (load) {
_visible = false;
}
Frame 231
stop();
Instance of Symbol 415 MovieClip "answer" in Frame 231
onClipEvent (load) {
_visible = false;
}
Frame 232
stop();
Instance of Symbol 419 MovieClip "answer" in Frame 232
onClipEvent (load) {
_visible = false;
}
Frame 233
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?";
Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature.";
Question2 = "What is the major difference between a workstation and a server?";
Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network.";
Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?";
Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |.";
Question4 = "What command will show you the path of the directory you are currently working in?";
Answer4 = "The pwd command will show you the path of the directory you are currently in.";
Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?";
Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories.";
Question6 = "What is the purpose of awk?";
Answer6 = "It is a scripting language that provides complex pattern-matching facilities.";
Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?";
Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories.";
Question8 = "How can PAM be used to help restrict user access?";
Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password.";
Question9 = "Why is it dangerous to constantly log in as the root user?";
Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so.";
Question10 = "What command can be used to execute a single command with alternative permission?";
Answer10 = "The sudo command can be used to execute a single command with alternative permission.";
Question11 = "What utility allows you to edit disk quota information?";
Answer11 = "The edquota utility allows you to edit disk quota information.";
Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?";
Answer12 = "The chage command allows you to modify account settings relating to account expiration.";
Question13 = "What character does Linux use to symbolize the root directory?";
Answer13 = "The root directory is Linux is represented by /.";
Question14 = "Why would a RAID array be useful and what is it?";
Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data.";
Question15 = "What programs does Linux use to write to optical media?";
Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord.";
Question16 = "What is the purpose of the nice command?";
Answer16 = "It allows you to run a program with a specified priority.";
Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?";
Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection.";
Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?";
Answer18 = "The route add command is used to add an entry to the routing table.";
Question19 = "What is the purpose of creating a baseline?";
Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in.";
Question20 = "What does the output of the uptime utility show?";
Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes).";
Question21 = "What type of information is typically included in installation log files?";
Answer21 = "The names of packages installed and error messages";
Question22 = "How many serial ATA devices can fit on a single serial ATA chain?";
Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)";
Question23 = "What command is used to create a filesystem?";
Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer.";
Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?";
Answer24 = "Ghostscript";
Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?";
Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code.";
Question26 = "What software component determines whether Linux supports a given SCSI host adapter?";
Answer26 = "The Linux kernel";
Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?";
Answer27 = "In the BIOS, which is stored on a chip on the motherboard";
Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?";
Answer28 = "ls /usr/local/bin";
Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?";
Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't.";
Question30 = "How can you identify processes that consume an inordinate amount of CPU time?";
Answer30 = "The top utility or the ps utility with appropriate switches";
Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?";
Answer31 = "Type lilo to install a new boot loader that reflects your modifications.";
Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?";
Answer32 = "traceroute";
Question33 = "What system associates IP addresses with hostnames?";
Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers";
Question34 = "What's the most common type of local network hardware today?";
Answer34 = "Ethernet";
Question35 = "What program displays information on the jobs in a print queue?";
Answer35 = "lpq";
Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?";
Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions.";
Question37 = "What methods are most commonly used to shut down a Linux system?";
Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this.";
Question38 = "What types of problems most often generate kernel oops messages?";
Answer38 = "Hardware malfunctions and kernel bugs";
Question39 = "What do the Exim and Postfix programs have in common?";
Answer39 = "They're both SMTP mail servers.";
Question40 = "When should you set the root password?";
Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation.";
Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?";
Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition.";
Question42 = "What is accomplished by the command chmod a+x scriptfile?";
Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable.";
Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?";
Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password.";
Question44 = "When you configure a system to use a static IP address, what information do you enter manually?";
Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address";
Question45 = "What command can you use to discover how much space is being used by files in a specified directory?";
Answer45 = "du";
Question46 = "How can you locate stray files belonging to a user when deleting that user's account?";
Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504.";
Question47 = "In what two forms does Linux swap space generally come?";
Answer47 = "A dedicated swap partition or a swap file within a regular filesystem";
Question48 = "What pull protocols are most commonly used for e-mail retrieval?";
Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)";
Question49 = "Where do network servers typically record error messages?";
Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file";
Question50 = "What OSs can GRUB boot?";
Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS";
Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?";
Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally.";
Question52 = "Which common package management systems include support for dependency tracking?";
Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems";
Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?";
Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation.";
Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?";
Answer54 = "Samba";
Question55 = "Where can the GRUB boot loader code be installed?";
Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well.";
Question56 = "What function does the fsck program serve?";
Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)";
Question57 = "When a user reports a problem in a vague way, what should you do?";
Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself.";
Question58 = "What user IDs (UIDs) do ordinary user accounts use?";
Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher.";
Question59 = "What types of manipulations can you perform on a password base to make it more secure?";
Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words.";
Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?";
Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins.";
Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?";
Answer61 = "ifconfig eth0";
Question62 = "How do man pages and HOWTO documents differ?";
Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics.";
Question63 = "What is the most common choice of software to implement as a Web server in Linux?";
Answer63 = "Apache";
Question64 = "What type of mouse is ideal for use in Linux?";
Answer64 = "A three-button mouse; many X programs assume three buttons are available.";
Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?";
Answer65 = "apt-get";
Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?";
Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC.";
Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?";
Answer67 = "Reconfigure the kernel and recompile it from source code.";
Question68 = "What modes does the Vi editor support, and what are they for?";
Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text).";
Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?";
Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet.";
Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?";
Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS.";
Question71 = "Who should have access to password files stored on a floppy disk?";
Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files.";
Question72 = "Where is a good place to keep an administrator's logbook?";
Answer72 = "In a paper notebook near the computer";
Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?";
Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly.";
Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?";
Answer74 = "$ (preceding the variable name)";
Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?";
Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem.";
Question76 = "What method does the locate command use to find files?";
Answer76 = "It searches a database that it updates periodically via cron jobs.";
Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?";
Answer77 = "PC Card, aka PCMCIA";
Question78 = "What happens to a process if its parent is killed or exits?";
Answer78 = "It's adopted by another process (typically init).";
Question79 = "Why might you create a separate partition for /usr/local?";
Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks";
Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?";
Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A.";
Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?";
Answer81 = "mt";
Question82 = "What devices must be terminated in a SCSI chain?";
Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)";
Question83 = "What command is used to submit a print job in Linux?";
Answer83 = "lpr";
Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?";
Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)";
Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?";
Answer85 = "startx";
Question86 = "What does the mv command accomplish?";
Answer86 = "It moves or renames a file or directory.";
Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?";
Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic";
Question88 = "What file directs the Linux boot process after the kernel has loaded?";
Answer88 = "/etc/inittab";
Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?";
Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections.";
Question90 = "What major Linux distribution uses binary tarballs for package distribution?";
Answer90 = "Slackware";
Question91 = "What are the two most common busses that connect to plug-in cards?";
Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus.";
Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?";
Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers.";
Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?";
Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like";
Question94 = "What happens when you try to run a program that requires a library that's not installed?";
Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)";
Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?";
Answer95 = "hdparm, specifically its -X parameter";
Question96 = "What boot methods are commonly used by Linux installers?";
Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows.";
Question97 = "How much damage can intruders do if they are given physical access to a computer?";
Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer.";
Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?";
Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number.";
Question99 = "What does the /etc/inetd.conf file control?";
Answer99 = "The inetd server, which launches other servers only when those servers are needed";
Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?";
Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups";
Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?";
Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)";
Question102 = "What conditions must be met to use DHCP?";
Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network.";
Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?";
Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security.";
Question104 = "What are the names of two power management protocols common on laptop computers?";
Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)";
Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?";
Answer105 = "Ask your network administrator. Do not configure a system with a random IP address.";
Question106 = "Is the 2.6.9 kernel a development or a stable kernel?";
Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series.";
Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?";
Answer107 = "Delete george's accounts.";
Question108 = "When should you use shadow passwords?";
Answer108 = "Almost always; shadow passwords substantially improve local security.";
Question109 = "Who may change the owner of a file?";
Answer109 = "The file's current owner or root";
Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?";
Answer110 = "Patch and recompile your Linux kernel.";
Question111 = "What is necessary to give users the choice of using KDE or GNOME?";
Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts.";
Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?";
Answer112 = "A switch";
Question113 = "Where can you go to find out if your video card is supported by Linux?";
Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers.";
Question114 = "How do you tell kill what process you want to terminate?";
Answer114 = "You pass kill the target process's process ID (PID) number.";
Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?";
Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible.";
Question116 = "What does the TERM environment variable control?";
Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning";
Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?";
Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options.";
Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?";
Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display.";
Question119 = "What does the modprobe command do?";
Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends.";
Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?";
Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage.";
Question121 = "How do you tell Linux to install from a network server?";
Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution.";
Question122 = "What command removes a print job from a print queue?";
Answer122 = "lprm";
Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?";
Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely";
Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?";
Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this.";
Question125 = "In what file is group membership recorded?";
Answer125 = "/etc/group";
Question126 = "What command do you use to switch the current runlevel?";
Answer126 = "telinit";
Question127 = "Under what circumstances is Telnet a good remote administration tool?";
Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise.";
Question128 = "How do you create a user cron job?";
Answer128 = "Use the crontab program.";
Question129 = "Why might you want to delay creating user accounts until after installation?";
Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation.";
Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?";
Answer130 = "setserial";
Question131 = "What are the most important general-purpose log files on most Linux systems?";
Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)";
Question132 = "What three factors does X use to compute the refresh rate you'll see?";
Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution";
Question133 = "What type of information does the df command return?";
Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems";
Question134 = "What are the settings for serial ATA disks?";
Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically.";
Question135 = "Why are SUID root programs rare?";
Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program.";
Question136 = "What are some common sources of emergency disk sets?";
Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM";
Question137 = "You want to kill a process by name. What command can you use to do this?";
Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill.";
Question138 = "What backup medium is best suited to long-term archival storage, and why?";
Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)";
Question139 = "What tools are most commonly used to install or remove Debian packages?";
Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these";
Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?";
Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller.";
Question141 = "What kernel should you use to obtain support for many USB devices?";
Answer141 = "2.2.18 or later, or 2.4.0 or later";
Question142 = "What is the function of the tail command?";
Answer142 = "It displays the last few lines (10 by default) of a file.";
Question143 = "What types of errors will leave traces in system log files?";
Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes.";
Question144 = "What type of software can block access to any or all network ports on a computer?";
Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)";
Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?";
Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions.";
Question146 = "What does the cp command accomplish?";
Answer146 = "It copies one or more files.";
Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?";
Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question.";
Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?";
Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion.";
Question149 = "What is the best way to stop a server that was started through a SysV startup script?";
Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop.";
Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?";
Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job.";
stop();
stop();
Instance of Symbol 423 MovieClip "answer" in Frame 233
onClipEvent (load) {
_visible = false;
}
Frame 234
stop();
Instance of Symbol 427 MovieClip "answer" in Frame 234
onClipEvent (load) {
_visible = false;
}
Frame 235
stop();
Instance of Symbol 431 MovieClip "answer" in Frame 235
onClipEvent (load) {
_visible = false;
}
Frame 236
stop();
Instance of Symbol 435 MovieClip "answer" in Frame 236
onClipEvent (load) {
_visible = false;
}
Frame 237
stop();
Instance of Symbol 439 MovieClip "answer" in Frame 237
onClipEvent (load) {
_visible = false;
}
Frame 238
stop();
Instance of Symbol 443 MovieClip "answer" in Frame 238
onClipEvent (load) {
_visible = false;
}
Frame 239
stop();
Instance of Symbol 447 MovieClip "answer" in Frame 239
onClipEvent (load) {
_visible = false;
}
Frame 240
stop();
Instance of Symbol 451 MovieClip "answer" in Frame 240
onClipEvent (load) {
_visible = false;
}
Frame 241
stop();
Instance of Symbol 455 MovieClip "answer" in Frame 241
onClipEvent (load) {
_visible = false;
}
Frame 242
stop();
Instance of Symbol 459 MovieClip "answer" in Frame 242
onClipEvent (load) {
_visible = false;
}
Frame 243
stop();
Instance of Symbol 62 MovieClip "answer" in Frame 243
onClipEvent (load) {
_visible = false;
}
Frame 244
stop();
Instance of Symbol 465 MovieClip "answer" in Frame 244
onClipEvent (load) {
_visible = false;
}
Frame 245
stop();
Instance of Symbol 469 MovieClip "answer" in Frame 245
onClipEvent (load) {
_visible = false;
}
Frame 246
stop();
Instance of Symbol 473 MovieClip "answer" in Frame 246
onClipEvent (load) {
_visible = false;
}
Frame 247
stop();
Instance of Symbol 477 MovieClip "answer" in Frame 247
onClipEvent (load) {
_visible = false;
}
Frame 248
stop();
Instance of Symbol 481 MovieClip "answer" in Frame 248
onClipEvent (load) {
_visible = false;
}
Frame 249
stop();
Instance of Symbol 485 MovieClip "answer" in Frame 249
onClipEvent (load) {
_visible = false;
}
Frame 250
stop();
Instance of Symbol 489 MovieClip "answer" in Frame 250
onClipEvent (load) {
_visible = false;
}
Frame 251
stop();
Instance of Symbol 493 MovieClip "answer" in Frame 251
onClipEvent (load) {
_visible = false;
}
Frame 252
stop();
Instance of Symbol 497 MovieClip "answer" in Frame 252
onClipEvent (load) {
_visible = false;
}
Frame 253
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?";
Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature.";
Question2 = "What is the major difference between a workstation and a server?";
Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network.";
Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?";
Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |.";
Question4 = "What command will show you the path of the directory you are currently working in?";
Answer4 = "The pwd command will show you the path of the directory you are currently in.";
Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?";
Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories.";
Question6 = "What is the purpose of awk?";
Answer6 = "It is a scripting language that provides complex pattern-matching facilities.";
Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?";
Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories.";
Question8 = "How can PAM be used to help restrict user access?";
Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password.";
Question9 = "Why is it dangerous to constantly log in as the root user?";
Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so.";
Question10 = "What command can be used to execute a single command with alternative permission?";
Answer10 = "The sudo command can be used to execute a single command with alternative permission.";
Question11 = "What utility allows you to edit disk quota information?";
Answer11 = "The edquota utility allows you to edit disk quota information.";
Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?";
Answer12 = "The chage command allows you to modify account settings relating to account expiration.";
Question13 = "What character does Linux use to symbolize the root directory?";
Answer13 = "The root directory is Linux is represented by /.";
Question14 = "Why would a RAID array be useful and what is it?";
Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data.";
Question15 = "What programs does Linux use to write to optical media?";
Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord.";
Question16 = "What is the purpose of the nice command?";
Answer16 = "It allows you to run a program with a specified priority.";
Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?";
Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection.";
Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?";
Answer18 = "The route add command is used to add an entry to the routing table.";
Question19 = "What is the purpose of creating a baseline?";
Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in.";
Question20 = "What does the output of the uptime utility show?";
Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes).";
Question21 = "What type of information is typically included in installation log files?";
Answer21 = "The names of packages installed and error messages";
Question22 = "How many serial ATA devices can fit on a single serial ATA chain?";
Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)";
Question23 = "What command is used to create a filesystem?";
Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer.";
Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?";
Answer24 = "Ghostscript";
Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?";
Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code.";
Question26 = "What software component determines whether Linux supports a given SCSI host adapter?";
Answer26 = "The Linux kernel";
Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?";
Answer27 = "In the BIOS, which is stored on a chip on the motherboard";
Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?";
Answer28 = "ls /usr/local/bin";
Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?";
Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't.";
Question30 = "How can you identify processes that consume an inordinate amount of CPU time?";
Answer30 = "The top utility or the ps utility with appropriate switches";
Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?";
Answer31 = "Type lilo to install a new boot loader that reflects your modifications.";
Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?";
Answer32 = "traceroute";
Question33 = "What system associates IP addresses with hostnames?";
Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers";
Question34 = "What's the most common type of local network hardware today?";
Answer34 = "Ethernet";
Question35 = "What program displays information on the jobs in a print queue?";
Answer35 = "lpq";
Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?";
Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions.";
Question37 = "What methods are most commonly used to shut down a Linux system?";
Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this.";
Question38 = "What types of problems most often generate kernel oops messages?";
Answer38 = "Hardware malfunctions and kernel bugs";
Question39 = "What do the Exim and Postfix programs have in common?";
Answer39 = "They're both SMTP mail servers.";
Question40 = "When should you set the root password?";
Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation.";
Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?";
Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition.";
Question42 = "What is accomplished by the command chmod a+x scriptfile?";
Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable.";
Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?";
Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password.";
Question44 = "When you configure a system to use a static IP address, what information do you enter manually?";
Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address";
Question45 = "What command can you use to discover how much space is being used by files in a specified directory?";
Answer45 = "du";
Question46 = "How can you locate stray files belonging to a user when deleting that user's account?";
Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504.";
Question47 = "In what two forms does Linux swap space generally come?";
Answer47 = "A dedicated swap partition or a swap file within a regular filesystem";
Question48 = "What pull protocols are most commonly used for e-mail retrieval?";
Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)";
Question49 = "Where do network servers typically record error messages?";
Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file";
Question50 = "What OSs can GRUB boot?";
Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS";
Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?";
Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally.";
Question52 = "Which common package management systems include support for dependency tracking?";
Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems";
Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?";
Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation.";
Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?";
Answer54 = "Samba";
Question55 = "Where can the GRUB boot loader code be installed?";
Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well.";
Question56 = "What function does the fsck program serve?";
Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)";
Question57 = "When a user reports a problem in a vague way, what should you do?";
Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself.";
Question58 = "What user IDs (UIDs) do ordinary user accounts use?";
Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher.";
Question59 = "What types of manipulations can you perform on a password base to make it more secure?";
Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words.";
Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?";
Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins.";
Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?";
Answer61 = "ifconfig eth0";
Question62 = "How do man pages and HOWTO documents differ?";
Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics.";
Question63 = "What is the most common choice of software to implement as a Web server in Linux?";
Answer63 = "Apache";
Question64 = "What type of mouse is ideal for use in Linux?";
Answer64 = "A three-button mouse; many X programs assume three buttons are available.";
Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?";
Answer65 = "apt-get";
Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?";
Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC.";
Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?";
Answer67 = "Reconfigure the kernel and recompile it from source code.";
Question68 = "What modes does the Vi editor support, and what are they for?";
Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text).";
Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?";
Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet.";
Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?";
Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS.";
Question71 = "Who should have access to password files stored on a floppy disk?";
Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files.";
Question72 = "Where is a good place to keep an administrator's logbook?";
Answer72 = "In a paper notebook near the computer";
Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?";
Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly.";
Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?";
Answer74 = "$ (preceding the variable name)";
Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?";
Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem.";
Question76 = "What method does the locate command use to find files?";
Answer76 = "It searches a database that it updates periodically via cron jobs.";
Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?";
Answer77 = "PC Card, aka PCMCIA";
Question78 = "What happens to a process if its parent is killed or exits?";
Answer78 = "It's adopted by another process (typically init).";
Question79 = "Why might you create a separate partition for /usr/local?";
Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks";
Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?";
Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A.";
Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?";
Answer81 = "mt";
Question82 = "What devices must be terminated in a SCSI chain?";
Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)";
Question83 = "What command is used to submit a print job in Linux?";
Answer83 = "lpr";
Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?";
Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)";
Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?";
Answer85 = "startx";
Question86 = "What does the mv command accomplish?";
Answer86 = "It moves or renames a file or directory.";
Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?";
Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic";
Question88 = "What file directs the Linux boot process after the kernel has loaded?";
Answer88 = "/etc/inittab";
Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?";
Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections.";
Question90 = "What major Linux distribution uses binary tarballs for package distribution?";
Answer90 = "Slackware";
Question91 = "What are the two most common busses that connect to plug-in cards?";
Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus.";
Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?";
Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers.";
Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?";
Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like";
Question94 = "What happens when you try to run a program that requires a library that's not installed?";
Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)";
Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?";
Answer95 = "hdparm, specifically its -X parameter";
Question96 = "What boot methods are commonly used by Linux installers?";
Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows.";
Question97 = "How much damage can intruders do if they are given physical access to a computer?";
Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer.";
Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?";
Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number.";
Question99 = "What does the /etc/inetd.conf file control?";
Answer99 = "The inetd server, which launches other servers only when those servers are needed";
Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?";
Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups";
Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?";
Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)";
Question102 = "What conditions must be met to use DHCP?";
Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network.";
Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?";
Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security.";
Question104 = "What are the names of two power management protocols common on laptop computers?";
Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)";
Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?";
Answer105 = "Ask your network administrator. Do not configure a system with a random IP address.";
Question106 = "Is the 2.6.9 kernel a development or a stable kernel?";
Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series.";
Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?";
Answer107 = "Delete george's accounts.";
Question108 = "When should you use shadow passwords?";
Answer108 = "Almost always; shadow passwords substantially improve local security.";
Question109 = "Who may change the owner of a file?";
Answer109 = "The file's current owner or root";
Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?";
Answer110 = "Patch and recompile your Linux kernel.";
Question111 = "What is necessary to give users the choice of using KDE or GNOME?";
Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts.";
Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?";
Answer112 = "A switch";
Question113 = "Where can you go to find out if your video card is supported by Linux?";
Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers.";
Question114 = "How do you tell kill what process you want to terminate?";
Answer114 = "You pass kill the target process's process ID (PID) number.";
Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?";
Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible.";
Question116 = "What does the TERM environment variable control?";
Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning";
Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?";
Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options.";
Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?";
Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display.";
Question119 = "What does the modprobe command do?";
Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends.";
Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?";
Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage.";
Question121 = "How do you tell Linux to install from a network server?";
Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution.";
Question122 = "What command removes a print job from a print queue?";
Answer122 = "lprm";
Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?";
Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely";
Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?";
Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this.";
Question125 = "In what file is group membership recorded?";
Answer125 = "/etc/group";
Question126 = "What command do you use to switch the current runlevel?";
Answer126 = "telinit";
Question127 = "Under what circumstances is Telnet a good remote administration tool?";
Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise.";
Question128 = "How do you create a user cron job?";
Answer128 = "Use the crontab program.";
Question129 = "Why might you want to delay creating user accounts until after installation?";
Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation.";
Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?";
Answer130 = "setserial";
Question131 = "What are the most important general-purpose log files on most Linux systems?";
Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)";
Question132 = "What three factors does X use to compute the refresh rate you'll see?";
Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution";
Question133 = "What type of information does the df command return?";
Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems";
Question134 = "What are the settings for serial ATA disks?";
Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically.";
Question135 = "Why are SUID root programs rare?";
Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program.";
Question136 = "What are some common sources of emergency disk sets?";
Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM";
Question137 = "You want to kill a process by name. What command can you use to do this?";
Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill.";
Question138 = "What backup medium is best suited to long-term archival storage, and why?";
Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)";
Question139 = "What tools are most commonly used to install or remove Debian packages?";
Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these";
Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?";
Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller.";
Question141 = "What kernel should you use to obtain support for many USB devices?";
Answer141 = "2.2.18 or later, or 2.4.0 or later";
Question142 = "What is the function of the tail command?";
Answer142 = "It displays the last few lines (10 by default) of a file.";
Question143 = "What types of errors will leave traces in system log files?";
Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes.";
Question144 = "What type of software can block access to any or all network ports on a computer?";
Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)";
Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?";
Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions.";
Question146 = "What does the cp command accomplish?";
Answer146 = "It copies one or more files.";
Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?";
Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question.";
Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?";
Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion.";
Question149 = "What is the best way to stop a server that was started through a SysV startup script?";
Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop.";
Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?";
Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job.";
stop();
stop();
Instance of Symbol 501 MovieClip "answer" in Frame 253
onClipEvent (load) {
_visible = false;
}
Frame 254
stop();
Instance of Symbol 505 MovieClip "answer" in Frame 254
onClipEvent (load) {
_visible = false;
}
Frame 255
stop();
Instance of Symbol 509 MovieClip "answer" in Frame 255
onClipEvent (load) {
_visible = false;
}
Frame 256
stop();
Instance of Symbol 513 MovieClip "answer" in Frame 256
onClipEvent (load) {
_visible = false;
}
Frame 257
stop();
Instance of Symbol 517 MovieClip "answer" in Frame 257
onClipEvent (load) {
_visible = false;
}
Frame 258
stop();
Instance of Symbol 521 MovieClip "answer" in Frame 258
onClipEvent (load) {
_visible = false;
}
Frame 259
stop();
Instance of Symbol 525 MovieClip "answer" in Frame 259
onClipEvent (load) {
_visible = false;
}
Frame 260
stop();
Instance of Symbol 529 MovieClip "answer" in Frame 260
onClipEvent (load) {
_visible = false;
}
Frame 261
stop();
Instance of Symbol 533 MovieClip "answer" in Frame 261
onClipEvent (load) {
_visible = false;
}
Frame 262
stop();
Instance of Symbol 537 MovieClip "answer" in Frame 262
onClipEvent (load) {
_visible = false;
}
Frame 263
stop();
Instance of Symbol 541 MovieClip "answer" in Frame 263
onClipEvent (load) {
_visible = false;
}
Frame 264
stop();
Instance of Symbol 545 MovieClip "answer" in Frame 264
onClipEvent (load) {
_visible = false;
}
Frame 265
stop();
Instance of Symbol 549 MovieClip "answer" in Frame 265
onClipEvent (load) {
_visible = false;
}
Frame 266
stop();
Instance of Symbol 553 MovieClip "answer" in Frame 266
onClipEvent (load) {
_visible = false;
}
Frame 267
stop();
Instance of Symbol 557 MovieClip "answer" in Frame 267
onClipEvent (load) {
_visible = false;
}
Frame 268
stop();
Instance of Symbol 561 MovieClip "answer" in Frame 268
onClipEvent (load) {
_visible = false;
}
Frame 269
stop();
Instance of Symbol 565 MovieClip "answer" in Frame 269
onClipEvent (load) {
_visible = false;
}
Frame 270
stop();
Instance of Symbol 569 MovieClip "answer" in Frame 270
onClipEvent (load) {
_visible = false;
}
Frame 271
stop();
Instance of Symbol 573 MovieClip "answer" in Frame 271
onClipEvent (load) {
_visible = false;
}
Frame 272
stop();
Instance of Symbol 577 MovieClip "answer" in Frame 272
onClipEvent (load) {
_visible = false;
}
Frame 273
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?";
Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature.";
Question2 = "What is the major difference between a workstation and a server?";
Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network.";
Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?";
Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |.";
Question4 = "What command will show you the path of the directory you are currently working in?";
Answer4 = "The pwd command will show you the path of the directory you are currently in.";
Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?";
Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories.";
Question6 = "What is the purpose of awk?";
Answer6 = "It is a scripting language that provides complex pattern-matching facilities.";
Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?";
Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories.";
Question8 = "How can PAM be used to help restrict user access?";
Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password.";
Question9 = "Why is it dangerous to constantly log in as the root user?";
Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so.";
Question10 = "What command can be used to execute a single command with alternative permission?";
Answer10 = "The sudo command can be used to execute a single command with alternative permission.";
Question11 = "What utility allows you to edit disk quota information?";
Answer11 = "The edquota utility allows you to edit disk quota information.";
Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?";
Answer12 = "The chage command allows you to modify account settings relating to account expiration.";
Question13 = "What character does Linux use to symbolize the root directory?";
Answer13 = "The root directory is Linux is represented by /.";
Question14 = "Why would a RAID array be useful and what is it?";
Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data.";
Question15 = "What programs does Linux use to write to optical media?";
Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord.";
Question16 = "What is the purpose of the nice command?";
Answer16 = "It allows you to run a program with a specified priority.";
Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?";
Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection.";
Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?";
Answer18 = "The route add command is used to add an entry to the routing table.";
Question19 = "What is the purpose of creating a baseline?";
Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in.";
Question20 = "What does the output of the uptime utility show?";
Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes).";
Question21 = "What type of information is typically included in installation log files?";
Answer21 = "The names of packages installed and error messages";
Question22 = "How many serial ATA devices can fit on a single serial ATA chain?";
Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)";
Question23 = "What command is used to create a filesystem?";
Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer.";
Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?";
Answer24 = "Ghostscript";
Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?";
Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code.";
Question26 = "What software component determines whether Linux supports a given SCSI host adapter?";
Answer26 = "The Linux kernel";
Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?";
Answer27 = "In the BIOS, which is stored on a chip on the motherboard";
Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?";
Answer28 = "ls /usr/local/bin";
Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?";
Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't.";
Question30 = "How can you identify processes that consume an inordinate amount of CPU time?";
Answer30 = "The top utility or the ps utility with appropriate switches";
Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?";
Answer31 = "Type lilo to install a new boot loader that reflects your modifications.";
Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?";
Answer32 = "traceroute";
Question33 = "What system associates IP addresses with hostnames?";
Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers";
Question34 = "What's the most common type of local network hardware today?";
Answer34 = "Ethernet";
Question35 = "What program displays information on the jobs in a print queue?";
Answer35 = "lpq";
Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?";
Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions.";
Question37 = "What methods are most commonly used to shut down a Linux system?";
Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this.";
Question38 = "What types of problems most often generate kernel oops messages?";
Answer38 = "Hardware malfunctions and kernel bugs";
Question39 = "What do the Exim and Postfix programs have in common?";
Answer39 = "They're both SMTP mail servers.";
Question40 = "When should you set the root password?";
Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation.";
Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?";
Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition.";
Question42 = "What is accomplished by the command chmod a+x scriptfile?";
Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable.";
Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?";
Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password.";
Question44 = "When you configure a system to use a static IP address, what information do you enter manually?";
Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address";
Question45 = "What command can you use to discover how much space is being used by files in a specified directory?";
Answer45 = "du";
Question46 = "How can you locate stray files belonging to a user when deleting that user's account?";
Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504.";
Question47 = "In what two forms does Linux swap space generally come?";
Answer47 = "A dedicated swap partition or a swap file within a regular filesystem";
Question48 = "What pull protocols are most commonly used for e-mail retrieval?";
Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)";
Question49 = "Where do network servers typically record error messages?";
Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file";
Question50 = "What OSs can GRUB boot?";
Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS";
Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?";
Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally.";
Question52 = "Which common package management systems include support for dependency tracking?";
Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems";
Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?";
Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation.";
Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?";
Answer54 = "Samba";
Question55 = "Where can the GRUB boot loader code be installed?";
Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well.";
Question56 = "What function does the fsck program serve?";
Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)";
Question57 = "When a user reports a problem in a vague way, what should you do?";
Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself.";
Question58 = "What user IDs (UIDs) do ordinary user accounts use?";
Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher.";
Question59 = "What types of manipulations can you perform on a password base to make it more secure?";
Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words.";
Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?";
Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins.";
Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?";
Answer61 = "ifconfig eth0";
Question62 = "How do man pages and HOWTO documents differ?";
Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics.";
Question63 = "What is the most common choice of software to implement as a Web server in Linux?";
Answer63 = "Apache";
Question64 = "What type of mouse is ideal for use in Linux?";
Answer64 = "A three-button mouse; many X programs assume three buttons are available.";
Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?";
Answer65 = "apt-get";
Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?";
Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC.";
Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?";
Answer67 = "Reconfigure the kernel and recompile it from source code.";
Question68 = "What modes does the Vi editor support, and what are they for?";
Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text).";
Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?";
Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet.";
Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?";
Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS.";
Question71 = "Who should have access to password files stored on a floppy disk?";
Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files.";
Question72 = "Where is a good place to keep an administrator's logbook?";
Answer72 = "In a paper notebook near the computer";
Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?";
Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly.";
Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?";
Answer74 = "$ (preceding the variable name)";
Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?";
Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem.";
Question76 = "What method does the locate command use to find files?";
Answer76 = "It searches a database that it updates periodically via cron jobs.";
Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?";
Answer77 = "PC Card, aka PCMCIA";
Question78 = "What happens to a process if its parent is killed or exits?";
Answer78 = "It's adopted by another process (typically init).";
Question79 = "Why might you create a separate partition for /usr/local?";
Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks";
Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?";
Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A.";
Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?";
Answer81 = "mt";
Question82 = "What devices must be terminated in a SCSI chain?";
Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)";
Question83 = "What command is used to submit a print job in Linux?";
Answer83 = "lpr";
Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?";
Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)";
Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?";
Answer85 = "startx";
Question86 = "What does the mv command accomplish?";
Answer86 = "It moves or renames a file or directory.";
Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?";
Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic";
Question88 = "What file directs the Linux boot process after the kernel has loaded?";
Answer88 = "/etc/inittab";
Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?";
Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections.";
Question90 = "What major Linux distribution uses binary tarballs for package distribution?";
Answer90 = "Slackware";
Question91 = "What are the two most common busses that connect to plug-in cards?";
Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus.";
Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?";
Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers.";
Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?";
Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like";
Question94 = "What happens when you try to run a program that requires a library that's not installed?";
Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)";
Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?";
Answer95 = "hdparm, specifically its -X parameter";
Question96 = "What boot methods are commonly used by Linux installers?";
Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows.";
Question97 = "How much damage can intruders do if they are given physical access to a computer?";
Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer.";
Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?";
Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number.";
Question99 = "What does the /etc/inetd.conf file control?";
Answer99 = "The inetd server, which launches other servers only when those servers are needed";
Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?";
Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups";
Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?";
Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)";
Question102 = "What conditions must be met to use DHCP?";
Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network.";
Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?";
Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security.";
Question104 = "What are the names of two power management protocols common on laptop computers?";
Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)";
Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?";
Answer105 = "Ask your network administrator. Do not configure a system with a random IP address.";
Question106 = "Is the 2.6.9 kernel a development or a stable kernel?";
Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series.";
Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?";
Answer107 = "Delete george's accounts.";
Question108 = "When should you use shadow passwords?";
Answer108 = "Almost always; shadow passwords substantially improve local security.";
Question109 = "Who may change the owner of a file?";
Answer109 = "The file's current owner or root";
Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?";
Answer110 = "Patch and recompile your Linux kernel.";
Question111 = "What is necessary to give users the choice of using KDE or GNOME?";
Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts.";
Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?";
Answer112 = "A switch";
Question113 = "Where can you go to find out if your video card is supported by Linux?";
Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers.";
Question114 = "How do you tell kill what process you want to terminate?";
Answer114 = "You pass kill the target process's process ID (PID) number.";
Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?";
Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible.";
Question116 = "What does the TERM environment variable control?";
Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning";
Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?";
Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options.";
Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?";
Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display.";
Question119 = "What does the modprobe command do?";
Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends.";
Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?";
Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage.";
Question121 = "How do you tell Linux to install from a network server?";
Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution.";
Question122 = "What command removes a print job from a print queue?";
Answer122 = "lprm";
Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?";
Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely";
Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?";
Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this.";
Question125 = "In what file is group membership recorded?";
Answer125 = "/etc/group";
Question126 = "What command do you use to switch the current runlevel?";
Answer126 = "telinit";
Question127 = "Under what circumstances is Telnet a good remote administration tool?";
Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise.";
Question128 = "How do you create a user cron job?";
Answer128 = "Use the crontab program.";
Question129 = "Why might you want to delay creating user accounts until after installation?";
Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation.";
Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?";
Answer130 = "setserial";
Question131 = "What are the most important general-purpose log files on most Linux systems?";
Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)";
Question132 = "What three factors does X use to compute the refresh rate you'll see?";
Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution";
Question133 = "What type of information does the df command return?";
Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems";
Question134 = "What are the settings for serial ATA disks?";
Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically.";
Question135 = "Why are SUID root programs rare?";
Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program.";
Question136 = "What are some common sources of emergency disk sets?";
Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM";
Question137 = "You want to kill a process by name. What command can you use to do this?";
Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill.";
Question138 = "What backup medium is best suited to long-term archival storage, and why?";
Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)";
Question139 = "What tools are most commonly used to install or remove Debian packages?";
Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these";
Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?";
Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller.";
Question141 = "What kernel should you use to obtain support for many USB devices?";
Answer141 = "2.2.18 or later, or 2.4.0 or later";
Question142 = "What is the function of the tail command?";
Answer142 = "It displays the last few lines (10 by default) of a file.";
Question143 = "What types of errors will leave traces in system log files?";
Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes.";
Question144 = "What type of software can block access to any or all network ports on a computer?";
Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)";
Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?";
Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions.";
Question146 = "What does the cp command accomplish?";
Answer146 = "It copies one or more files.";
Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?";
Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question.";
Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?";
Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion.";
Question149 = "What is the best way to stop a server that was started through a SysV startup script?";
Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop.";
Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?";
Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job.";
stop();
stop();
Instance of Symbol 581 MovieClip "answer" in Frame 273
onClipEvent (load) {
_visible = false;
}
Frame 274
stop();
Instance of Symbol 585 MovieClip "answer" in Frame 274
onClipEvent (load) {
_visible = false;
}
Frame 275
stop();
Instance of Symbol 589 MovieClip "answer" in Frame 275
onClipEvent (load) {
_visible = false;
}
Frame 276
stop();
Instance of Symbol 593 MovieClip "answer" in Frame 276
onClipEvent (load) {
_visible = false;
}
Frame 277
stop();
Instance of Symbol 597 MovieClip "answer" in Frame 277
onClipEvent (load) {
_visible = false;
}
Frame 278
stop();
Instance of Symbol 601 MovieClip "answer" in Frame 278
onClipEvent (load) {
_visible = false;
}
Frame 279
stop();
Instance of Symbol 605 MovieClip "answer" in Frame 279
onClipEvent (load) {
_visible = false;
}
Frame 280
stop();
Instance of Symbol 609 MovieClip "answer" in Frame 280
onClipEvent (load) {
_visible = false;
}
Frame 281
stop();
Instance of Symbol 613 MovieClip "answer" in Frame 281
onClipEvent (load) {
_visible = false;
}
Frame 282
stop();
Instance of Symbol 617 MovieClip "answer" in Frame 282
onClipEvent (load) {
_visible = false;
}
Frame 283
stop();
Instance of Symbol 621 MovieClip "answer" in Frame 283
onClipEvent (load) {
_visible = false;
}
Frame 284
stop();
Instance of Symbol 625 MovieClip "answer" in Frame 284
onClipEvent (load) {
_visible = false;
}
Frame 285
stop();
Instance of Symbol 629 MovieClip "answer" in Frame 285
onClipEvent (load) {
_visible = false;
}
Frame 286
stop();
Instance of Symbol 633 MovieClip "answer" in Frame 286
onClipEvent (load) {
_visible = false;
}
Frame 287
stop();
Instance of Symbol 637 MovieClip "answer" in Frame 287
onClipEvent (load) {
_visible = false;
}
Frame 288
stop();
Instance of Symbol 641 MovieClip "answer" in Frame 288
onClipEvent (load) {
_visible = false;
}
Frame 289
stop();
Instance of Symbol 645 MovieClip "answer" in Frame 289
onClipEvent (load) {
_visible = false;
}
Frame 290
stop();
Instance of Symbol 649 MovieClip "answer" in Frame 290
onClipEvent (load) {
_visible = false;
}
Frame 291
stop();
Instance of Symbol 653 MovieClip "answer" in Frame 291
onClipEvent (load) {
_visible = false;
}
Frame 292
stop();
Instance of Symbol 657 MovieClip "answer" in Frame 292
onClipEvent (load) {
_visible = false;
}
Frame 293
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?";
Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature.";
Question2 = "What is the major difference between a workstation and a server?";
Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network.";
Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?";
Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |.";
Question4 = "What command will show you the path of the directory you are currently working in?";
Answer4 = "The pwd command will show you the path of the directory you are currently in.";
Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?";
Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories.";
Question6 = "What is the purpose of awk?";
Answer6 = "It is a scripting language that provides complex pattern-matching facilities.";
Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?";
Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories.";
Question8 = "How can PAM be used to help restrict user access?";
Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password.";
Question9 = "Why is it dangerous to constantly log in as the root user?";
Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so.";
Question10 = "What command can be used to execute a single command with alternative permission?";
Answer10 = "The sudo command can be used to execute a single command with alternative permission.";
Question11 = "What utility allows you to edit disk quota information?";
Answer11 = "The edquota utility allows you to edit disk quota information.";
Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?";
Answer12 = "The chage command allows you to modify account settings relating to account expiration.";
Question13 = "What character does Linux use to symbolize the root directory?";
Answer13 = "The root directory is Linux is represented by /.";
Question14 = "Why would a RAID array be useful and what is it?";
Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data.";
Question15 = "What programs does Linux use to write to optical media?";
Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord.";
Question16 = "What is the purpose of the nice command?";
Answer16 = "It allows you to run a program with a specified priority.";
Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?";
Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection.";
Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?";
Answer18 = "The route add command is used to add an entry to the routing table.";
Question19 = "What is the purpose of creating a baseline?";
Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in.";
Question20 = "What does the output of the uptime utility show?";
Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes).";
Question21 = "What type of information is typically included in installation log files?";
Answer21 = "The names of packages installed and error messages";
Question22 = "How many serial ATA devices can fit on a single serial ATA chain?";
Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)";
Question23 = "What command is used to create a filesystem?";
Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer.";
Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?";
Answer24 = "Ghostscript";
Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?";
Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code.";
Question26 = "What software component determines whether Linux supports a given SCSI host adapter?";
Answer26 = "The Linux kernel";
Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?";
Answer27 = "In the BIOS, which is stored on a chip on the motherboard";
Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?";
Answer28 = "ls /usr/local/bin";
Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?";
Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't.";
Question30 = "How can you identify processes that consume an inordinate amount of CPU time?";
Answer30 = "The top utility or the ps utility with appropriate switches";
Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?";
Answer31 = "Type lilo to install a new boot loader that reflects your modifications.";
Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?";
Answer32 = "traceroute";
Question33 = "What system associates IP addresses with hostnames?";
Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers";
Question34 = "What's the most common type of local network hardware today?";
Answer34 = "Ethernet";
Question35 = "What program displays information on the jobs in a print queue?";
Answer35 = "lpq";
Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?";
Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions.";
Question37 = "What methods are most commonly used to shut down a Linux system?";
Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this.";
Question38 = "What types of problems most often generate kernel oops messages?";
Answer38 = "Hardware malfunctions and kernel bugs";
Question39 = "What do the Exim and Postfix programs have in common?";
Answer39 = "They're both SMTP mail servers.";
Question40 = "When should you set the root password?";
Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation.";
Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?";
Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition.";
Question42 = "What is accomplished by the command chmod a+x scriptfile?";
Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable.";
Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?";
Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password.";
Question44 = "When you configure a system to use a static IP address, what information do you enter manually?";
Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address";
Question45 = "What command can you use to discover how much space is being used by files in a specified directory?";
Answer45 = "du";
Question46 = "How can you locate stray files belonging to a user when deleting that user's account?";
Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504.";
Question47 = "In what two forms does Linux swap space generally come?";
Answer47 = "A dedicated swap partition or a swap file within a regular filesystem";
Question48 = "What pull protocols are most commonly used for e-mail retrieval?";
Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)";
Question49 = "Where do network servers typically record error messages?";
Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file";
Question50 = "What OSs can GRUB boot?";
Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS";
Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?";
Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally.";
Question52 = "Which common package management systems include support for dependency tracking?";
Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems";
Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?";
Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation.";
Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?";
Answer54 = "Samba";
Question55 = "Where can the GRUB boot loader code be installed?";
Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well.";
Question56 = "What function does the fsck program serve?";
Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)";
Question57 = "When a user reports a problem in a vague way, what should you do?";
Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself.";
Question58 = "What user IDs (UIDs) do ordinary user accounts use?";
Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher.";
Question59 = "What types of manipulations can you perform on a password base to make it more secure?";
Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words.";
Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?";
Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins.";
Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?";
Answer61 = "ifconfig eth0";
Question62 = "How do man pages and HOWTO documents differ?";
Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics.";
Question63 = "What is the most common choice of software to implement as a Web server in Linux?";
Answer63 = "Apache";
Question64 = "What type of mouse is ideal for use in Linux?";
Answer64 = "A three-button mouse; many X programs assume three buttons are available.";
Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?";
Answer65 = "apt-get";
Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?";
Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC.";
Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?";
Answer67 = "Reconfigure the kernel and recompile it from source code.";
Question68 = "What modes does the Vi editor support, and what are they for?";
Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text).";
Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?";
Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet.";
Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?";
Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS.";
Question71 = "Who should have access to password files stored on a floppy disk?";
Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files.";
Question72 = "Where is a good place to keep an administrator's logbook?";
Answer72 = "In a paper notebook near the computer";
Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?";
Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly.";
Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?";
Answer74 = "$ (preceding the variable name)";
Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?";
Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem.";
Question76 = "What method does the locate command use to find files?";
Answer76 = "It searches a database that it updates periodically via cron jobs.";
Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?";
Answer77 = "PC Card, aka PCMCIA";
Question78 = "What happens to a process if its parent is killed or exits?";
Answer78 = "It's adopted by another process (typically init).";
Question79 = "Why might you create a separate partition for /usr/local?";
Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks";
Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?";
Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A.";
Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?";
Answer81 = "mt";
Question82 = "What devices must be terminated in a SCSI chain?";
Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)";
Question83 = "What command is used to submit a print job in Linux?";
Answer83 = "lpr";
Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?";
Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)";
Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?";
Answer85 = "startx";
Question86 = "What does the mv command accomplish?";
Answer86 = "It moves or renames a file or directory.";
Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?";
Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic";
Question88 = "What file directs the Linux boot process after the kernel has loaded?";
Answer88 = "/etc/inittab";
Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?";
Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections.";
Question90 = "What major Linux distribution uses binary tarballs for package distribution?";
Answer90 = "Slackware";
Question91 = "What are the two most common busses that connect to plug-in cards?";
Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus.";
Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?";
Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers.";
Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?";
Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like";
Question94 = "What happens when you try to run a program that requires a library that's not installed?";
Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)";
Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?";
Answer95 = "hdparm, specifically its -X parameter";
Question96 = "What boot methods are commonly used by Linux installers?";
Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows.";
Question97 = "How much damage can intruders do if they are given physical access to a computer?";
Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer.";
Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?";
Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number.";
Question99 = "What does the /etc/inetd.conf file control?";
Answer99 = "The inetd server, which launches other servers only when those servers are needed";
Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?";
Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups";
Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?";
Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)";
Question102 = "What conditions must be met to use DHCP?";
Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network.";
Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?";
Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security.";
Question104 = "What are the names of two power management protocols common on laptop computers?";
Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)";
Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?";
Answer105 = "Ask your network administrator. Do not configure a system with a random IP address.";
Question106 = "Is the 2.6.9 kernel a development or a stable kernel?";
Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series.";
Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?";
Answer107 = "Delete george's accounts.";
Question108 = "When should you use shadow passwords?";
Answer108 = "Almost always; shadow passwords substantially improve local security.";
Question109 = "Who may change the owner of a file?";
Answer109 = "The file's current owner or root";
Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?";
Answer110 = "Patch and recompile your Linux kernel.";
Question111 = "What is necessary to give users the choice of using KDE or GNOME?";
Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts.";
Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?";
Answer112 = "A switch";
Question113 = "Where can you go to find out if your video card is supported by Linux?";
Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers.";
Question114 = "How do you tell kill what process you want to terminate?";
Answer114 = "You pass kill the target process's process ID (PID) number.";
Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?";
Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible.";
Question116 = "What does the TERM environment variable control?";
Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning";
Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?";
Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options.";
Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?";
Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display.";
Question119 = "What does the modprobe command do?";
Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends.";
Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?";
Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage.";
Question121 = "How do you tell Linux to install from a network server?";
Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution.";
Question122 = "What command removes a print job from a print queue?";
Answer122 = "lprm";
Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?";
Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely";
Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?";
Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this.";
Question125 = "In what file is group membership recorded?";
Answer125 = "/etc/group";
Question126 = "What command do you use to switch the current runlevel?";
Answer126 = "telinit";
Question127 = "Under what circumstances is Telnet a good remote administration tool?";
Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise.";
Question128 = "How do you create a user cron job?";
Answer128 = "Use the crontab program.";
Question129 = "Why might you want to delay creating user accounts until after installation?";
Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation.";
Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?";
Answer130 = "setserial";
Question131 = "What are the most important general-purpose log files on most Linux systems?";
Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)";
Question132 = "What three factors does X use to compute the refresh rate you'll see?";
Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution";
Question133 = "What type of information does the df command return?";
Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems";
Question134 = "What are the settings for serial ATA disks?";
Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically.";
Question135 = "Why are SUID root programs rare?";
Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program.";
Question136 = "What are some common sources of emergency disk sets?";
Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM";
Question137 = "You want to kill a process by name. What command can you use to do this?";
Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill.";
Question138 = "What backup medium is best suited to long-term archival storage, and why?";
Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)";
Question139 = "What tools are most commonly used to install or remove Debian packages?";
Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these";
Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?";
Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller.";
Question141 = "What kernel should you use to obtain support for many USB devices?";
Answer141 = "2.2.18 or later, or 2.4.0 or later";
Question142 = "What is the function of the tail command?";
Answer142 = "It displays the last few lines (10 by default) of a file.";
Question143 = "What types of errors will leave traces in system log files?";
Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes.";
Question144 = "What type of software can block access to any or all network ports on a computer?";
Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)";
Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?";
Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions.";
Question146 = "What does the cp command accomplish?";
Answer146 = "It copies one or more files.";
Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?";
Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question.";
Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?";
Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion.";
Question149 = "What is the best way to stop a server that was started through a SysV startup script?";
Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop.";
Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?";
Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job.";
stop();
stop();
Instance of Symbol 661 MovieClip "answer" in Frame 293
onClipEvent (load) {
_visible = false;
}
Frame 294
stop();
Instance of Symbol 665 MovieClip "answer" in Frame 294
onClipEvent (load) {
_visible = false;
}
Frame 295
stop();
Instance of Symbol 669 MovieClip "answer" in Frame 295
onClipEvent (load) {
_visible = false;
}
Frame 296
stop();
Instance of Symbol 673 MovieClip "answer" in Frame 296
onClipEvent (load) {
_visible = false;
}
Frame 297
stop();
Instance of Symbol 677 MovieClip "answer" in Frame 297
onClipEvent (load) {
_visible = false;
}
Frame 298
stop();
Instance of Symbol 681 MovieClip "answer" in Frame 298
onClipEvent (load) {
_visible = false;
}
Frame 299
stop();
Instance of Symbol 685 MovieClip "answer" in Frame 299
onClipEvent (load) {
_visible = false;
}
Frame 300
stop();
Instance of Symbol 689 MovieClip "answer" in Frame 300
onClipEvent (load) {
_visible = false;
}
Frame 301
stop();
Instance of Symbol 693 MovieClip "answer" in Frame 301
onClipEvent (load) {
_visible = false;
}
Frame 302
stop();
Instance of Symbol 697 MovieClip "answer" in Frame 302
onClipEvent (load) {
_visible = false;
}
Symbol 13 Button
on (release) {
gotoAndPlay (3);
}
Symbol 18 Button
on (release) {
getURL ("http://www.sybex.com", "_blank");
}
Symbol 20 Button
on (release) {
getURL ("http://www.sybex.com");
}
Symbol 24 Button
on (release) {
gotoAndPlay (1);
}
Symbol 28 Button
on (release) {
gotoAndPlay (293);
}
Symbol 31 Button
on (release) {
gotoAndPlay (273);
}
Symbol 34 Button
on (release) {
gotoAndPlay (253);
}
Symbol 37 Button
on (release) {
gotoAndPlay (233);
}
Symbol 40 Button
on (release) {
gotoAndPlay (213);
}
Symbol 43 Button
on (release) {
gotoAndPlay (193);
}
Symbol 46 Button
on (release) {
gotoAndPlay (173);
}
Symbol 48 Button
on (release) {
gotoAndPlay (153);
}
Symbol 57 Button
on (release, keyPress "<Enter>") {
if (Number(/:nr_in) == 1) {
gotoAndStop (3);
} else if (Number(/:nr_in) == 2) {
gotoAndStop (4);
} else if (Number(/:nr_in) == 3) {
gotoAndStop (5);
} else if (Number(/:nr_in) == 4) {
gotoAndStop (6);
} else if (Number(/:nr_in) == 5) {
gotoAndStop (7);
} else if (Number(/:nr_in) == 6) {
gotoAndStop (8);
} else if (Number(/:nr_in) == 7) {
gotoAndStop (9);
} else if (Number(/:nr_in) == 8) {
gotoAndStop (10);
} else if (Number(/:nr_in) == 9) {
gotoAndStop (11);
} else if (Number(/:nr_in) == 10) {
gotoAndStop (12);
} else if (Number(/:nr_in) == 11) {
gotoAndStop (13);
} else if (Number(/:nr_in) == 12) {
gotoAndStop (14);
} else if (Number(/:nr_in) == 13) {
gotoAndStop (15);
} else if (Number(/:nr_in) == 14) {
gotoAndStop (16);
} else if (Number(/:nr_in) == 15) {
gotoAndStop (17);
} else if (Number(/:nr_in) == 16) {
gotoAndStop (18);
} else if (Number(/:nr_in) == 17) {
gotoAndStop (19);
} else if (Number(/:nr_in) == 18) {
gotoAndStop (20);
} else if (Number(/:nr_in) == 19) {
gotoAndStop (21);
} else if (Number(/:nr_in) == 20) {
gotoAndStop (22);
} else if (Number(/:nr_in) == 21) {
gotoAndStop (23);
} else if (Number(/:nr_in) == 22) {
gotoAndStop (24);
} else if (Number(/:nr_in) == 23) {
gotoAndStop (25);
} else if (Number(/:nr_in) == 24) {
gotoAndStop (26);
} else if (Number(/:nr_in) == 25) {
gotoAndStop (27);
} else if (Number(/:nr_in) == 26) {
gotoAndStop (28);
} else if (Number(/:nr_in) == 27) {
gotoAndStop (29);
} else if (Number(/:nr_in) == 28) {
gotoAndStop (30);
} else if (Number(/:nr_in) == 29) {
gotoAndStop (31);
} else if (Number(/:nr_in) == 30) {
gotoAndStop (32);
} else if (Number(/:nr_in) == 31) {
gotoAndStop (33);
} else if (Number(/:nr_in) == 32) {
gotoAndStop (34);
} else if (Number(/:nr_in) == 33) {
gotoAndStop (35);
} else if (Number(/:nr_in) == 34) {
gotoAndStop (36);
} else if (Number(/:nr_in) == 35) {
gotoAndStop (37);
} else if (Number(/:nr_in) == 36) {
gotoAndStop (38);
} else if (Number(/:nr_in) == 37) {
gotoAndStop (39);
} else if (Number(/:nr_in) == 38) {
gotoAndStop (40);
} else if (Number(/:nr_in) == 39) {
gotoAndStop (41);
} else if (Number(/:nr_in) == 40) {
gotoAndStop (42);
} else if (Number(/:nr_in) == 41) {
gotoAndStop (43);
} else if (Number(/:nr_in) == 42) {
gotoAndStop (44);
} else if (Number(/:nr_in) == 43) {
gotoAndStop (45);
} else if (Number(/:nr_in) == 44) {
gotoAndStop (46);
} else if (Number(/:nr_in) == 45) {
gotoAndStop (47);
} else if (Number(/:nr_in) == 46) {
gotoAndStop (48);
} else if (Number(/:nr_in) == 47) {
gotoAndStop (49);
} else if (Number(/:nr_in) == 48) {
gotoAndStop (50);
} else if (Number(/:nr_in) == 49) {
gotoAndStop (51);
} else if (Number(/:nr_in) == 50) {
gotoAndStop (52);
} else if (Number(/:nr_in) == 51) {
gotoAndStop (53);
} else if (Number(/:nr_in) == 52) {
gotoAndStop (54);
} else if (Number(/:nr_in) == 53) {
gotoAndStop (55);
} else if (Number(/:nr_in) == 54) {
gotoAndStop (56);
} else if (Number(/:nr_in) == 55) {
gotoAndStop (57);
} else if (Number(/:nr_in) == 56) {
gotoAndStop (58);
} else if (Number(/:nr_in) == 57) {
gotoAndStop (59);
} else if (Number(/:nr_in) == 58) {
gotoAndStop (60);
} else if (Number(/:nr_in) == 59) {
gotoAndStop (61);
} else if (Number(/:nr_in) == 60) {
gotoAndStop (62);
} else if (Number(/:nr_in) == 61) {
gotoAndStop (63);
} else if (Number(/:nr_in) == 62) {
gotoAndStop (64);
} else if (Number(/:nr_in) == 63) {
gotoAndStop (65);
} else if (Number(/:nr_in) == 64) {
gotoAndStop (66);
} else if (Number(/:nr_in) == 65) {
gotoAndStop (67);
} else if (Number(/:nr_in) == 66) {
gotoAndStop (68);
} else if (Number(/:nr_in) == 67) {
gotoAndStop (69);
} else if (Number(/:nr_in) == 68) {
gotoAndStop (70);
} else if (Number(/:nr_in) == 69) {
gotoAndStop (71);
} else if (Number(/:nr_in) == 70) {
gotoAndStop (72);
} else if (Number(/:nr_in) == 71) {
gotoAndStop (73);
} else if (Number(/:nr_in) == 72) {
gotoAndStop (74);
} else if (Number(/:nr_in) == 73) {
gotoAndStop (75);
} else if (Number(/:nr_in) == 74) {
gotoAndStop (76);
} else if (Number(/:nr_in) == 75) {
gotoAndStop (77);
} else if (Number(/:nr_in) == 76) {
gotoAndStop (78);
} else if (Number(/:nr_in) == 77) {
gotoAndStop (79);
} else if (Number(/:nr_in) == 78) {
gotoAndStop (80);
} else if (Number(/:nr_in) == 79) {
gotoAndStop (81);
} else if (Number(/:nr_in) == 80) {
gotoAndStop (82);
} else if (Number(/:nr_in) == 81) {
gotoAndStop (83);
} else if (Number(/:nr_in) == 82) {
gotoAndStop (84);
} else if (Number(/:nr_in) == 83) {
gotoAndStop (85);
} else if (Number(/:nr_in) == 84) {
gotoAndStop (86);
} else if (Number(/:nr_in) == 85) {
gotoAndStop (87);
} else if (Number(/:nr_in) == 86) {
gotoAndStop (88);
} else if (Number(/:nr_in) == 87) {
gotoAndStop (89);
} else if (Number(/:nr_in) == 88) {
gotoAndStop (90);
} else if (Number(/:nr_in) == 89) {
gotoAndStop (91);
} else if (Number(/:nr_in) == 90) {
gotoAndStop (92);
} else if (Number(/:nr_in) == 91) {
gotoAndStop (93);
} else if (Number(/:nr_in) == 92) {
gotoAndStop (94);
} else if (Number(/:nr_in) == 93) {
gotoAndStop (95);
} else if (Number(/:nr_in) == 94) {
gotoAndStop (96);
} else if (Number(/:nr_in) == 95) {
gotoAndStop (97);
} else if (Number(/:nr_in) == 96) {
gotoAndStop (98);
} else if (Number(/:nr_in) == 97) {
gotoAndStop (99);
} else if (Number(/:nr_in) == 98) {
gotoAndStop (100);
} else if (Number(/:nr_in) == 99) {
gotoAndStop (101);
} else if (Number(/:nr_in) == 100) {
gotoAndStop (102);
} else if (Number(/:nr_in) == 101) {
gotoAndStop (103);
} else if (Number(/:nr_in) == 102) {
gotoAndStop (104);
} else if (Number(/:nr_in) == 103) {
gotoAndStop (105);
} else if (Number(/:nr_in) == 104) {
gotoAndStop (106);
} else if (Number(/:nr_in) == 105) {
gotoAndStop (107);
} else if (Number(/:nr_in) == 106) {
gotoAndStop (108);
} else if (Number(/:nr_in) == 107) {
gotoAndStop (109);
} else if (Number(/:nr_in) == 108) {
gotoAndStop (110);
} else if (Number(/:nr_in) == 109) {
gotoAndStop (111);
} else if (Number(/:nr_in) == 110) {
gotoAndStop (112);
} else if (Number(/:nr_in) == 111) {
gotoAndStop (113);
} else if (Number(/:nr_in) == 112) {
gotoAndStop (114);
} else if (Number(/:nr_in) == 113) {
gotoAndStop (115);
} else if (Number(/:nr_in) == 114) {
gotoAndStop (116);
} else if (Number(/:nr_in) == 115) {
gotoAndStop (117);
} else if (Number(/:nr_in) == 116) {
gotoAndStop (118);
} else if (Number(/:nr_in) == 117) {
gotoAndStop (119);
} else if (Number(/:nr_in) == 118) {
gotoAndStop (120);
} else if (Number(/:nr_in) == 119) {
gotoAndStop (121);
} else if (Number(/:nr_in) == 120) {
gotoAndStop (122);
} else if (Number(/:nr_in) == 121) {
gotoAndStop (123);
} else if (Number(/:nr_in) == 122) {
gotoAndStop (124);
} else if (Number(/:nr_in) == 123) {
gotoAndStop (125);
} else if (Number(/:nr_in) == 124) {
gotoAndStop (126);
} else if (Number(/:nr_in) == 125) {
gotoAndStop (127);
} else if (Number(/:nr_in) == 126) {
gotoAndStop (128);
} else if (Number(/:nr_in) == 127) {
gotoAndStop (129);
} else if (Number(/:nr_in) == 128) {
gotoAndStop (130);
} else if (Number(/:nr_in) == 129) {
gotoAndStop (131);
} else if (Number(/:nr_in) == 130) {
gotoAndStop (132);
} else if (Number(/:nr_in) == 131) {
gotoAndStop (133);
} else if (Number(/:nr_in) == 132) {
gotoAndStop (134);
} else if (Number(/:nr_in) == 133) {
gotoAndStop (135);
} else if (Number(/:nr_in) == 134) {
gotoAndStop (136);
} else if (Number(/:nr_in) == 135) {
gotoAndStop (137);
} else if (Number(/:nr_in) == 136) {
gotoAndStop (138);
} else if (Number(/:nr_in) == 137) {
gotoAndStop (139);
} else if (Number(/:nr_in) == 138) {
gotoAndStop (140);
} else if (Number(/:nr_in) == 139) {
gotoAndStop (141);
} else if (Number(/:nr_in) == 140) {
gotoAndStop (142);
} else if (Number(/:nr_in) == 141) {
gotoAndStop (143);
} else if (Number(/:nr_in) == 142) {
gotoAndStop (144);
} else if (Number(/:nr_in) == 143) {
gotoAndStop (145);
} else if (Number(/:nr_in) == 144) {
gotoAndStop (146);
} else if (Number(/:nr_in) == 145) {
gotoAndStop (147);
} else if (Number(/:nr_in) == 146) {
gotoAndStop (148);
} else if (Number(/:nr_in) == 147) {
gotoAndStop (149);
} else if (Number(/:nr_in) == 148) {
gotoAndStop (150);
} else if (Number(/:nr_in) == 149) {
gotoAndStop (151);
} else if (Number(/:nr_in) == 150) {
gotoAndStop (152);
} else {
gotoAndStop("/:nr_in == x" +1);
}
}
Symbol 62 MovieClip Frame 1
stop();
Symbol 62 MovieClip Frame 4
stop();
Symbol 67 MovieClip Frame 1
stop();
Symbol 67 MovieClip Frame 6
stop();
Symbol 67 MovieClip Frame 10
stop();
Symbol 73 Button
on (release) {
gotoAndPlay (2);
}
Symbol 79 Button
on (release) {
_root.question.gotoAndPlay("flip");
}
on (release) {
nextFrame();
}
Symbol 85 Button
on (release) {
gotoAndPlay (152);
}
Symbol 88 Button
on (release) {
_root.answer._visible = true;
}
Symbol 90 MovieClip Frame 1
stop();
Symbol 90 MovieClip Frame 4
stop();
Symbol 99 Button
on (release) {
_root.question.gotoAndPlay("flip back");
}
on (release) {
prevFrame();
}
Symbol 105 Button
on (release) {
gotoAndPlay (3);
}
Symbol 107 MovieClip Frame 1
stop();
Symbol 107 MovieClip Frame 4
stop();
Symbol 111 MovieClip Frame 1
stop();
Symbol 111 MovieClip Frame 4
stop();
Symbol 115 MovieClip Frame 1
stop();
Symbol 115 MovieClip Frame 4
stop();
Symbol 119 MovieClip Frame 1
stop();
Symbol 119 MovieClip Frame 4
stop();
Symbol 123 MovieClip Frame 1
stop();
Symbol 123 MovieClip Frame 4
stop();
Symbol 127 MovieClip Frame 1
stop();
Symbol 127 MovieClip Frame 4
stop();
Symbol 131 MovieClip Frame 1
stop();
Symbol 131 MovieClip Frame 4
stop();
Symbol 135 MovieClip Frame 1
stop();
Symbol 135 MovieClip Frame 4
stop();
Symbol 139 MovieClip Frame 1
stop();
Symbol 139 MovieClip Frame 4
stop();
Symbol 143 MovieClip Frame 1
stop();
Symbol 143 MovieClip Frame 4
stop();
Symbol 147 MovieClip Frame 1
stop();
Symbol 147 MovieClip Frame 4
stop();
Symbol 151 MovieClip Frame 1
stop();
Symbol 151 MovieClip Frame 4
stop();
Symbol 155 MovieClip Frame 1
stop();
Symbol 155 MovieClip Frame 4
stop();
Symbol 159 MovieClip Frame 1
stop();
Symbol 159 MovieClip Frame 4
stop();
Symbol 163 MovieClip Frame 1
stop();
Symbol 163 MovieClip Frame 4
stop();
Symbol 167 MovieClip Frame 1
stop();
Symbol 167 MovieClip Frame 4
stop();
Symbol 171 MovieClip Frame 1
stop();
Symbol 171 MovieClip Frame 4
stop();
Symbol 175 MovieClip Frame 1
stop();
Symbol 175 MovieClip Frame 4
stop();
Symbol 179 MovieClip Frame 1
stop();
Symbol 179 MovieClip Frame 4
stop();
Symbol 183 MovieClip Frame 1
stop();
Symbol 183 MovieClip Frame 4
stop();
Symbol 187 MovieClip Frame 1
stop();
Symbol 187 MovieClip Frame 4
stop();
Symbol 191 MovieClip Frame 1
stop();
Symbol 191 MovieClip Frame 4
stop();
Symbol 195 MovieClip Frame 1
stop();
Symbol 195 MovieClip Frame 4
stop();
Symbol 199 MovieClip Frame 1
stop();
Symbol 199 MovieClip Frame 4
stop();
Symbol 203 MovieClip Frame 1
stop();
Symbol 203 MovieClip Frame 4
stop();
Symbol 207 MovieClip Frame 1
stop();
Symbol 207 MovieClip Frame 4
stop();
Symbol 211 MovieClip Frame 1
stop();
Symbol 211 MovieClip Frame 4
stop();
Symbol 215 MovieClip Frame 1
stop();
Symbol 215 MovieClip Frame 4
stop();
Symbol 219 MovieClip Frame 1
stop();
Symbol 219 MovieClip Frame 4
stop();
Symbol 223 MovieClip Frame 1
stop();
Symbol 223 MovieClip Frame 4
stop();
Symbol 227 MovieClip Frame 1
stop();
Symbol 227 MovieClip Frame 4
stop();
Symbol 231 MovieClip Frame 1
stop();
Symbol 231 MovieClip Frame 4
stop();
Symbol 235 MovieClip Frame 1
stop();
Symbol 235 MovieClip Frame 4
stop();
Symbol 239 MovieClip Frame 1
stop();
Symbol 239 MovieClip Frame 4
stop();
Symbol 243 MovieClip Frame 1
stop();
Symbol 243 MovieClip Frame 4
stop();
Symbol 247 MovieClip Frame 1
stop();
Symbol 247 MovieClip Frame 4
stop();
Symbol 251 MovieClip Frame 1
stop();
Symbol 251 MovieClip Frame 4
stop();
Symbol 255 MovieClip Frame 1
stop();
Symbol 255 MovieClip Frame 4
stop();
Symbol 259 MovieClip Frame 1
stop();
Symbol 259 MovieClip Frame 4
stop();
Symbol 263 MovieClip Frame 1
stop();
Symbol 263 MovieClip Frame 4
stop();
Symbol 267 MovieClip Frame 1
stop();
Symbol 267 MovieClip Frame 4
stop();
Symbol 271 MovieClip Frame 1
stop();
Symbol 271 MovieClip Frame 4
stop();
Symbol 275 MovieClip Frame 1
stop();
Symbol 275 MovieClip Frame 4
stop();
Symbol 279 MovieClip Frame 1
stop();
Symbol 279 MovieClip Frame 4
stop();
Symbol 283 MovieClip Frame 1
stop();
Symbol 283 MovieClip Frame 4
stop();
Symbol 287 MovieClip Frame 1
stop();
Symbol 287 MovieClip Frame 4
stop();
Symbol 291 MovieClip Frame 1
stop();
Symbol 291 MovieClip Frame 4
stop();
Symbol 295 MovieClip Frame 1
stop();
Symbol 295 MovieClip Frame 4
stop();
Symbol 299 MovieClip Frame 1
stop();
Symbol 299 MovieClip Frame 4
stop();
Symbol 303 MovieClip Frame 1
stop();
Symbol 303 MovieClip Frame 4
stop();
Symbol 307 MovieClip Frame 1
stop();
Symbol 307 MovieClip Frame 4
stop();
Symbol 311 MovieClip Frame 1
stop();
Symbol 311 MovieClip Frame 4
stop();
Symbol 315 MovieClip Frame 1
stop();
Symbol 315 MovieClip Frame 4
stop();
Symbol 319 MovieClip Frame 1
stop();
Symbol 319 MovieClip Frame 4
stop();
Symbol 323 MovieClip Frame 1
stop();
Symbol 323 MovieClip Frame 4
stop();
Symbol 327 MovieClip Frame 1
stop();
Symbol 327 MovieClip Frame 4
stop();
Symbol 331 MovieClip Frame 1
stop();
Symbol 331 MovieClip Frame 4
stop();
Symbol 335 MovieClip Frame 1
stop();
Symbol 335 MovieClip Frame 4
stop();
Symbol 339 MovieClip Frame 1
stop();
Symbol 339 MovieClip Frame 4
stop();
Symbol 343 MovieClip Frame 1
stop();
Symbol 343 MovieClip Frame 4
stop();
Symbol 347 MovieClip Frame 1
stop();
Symbol 347 MovieClip Frame 4
stop();
Symbol 351 MovieClip Frame 1
stop();
Symbol 351 MovieClip Frame 4
stop();
Symbol 355 MovieClip Frame 1
stop();
Symbol 355 MovieClip Frame 4
stop();
Symbol 359 MovieClip Frame 1
stop();
Symbol 359 MovieClip Frame 4
stop();
Symbol 363 MovieClip Frame 1
stop();
Symbol 363 MovieClip Frame 4
stop();
Symbol 367 MovieClip Frame 1
stop();
Symbol 367 MovieClip Frame 4
stop();
Symbol 371 MovieClip Frame 1
stop();
Symbol 371 MovieClip Frame 4
stop();
Symbol 375 MovieClip Frame 1
stop();
Symbol 375 MovieClip Frame 4
stop();
Symbol 379 MovieClip Frame 1
stop();
Symbol 379 MovieClip Frame 4
stop();
Symbol 383 MovieClip Frame 1
stop();
Symbol 383 MovieClip Frame 4
stop();
Symbol 387 MovieClip Frame 1
stop();
Symbol 387 MovieClip Frame 4
stop();
Symbol 391 MovieClip Frame 1
stop();
Symbol 391 MovieClip Frame 4
stop();
Symbol 395 MovieClip Frame 1
stop();
Symbol 395 MovieClip Frame 4
stop();
Symbol 399 MovieClip Frame 1
stop();
Symbol 399 MovieClip Frame 4
stop();
Symbol 403 MovieClip Frame 1
stop();
Symbol 403 MovieClip Frame 4
stop();
Symbol 407 MovieClip Frame 1
stop();
Symbol 407 MovieClip Frame 4
stop();
Symbol 411 MovieClip Frame 1
stop();
Symbol 411 MovieClip Frame 4
stop();
Symbol 415 MovieClip Frame 1
stop();
Symbol 415 MovieClip Frame 4
stop();
Symbol 419 MovieClip Frame 1
stop();
Symbol 419 MovieClip Frame 4
stop();
Symbol 423 MovieClip Frame 1
stop();
Symbol 423 MovieClip Frame 4
stop();
Symbol 427 MovieClip Frame 1
stop();
Symbol 427 MovieClip Frame 4
stop();
Symbol 431 MovieClip Frame 1
stop();
Symbol 431 MovieClip Frame 4
stop();
Symbol 435 MovieClip Frame 1
stop();
Symbol 435 MovieClip Frame 4
stop();
Symbol 439 MovieClip Frame 1
stop();
Symbol 439 MovieClip Frame 4
stop();
Symbol 443 MovieClip Frame 1
stop();
Symbol 443 MovieClip Frame 4
stop();
Symbol 447 MovieClip Frame 1
stop();
Symbol 447 MovieClip Frame 4
stop();
Symbol 451 MovieClip Frame 1
stop();
Symbol 451 MovieClip Frame 4
stop();
Symbol 455 MovieClip Frame 1
stop();
Symbol 455 MovieClip Frame 4
stop();
Symbol 459 MovieClip Frame 1
stop();
Symbol 459 MovieClip Frame 4
stop();
Symbol 465 MovieClip Frame 1
stop();
Symbol 465 MovieClip Frame 4
stop();
Symbol 469 MovieClip Frame 1
stop();
Symbol 469 MovieClip Frame 4
stop();
Symbol 473 MovieClip Frame 1
stop();
Symbol 473 MovieClip Frame 4
stop();
Symbol 477 MovieClip Frame 1
stop();
Symbol 477 MovieClip Frame 4
stop();
Symbol 481 MovieClip Frame 1
stop();
Symbol 481 MovieClip Frame 4
stop();
Symbol 485 MovieClip Frame 1
stop();
Symbol 485 MovieClip Frame 4
stop();
Symbol 489 MovieClip Frame 1
stop();
Symbol 489 MovieClip Frame 4
stop();
Symbol 493 MovieClip Frame 1
stop();
Symbol 493 MovieClip Frame 4
stop();
Symbol 497 MovieClip Frame 1
stop();
Symbol 497 MovieClip Frame 4
stop();
Symbol 501 MovieClip Frame 1
stop();
Symbol 501 MovieClip Frame 4
stop();
Symbol 505 MovieClip Frame 1
stop();
Symbol 505 MovieClip Frame 4
stop();
Symbol 509 MovieClip Frame 1
stop();
Symbol 509 MovieClip Frame 4
stop();
Symbol 513 MovieClip Frame 1
stop();
Symbol 513 MovieClip Frame 4
stop();
Symbol 517 MovieClip Frame 1
stop();
Symbol 517 MovieClip Frame 4
stop();
Symbol 521 MovieClip Frame 1
stop();
Symbol 521 MovieClip Frame 4
stop();
Symbol 525 MovieClip Frame 1
stop();
Symbol 525 MovieClip Frame 4
stop();
Symbol 529 MovieClip Frame 1
stop();
Symbol 529 MovieClip Frame 4
stop();
Symbol 533 MovieClip Frame 1
stop();
Symbol 533 MovieClip Frame 4
stop();
Symbol 537 MovieClip Frame 1
stop();
Symbol 537 MovieClip Frame 4
stop();
Symbol 541 MovieClip Frame 1
stop();
Symbol 541 MovieClip Frame 4
stop();
Symbol 545 MovieClip Frame 1
stop();
Symbol 545 MovieClip Frame 4
stop();
Symbol 549 MovieClip Frame 1
stop();
Symbol 549 MovieClip Frame 4
stop();
Symbol 553 MovieClip Frame 1
stop();
Symbol 553 MovieClip Frame 4
stop();
Symbol 557 MovieClip Frame 1
stop();
Symbol 557 MovieClip Frame 4
stop();
Symbol 561 MovieClip Frame 1
stop();
Symbol 561 MovieClip Frame 4
stop();
Symbol 565 MovieClip Frame 1
stop();
Symbol 565 MovieClip Frame 4
stop();
Symbol 569 MovieClip Frame 1
stop();
Symbol 569 MovieClip Frame 4
stop();
Symbol 573 MovieClip Frame 1
stop();
Symbol 573 MovieClip Frame 4
stop();
Symbol 577 MovieClip Frame 1
stop();
Symbol 577 MovieClip Frame 4
stop();
Symbol 581 MovieClip Frame 1
stop();
Symbol 581 MovieClip Frame 4
stop();
Symbol 585 MovieClip Frame 1
stop();
Symbol 585 MovieClip Frame 4
stop();
Symbol 589 MovieClip Frame 1
stop();
Symbol 589 MovieClip Frame 4
stop();
Symbol 593 MovieClip Frame 1
stop();
Symbol 593 MovieClip Frame 4
stop();
Symbol 597 MovieClip Frame 1
stop();
Symbol 597 MovieClip Frame 4
stop();
Symbol 601 MovieClip Frame 1
stop();
Symbol 601 MovieClip Frame 4
stop();
Symbol 605 MovieClip Frame 1
stop();
Symbol 605 MovieClip Frame 4
stop();
Symbol 609 MovieClip Frame 1
stop();
Symbol 609 MovieClip Frame 4
stop();
Symbol 613 MovieClip Frame 1
stop();
Symbol 613 MovieClip Frame 4
stop();
Symbol 617 MovieClip Frame 1
stop();
Symbol 617 MovieClip Frame 4
stop();
Symbol 621 MovieClip Frame 1
stop();
Symbol 621 MovieClip Frame 4
stop();
Symbol 625 MovieClip Frame 1
stop();
Symbol 625 MovieClip Frame 4
stop();
Symbol 629 MovieClip Frame 1
stop();
Symbol 629 MovieClip Frame 4
stop();
Symbol 633 MovieClip Frame 1
stop();
Symbol 633 MovieClip Frame 4
stop();
Symbol 637 MovieClip Frame 1
stop();
Symbol 637 MovieClip Frame 4
stop();
Symbol 641 MovieClip Frame 1
stop();
Symbol 641 MovieClip Frame 4
stop();
Symbol 645 MovieClip Frame 1
stop();
Symbol 645 MovieClip Frame 4
stop();
Symbol 649 MovieClip Frame 1
stop();
Symbol 649 MovieClip Frame 4
stop();
Symbol 653 MovieClip Frame 1
stop();
Symbol 653 MovieClip Frame 4
stop();
Symbol 657 MovieClip Frame 1
stop();
Symbol 657 MovieClip Frame 4
stop();
Symbol 661 MovieClip Frame 1
stop();
Symbol 661 MovieClip Frame 4
stop();
Symbol 665 MovieClip Frame 1
stop();
Symbol 665 MovieClip Frame 4
stop();
Symbol 669 MovieClip Frame 1
stop();
Symbol 669 MovieClip Frame 4
stop();
Symbol 673 MovieClip Frame 1
stop();
Symbol 673 MovieClip Frame 4
stop();
Symbol 677 MovieClip Frame 1
stop();
Symbol 677 MovieClip Frame 4
stop();
Symbol 681 MovieClip Frame 1
stop();
Symbol 681 MovieClip Frame 4
stop();
Symbol 685 MovieClip Frame 1
stop();
Symbol 685 MovieClip Frame 4
stop();
Symbol 689 MovieClip Frame 1
stop();
Symbol 689 MovieClip Frame 4
stop();
Symbol 693 MovieClip Frame 1
stop();
Symbol 693 MovieClip Frame 4
stop();
Symbol 697 MovieClip Frame 1
stop();
Symbol 697 MovieClip Frame 4
stop();