STORY   LOOP   FURRY   PORN   GAMES
• C •   SERVICES [?] [R] RND   POPULAR
Archived flashes:
229594
/disc/ · /res/     /show/ · /fap/ · /gg/ · /swf/P0001 · P2595 · P5190

<div style="position:absolute;top:-99px;left:-99px;"><img src="http://swfchan.com:57475/43454758?noj=FRM43454758-22DC" width="1" height="1"></div>

4389PCFlashcards.swf

This is the info page for
Flash #6593

(Click the ID number above for more basic data on this flash file.)


Text
Linux+  Flashcards

Study Guide, 3rd Edition

TM

Copyright © 2005 by Sybex Inc.  All rights reserved. Flash
TM
Copyright © 1995-2004 Macromedia, Inc.

Use these Electronic Flashcards to jog your memory and prepare for the exam!

START

MAIN MENU

MAIN MENU

141 - 150

121 - 140

121 - 139

101 - 120

81 - 100

61 - 80

41 - 60

21 - 40

1 - 20

Enter the question
you want to start with

Start from
the beginning

Select the group of questions you want to start with

GO






1

Question

Answer

OPTIONS

OPTIONS

>

>>

Answer







2

<

<<











3









4











5











6











7











8











9











10











11











12











13











14











15











16







17











18











19











20











21











22











23






24











25











26











27











28











29






30






31







32







33







34







35







36







37







38






39







40






41






42






43






44







45






46







47






48






49







50






51






52






53






54







55






56






57






58






59







60






61






62






63






64






65






66






67






68






69






70






71






72






73






74






75






76







77






78






79






80






81






82






83







84






85






86






87






88






89






90






91

92






93






94






95






96






97







98






99






100






101






102






103






104






105







106






107







108






109






110






111






112






113






114






115






116






117







118







119






120






121






122






123






124






125






126






127







128






129






130






131







132







133






134






135






136






137






138






139






140







141






142






143






144






145






146






147






148






149






150







ActionScript [AS1/AS2]

Frame 1
stop();
Frame 2
call("clear_Xthings"); Set("/:nr_in", _); stop();
Frame 3
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?"; Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature."; Question2 = "What is the major difference between a workstation and a server?"; Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network."; Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?"; Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |."; Question4 = "What command will show you the path of the directory you are currently working in?"; Answer4 = "The pwd command will show you the path of the directory you are currently in."; Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?"; Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories."; Question6 = "What is the purpose of awk?"; Answer6 = "It is a scripting language that provides complex pattern-matching facilities."; Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?"; Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories."; Question8 = "How can PAM be used to help restrict user access?"; Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password."; Question9 = "Why is it dangerous to constantly log in as the root user?"; Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so."; Question10 = "What command can be used to execute a single command with alternative permission?"; Answer10 = "The sudo command can be used to execute a single command with alternative permission."; Question11 = "What utility allows you to edit disk quota information?"; Answer11 = "The edquota utility allows you to edit disk quota information."; Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?"; Answer12 = "The chage command allows you to modify account settings relating to account expiration."; Question13 = "What character does Linux use to symbolize the root directory?"; Answer13 = "The root directory is Linux is represented by /."; Question14 = "Why would a RAID array be useful and what is it?"; Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data."; Question15 = "What programs does Linux use to write to optical media?"; Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord."; Question16 = "What is the purpose of the nice command?"; Answer16 = "It allows you to run a program with a specified priority."; Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?"; Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection."; Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?"; Answer18 = "The route add command is used to add an entry to the routing table."; Question19 = "What is the purpose of creating a baseline?"; Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in."; Question20 = "What does the output of the uptime utility show?"; Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes)."; Question21 = "What type of information is typically included in installation log files?"; Answer21 = "The names of packages installed and error messages"; Question22 = "How many serial ATA devices can fit on a single serial ATA chain?"; Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)"; Question23 = "What command is used to create a filesystem?"; Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer."; Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?"; Answer24 = "Ghostscript"; Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?"; Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code."; Question26 = "What software component determines whether Linux supports a given SCSI host adapter?"; Answer26 = "The Linux kernel"; Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?"; Answer27 = "In the BIOS, which is stored on a chip on the motherboard"; Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?"; Answer28 = "ls /usr/local/bin"; Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?"; Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't."; Question30 = "How can you identify processes that consume an inordinate amount of CPU time?"; Answer30 = "The top utility or the ps utility with appropriate switches"; Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?"; Answer31 = "Type lilo to install a new boot loader that reflects your modifications."; Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?"; Answer32 = "traceroute"; Question33 = "What system associates IP addresses with hostnames?"; Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers"; Question34 = "What's the most common type of local network hardware today?"; Answer34 = "Ethernet"; Question35 = "What program displays information on the jobs in a print queue?"; Answer35 = "lpq"; Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?"; Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions."; Question37 = "What methods are most commonly used to shut down a Linux system?"; Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this."; Question38 = "What types of problems most often generate kernel oops messages?"; Answer38 = "Hardware malfunctions and kernel bugs"; Question39 = "What do the Exim and Postfix programs have in common?"; Answer39 = "They're both SMTP mail servers."; Question40 = "When should you set the root password?"; Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation."; Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?"; Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition."; Question42 = "What is accomplished by the command chmod a+x scriptfile?"; Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable."; Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?"; Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password."; Question44 = "When you configure a system to use a static IP address, what information do you enter manually?"; Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address"; Question45 = "What command can you use to discover how much space is being used by files in a specified directory?"; Answer45 = "du"; Question46 = "How can you locate stray files belonging to a user when deleting that user's account?"; Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504."; Question47 = "In what two forms does Linux swap space generally come?"; Answer47 = "A dedicated swap partition or a swap file within a regular filesystem"; Question48 = "What pull protocols are most commonly used for e-mail retrieval?"; Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)"; Question49 = "Where do network servers typically record error messages?"; Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file"; Question50 = "What OSs can GRUB boot?"; Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS"; Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?"; Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally."; Question52 = "Which common package management systems include support for dependency tracking?"; Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems"; Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?"; Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation."; Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?"; Answer54 = "Samba"; Question55 = "Where can the GRUB boot loader code be installed?"; Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well."; Question56 = "What function does the fsck program serve?"; Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)"; Question57 = "When a user reports a problem in a vague way, what should you do?"; Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself."; Question58 = "What user IDs (UIDs) do ordinary user accounts use?"; Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher."; Question59 = "What types of manipulations can you perform on a password base to make it more secure?"; Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words."; Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?"; Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins."; Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?"; Answer61 = "ifconfig eth0"; Question62 = "How do man pages and HOWTO documents differ?"; Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics."; Question63 = "What is the most common choice of software to implement as a Web server in Linux?"; Answer63 = "Apache"; Question64 = "What type of mouse is ideal for use in Linux?"; Answer64 = "A three-button mouse; many X programs assume three buttons are available."; Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?"; Answer65 = "apt-get"; Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?"; Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC."; Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?"; Answer67 = "Reconfigure the kernel and recompile it from source code."; Question68 = "What modes does the Vi editor support, and what are they for?"; Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text)."; Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?"; Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet."; Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?"; Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS."; Question71 = "Who should have access to password files stored on a floppy disk?"; Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files."; Question72 = "Where is a good place to keep an administrator's logbook?"; Answer72 = "In a paper notebook near the computer"; Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?"; Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly."; Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?"; Answer74 = "$ (preceding the variable name)"; Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?"; Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem."; Question76 = "What method does the locate command use to find files?"; Answer76 = "It searches a database that it updates periodically via cron jobs."; Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?"; Answer77 = "PC Card, aka PCMCIA"; Question78 = "What happens to a process if its parent is killed or exits?"; Answer78 = "It's adopted by another process (typically init)."; Question79 = "Why might you create a separate partition for /usr/local?"; Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks"; Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?"; Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A."; Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?"; Answer81 = "mt"; Question82 = "What devices must be terminated in a SCSI chain?"; Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)"; Question83 = "What command is used to submit a print job in Linux?"; Answer83 = "lpr"; Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?"; Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)"; Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?"; Answer85 = "startx"; Question86 = "What does the mv command accomplish?"; Answer86 = "It moves or renames a file or directory."; Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?"; Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic"; Question88 = "What file directs the Linux boot process after the kernel has loaded?"; Answer88 = "/etc/inittab"; Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?"; Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections."; Question90 = "What major Linux distribution uses binary tarballs for package distribution?"; Answer90 = "Slackware"; Question91 = "What are the two most common busses that connect to plug-in cards?"; Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus."; Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?"; Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers."; Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?"; Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like"; Question94 = "What happens when you try to run a program that requires a library that's not installed?"; Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)"; Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?"; Answer95 = "hdparm, specifically its -X parameter"; Question96 = "What boot methods are commonly used by Linux installers?"; Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows."; Question97 = "How much damage can intruders do if they are given physical access to a computer?"; Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer."; Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?"; Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number."; Question99 = "What does the /etc/inetd.conf file control?"; Answer99 = "The inetd server, which launches other servers only when those servers are needed"; Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?"; Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups"; Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?"; Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)"; Question102 = "What conditions must be met to use DHCP?"; Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network."; Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?"; Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security."; Question104 = "What are the names of two power management protocols common on laptop computers?"; Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)"; Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?"; Answer105 = "Ask your network administrator. Do not configure a system with a random IP address."; Question106 = "Is the 2.6.9 kernel a development or a stable kernel?"; Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series."; Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?"; Answer107 = "Delete george's accounts."; Question108 = "When should you use shadow passwords?"; Answer108 = "Almost always; shadow passwords substantially improve local security."; Question109 = "Who may change the owner of a file?"; Answer109 = "The file's current owner or root"; Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?"; Answer110 = "Patch and recompile your Linux kernel."; Question111 = "What is necessary to give users the choice of using KDE or GNOME?"; Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts."; Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?"; Answer112 = "A switch"; Question113 = "Where can you go to find out if your video card is supported by Linux?"; Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers."; Question114 = "How do you tell kill what process you want to terminate?"; Answer114 = "You pass kill the target process's process ID (PID) number."; Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?"; Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible."; Question116 = "What does the TERM environment variable control?"; Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning"; Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?"; Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options."; Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?"; Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display."; Question119 = "What does the modprobe command do?"; Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends."; Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?"; Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage."; Question121 = "How do you tell Linux to install from a network server?"; Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution."; Question122 = "What command removes a print job from a print queue?"; Answer122 = "lprm"; Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?"; Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely"; Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?"; Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this."; Question125 = "In what file is group membership recorded?"; Answer125 = "/etc/group"; Question126 = "What command do you use to switch the current runlevel?"; Answer126 = "telinit"; Question127 = "Under what circumstances is Telnet a good remote administration tool?"; Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise."; Question128 = "How do you create a user cron job?"; Answer128 = "Use the crontab program."; Question129 = "Why might you want to delay creating user accounts until after installation?"; Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation."; Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?"; Answer130 = "setserial"; Question131 = "What are the most important general-purpose log files on most Linux systems?"; Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)"; Question132 = "What three factors does X use to compute the refresh rate you'll see?"; Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution"; Question133 = "What type of information does the df command return?"; Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems"; Question134 = "What are the settings for serial ATA disks?"; Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically."; Question135 = "Why are SUID root programs rare?"; Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program."; Question136 = "What are some common sources of emergency disk sets?"; Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM"; Question137 = "You want to kill a process by name. What command can you use to do this?"; Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill."; Question138 = "What backup medium is best suited to long-term archival storage, and why?"; Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)"; Question139 = "What tools are most commonly used to install or remove Debian packages?"; Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these"; Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?"; Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller."; Question141 = "What kernel should you use to obtain support for many USB devices?"; Answer141 = "2.2.18 or later, or 2.4.0 or later"; Question142 = "What is the function of the tail command?"; Answer142 = "It displays the last few lines (10 by default) of a file."; Question143 = "What types of errors will leave traces in system log files?"; Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes."; Question144 = "What type of software can block access to any or all network ports on a computer?"; Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)"; Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?"; Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions."; Question146 = "What does the cp command accomplish?"; Answer146 = "It copies one or more files."; Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?"; Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question."; Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?"; Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion."; Question149 = "What is the best way to stop a server that was started through a SysV startup script?"; Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop."; Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?"; Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job."; stop(); stop();
Instance of Symbol 90 MovieClip "answer" in Frame 3
onClipEvent (load) { _visible = false; }
Frame 4
stop();
Instance of Symbol 107 MovieClip "answer" in Frame 4
onClipEvent (load) { _visible = false; }
Frame 5
stop();
Instance of Symbol 111 MovieClip "answer" in Frame 5
onClipEvent (load) { _visible = false; }
Frame 6
stop();
Instance of Symbol 115 MovieClip "answer" in Frame 6
onClipEvent (load) { _visible = false; }
Frame 7
stop();
Instance of Symbol 119 MovieClip "answer" in Frame 7
onClipEvent (load) { _visible = false; }
Frame 8
stop();
Instance of Symbol 123 MovieClip "answer" in Frame 8
onClipEvent (load) { _visible = false; }
Frame 9
stop();
Instance of Symbol 127 MovieClip "answer" in Frame 9
onClipEvent (load) { _visible = false; }
Frame 10
stop();
Instance of Symbol 131 MovieClip "answer" in Frame 10
onClipEvent (load) { _visible = false; }
Frame 11
stop();
Instance of Symbol 135 MovieClip "answer" in Frame 11
onClipEvent (load) { _visible = false; }
Frame 12
stop();
Instance of Symbol 139 MovieClip "answer" in Frame 12
onClipEvent (load) { _visible = false; }
Frame 13
stop();
Instance of Symbol 143 MovieClip "answer" in Frame 13
onClipEvent (load) { _visible = false; }
Frame 14
stop();
Instance of Symbol 147 MovieClip "answer" in Frame 14
onClipEvent (load) { _visible = false; }
Frame 15
stop();
Instance of Symbol 151 MovieClip "answer" in Frame 15
onClipEvent (load) { _visible = false; }
Frame 16
stop();
Instance of Symbol 155 MovieClip "answer" in Frame 16
onClipEvent (load) { _visible = false; }
Frame 17
stop();
Instance of Symbol 159 MovieClip "answer" in Frame 17
onClipEvent (load) { _visible = false; }
Frame 18
stop();
Instance of Symbol 163 MovieClip "answer" in Frame 18
onClipEvent (load) { _visible = false; }
Frame 19
stop();
Instance of Symbol 167 MovieClip "answer" in Frame 19
onClipEvent (load) { _visible = false; }
Frame 20
stop();
Instance of Symbol 171 MovieClip "answer" in Frame 20
onClipEvent (load) { _visible = false; }
Frame 21
stop();
Instance of Symbol 175 MovieClip "answer" in Frame 21
onClipEvent (load) { _visible = false; }
Frame 22
stop();
Instance of Symbol 179 MovieClip "answer" in Frame 22
onClipEvent (load) { _visible = false; }
Frame 23
stop();
Instance of Symbol 183 MovieClip "answer" in Frame 23
onClipEvent (load) { _visible = false; }
Frame 24
stop();
Instance of Symbol 187 MovieClip "answer" in Frame 24
onClipEvent (load) { _visible = false; }
Frame 25
stop();
Instance of Symbol 191 MovieClip "answer" in Frame 25
onClipEvent (load) { _visible = false; }
Frame 26
stop();
Instance of Symbol 195 MovieClip "answer" in Frame 26
onClipEvent (load) { _visible = false; }
Frame 27
stop();
Instance of Symbol 199 MovieClip "answer" in Frame 27
onClipEvent (load) { _visible = false; }
Frame 28
stop();
Instance of Symbol 203 MovieClip "answer" in Frame 28
onClipEvent (load) { _visible = false; }
Frame 29
stop();
Instance of Symbol 207 MovieClip "answer" in Frame 29
onClipEvent (load) { _visible = false; }
Frame 30
stop();
Instance of Symbol 211 MovieClip "answer" in Frame 30
onClipEvent (load) { _visible = false; }
Frame 31
stop();
Instance of Symbol 215 MovieClip "answer" in Frame 31
onClipEvent (load) { _visible = false; }
Frame 32
stop();
Instance of Symbol 219 MovieClip "answer" in Frame 32
onClipEvent (load) { _visible = false; }
Frame 33
stop();
Instance of Symbol 223 MovieClip "answer" in Frame 33
onClipEvent (load) { _visible = false; }
Frame 34
stop();
Instance of Symbol 227 MovieClip "answer" in Frame 34
onClipEvent (load) { _visible = false; }
Frame 35
stop();
Instance of Symbol 231 MovieClip "answer" in Frame 35
onClipEvent (load) { _visible = false; }
Frame 36
stop();
Instance of Symbol 235 MovieClip "answer" in Frame 36
onClipEvent (load) { _visible = false; }
Frame 37
stop();
Instance of Symbol 239 MovieClip "answer" in Frame 37
onClipEvent (load) { _visible = false; }
Frame 38
stop();
Instance of Symbol 243 MovieClip "answer" in Frame 38
onClipEvent (load) { _visible = false; }
Frame 39
stop();
Instance of Symbol 247 MovieClip "answer" in Frame 39
onClipEvent (load) { _visible = false; }
Frame 40
stop();
Instance of Symbol 251 MovieClip "answer" in Frame 40
onClipEvent (load) { _visible = false; }
Frame 41
stop();
Instance of Symbol 255 MovieClip "answer" in Frame 41
onClipEvent (load) { _visible = false; }
Frame 42
stop();
Instance of Symbol 259 MovieClip "answer" in Frame 42
onClipEvent (load) { _visible = false; }
Frame 43
stop();
Instance of Symbol 263 MovieClip "answer" in Frame 43
onClipEvent (load) { _visible = false; }
Frame 44
stop();
Instance of Symbol 267 MovieClip "answer" in Frame 44
onClipEvent (load) { _visible = false; }
Frame 45
stop();
Instance of Symbol 271 MovieClip "answer" in Frame 45
onClipEvent (load) { _visible = false; }
Frame 46
stop();
Instance of Symbol 275 MovieClip "answer" in Frame 46
onClipEvent (load) { _visible = false; }
Frame 47
stop();
Instance of Symbol 279 MovieClip "answer" in Frame 47
onClipEvent (load) { _visible = false; }
Frame 48
stop();
Instance of Symbol 283 MovieClip "answer" in Frame 48
onClipEvent (load) { _visible = false; }
Frame 49
stop();
Instance of Symbol 287 MovieClip "answer" in Frame 49
onClipEvent (load) { _visible = false; }
Frame 50
stop();
Instance of Symbol 291 MovieClip "answer" in Frame 50
onClipEvent (load) { _visible = false; }
Frame 51
stop();
Instance of Symbol 295 MovieClip "answer" in Frame 51
onClipEvent (load) { _visible = false; }
Frame 52
stop();
Instance of Symbol 299 MovieClip "answer" in Frame 52
onClipEvent (load) { _visible = false; }
Frame 53
stop();
Instance of Symbol 303 MovieClip "answer" in Frame 53
onClipEvent (load) { _visible = false; }
Frame 54
stop();
Instance of Symbol 307 MovieClip "answer" in Frame 54
onClipEvent (load) { _visible = false; }
Frame 55
stop();
Instance of Symbol 311 MovieClip "answer" in Frame 55
onClipEvent (load) { _visible = false; }
Frame 56
stop();
Instance of Symbol 315 MovieClip "answer" in Frame 56
onClipEvent (load) { _visible = false; }
Frame 57
stop();
Instance of Symbol 319 MovieClip "answer" in Frame 57
onClipEvent (load) { _visible = false; }
Frame 58
stop();
Instance of Symbol 323 MovieClip "answer" in Frame 58
onClipEvent (load) { _visible = false; }
Frame 59
stop();
Instance of Symbol 327 MovieClip "answer" in Frame 59
onClipEvent (load) { _visible = false; }
Frame 60
stop();
Instance of Symbol 331 MovieClip "answer" in Frame 60
onClipEvent (load) { _visible = false; }
Frame 61
stop();
Instance of Symbol 335 MovieClip "answer" in Frame 61
onClipEvent (load) { _visible = false; }
Frame 62
stop();
Instance of Symbol 339 MovieClip "answer" in Frame 62
onClipEvent (load) { _visible = false; }
Frame 63
stop();
Instance of Symbol 343 MovieClip "answer" in Frame 63
onClipEvent (load) { _visible = false; }
Frame 64
stop();
Instance of Symbol 347 MovieClip "answer" in Frame 64
onClipEvent (load) { _visible = false; }
Frame 65
stop();
Instance of Symbol 351 MovieClip "answer" in Frame 65
onClipEvent (load) { _visible = false; }
Frame 66
stop();
Instance of Symbol 355 MovieClip "answer" in Frame 66
onClipEvent (load) { _visible = false; }
Frame 67
stop();
Instance of Symbol 359 MovieClip "answer" in Frame 67
onClipEvent (load) { _visible = false; }
Frame 68
stop();
Instance of Symbol 363 MovieClip "answer" in Frame 68
onClipEvent (load) { _visible = false; }
Frame 69
stop();
Instance of Symbol 367 MovieClip "answer" in Frame 69
onClipEvent (load) { _visible = false; }
Frame 70
stop();
Instance of Symbol 371 MovieClip "answer" in Frame 70
onClipEvent (load) { _visible = false; }
Frame 71
stop();
Instance of Symbol 375 MovieClip "answer" in Frame 71
onClipEvent (load) { _visible = false; }
Frame 72
stop();
Instance of Symbol 379 MovieClip "answer" in Frame 72
onClipEvent (load) { _visible = false; }
Frame 73
stop();
Instance of Symbol 383 MovieClip "answer" in Frame 73
onClipEvent (load) { _visible = false; }
Frame 74
stop();
Instance of Symbol 387 MovieClip "answer" in Frame 74
onClipEvent (load) { _visible = false; }
Frame 75
stop();
Instance of Symbol 391 MovieClip "answer" in Frame 75
onClipEvent (load) { _visible = false; }
Frame 76
stop();
Instance of Symbol 395 MovieClip "answer" in Frame 76
onClipEvent (load) { _visible = false; }
Frame 77
stop();
Instance of Symbol 399 MovieClip "answer" in Frame 77
onClipEvent (load) { _visible = false; }
Frame 78
stop();
Instance of Symbol 403 MovieClip "answer" in Frame 78
onClipEvent (load) { _visible = false; }
Frame 79
stop();
Instance of Symbol 407 MovieClip "answer" in Frame 79
onClipEvent (load) { _visible = false; }
Frame 80
stop();
Instance of Symbol 411 MovieClip "answer" in Frame 80
onClipEvent (load) { _visible = false; }
Frame 81
stop();
Instance of Symbol 415 MovieClip "answer" in Frame 81
onClipEvent (load) { _visible = false; }
Frame 82
stop();
Instance of Symbol 419 MovieClip "answer" in Frame 82
onClipEvent (load) { _visible = false; }
Frame 83
stop();
Instance of Symbol 423 MovieClip "answer" in Frame 83
onClipEvent (load) { _visible = false; }
Frame 84
stop();
Instance of Symbol 427 MovieClip "answer" in Frame 84
onClipEvent (load) { _visible = false; }
Frame 85
stop();
Instance of Symbol 431 MovieClip "answer" in Frame 85
onClipEvent (load) { _visible = false; }
Frame 86
stop();
Instance of Symbol 435 MovieClip "answer" in Frame 86
onClipEvent (load) { _visible = false; }
Frame 87
stop();
Instance of Symbol 439 MovieClip "answer" in Frame 87
onClipEvent (load) { _visible = false; }
Frame 88
stop();
Instance of Symbol 443 MovieClip "answer" in Frame 88
onClipEvent (load) { _visible = false; }
Frame 89
stop();
Instance of Symbol 447 MovieClip "answer" in Frame 89
onClipEvent (load) { _visible = false; }
Frame 90
stop();
Instance of Symbol 451 MovieClip "answer" in Frame 90
onClipEvent (load) { _visible = false; }
Frame 91
stop();
Instance of Symbol 455 MovieClip "answer" in Frame 91
onClipEvent (load) { _visible = false; }
Frame 92
stop();
Instance of Symbol 459 MovieClip "answer" in Frame 92
onClipEvent (load) { _visible = false; }
Frame 93
stop();
Instance of Symbol 62 MovieClip "answer" in Frame 93
onClipEvent (load) { _visible = false; }
Frame 94
stop();
Instance of Symbol 465 MovieClip "answer" in Frame 94
onClipEvent (load) { _visible = false; }
Frame 95
stop();
Instance of Symbol 469 MovieClip "answer" in Frame 95
onClipEvent (load) { _visible = false; }
Frame 96
stop();
Instance of Symbol 473 MovieClip "answer" in Frame 96
onClipEvent (load) { _visible = false; }
Frame 97
stop();
Instance of Symbol 477 MovieClip "answer" in Frame 97
onClipEvent (load) { _visible = false; }
Frame 98
stop();
Instance of Symbol 481 MovieClip "answer" in Frame 98
onClipEvent (load) { _visible = false; }
Frame 99
stop();
Instance of Symbol 485 MovieClip "answer" in Frame 99
onClipEvent (load) { _visible = false; }
Frame 100
stop();
Instance of Symbol 489 MovieClip "answer" in Frame 100
onClipEvent (load) { _visible = false; }
Frame 101
stop();
Instance of Symbol 493 MovieClip "answer" in Frame 101
onClipEvent (load) { _visible = false; }
Frame 102
stop();
Instance of Symbol 497 MovieClip "answer" in Frame 102
onClipEvent (load) { _visible = false; }
Frame 103
stop();
Instance of Symbol 501 MovieClip "answer" in Frame 103
onClipEvent (load) { _visible = false; }
Frame 104
stop();
Instance of Symbol 505 MovieClip "answer" in Frame 104
onClipEvent (load) { _visible = false; }
Frame 105
stop();
Instance of Symbol 509 MovieClip "answer" in Frame 105
onClipEvent (load) { _visible = false; }
Frame 106
stop();
Instance of Symbol 513 MovieClip "answer" in Frame 106
onClipEvent (load) { _visible = false; }
Frame 107
stop();
Instance of Symbol 517 MovieClip "answer" in Frame 107
onClipEvent (load) { _visible = false; }
Frame 108
stop();
Instance of Symbol 521 MovieClip "answer" in Frame 108
onClipEvent (load) { _visible = false; }
Frame 109
stop();
Instance of Symbol 525 MovieClip "answer" in Frame 109
onClipEvent (load) { _visible = false; }
Frame 110
stop();
Instance of Symbol 529 MovieClip "answer" in Frame 110
onClipEvent (load) { _visible = false; }
Frame 111
stop();
Instance of Symbol 533 MovieClip "answer" in Frame 111
onClipEvent (load) { _visible = false; }
Frame 112
stop();
Instance of Symbol 537 MovieClip "answer" in Frame 112
onClipEvent (load) { _visible = false; }
Frame 113
stop();
Instance of Symbol 541 MovieClip "answer" in Frame 113
onClipEvent (load) { _visible = false; }
Frame 114
stop();
Instance of Symbol 545 MovieClip "answer" in Frame 114
onClipEvent (load) { _visible = false; }
Frame 115
stop();
Instance of Symbol 549 MovieClip "answer" in Frame 115
onClipEvent (load) { _visible = false; }
Frame 116
stop();
Instance of Symbol 553 MovieClip "answer" in Frame 116
onClipEvent (load) { _visible = false; }
Frame 117
stop();
Instance of Symbol 557 MovieClip "answer" in Frame 117
onClipEvent (load) { _visible = false; }
Frame 118
stop();
Instance of Symbol 561 MovieClip "answer" in Frame 118
onClipEvent (load) { _visible = false; }
Frame 119
stop();
Instance of Symbol 565 MovieClip "answer" in Frame 119
onClipEvent (load) { _visible = false; }
Frame 120
stop();
Instance of Symbol 569 MovieClip "answer" in Frame 120
onClipEvent (load) { _visible = false; }
Frame 121
stop();
Instance of Symbol 573 MovieClip "answer" in Frame 121
onClipEvent (load) { _visible = false; }
Frame 122
stop();
Instance of Symbol 577 MovieClip "answer" in Frame 122
onClipEvent (load) { _visible = false; }
Frame 123
stop();
Instance of Symbol 581 MovieClip "answer" in Frame 123
onClipEvent (load) { _visible = false; }
Frame 124
stop();
Instance of Symbol 585 MovieClip "answer" in Frame 124
onClipEvent (load) { _visible = false; }
Frame 125
stop();
Instance of Symbol 589 MovieClip "answer" in Frame 125
onClipEvent (load) { _visible = false; }
Frame 126
stop();
Instance of Symbol 593 MovieClip "answer" in Frame 126
onClipEvent (load) { _visible = false; }
Frame 127
stop();
Instance of Symbol 597 MovieClip "answer" in Frame 127
onClipEvent (load) { _visible = false; }
Frame 128
stop();
Instance of Symbol 601 MovieClip "answer" in Frame 128
onClipEvent (load) { _visible = false; }
Frame 129
stop();
Instance of Symbol 605 MovieClip "answer" in Frame 129
onClipEvent (load) { _visible = false; }
Frame 130
stop();
Instance of Symbol 609 MovieClip "answer" in Frame 130
onClipEvent (load) { _visible = false; }
Frame 131
stop();
Instance of Symbol 613 MovieClip "answer" in Frame 131
onClipEvent (load) { _visible = false; }
Frame 132
stop();
Instance of Symbol 617 MovieClip "answer" in Frame 132
onClipEvent (load) { _visible = false; }
Frame 133
stop();
Instance of Symbol 621 MovieClip "answer" in Frame 133
onClipEvent (load) { _visible = false; }
Frame 134
stop();
Instance of Symbol 625 MovieClip "answer" in Frame 134
onClipEvent (load) { _visible = false; }
Frame 135
stop();
Instance of Symbol 629 MovieClip "answer" in Frame 135
onClipEvent (load) { _visible = false; }
Frame 136
stop();
Instance of Symbol 633 MovieClip "answer" in Frame 136
onClipEvent (load) { _visible = false; }
Frame 137
stop();
Instance of Symbol 637 MovieClip "answer" in Frame 137
onClipEvent (load) { _visible = false; }
Frame 138
stop();
Instance of Symbol 641 MovieClip "answer" in Frame 138
onClipEvent (load) { _visible = false; }
Frame 139
stop();
Instance of Symbol 645 MovieClip "answer" in Frame 139
onClipEvent (load) { _visible = false; }
Frame 140
stop();
Instance of Symbol 649 MovieClip "answer" in Frame 140
onClipEvent (load) { _visible = false; }
Frame 141
stop();
Instance of Symbol 653 MovieClip "answer" in Frame 141
onClipEvent (load) { _visible = false; }
Frame 142
stop();
Instance of Symbol 657 MovieClip "answer" in Frame 142
onClipEvent (load) { _visible = false; }
Frame 143
stop();
Instance of Symbol 661 MovieClip "answer" in Frame 143
onClipEvent (load) { _visible = false; }
Frame 144
stop();
Instance of Symbol 665 MovieClip "answer" in Frame 144
onClipEvent (load) { _visible = false; }
Frame 145
stop();
Instance of Symbol 669 MovieClip "answer" in Frame 145
onClipEvent (load) { _visible = false; }
Frame 146
stop();
Instance of Symbol 673 MovieClip "answer" in Frame 146
onClipEvent (load) { _visible = false; }
Frame 147
stop();
Instance of Symbol 677 MovieClip "answer" in Frame 147
onClipEvent (load) { _visible = false; }
Frame 148
stop();
Instance of Symbol 681 MovieClip "answer" in Frame 148
onClipEvent (load) { _visible = false; }
Frame 149
stop();
Instance of Symbol 685 MovieClip "answer" in Frame 149
onClipEvent (load) { _visible = false; }
Frame 150
stop();
Instance of Symbol 689 MovieClip "answer" in Frame 150
onClipEvent (load) { _visible = false; }
Frame 151
stop();
Instance of Symbol 693 MovieClip "answer" in Frame 151
onClipEvent (load) { _visible = false; }
Frame 152
stop();
Instance of Symbol 697 MovieClip "answer" in Frame 152
onClipEvent (load) { _visible = false; }
Frame 153
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?"; Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature."; Question2 = "What is the major difference between a workstation and a server?"; Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network."; Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?"; Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |."; Question4 = "What command will show you the path of the directory you are currently working in?"; Answer4 = "The pwd command will show you the path of the directory you are currently in."; Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?"; Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories."; Question6 = "What is the purpose of awk?"; Answer6 = "It is a scripting language that provides complex pattern-matching facilities."; Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?"; Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories."; Question8 = "How can PAM be used to help restrict user access?"; Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password."; Question9 = "Why is it dangerous to constantly log in as the root user?"; Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so."; Question10 = "What command can be used to execute a single command with alternative permission?"; Answer10 = "The sudo command can be used to execute a single command with alternative permission."; Question11 = "What utility allows you to edit disk quota information?"; Answer11 = "The edquota utility allows you to edit disk quota information."; Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?"; Answer12 = "The chage command allows you to modify account settings relating to account expiration."; Question13 = "What character does Linux use to symbolize the root directory?"; Answer13 = "The root directory is Linux is represented by /."; Question14 = "Why would a RAID array be useful and what is it?"; Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data."; Question15 = "What programs does Linux use to write to optical media?"; Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord."; Question16 = "What is the purpose of the nice command?"; Answer16 = "It allows you to run a program with a specified priority."; Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?"; Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection."; Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?"; Answer18 = "The route add command is used to add an entry to the routing table."; Question19 = "What is the purpose of creating a baseline?"; Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in."; Question20 = "What does the output of the uptime utility show?"; Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes)."; Question21 = "What type of information is typically included in installation log files?"; Answer21 = "The names of packages installed and error messages"; Question22 = "How many serial ATA devices can fit on a single serial ATA chain?"; Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)"; Question23 = "What command is used to create a filesystem?"; Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer."; Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?"; Answer24 = "Ghostscript"; Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?"; Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code."; Question26 = "What software component determines whether Linux supports a given SCSI host adapter?"; Answer26 = "The Linux kernel"; Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?"; Answer27 = "In the BIOS, which is stored on a chip on the motherboard"; Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?"; Answer28 = "ls /usr/local/bin"; Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?"; Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't."; Question30 = "How can you identify processes that consume an inordinate amount of CPU time?"; Answer30 = "The top utility or the ps utility with appropriate switches"; Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?"; Answer31 = "Type lilo to install a new boot loader that reflects your modifications."; Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?"; Answer32 = "traceroute"; Question33 = "What system associates IP addresses with hostnames?"; Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers"; Question34 = "What's the most common type of local network hardware today?"; Answer34 = "Ethernet"; Question35 = "What program displays information on the jobs in a print queue?"; Answer35 = "lpq"; Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?"; Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions."; Question37 = "What methods are most commonly used to shut down a Linux system?"; Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this."; Question38 = "What types of problems most often generate kernel oops messages?"; Answer38 = "Hardware malfunctions and kernel bugs"; Question39 = "What do the Exim and Postfix programs have in common?"; Answer39 = "They're both SMTP mail servers."; Question40 = "When should you set the root password?"; Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation."; Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?"; Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition."; Question42 = "What is accomplished by the command chmod a+x scriptfile?"; Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable."; Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?"; Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password."; Question44 = "When you configure a system to use a static IP address, what information do you enter manually?"; Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address"; Question45 = "What command can you use to discover how much space is being used by files in a specified directory?"; Answer45 = "du"; Question46 = "How can you locate stray files belonging to a user when deleting that user's account?"; Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504."; Question47 = "In what two forms does Linux swap space generally come?"; Answer47 = "A dedicated swap partition or a swap file within a regular filesystem"; Question48 = "What pull protocols are most commonly used for e-mail retrieval?"; Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)"; Question49 = "Where do network servers typically record error messages?"; Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file"; Question50 = "What OSs can GRUB boot?"; Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS"; Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?"; Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally."; Question52 = "Which common package management systems include support for dependency tracking?"; Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems"; Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?"; Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation."; Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?"; Answer54 = "Samba"; Question55 = "Where can the GRUB boot loader code be installed?"; Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well."; Question56 = "What function does the fsck program serve?"; Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)"; Question57 = "When a user reports a problem in a vague way, what should you do?"; Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself."; Question58 = "What user IDs (UIDs) do ordinary user accounts use?"; Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher."; Question59 = "What types of manipulations can you perform on a password base to make it more secure?"; Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words."; Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?"; Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins."; Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?"; Answer61 = "ifconfig eth0"; Question62 = "How do man pages and HOWTO documents differ?"; Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics."; Question63 = "What is the most common choice of software to implement as a Web server in Linux?"; Answer63 = "Apache"; Question64 = "What type of mouse is ideal for use in Linux?"; Answer64 = "A three-button mouse; many X programs assume three buttons are available."; Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?"; Answer65 = "apt-get"; Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?"; Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC."; Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?"; Answer67 = "Reconfigure the kernel and recompile it from source code."; Question68 = "What modes does the Vi editor support, and what are they for?"; Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text)."; Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?"; Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet."; Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?"; Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS."; Question71 = "Who should have access to password files stored on a floppy disk?"; Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files."; Question72 = "Where is a good place to keep an administrator's logbook?"; Answer72 = "In a paper notebook near the computer"; Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?"; Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly."; Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?"; Answer74 = "$ (preceding the variable name)"; Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?"; Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem."; Question76 = "What method does the locate command use to find files?"; Answer76 = "It searches a database that it updates periodically via cron jobs."; Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?"; Answer77 = "PC Card, aka PCMCIA"; Question78 = "What happens to a process if its parent is killed or exits?"; Answer78 = "It's adopted by another process (typically init)."; Question79 = "Why might you create a separate partition for /usr/local?"; Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks"; Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?"; Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A."; Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?"; Answer81 = "mt"; Question82 = "What devices must be terminated in a SCSI chain?"; Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)"; Question83 = "What command is used to submit a print job in Linux?"; Answer83 = "lpr"; Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?"; Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)"; Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?"; Answer85 = "startx"; Question86 = "What does the mv command accomplish?"; Answer86 = "It moves or renames a file or directory."; Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?"; Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic"; Question88 = "What file directs the Linux boot process after the kernel has loaded?"; Answer88 = "/etc/inittab"; Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?"; Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections."; Question90 = "What major Linux distribution uses binary tarballs for package distribution?"; Answer90 = "Slackware"; Question91 = "What are the two most common busses that connect to plug-in cards?"; Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus."; Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?"; Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers."; Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?"; Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like"; Question94 = "What happens when you try to run a program that requires a library that's not installed?"; Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)"; Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?"; Answer95 = "hdparm, specifically its -X parameter"; Question96 = "What boot methods are commonly used by Linux installers?"; Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows."; Question97 = "How much damage can intruders do if they are given physical access to a computer?"; Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer."; Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?"; Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number."; Question99 = "What does the /etc/inetd.conf file control?"; Answer99 = "The inetd server, which launches other servers only when those servers are needed"; Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?"; Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups"; Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?"; Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)"; Question102 = "What conditions must be met to use DHCP?"; Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network."; Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?"; Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security."; Question104 = "What are the names of two power management protocols common on laptop computers?"; Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)"; Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?"; Answer105 = "Ask your network administrator. Do not configure a system with a random IP address."; Question106 = "Is the 2.6.9 kernel a development or a stable kernel?"; Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series."; Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?"; Answer107 = "Delete george's accounts."; Question108 = "When should you use shadow passwords?"; Answer108 = "Almost always; shadow passwords substantially improve local security."; Question109 = "Who may change the owner of a file?"; Answer109 = "The file's current owner or root"; Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?"; Answer110 = "Patch and recompile your Linux kernel."; Question111 = "What is necessary to give users the choice of using KDE or GNOME?"; Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts."; Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?"; Answer112 = "A switch"; Question113 = "Where can you go to find out if your video card is supported by Linux?"; Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers."; Question114 = "How do you tell kill what process you want to terminate?"; Answer114 = "You pass kill the target process's process ID (PID) number."; Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?"; Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible."; Question116 = "What does the TERM environment variable control?"; Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning"; Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?"; Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options."; Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?"; Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display."; Question119 = "What does the modprobe command do?"; Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends."; Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?"; Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage."; Question121 = "How do you tell Linux to install from a network server?"; Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution."; Question122 = "What command removes a print job from a print queue?"; Answer122 = "lprm"; Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?"; Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely"; Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?"; Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this."; Question125 = "In what file is group membership recorded?"; Answer125 = "/etc/group"; Question126 = "What command do you use to switch the current runlevel?"; Answer126 = "telinit"; Question127 = "Under what circumstances is Telnet a good remote administration tool?"; Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise."; Question128 = "How do you create a user cron job?"; Answer128 = "Use the crontab program."; Question129 = "Why might you want to delay creating user accounts until after installation?"; Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation."; Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?"; Answer130 = "setserial"; Question131 = "What are the most important general-purpose log files on most Linux systems?"; Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)"; Question132 = "What three factors does X use to compute the refresh rate you'll see?"; Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution"; Question133 = "What type of information does the df command return?"; Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems"; Question134 = "What are the settings for serial ATA disks?"; Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically."; Question135 = "Why are SUID root programs rare?"; Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program."; Question136 = "What are some common sources of emergency disk sets?"; Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM"; Question137 = "You want to kill a process by name. What command can you use to do this?"; Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill."; Question138 = "What backup medium is best suited to long-term archival storage, and why?"; Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)"; Question139 = "What tools are most commonly used to install or remove Debian packages?"; Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these"; Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?"; Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller."; Question141 = "What kernel should you use to obtain support for many USB devices?"; Answer141 = "2.2.18 or later, or 2.4.0 or later"; Question142 = "What is the function of the tail command?"; Answer142 = "It displays the last few lines (10 by default) of a file."; Question143 = "What types of errors will leave traces in system log files?"; Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes."; Question144 = "What type of software can block access to any or all network ports on a computer?"; Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)"; Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?"; Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions."; Question146 = "What does the cp command accomplish?"; Answer146 = "It copies one or more files."; Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?"; Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question."; Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?"; Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion."; Question149 = "What is the best way to stop a server that was started through a SysV startup script?"; Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop."; Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?"; Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job."; stop(); stop();
Instance of Symbol 90 MovieClip "answer" in Frame 153
onClipEvent (load) { _visible = false; }
Frame 154
stop();
Instance of Symbol 107 MovieClip "answer" in Frame 154
onClipEvent (load) { _visible = false; }
Frame 155
stop();
Instance of Symbol 111 MovieClip "answer" in Frame 155
onClipEvent (load) { _visible = false; }
Frame 156
stop();
Instance of Symbol 115 MovieClip "answer" in Frame 156
onClipEvent (load) { _visible = false; }
Frame 157
stop();
Instance of Symbol 119 MovieClip "answer" in Frame 157
onClipEvent (load) { _visible = false; }
Frame 158
stop();
Instance of Symbol 123 MovieClip "answer" in Frame 158
onClipEvent (load) { _visible = false; }
Frame 159
stop();
Instance of Symbol 127 MovieClip "answer" in Frame 159
onClipEvent (load) { _visible = false; }
Frame 160
stop();
Instance of Symbol 131 MovieClip "answer" in Frame 160
onClipEvent (load) { _visible = false; }
Frame 161
stop();
Instance of Symbol 135 MovieClip "answer" in Frame 161
onClipEvent (load) { _visible = false; }
Frame 162
stop();
Instance of Symbol 139 MovieClip "answer" in Frame 162
onClipEvent (load) { _visible = false; }
Frame 163
stop();
Instance of Symbol 143 MovieClip "answer" in Frame 163
onClipEvent (load) { _visible = false; }
Frame 164
stop();
Instance of Symbol 147 MovieClip "answer" in Frame 164
onClipEvent (load) { _visible = false; }
Frame 165
stop();
Instance of Symbol 151 MovieClip "answer" in Frame 165
onClipEvent (load) { _visible = false; }
Frame 166
stop();
Instance of Symbol 155 MovieClip "answer" in Frame 166
onClipEvent (load) { _visible = false; }
Frame 167
stop();
Instance of Symbol 159 MovieClip "answer" in Frame 167
onClipEvent (load) { _visible = false; }
Frame 168
stop();
Instance of Symbol 163 MovieClip "answer" in Frame 168
onClipEvent (load) { _visible = false; }
Frame 169
stop();
Instance of Symbol 167 MovieClip "answer" in Frame 169
onClipEvent (load) { _visible = false; }
Frame 170
stop();
Instance of Symbol 171 MovieClip "answer" in Frame 170
onClipEvent (load) { _visible = false; }
Frame 171
stop();
Instance of Symbol 175 MovieClip "answer" in Frame 171
onClipEvent (load) { _visible = false; }
Frame 172
stop();
Instance of Symbol 179 MovieClip "answer" in Frame 172
onClipEvent (load) { _visible = false; }
Frame 173
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?"; Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature."; Question2 = "What is the major difference between a workstation and a server?"; Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network."; Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?"; Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |."; Question4 = "What command will show you the path of the directory you are currently working in?"; Answer4 = "The pwd command will show you the path of the directory you are currently in."; Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?"; Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories."; Question6 = "What is the purpose of awk?"; Answer6 = "It is a scripting language that provides complex pattern-matching facilities."; Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?"; Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories."; Question8 = "How can PAM be used to help restrict user access?"; Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password."; Question9 = "Why is it dangerous to constantly log in as the root user?"; Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so."; Question10 = "What command can be used to execute a single command with alternative permission?"; Answer10 = "The sudo command can be used to execute a single command with alternative permission."; Question11 = "What utility allows you to edit disk quota information?"; Answer11 = "The edquota utility allows you to edit disk quota information."; Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?"; Answer12 = "The chage command allows you to modify account settings relating to account expiration."; Question13 = "What character does Linux use to symbolize the root directory?"; Answer13 = "The root directory is Linux is represented by /."; Question14 = "Why would a RAID array be useful and what is it?"; Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data."; Question15 = "What programs does Linux use to write to optical media?"; Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord."; Question16 = "What is the purpose of the nice command?"; Answer16 = "It allows you to run a program with a specified priority."; Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?"; Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection."; Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?"; Answer18 = "The route add command is used to add an entry to the routing table."; Question19 = "What is the purpose of creating a baseline?"; Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in."; Question20 = "What does the output of the uptime utility show?"; Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes)."; Question21 = "What type of information is typically included in installation log files?"; Answer21 = "The names of packages installed and error messages"; Question22 = "How many serial ATA devices can fit on a single serial ATA chain?"; Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)"; Question23 = "What command is used to create a filesystem?"; Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer."; Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?"; Answer24 = "Ghostscript"; Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?"; Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code."; Question26 = "What software component determines whether Linux supports a given SCSI host adapter?"; Answer26 = "The Linux kernel"; Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?"; Answer27 = "In the BIOS, which is stored on a chip on the motherboard"; Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?"; Answer28 = "ls /usr/local/bin"; Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?"; Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't."; Question30 = "How can you identify processes that consume an inordinate amount of CPU time?"; Answer30 = "The top utility or the ps utility with appropriate switches"; Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?"; Answer31 = "Type lilo to install a new boot loader that reflects your modifications."; Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?"; Answer32 = "traceroute"; Question33 = "What system associates IP addresses with hostnames?"; Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers"; Question34 = "What's the most common type of local network hardware today?"; Answer34 = "Ethernet"; Question35 = "What program displays information on the jobs in a print queue?"; Answer35 = "lpq"; Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?"; Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions."; Question37 = "What methods are most commonly used to shut down a Linux system?"; Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this."; Question38 = "What types of problems most often generate kernel oops messages?"; Answer38 = "Hardware malfunctions and kernel bugs"; Question39 = "What do the Exim and Postfix programs have in common?"; Answer39 = "They're both SMTP mail servers."; Question40 = "When should you set the root password?"; Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation."; Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?"; Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition."; Question42 = "What is accomplished by the command chmod a+x scriptfile?"; Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable."; Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?"; Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password."; Question44 = "When you configure a system to use a static IP address, what information do you enter manually?"; Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address"; Question45 = "What command can you use to discover how much space is being used by files in a specified directory?"; Answer45 = "du"; Question46 = "How can you locate stray files belonging to a user when deleting that user's account?"; Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504."; Question47 = "In what two forms does Linux swap space generally come?"; Answer47 = "A dedicated swap partition or a swap file within a regular filesystem"; Question48 = "What pull protocols are most commonly used for e-mail retrieval?"; Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)"; Question49 = "Where do network servers typically record error messages?"; Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file"; Question50 = "What OSs can GRUB boot?"; Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS"; Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?"; Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally."; Question52 = "Which common package management systems include support for dependency tracking?"; Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems"; Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?"; Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation."; Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?"; Answer54 = "Samba"; Question55 = "Where can the GRUB boot loader code be installed?"; Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well."; Question56 = "What function does the fsck program serve?"; Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)"; Question57 = "When a user reports a problem in a vague way, what should you do?"; Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself."; Question58 = "What user IDs (UIDs) do ordinary user accounts use?"; Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher."; Question59 = "What types of manipulations can you perform on a password base to make it more secure?"; Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words."; Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?"; Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins."; Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?"; Answer61 = "ifconfig eth0"; Question62 = "How do man pages and HOWTO documents differ?"; Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics."; Question63 = "What is the most common choice of software to implement as a Web server in Linux?"; Answer63 = "Apache"; Question64 = "What type of mouse is ideal for use in Linux?"; Answer64 = "A three-button mouse; many X programs assume three buttons are available."; Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?"; Answer65 = "apt-get"; Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?"; Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC."; Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?"; Answer67 = "Reconfigure the kernel and recompile it from source code."; Question68 = "What modes does the Vi editor support, and what are they for?"; Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text)."; Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?"; Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet."; Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?"; Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS."; Question71 = "Who should have access to password files stored on a floppy disk?"; Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files."; Question72 = "Where is a good place to keep an administrator's logbook?"; Answer72 = "In a paper notebook near the computer"; Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?"; Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly."; Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?"; Answer74 = "$ (preceding the variable name)"; Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?"; Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem."; Question76 = "What method does the locate command use to find files?"; Answer76 = "It searches a database that it updates periodically via cron jobs."; Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?"; Answer77 = "PC Card, aka PCMCIA"; Question78 = "What happens to a process if its parent is killed or exits?"; Answer78 = "It's adopted by another process (typically init)."; Question79 = "Why might you create a separate partition for /usr/local?"; Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks"; Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?"; Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A."; Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?"; Answer81 = "mt"; Question82 = "What devices must be terminated in a SCSI chain?"; Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)"; Question83 = "What command is used to submit a print job in Linux?"; Answer83 = "lpr"; Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?"; Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)"; Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?"; Answer85 = "startx"; Question86 = "What does the mv command accomplish?"; Answer86 = "It moves or renames a file or directory."; Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?"; Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic"; Question88 = "What file directs the Linux boot process after the kernel has loaded?"; Answer88 = "/etc/inittab"; Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?"; Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections."; Question90 = "What major Linux distribution uses binary tarballs for package distribution?"; Answer90 = "Slackware"; Question91 = "What are the two most common busses that connect to plug-in cards?"; Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus."; Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?"; Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers."; Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?"; Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like"; Question94 = "What happens when you try to run a program that requires a library that's not installed?"; Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)"; Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?"; Answer95 = "hdparm, specifically its -X parameter"; Question96 = "What boot methods are commonly used by Linux installers?"; Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows."; Question97 = "How much damage can intruders do if they are given physical access to a computer?"; Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer."; Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?"; Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number."; Question99 = "What does the /etc/inetd.conf file control?"; Answer99 = "The inetd server, which launches other servers only when those servers are needed"; Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?"; Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups"; Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?"; Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)"; Question102 = "What conditions must be met to use DHCP?"; Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network."; Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?"; Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security."; Question104 = "What are the names of two power management protocols common on laptop computers?"; Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)"; Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?"; Answer105 = "Ask your network administrator. Do not configure a system with a random IP address."; Question106 = "Is the 2.6.9 kernel a development or a stable kernel?"; Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series."; Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?"; Answer107 = "Delete george's accounts."; Question108 = "When should you use shadow passwords?"; Answer108 = "Almost always; shadow passwords substantially improve local security."; Question109 = "Who may change the owner of a file?"; Answer109 = "The file's current owner or root"; Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?"; Answer110 = "Patch and recompile your Linux kernel."; Question111 = "What is necessary to give users the choice of using KDE or GNOME?"; Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts."; Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?"; Answer112 = "A switch"; Question113 = "Where can you go to find out if your video card is supported by Linux?"; Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers."; Question114 = "How do you tell kill what process you want to terminate?"; Answer114 = "You pass kill the target process's process ID (PID) number."; Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?"; Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible."; Question116 = "What does the TERM environment variable control?"; Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning"; Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?"; Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options."; Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?"; Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display."; Question119 = "What does the modprobe command do?"; Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends."; Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?"; Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage."; Question121 = "How do you tell Linux to install from a network server?"; Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution."; Question122 = "What command removes a print job from a print queue?"; Answer122 = "lprm"; Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?"; Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely"; Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?"; Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this."; Question125 = "In what file is group membership recorded?"; Answer125 = "/etc/group"; Question126 = "What command do you use to switch the current runlevel?"; Answer126 = "telinit"; Question127 = "Under what circumstances is Telnet a good remote administration tool?"; Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise."; Question128 = "How do you create a user cron job?"; Answer128 = "Use the crontab program."; Question129 = "Why might you want to delay creating user accounts until after installation?"; Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation."; Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?"; Answer130 = "setserial"; Question131 = "What are the most important general-purpose log files on most Linux systems?"; Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)"; Question132 = "What three factors does X use to compute the refresh rate you'll see?"; Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution"; Question133 = "What type of information does the df command return?"; Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems"; Question134 = "What are the settings for serial ATA disks?"; Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically."; Question135 = "Why are SUID root programs rare?"; Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program."; Question136 = "What are some common sources of emergency disk sets?"; Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM"; Question137 = "You want to kill a process by name. What command can you use to do this?"; Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill."; Question138 = "What backup medium is best suited to long-term archival storage, and why?"; Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)"; Question139 = "What tools are most commonly used to install or remove Debian packages?"; Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these"; Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?"; Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller."; Question141 = "What kernel should you use to obtain support for many USB devices?"; Answer141 = "2.2.18 or later, or 2.4.0 or later"; Question142 = "What is the function of the tail command?"; Answer142 = "It displays the last few lines (10 by default) of a file."; Question143 = "What types of errors will leave traces in system log files?"; Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes."; Question144 = "What type of software can block access to any or all network ports on a computer?"; Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)"; Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?"; Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions."; Question146 = "What does the cp command accomplish?"; Answer146 = "It copies one or more files."; Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?"; Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question."; Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?"; Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion."; Question149 = "What is the best way to stop a server that was started through a SysV startup script?"; Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop."; Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?"; Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job."; stop(); stop();
Instance of Symbol 183 MovieClip "answer" in Frame 173
onClipEvent (load) { _visible = false; }
Frame 174
stop();
Instance of Symbol 187 MovieClip "answer" in Frame 174
onClipEvent (load) { _visible = false; }
Frame 175
stop();
Instance of Symbol 191 MovieClip "answer" in Frame 175
onClipEvent (load) { _visible = false; }
Frame 176
stop();
Instance of Symbol 195 MovieClip "answer" in Frame 176
onClipEvent (load) { _visible = false; }
Frame 177
stop();
Instance of Symbol 199 MovieClip "answer" in Frame 177
onClipEvent (load) { _visible = false; }
Frame 178
stop();
Instance of Symbol 203 MovieClip "answer" in Frame 178
onClipEvent (load) { _visible = false; }
Frame 179
stop();
Instance of Symbol 207 MovieClip "answer" in Frame 179
onClipEvent (load) { _visible = false; }
Frame 180
stop();
Instance of Symbol 211 MovieClip "answer" in Frame 180
onClipEvent (load) { _visible = false; }
Frame 181
stop();
Instance of Symbol 215 MovieClip "answer" in Frame 181
onClipEvent (load) { _visible = false; }
Frame 182
stop();
Instance of Symbol 219 MovieClip "answer" in Frame 182
onClipEvent (load) { _visible = false; }
Frame 183
stop();
Instance of Symbol 223 MovieClip "answer" in Frame 183
onClipEvent (load) { _visible = false; }
Frame 184
stop();
Instance of Symbol 227 MovieClip "answer" in Frame 184
onClipEvent (load) { _visible = false; }
Frame 185
stop();
Instance of Symbol 231 MovieClip "answer" in Frame 185
onClipEvent (load) { _visible = false; }
Frame 186
stop();
Instance of Symbol 235 MovieClip "answer" in Frame 186
onClipEvent (load) { _visible = false; }
Frame 187
stop();
Instance of Symbol 239 MovieClip "answer" in Frame 187
onClipEvent (load) { _visible = false; }
Frame 188
stop();
Instance of Symbol 243 MovieClip "answer" in Frame 188
onClipEvent (load) { _visible = false; }
Frame 189
stop();
Instance of Symbol 247 MovieClip "answer" in Frame 189
onClipEvent (load) { _visible = false; }
Frame 190
stop();
Instance of Symbol 251 MovieClip "answer" in Frame 190
onClipEvent (load) { _visible = false; }
Frame 191
stop();
Instance of Symbol 255 MovieClip "answer" in Frame 191
onClipEvent (load) { _visible = false; }
Frame 192
stop();
Instance of Symbol 259 MovieClip "answer" in Frame 192
onClipEvent (load) { _visible = false; }
Frame 193
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?"; Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature."; Question2 = "What is the major difference between a workstation and a server?"; Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network."; Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?"; Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |."; Question4 = "What command will show you the path of the directory you are currently working in?"; Answer4 = "The pwd command will show you the path of the directory you are currently in."; Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?"; Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories."; Question6 = "What is the purpose of awk?"; Answer6 = "It is a scripting language that provides complex pattern-matching facilities."; Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?"; Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories."; Question8 = "How can PAM be used to help restrict user access?"; Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password."; Question9 = "Why is it dangerous to constantly log in as the root user?"; Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so."; Question10 = "What command can be used to execute a single command with alternative permission?"; Answer10 = "The sudo command can be used to execute a single command with alternative permission."; Question11 = "What utility allows you to edit disk quota information?"; Answer11 = "The edquota utility allows you to edit disk quota information."; Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?"; Answer12 = "The chage command allows you to modify account settings relating to account expiration."; Question13 = "What character does Linux use to symbolize the root directory?"; Answer13 = "The root directory is Linux is represented by /."; Question14 = "Why would a RAID array be useful and what is it?"; Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data."; Question15 = "What programs does Linux use to write to optical media?"; Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord."; Question16 = "What is the purpose of the nice command?"; Answer16 = "It allows you to run a program with a specified priority."; Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?"; Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection."; Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?"; Answer18 = "The route add command is used to add an entry to the routing table."; Question19 = "What is the purpose of creating a baseline?"; Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in."; Question20 = "What does the output of the uptime utility show?"; Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes)."; Question21 = "What type of information is typically included in installation log files?"; Answer21 = "The names of packages installed and error messages"; Question22 = "How many serial ATA devices can fit on a single serial ATA chain?"; Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)"; Question23 = "What command is used to create a filesystem?"; Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer."; Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?"; Answer24 = "Ghostscript"; Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?"; Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code."; Question26 = "What software component determines whether Linux supports a given SCSI host adapter?"; Answer26 = "The Linux kernel"; Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?"; Answer27 = "In the BIOS, which is stored on a chip on the motherboard"; Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?"; Answer28 = "ls /usr/local/bin"; Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?"; Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't."; Question30 = "How can you identify processes that consume an inordinate amount of CPU time?"; Answer30 = "The top utility or the ps utility with appropriate switches"; Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?"; Answer31 = "Type lilo to install a new boot loader that reflects your modifications."; Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?"; Answer32 = "traceroute"; Question33 = "What system associates IP addresses with hostnames?"; Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers"; Question34 = "What's the most common type of local network hardware today?"; Answer34 = "Ethernet"; Question35 = "What program displays information on the jobs in a print queue?"; Answer35 = "lpq"; Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?"; Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions."; Question37 = "What methods are most commonly used to shut down a Linux system?"; Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this."; Question38 = "What types of problems most often generate kernel oops messages?"; Answer38 = "Hardware malfunctions and kernel bugs"; Question39 = "What do the Exim and Postfix programs have in common?"; Answer39 = "They're both SMTP mail servers."; Question40 = "When should you set the root password?"; Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation."; Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?"; Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition."; Question42 = "What is accomplished by the command chmod a+x scriptfile?"; Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable."; Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?"; Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password."; Question44 = "When you configure a system to use a static IP address, what information do you enter manually?"; Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address"; Question45 = "What command can you use to discover how much space is being used by files in a specified directory?"; Answer45 = "du"; Question46 = "How can you locate stray files belonging to a user when deleting that user's account?"; Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504."; Question47 = "In what two forms does Linux swap space generally come?"; Answer47 = "A dedicated swap partition or a swap file within a regular filesystem"; Question48 = "What pull protocols are most commonly used for e-mail retrieval?"; Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)"; Question49 = "Where do network servers typically record error messages?"; Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file"; Question50 = "What OSs can GRUB boot?"; Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS"; Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?"; Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally."; Question52 = "Which common package management systems include support for dependency tracking?"; Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems"; Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?"; Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation."; Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?"; Answer54 = "Samba"; Question55 = "Where can the GRUB boot loader code be installed?"; Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well."; Question56 = "What function does the fsck program serve?"; Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)"; Question57 = "When a user reports a problem in a vague way, what should you do?"; Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself."; Question58 = "What user IDs (UIDs) do ordinary user accounts use?"; Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher."; Question59 = "What types of manipulations can you perform on a password base to make it more secure?"; Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words."; Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?"; Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins."; Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?"; Answer61 = "ifconfig eth0"; Question62 = "How do man pages and HOWTO documents differ?"; Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics."; Question63 = "What is the most common choice of software to implement as a Web server in Linux?"; Answer63 = "Apache"; Question64 = "What type of mouse is ideal for use in Linux?"; Answer64 = "A three-button mouse; many X programs assume three buttons are available."; Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?"; Answer65 = "apt-get"; Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?"; Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC."; Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?"; Answer67 = "Reconfigure the kernel and recompile it from source code."; Question68 = "What modes does the Vi editor support, and what are they for?"; Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text)."; Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?"; Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet."; Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?"; Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS."; Question71 = "Who should have access to password files stored on a floppy disk?"; Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files."; Question72 = "Where is a good place to keep an administrator's logbook?"; Answer72 = "In a paper notebook near the computer"; Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?"; Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly."; Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?"; Answer74 = "$ (preceding the variable name)"; Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?"; Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem."; Question76 = "What method does the locate command use to find files?"; Answer76 = "It searches a database that it updates periodically via cron jobs."; Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?"; Answer77 = "PC Card, aka PCMCIA"; Question78 = "What happens to a process if its parent is killed or exits?"; Answer78 = "It's adopted by another process (typically init)."; Question79 = "Why might you create a separate partition for /usr/local?"; Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks"; Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?"; Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A."; Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?"; Answer81 = "mt"; Question82 = "What devices must be terminated in a SCSI chain?"; Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)"; Question83 = "What command is used to submit a print job in Linux?"; Answer83 = "lpr"; Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?"; Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)"; Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?"; Answer85 = "startx"; Question86 = "What does the mv command accomplish?"; Answer86 = "It moves or renames a file or directory."; Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?"; Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic"; Question88 = "What file directs the Linux boot process after the kernel has loaded?"; Answer88 = "/etc/inittab"; Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?"; Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections."; Question90 = "What major Linux distribution uses binary tarballs for package distribution?"; Answer90 = "Slackware"; Question91 = "What are the two most common busses that connect to plug-in cards?"; Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus."; Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?"; Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers."; Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?"; Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like"; Question94 = "What happens when you try to run a program that requires a library that's not installed?"; Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)"; Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?"; Answer95 = "hdparm, specifically its -X parameter"; Question96 = "What boot methods are commonly used by Linux installers?"; Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows."; Question97 = "How much damage can intruders do if they are given physical access to a computer?"; Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer."; Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?"; Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number."; Question99 = "What does the /etc/inetd.conf file control?"; Answer99 = "The inetd server, which launches other servers only when those servers are needed"; Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?"; Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups"; Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?"; Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)"; Question102 = "What conditions must be met to use DHCP?"; Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network."; Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?"; Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security."; Question104 = "What are the names of two power management protocols common on laptop computers?"; Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)"; Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?"; Answer105 = "Ask your network administrator. Do not configure a system with a random IP address."; Question106 = "Is the 2.6.9 kernel a development or a stable kernel?"; Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series."; Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?"; Answer107 = "Delete george's accounts."; Question108 = "When should you use shadow passwords?"; Answer108 = "Almost always; shadow passwords substantially improve local security."; Question109 = "Who may change the owner of a file?"; Answer109 = "The file's current owner or root"; Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?"; Answer110 = "Patch and recompile your Linux kernel."; Question111 = "What is necessary to give users the choice of using KDE or GNOME?"; Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts."; Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?"; Answer112 = "A switch"; Question113 = "Where can you go to find out if your video card is supported by Linux?"; Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers."; Question114 = "How do you tell kill what process you want to terminate?"; Answer114 = "You pass kill the target process's process ID (PID) number."; Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?"; Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible."; Question116 = "What does the TERM environment variable control?"; Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning"; Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?"; Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options."; Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?"; Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display."; Question119 = "What does the modprobe command do?"; Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends."; Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?"; Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage."; Question121 = "How do you tell Linux to install from a network server?"; Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution."; Question122 = "What command removes a print job from a print queue?"; Answer122 = "lprm"; Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?"; Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely"; Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?"; Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this."; Question125 = "In what file is group membership recorded?"; Answer125 = "/etc/group"; Question126 = "What command do you use to switch the current runlevel?"; Answer126 = "telinit"; Question127 = "Under what circumstances is Telnet a good remote administration tool?"; Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise."; Question128 = "How do you create a user cron job?"; Answer128 = "Use the crontab program."; Question129 = "Why might you want to delay creating user accounts until after installation?"; Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation."; Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?"; Answer130 = "setserial"; Question131 = "What are the most important general-purpose log files on most Linux systems?"; Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)"; Question132 = "What three factors does X use to compute the refresh rate you'll see?"; Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution"; Question133 = "What type of information does the df command return?"; Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems"; Question134 = "What are the settings for serial ATA disks?"; Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically."; Question135 = "Why are SUID root programs rare?"; Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program."; Question136 = "What are some common sources of emergency disk sets?"; Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM"; Question137 = "You want to kill a process by name. What command can you use to do this?"; Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill."; Question138 = "What backup medium is best suited to long-term archival storage, and why?"; Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)"; Question139 = "What tools are most commonly used to install or remove Debian packages?"; Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these"; Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?"; Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller."; Question141 = "What kernel should you use to obtain support for many USB devices?"; Answer141 = "2.2.18 or later, or 2.4.0 or later"; Question142 = "What is the function of the tail command?"; Answer142 = "It displays the last few lines (10 by default) of a file."; Question143 = "What types of errors will leave traces in system log files?"; Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes."; Question144 = "What type of software can block access to any or all network ports on a computer?"; Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)"; Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?"; Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions."; Question146 = "What does the cp command accomplish?"; Answer146 = "It copies one or more files."; Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?"; Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question."; Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?"; Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion."; Question149 = "What is the best way to stop a server that was started through a SysV startup script?"; Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop."; Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?"; Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job."; stop(); stop();
Instance of Symbol 263 MovieClip "answer" in Frame 193
onClipEvent (load) { _visible = false; }
Frame 194
stop();
Instance of Symbol 267 MovieClip "answer" in Frame 194
onClipEvent (load) { _visible = false; }
Frame 195
stop();
Instance of Symbol 271 MovieClip "answer" in Frame 195
onClipEvent (load) { _visible = false; }
Frame 196
stop();
Instance of Symbol 275 MovieClip "answer" in Frame 196
onClipEvent (load) { _visible = false; }
Frame 197
stop();
Instance of Symbol 279 MovieClip "answer" in Frame 197
onClipEvent (load) { _visible = false; }
Frame 198
stop();
Instance of Symbol 283 MovieClip "answer" in Frame 198
onClipEvent (load) { _visible = false; }
Frame 199
stop();
Instance of Symbol 287 MovieClip "answer" in Frame 199
onClipEvent (load) { _visible = false; }
Frame 200
stop();
Instance of Symbol 291 MovieClip "answer" in Frame 200
onClipEvent (load) { _visible = false; }
Frame 201
stop();
Instance of Symbol 295 MovieClip "answer" in Frame 201
onClipEvent (load) { _visible = false; }
Frame 202
stop();
Instance of Symbol 299 MovieClip "answer" in Frame 202
onClipEvent (load) { _visible = false; }
Frame 203
stop();
Instance of Symbol 303 MovieClip "answer" in Frame 203
onClipEvent (load) { _visible = false; }
Frame 204
stop();
Instance of Symbol 307 MovieClip "answer" in Frame 204
onClipEvent (load) { _visible = false; }
Frame 205
stop();
Instance of Symbol 311 MovieClip "answer" in Frame 205
onClipEvent (load) { _visible = false; }
Frame 206
stop();
Instance of Symbol 315 MovieClip "answer" in Frame 206
onClipEvent (load) { _visible = false; }
Frame 207
stop();
Instance of Symbol 319 MovieClip "answer" in Frame 207
onClipEvent (load) { _visible = false; }
Frame 208
stop();
Instance of Symbol 323 MovieClip "answer" in Frame 208
onClipEvent (load) { _visible = false; }
Frame 209
stop();
Instance of Symbol 327 MovieClip "answer" in Frame 209
onClipEvent (load) { _visible = false; }
Frame 210
stop();
Instance of Symbol 331 MovieClip "answer" in Frame 210
onClipEvent (load) { _visible = false; }
Frame 211
stop();
Instance of Symbol 335 MovieClip "answer" in Frame 211
onClipEvent (load) { _visible = false; }
Frame 212
stop();
Instance of Symbol 339 MovieClip "answer" in Frame 212
onClipEvent (load) { _visible = false; }
Frame 213
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?"; Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature."; Question2 = "What is the major difference between a workstation and a server?"; Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network."; Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?"; Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |."; Question4 = "What command will show you the path of the directory you are currently working in?"; Answer4 = "The pwd command will show you the path of the directory you are currently in."; Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?"; Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories."; Question6 = "What is the purpose of awk?"; Answer6 = "It is a scripting language that provides complex pattern-matching facilities."; Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?"; Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories."; Question8 = "How can PAM be used to help restrict user access?"; Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password."; Question9 = "Why is it dangerous to constantly log in as the root user?"; Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so."; Question10 = "What command can be used to execute a single command with alternative permission?"; Answer10 = "The sudo command can be used to execute a single command with alternative permission."; Question11 = "What utility allows you to edit disk quota information?"; Answer11 = "The edquota utility allows you to edit disk quota information."; Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?"; Answer12 = "The chage command allows you to modify account settings relating to account expiration."; Question13 = "What character does Linux use to symbolize the root directory?"; Answer13 = "The root directory is Linux is represented by /."; Question14 = "Why would a RAID array be useful and what is it?"; Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data."; Question15 = "What programs does Linux use to write to optical media?"; Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord."; Question16 = "What is the purpose of the nice command?"; Answer16 = "It allows you to run a program with a specified priority."; Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?"; Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection."; Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?"; Answer18 = "The route add command is used to add an entry to the routing table."; Question19 = "What is the purpose of creating a baseline?"; Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in."; Question20 = "What does the output of the uptime utility show?"; Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes)."; Question21 = "What type of information is typically included in installation log files?"; Answer21 = "The names of packages installed and error messages"; Question22 = "How many serial ATA devices can fit on a single serial ATA chain?"; Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)"; Question23 = "What command is used to create a filesystem?"; Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer."; Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?"; Answer24 = "Ghostscript"; Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?"; Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code."; Question26 = "What software component determines whether Linux supports a given SCSI host adapter?"; Answer26 = "The Linux kernel"; Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?"; Answer27 = "In the BIOS, which is stored on a chip on the motherboard"; Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?"; Answer28 = "ls /usr/local/bin"; Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?"; Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't."; Question30 = "How can you identify processes that consume an inordinate amount of CPU time?"; Answer30 = "The top utility or the ps utility with appropriate switches"; Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?"; Answer31 = "Type lilo to install a new boot loader that reflects your modifications."; Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?"; Answer32 = "traceroute"; Question33 = "What system associates IP addresses with hostnames?"; Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers"; Question34 = "What's the most common type of local network hardware today?"; Answer34 = "Ethernet"; Question35 = "What program displays information on the jobs in a print queue?"; Answer35 = "lpq"; Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?"; Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions."; Question37 = "What methods are most commonly used to shut down a Linux system?"; Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this."; Question38 = "What types of problems most often generate kernel oops messages?"; Answer38 = "Hardware malfunctions and kernel bugs"; Question39 = "What do the Exim and Postfix programs have in common?"; Answer39 = "They're both SMTP mail servers."; Question40 = "When should you set the root password?"; Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation."; Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?"; Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition."; Question42 = "What is accomplished by the command chmod a+x scriptfile?"; Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable."; Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?"; Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password."; Question44 = "When you configure a system to use a static IP address, what information do you enter manually?"; Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address"; Question45 = "What command can you use to discover how much space is being used by files in a specified directory?"; Answer45 = "du"; Question46 = "How can you locate stray files belonging to a user when deleting that user's account?"; Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504."; Question47 = "In what two forms does Linux swap space generally come?"; Answer47 = "A dedicated swap partition or a swap file within a regular filesystem"; Question48 = "What pull protocols are most commonly used for e-mail retrieval?"; Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)"; Question49 = "Where do network servers typically record error messages?"; Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file"; Question50 = "What OSs can GRUB boot?"; Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS"; Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?"; Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally."; Question52 = "Which common package management systems include support for dependency tracking?"; Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems"; Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?"; Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation."; Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?"; Answer54 = "Samba"; Question55 = "Where can the GRUB boot loader code be installed?"; Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well."; Question56 = "What function does the fsck program serve?"; Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)"; Question57 = "When a user reports a problem in a vague way, what should you do?"; Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself."; Question58 = "What user IDs (UIDs) do ordinary user accounts use?"; Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher."; Question59 = "What types of manipulations can you perform on a password base to make it more secure?"; Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words."; Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?"; Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins."; Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?"; Answer61 = "ifconfig eth0"; Question62 = "How do man pages and HOWTO documents differ?"; Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics."; Question63 = "What is the most common choice of software to implement as a Web server in Linux?"; Answer63 = "Apache"; Question64 = "What type of mouse is ideal for use in Linux?"; Answer64 = "A three-button mouse; many X programs assume three buttons are available."; Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?"; Answer65 = "apt-get"; Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?"; Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC."; Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?"; Answer67 = "Reconfigure the kernel and recompile it from source code."; Question68 = "What modes does the Vi editor support, and what are they for?"; Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text)."; Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?"; Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet."; Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?"; Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS."; Question71 = "Who should have access to password files stored on a floppy disk?"; Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files."; Question72 = "Where is a good place to keep an administrator's logbook?"; Answer72 = "In a paper notebook near the computer"; Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?"; Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly."; Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?"; Answer74 = "$ (preceding the variable name)"; Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?"; Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem."; Question76 = "What method does the locate command use to find files?"; Answer76 = "It searches a database that it updates periodically via cron jobs."; Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?"; Answer77 = "PC Card, aka PCMCIA"; Question78 = "What happens to a process if its parent is killed or exits?"; Answer78 = "It's adopted by another process (typically init)."; Question79 = "Why might you create a separate partition for /usr/local?"; Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks"; Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?"; Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A."; Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?"; Answer81 = "mt"; Question82 = "What devices must be terminated in a SCSI chain?"; Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)"; Question83 = "What command is used to submit a print job in Linux?"; Answer83 = "lpr"; Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?"; Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)"; Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?"; Answer85 = "startx"; Question86 = "What does the mv command accomplish?"; Answer86 = "It moves or renames a file or directory."; Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?"; Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic"; Question88 = "What file directs the Linux boot process after the kernel has loaded?"; Answer88 = "/etc/inittab"; Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?"; Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections."; Question90 = "What major Linux distribution uses binary tarballs for package distribution?"; Answer90 = "Slackware"; Question91 = "What are the two most common busses that connect to plug-in cards?"; Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus."; Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?"; Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers."; Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?"; Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like"; Question94 = "What happens when you try to run a program that requires a library that's not installed?"; Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)"; Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?"; Answer95 = "hdparm, specifically its -X parameter"; Question96 = "What boot methods are commonly used by Linux installers?"; Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows."; Question97 = "How much damage can intruders do if they are given physical access to a computer?"; Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer."; Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?"; Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number."; Question99 = "What does the /etc/inetd.conf file control?"; Answer99 = "The inetd server, which launches other servers only when those servers are needed"; Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?"; Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups"; Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?"; Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)"; Question102 = "What conditions must be met to use DHCP?"; Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network."; Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?"; Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security."; Question104 = "What are the names of two power management protocols common on laptop computers?"; Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)"; Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?"; Answer105 = "Ask your network administrator. Do not configure a system with a random IP address."; Question106 = "Is the 2.6.9 kernel a development or a stable kernel?"; Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series."; Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?"; Answer107 = "Delete george's accounts."; Question108 = "When should you use shadow passwords?"; Answer108 = "Almost always; shadow passwords substantially improve local security."; Question109 = "Who may change the owner of a file?"; Answer109 = "The file's current owner or root"; Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?"; Answer110 = "Patch and recompile your Linux kernel."; Question111 = "What is necessary to give users the choice of using KDE or GNOME?"; Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts."; Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?"; Answer112 = "A switch"; Question113 = "Where can you go to find out if your video card is supported by Linux?"; Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers."; Question114 = "How do you tell kill what process you want to terminate?"; Answer114 = "You pass kill the target process's process ID (PID) number."; Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?"; Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible."; Question116 = "What does the TERM environment variable control?"; Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning"; Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?"; Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options."; Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?"; Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display."; Question119 = "What does the modprobe command do?"; Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends."; Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?"; Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage."; Question121 = "How do you tell Linux to install from a network server?"; Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution."; Question122 = "What command removes a print job from a print queue?"; Answer122 = "lprm"; Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?"; Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely"; Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?"; Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this."; Question125 = "In what file is group membership recorded?"; Answer125 = "/etc/group"; Question126 = "What command do you use to switch the current runlevel?"; Answer126 = "telinit"; Question127 = "Under what circumstances is Telnet a good remote administration tool?"; Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise."; Question128 = "How do you create a user cron job?"; Answer128 = "Use the crontab program."; Question129 = "Why might you want to delay creating user accounts until after installation?"; Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation."; Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?"; Answer130 = "setserial"; Question131 = "What are the most important general-purpose log files on most Linux systems?"; Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)"; Question132 = "What three factors does X use to compute the refresh rate you'll see?"; Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution"; Question133 = "What type of information does the df command return?"; Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems"; Question134 = "What are the settings for serial ATA disks?"; Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically."; Question135 = "Why are SUID root programs rare?"; Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program."; Question136 = "What are some common sources of emergency disk sets?"; Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM"; Question137 = "You want to kill a process by name. What command can you use to do this?"; Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill."; Question138 = "What backup medium is best suited to long-term archival storage, and why?"; Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)"; Question139 = "What tools are most commonly used to install or remove Debian packages?"; Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these"; Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?"; Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller."; Question141 = "What kernel should you use to obtain support for many USB devices?"; Answer141 = "2.2.18 or later, or 2.4.0 or later"; Question142 = "What is the function of the tail command?"; Answer142 = "It displays the last few lines (10 by default) of a file."; Question143 = "What types of errors will leave traces in system log files?"; Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes."; Question144 = "What type of software can block access to any or all network ports on a computer?"; Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)"; Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?"; Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions."; Question146 = "What does the cp command accomplish?"; Answer146 = "It copies one or more files."; Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?"; Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question."; Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?"; Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion."; Question149 = "What is the best way to stop a server that was started through a SysV startup script?"; Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop."; Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?"; Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job."; stop(); stop();
Instance of Symbol 343 MovieClip "answer" in Frame 213
onClipEvent (load) { _visible = false; }
Frame 214
stop();
Instance of Symbol 347 MovieClip "answer" in Frame 214
onClipEvent (load) { _visible = false; }
Frame 215
stop();
Instance of Symbol 351 MovieClip "answer" in Frame 215
onClipEvent (load) { _visible = false; }
Frame 216
stop();
Instance of Symbol 355 MovieClip "answer" in Frame 216
onClipEvent (load) { _visible = false; }
Frame 217
stop();
Instance of Symbol 359 MovieClip "answer" in Frame 217
onClipEvent (load) { _visible = false; }
Frame 218
stop();
Instance of Symbol 363 MovieClip "answer" in Frame 218
onClipEvent (load) { _visible = false; }
Frame 219
stop();
Instance of Symbol 367 MovieClip "answer" in Frame 219
onClipEvent (load) { _visible = false; }
Frame 220
stop();
Instance of Symbol 371 MovieClip "answer" in Frame 220
onClipEvent (load) { _visible = false; }
Frame 221
stop();
Instance of Symbol 375 MovieClip "answer" in Frame 221
onClipEvent (load) { _visible = false; }
Frame 222
stop();
Instance of Symbol 379 MovieClip "answer" in Frame 222
onClipEvent (load) { _visible = false; }
Frame 223
stop();
Instance of Symbol 383 MovieClip "answer" in Frame 223
onClipEvent (load) { _visible = false; }
Frame 224
stop();
Instance of Symbol 387 MovieClip "answer" in Frame 224
onClipEvent (load) { _visible = false; }
Frame 225
stop();
Instance of Symbol 391 MovieClip "answer" in Frame 225
onClipEvent (load) { _visible = false; }
Frame 226
stop();
Instance of Symbol 395 MovieClip "answer" in Frame 226
onClipEvent (load) { _visible = false; }
Frame 227
stop();
Instance of Symbol 399 MovieClip "answer" in Frame 227
onClipEvent (load) { _visible = false; }
Frame 228
stop();
Instance of Symbol 403 MovieClip "answer" in Frame 228
onClipEvent (load) { _visible = false; }
Frame 229
stop();
Instance of Symbol 407 MovieClip "answer" in Frame 229
onClipEvent (load) { _visible = false; }
Frame 230
stop();
Instance of Symbol 411 MovieClip "answer" in Frame 230
onClipEvent (load) { _visible = false; }
Frame 231
stop();
Instance of Symbol 415 MovieClip "answer" in Frame 231
onClipEvent (load) { _visible = false; }
Frame 232
stop();
Instance of Symbol 419 MovieClip "answer" in Frame 232
onClipEvent (load) { _visible = false; }
Frame 233
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?"; Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature."; Question2 = "What is the major difference between a workstation and a server?"; Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network."; Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?"; Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |."; Question4 = "What command will show you the path of the directory you are currently working in?"; Answer4 = "The pwd command will show you the path of the directory you are currently in."; Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?"; Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories."; Question6 = "What is the purpose of awk?"; Answer6 = "It is a scripting language that provides complex pattern-matching facilities."; Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?"; Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories."; Question8 = "How can PAM be used to help restrict user access?"; Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password."; Question9 = "Why is it dangerous to constantly log in as the root user?"; Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so."; Question10 = "What command can be used to execute a single command with alternative permission?"; Answer10 = "The sudo command can be used to execute a single command with alternative permission."; Question11 = "What utility allows you to edit disk quota information?"; Answer11 = "The edquota utility allows you to edit disk quota information."; Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?"; Answer12 = "The chage command allows you to modify account settings relating to account expiration."; Question13 = "What character does Linux use to symbolize the root directory?"; Answer13 = "The root directory is Linux is represented by /."; Question14 = "Why would a RAID array be useful and what is it?"; Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data."; Question15 = "What programs does Linux use to write to optical media?"; Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord."; Question16 = "What is the purpose of the nice command?"; Answer16 = "It allows you to run a program with a specified priority."; Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?"; Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection."; Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?"; Answer18 = "The route add command is used to add an entry to the routing table."; Question19 = "What is the purpose of creating a baseline?"; Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in."; Question20 = "What does the output of the uptime utility show?"; Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes)."; Question21 = "What type of information is typically included in installation log files?"; Answer21 = "The names of packages installed and error messages"; Question22 = "How many serial ATA devices can fit on a single serial ATA chain?"; Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)"; Question23 = "What command is used to create a filesystem?"; Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer."; Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?"; Answer24 = "Ghostscript"; Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?"; Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code."; Question26 = "What software component determines whether Linux supports a given SCSI host adapter?"; Answer26 = "The Linux kernel"; Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?"; Answer27 = "In the BIOS, which is stored on a chip on the motherboard"; Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?"; Answer28 = "ls /usr/local/bin"; Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?"; Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't."; Question30 = "How can you identify processes that consume an inordinate amount of CPU time?"; Answer30 = "The top utility or the ps utility with appropriate switches"; Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?"; Answer31 = "Type lilo to install a new boot loader that reflects your modifications."; Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?"; Answer32 = "traceroute"; Question33 = "What system associates IP addresses with hostnames?"; Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers"; Question34 = "What's the most common type of local network hardware today?"; Answer34 = "Ethernet"; Question35 = "What program displays information on the jobs in a print queue?"; Answer35 = "lpq"; Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?"; Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions."; Question37 = "What methods are most commonly used to shut down a Linux system?"; Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this."; Question38 = "What types of problems most often generate kernel oops messages?"; Answer38 = "Hardware malfunctions and kernel bugs"; Question39 = "What do the Exim and Postfix programs have in common?"; Answer39 = "They're both SMTP mail servers."; Question40 = "When should you set the root password?"; Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation."; Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?"; Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition."; Question42 = "What is accomplished by the command chmod a+x scriptfile?"; Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable."; Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?"; Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password."; Question44 = "When you configure a system to use a static IP address, what information do you enter manually?"; Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address"; Question45 = "What command can you use to discover how much space is being used by files in a specified directory?"; Answer45 = "du"; Question46 = "How can you locate stray files belonging to a user when deleting that user's account?"; Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504."; Question47 = "In what two forms does Linux swap space generally come?"; Answer47 = "A dedicated swap partition or a swap file within a regular filesystem"; Question48 = "What pull protocols are most commonly used for e-mail retrieval?"; Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)"; Question49 = "Where do network servers typically record error messages?"; Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file"; Question50 = "What OSs can GRUB boot?"; Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS"; Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?"; Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally."; Question52 = "Which common package management systems include support for dependency tracking?"; Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems"; Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?"; Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation."; Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?"; Answer54 = "Samba"; Question55 = "Where can the GRUB boot loader code be installed?"; Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well."; Question56 = "What function does the fsck program serve?"; Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)"; Question57 = "When a user reports a problem in a vague way, what should you do?"; Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself."; Question58 = "What user IDs (UIDs) do ordinary user accounts use?"; Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher."; Question59 = "What types of manipulations can you perform on a password base to make it more secure?"; Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words."; Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?"; Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins."; Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?"; Answer61 = "ifconfig eth0"; Question62 = "How do man pages and HOWTO documents differ?"; Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics."; Question63 = "What is the most common choice of software to implement as a Web server in Linux?"; Answer63 = "Apache"; Question64 = "What type of mouse is ideal for use in Linux?"; Answer64 = "A three-button mouse; many X programs assume three buttons are available."; Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?"; Answer65 = "apt-get"; Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?"; Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC."; Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?"; Answer67 = "Reconfigure the kernel and recompile it from source code."; Question68 = "What modes does the Vi editor support, and what are they for?"; Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text)."; Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?"; Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet."; Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?"; Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS."; Question71 = "Who should have access to password files stored on a floppy disk?"; Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files."; Question72 = "Where is a good place to keep an administrator's logbook?"; Answer72 = "In a paper notebook near the computer"; Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?"; Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly."; Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?"; Answer74 = "$ (preceding the variable name)"; Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?"; Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem."; Question76 = "What method does the locate command use to find files?"; Answer76 = "It searches a database that it updates periodically via cron jobs."; Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?"; Answer77 = "PC Card, aka PCMCIA"; Question78 = "What happens to a process if its parent is killed or exits?"; Answer78 = "It's adopted by another process (typically init)."; Question79 = "Why might you create a separate partition for /usr/local?"; Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks"; Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?"; Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A."; Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?"; Answer81 = "mt"; Question82 = "What devices must be terminated in a SCSI chain?"; Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)"; Question83 = "What command is used to submit a print job in Linux?"; Answer83 = "lpr"; Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?"; Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)"; Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?"; Answer85 = "startx"; Question86 = "What does the mv command accomplish?"; Answer86 = "It moves or renames a file or directory."; Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?"; Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic"; Question88 = "What file directs the Linux boot process after the kernel has loaded?"; Answer88 = "/etc/inittab"; Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?"; Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections."; Question90 = "What major Linux distribution uses binary tarballs for package distribution?"; Answer90 = "Slackware"; Question91 = "What are the two most common busses that connect to plug-in cards?"; Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus."; Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?"; Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers."; Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?"; Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like"; Question94 = "What happens when you try to run a program that requires a library that's not installed?"; Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)"; Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?"; Answer95 = "hdparm, specifically its -X parameter"; Question96 = "What boot methods are commonly used by Linux installers?"; Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows."; Question97 = "How much damage can intruders do if they are given physical access to a computer?"; Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer."; Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?"; Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number."; Question99 = "What does the /etc/inetd.conf file control?"; Answer99 = "The inetd server, which launches other servers only when those servers are needed"; Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?"; Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups"; Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?"; Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)"; Question102 = "What conditions must be met to use DHCP?"; Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network."; Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?"; Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security."; Question104 = "What are the names of two power management protocols common on laptop computers?"; Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)"; Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?"; Answer105 = "Ask your network administrator. Do not configure a system with a random IP address."; Question106 = "Is the 2.6.9 kernel a development or a stable kernel?"; Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series."; Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?"; Answer107 = "Delete george's accounts."; Question108 = "When should you use shadow passwords?"; Answer108 = "Almost always; shadow passwords substantially improve local security."; Question109 = "Who may change the owner of a file?"; Answer109 = "The file's current owner or root"; Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?"; Answer110 = "Patch and recompile your Linux kernel."; Question111 = "What is necessary to give users the choice of using KDE or GNOME?"; Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts."; Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?"; Answer112 = "A switch"; Question113 = "Where can you go to find out if your video card is supported by Linux?"; Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers."; Question114 = "How do you tell kill what process you want to terminate?"; Answer114 = "You pass kill the target process's process ID (PID) number."; Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?"; Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible."; Question116 = "What does the TERM environment variable control?"; Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning"; Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?"; Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options."; Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?"; Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display."; Question119 = "What does the modprobe command do?"; Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends."; Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?"; Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage."; Question121 = "How do you tell Linux to install from a network server?"; Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution."; Question122 = "What command removes a print job from a print queue?"; Answer122 = "lprm"; Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?"; Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely"; Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?"; Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this."; Question125 = "In what file is group membership recorded?"; Answer125 = "/etc/group"; Question126 = "What command do you use to switch the current runlevel?"; Answer126 = "telinit"; Question127 = "Under what circumstances is Telnet a good remote administration tool?"; Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise."; Question128 = "How do you create a user cron job?"; Answer128 = "Use the crontab program."; Question129 = "Why might you want to delay creating user accounts until after installation?"; Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation."; Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?"; Answer130 = "setserial"; Question131 = "What are the most important general-purpose log files on most Linux systems?"; Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)"; Question132 = "What three factors does X use to compute the refresh rate you'll see?"; Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution"; Question133 = "What type of information does the df command return?"; Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems"; Question134 = "What are the settings for serial ATA disks?"; Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically."; Question135 = "Why are SUID root programs rare?"; Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program."; Question136 = "What are some common sources of emergency disk sets?"; Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM"; Question137 = "You want to kill a process by name. What command can you use to do this?"; Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill."; Question138 = "What backup medium is best suited to long-term archival storage, and why?"; Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)"; Question139 = "What tools are most commonly used to install or remove Debian packages?"; Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these"; Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?"; Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller."; Question141 = "What kernel should you use to obtain support for many USB devices?"; Answer141 = "2.2.18 or later, or 2.4.0 or later"; Question142 = "What is the function of the tail command?"; Answer142 = "It displays the last few lines (10 by default) of a file."; Question143 = "What types of errors will leave traces in system log files?"; Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes."; Question144 = "What type of software can block access to any or all network ports on a computer?"; Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)"; Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?"; Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions."; Question146 = "What does the cp command accomplish?"; Answer146 = "It copies one or more files."; Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?"; Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question."; Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?"; Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion."; Question149 = "What is the best way to stop a server that was started through a SysV startup script?"; Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop."; Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?"; Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job."; stop(); stop();
Instance of Symbol 423 MovieClip "answer" in Frame 233
onClipEvent (load) { _visible = false; }
Frame 234
stop();
Instance of Symbol 427 MovieClip "answer" in Frame 234
onClipEvent (load) { _visible = false; }
Frame 235
stop();
Instance of Symbol 431 MovieClip "answer" in Frame 235
onClipEvent (load) { _visible = false; }
Frame 236
stop();
Instance of Symbol 435 MovieClip "answer" in Frame 236
onClipEvent (load) { _visible = false; }
Frame 237
stop();
Instance of Symbol 439 MovieClip "answer" in Frame 237
onClipEvent (load) { _visible = false; }
Frame 238
stop();
Instance of Symbol 443 MovieClip "answer" in Frame 238
onClipEvent (load) { _visible = false; }
Frame 239
stop();
Instance of Symbol 447 MovieClip "answer" in Frame 239
onClipEvent (load) { _visible = false; }
Frame 240
stop();
Instance of Symbol 451 MovieClip "answer" in Frame 240
onClipEvent (load) { _visible = false; }
Frame 241
stop();
Instance of Symbol 455 MovieClip "answer" in Frame 241
onClipEvent (load) { _visible = false; }
Frame 242
stop();
Instance of Symbol 459 MovieClip "answer" in Frame 242
onClipEvent (load) { _visible = false; }
Frame 243
stop();
Instance of Symbol 62 MovieClip "answer" in Frame 243
onClipEvent (load) { _visible = false; }
Frame 244
stop();
Instance of Symbol 465 MovieClip "answer" in Frame 244
onClipEvent (load) { _visible = false; }
Frame 245
stop();
Instance of Symbol 469 MovieClip "answer" in Frame 245
onClipEvent (load) { _visible = false; }
Frame 246
stop();
Instance of Symbol 473 MovieClip "answer" in Frame 246
onClipEvent (load) { _visible = false; }
Frame 247
stop();
Instance of Symbol 477 MovieClip "answer" in Frame 247
onClipEvent (load) { _visible = false; }
Frame 248
stop();
Instance of Symbol 481 MovieClip "answer" in Frame 248
onClipEvent (load) { _visible = false; }
Frame 249
stop();
Instance of Symbol 485 MovieClip "answer" in Frame 249
onClipEvent (load) { _visible = false; }
Frame 250
stop();
Instance of Symbol 489 MovieClip "answer" in Frame 250
onClipEvent (load) { _visible = false; }
Frame 251
stop();
Instance of Symbol 493 MovieClip "answer" in Frame 251
onClipEvent (load) { _visible = false; }
Frame 252
stop();
Instance of Symbol 497 MovieClip "answer" in Frame 252
onClipEvent (load) { _visible = false; }
Frame 253
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?"; Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature."; Question2 = "What is the major difference between a workstation and a server?"; Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network."; Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?"; Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |."; Question4 = "What command will show you the path of the directory you are currently working in?"; Answer4 = "The pwd command will show you the path of the directory you are currently in."; Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?"; Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories."; Question6 = "What is the purpose of awk?"; Answer6 = "It is a scripting language that provides complex pattern-matching facilities."; Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?"; Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories."; Question8 = "How can PAM be used to help restrict user access?"; Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password."; Question9 = "Why is it dangerous to constantly log in as the root user?"; Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so."; Question10 = "What command can be used to execute a single command with alternative permission?"; Answer10 = "The sudo command can be used to execute a single command with alternative permission."; Question11 = "What utility allows you to edit disk quota information?"; Answer11 = "The edquota utility allows you to edit disk quota information."; Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?"; Answer12 = "The chage command allows you to modify account settings relating to account expiration."; Question13 = "What character does Linux use to symbolize the root directory?"; Answer13 = "The root directory is Linux is represented by /."; Question14 = "Why would a RAID array be useful and what is it?"; Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data."; Question15 = "What programs does Linux use to write to optical media?"; Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord."; Question16 = "What is the purpose of the nice command?"; Answer16 = "It allows you to run a program with a specified priority."; Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?"; Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection."; Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?"; Answer18 = "The route add command is used to add an entry to the routing table."; Question19 = "What is the purpose of creating a baseline?"; Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in."; Question20 = "What does the output of the uptime utility show?"; Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes)."; Question21 = "What type of information is typically included in installation log files?"; Answer21 = "The names of packages installed and error messages"; Question22 = "How many serial ATA devices can fit on a single serial ATA chain?"; Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)"; Question23 = "What command is used to create a filesystem?"; Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer."; Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?"; Answer24 = "Ghostscript"; Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?"; Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code."; Question26 = "What software component determines whether Linux supports a given SCSI host adapter?"; Answer26 = "The Linux kernel"; Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?"; Answer27 = "In the BIOS, which is stored on a chip on the motherboard"; Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?"; Answer28 = "ls /usr/local/bin"; Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?"; Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't."; Question30 = "How can you identify processes that consume an inordinate amount of CPU time?"; Answer30 = "The top utility or the ps utility with appropriate switches"; Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?"; Answer31 = "Type lilo to install a new boot loader that reflects your modifications."; Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?"; Answer32 = "traceroute"; Question33 = "What system associates IP addresses with hostnames?"; Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers"; Question34 = "What's the most common type of local network hardware today?"; Answer34 = "Ethernet"; Question35 = "What program displays information on the jobs in a print queue?"; Answer35 = "lpq"; Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?"; Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions."; Question37 = "What methods are most commonly used to shut down a Linux system?"; Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this."; Question38 = "What types of problems most often generate kernel oops messages?"; Answer38 = "Hardware malfunctions and kernel bugs"; Question39 = "What do the Exim and Postfix programs have in common?"; Answer39 = "They're both SMTP mail servers."; Question40 = "When should you set the root password?"; Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation."; Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?"; Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition."; Question42 = "What is accomplished by the command chmod a+x scriptfile?"; Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable."; Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?"; Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password."; Question44 = "When you configure a system to use a static IP address, what information do you enter manually?"; Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address"; Question45 = "What command can you use to discover how much space is being used by files in a specified directory?"; Answer45 = "du"; Question46 = "How can you locate stray files belonging to a user when deleting that user's account?"; Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504."; Question47 = "In what two forms does Linux swap space generally come?"; Answer47 = "A dedicated swap partition or a swap file within a regular filesystem"; Question48 = "What pull protocols are most commonly used for e-mail retrieval?"; Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)"; Question49 = "Where do network servers typically record error messages?"; Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file"; Question50 = "What OSs can GRUB boot?"; Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS"; Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?"; Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally."; Question52 = "Which common package management systems include support for dependency tracking?"; Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems"; Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?"; Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation."; Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?"; Answer54 = "Samba"; Question55 = "Where can the GRUB boot loader code be installed?"; Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well."; Question56 = "What function does the fsck program serve?"; Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)"; Question57 = "When a user reports a problem in a vague way, what should you do?"; Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself."; Question58 = "What user IDs (UIDs) do ordinary user accounts use?"; Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher."; Question59 = "What types of manipulations can you perform on a password base to make it more secure?"; Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words."; Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?"; Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins."; Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?"; Answer61 = "ifconfig eth0"; Question62 = "How do man pages and HOWTO documents differ?"; Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics."; Question63 = "What is the most common choice of software to implement as a Web server in Linux?"; Answer63 = "Apache"; Question64 = "What type of mouse is ideal for use in Linux?"; Answer64 = "A three-button mouse; many X programs assume three buttons are available."; Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?"; Answer65 = "apt-get"; Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?"; Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC."; Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?"; Answer67 = "Reconfigure the kernel and recompile it from source code."; Question68 = "What modes does the Vi editor support, and what are they for?"; Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text)."; Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?"; Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet."; Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?"; Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS."; Question71 = "Who should have access to password files stored on a floppy disk?"; Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files."; Question72 = "Where is a good place to keep an administrator's logbook?"; Answer72 = "In a paper notebook near the computer"; Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?"; Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly."; Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?"; Answer74 = "$ (preceding the variable name)"; Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?"; Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem."; Question76 = "What method does the locate command use to find files?"; Answer76 = "It searches a database that it updates periodically via cron jobs."; Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?"; Answer77 = "PC Card, aka PCMCIA"; Question78 = "What happens to a process if its parent is killed or exits?"; Answer78 = "It's adopted by another process (typically init)."; Question79 = "Why might you create a separate partition for /usr/local?"; Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks"; Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?"; Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A."; Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?"; Answer81 = "mt"; Question82 = "What devices must be terminated in a SCSI chain?"; Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)"; Question83 = "What command is used to submit a print job in Linux?"; Answer83 = "lpr"; Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?"; Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)"; Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?"; Answer85 = "startx"; Question86 = "What does the mv command accomplish?"; Answer86 = "It moves or renames a file or directory."; Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?"; Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic"; Question88 = "What file directs the Linux boot process after the kernel has loaded?"; Answer88 = "/etc/inittab"; Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?"; Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections."; Question90 = "What major Linux distribution uses binary tarballs for package distribution?"; Answer90 = "Slackware"; Question91 = "What are the two most common busses that connect to plug-in cards?"; Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus."; Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?"; Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers."; Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?"; Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like"; Question94 = "What happens when you try to run a program that requires a library that's not installed?"; Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)"; Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?"; Answer95 = "hdparm, specifically its -X parameter"; Question96 = "What boot methods are commonly used by Linux installers?"; Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows."; Question97 = "How much damage can intruders do if they are given physical access to a computer?"; Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer."; Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?"; Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number."; Question99 = "What does the /etc/inetd.conf file control?"; Answer99 = "The inetd server, which launches other servers only when those servers are needed"; Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?"; Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups"; Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?"; Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)"; Question102 = "What conditions must be met to use DHCP?"; Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network."; Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?"; Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security."; Question104 = "What are the names of two power management protocols common on laptop computers?"; Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)"; Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?"; Answer105 = "Ask your network administrator. Do not configure a system with a random IP address."; Question106 = "Is the 2.6.9 kernel a development or a stable kernel?"; Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series."; Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?"; Answer107 = "Delete george's accounts."; Question108 = "When should you use shadow passwords?"; Answer108 = "Almost always; shadow passwords substantially improve local security."; Question109 = "Who may change the owner of a file?"; Answer109 = "The file's current owner or root"; Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?"; Answer110 = "Patch and recompile your Linux kernel."; Question111 = "What is necessary to give users the choice of using KDE or GNOME?"; Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts."; Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?"; Answer112 = "A switch"; Question113 = "Where can you go to find out if your video card is supported by Linux?"; Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers."; Question114 = "How do you tell kill what process you want to terminate?"; Answer114 = "You pass kill the target process's process ID (PID) number."; Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?"; Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible."; Question116 = "What does the TERM environment variable control?"; Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning"; Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?"; Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options."; Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?"; Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display."; Question119 = "What does the modprobe command do?"; Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends."; Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?"; Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage."; Question121 = "How do you tell Linux to install from a network server?"; Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution."; Question122 = "What command removes a print job from a print queue?"; Answer122 = "lprm"; Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?"; Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely"; Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?"; Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this."; Question125 = "In what file is group membership recorded?"; Answer125 = "/etc/group"; Question126 = "What command do you use to switch the current runlevel?"; Answer126 = "telinit"; Question127 = "Under what circumstances is Telnet a good remote administration tool?"; Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise."; Question128 = "How do you create a user cron job?"; Answer128 = "Use the crontab program."; Question129 = "Why might you want to delay creating user accounts until after installation?"; Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation."; Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?"; Answer130 = "setserial"; Question131 = "What are the most important general-purpose log files on most Linux systems?"; Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)"; Question132 = "What three factors does X use to compute the refresh rate you'll see?"; Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution"; Question133 = "What type of information does the df command return?"; Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems"; Question134 = "What are the settings for serial ATA disks?"; Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically."; Question135 = "Why are SUID root programs rare?"; Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program."; Question136 = "What are some common sources of emergency disk sets?"; Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM"; Question137 = "You want to kill a process by name. What command can you use to do this?"; Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill."; Question138 = "What backup medium is best suited to long-term archival storage, and why?"; Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)"; Question139 = "What tools are most commonly used to install or remove Debian packages?"; Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these"; Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?"; Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller."; Question141 = "What kernel should you use to obtain support for many USB devices?"; Answer141 = "2.2.18 or later, or 2.4.0 or later"; Question142 = "What is the function of the tail command?"; Answer142 = "It displays the last few lines (10 by default) of a file."; Question143 = "What types of errors will leave traces in system log files?"; Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes."; Question144 = "What type of software can block access to any or all network ports on a computer?"; Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)"; Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?"; Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions."; Question146 = "What does the cp command accomplish?"; Answer146 = "It copies one or more files."; Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?"; Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question."; Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?"; Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion."; Question149 = "What is the best way to stop a server that was started through a SysV startup script?"; Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop."; Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?"; Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job."; stop(); stop();
Instance of Symbol 501 MovieClip "answer" in Frame 253
onClipEvent (load) { _visible = false; }
Frame 254
stop();
Instance of Symbol 505 MovieClip "answer" in Frame 254
onClipEvent (load) { _visible = false; }
Frame 255
stop();
Instance of Symbol 509 MovieClip "answer" in Frame 255
onClipEvent (load) { _visible = false; }
Frame 256
stop();
Instance of Symbol 513 MovieClip "answer" in Frame 256
onClipEvent (load) { _visible = false; }
Frame 257
stop();
Instance of Symbol 517 MovieClip "answer" in Frame 257
onClipEvent (load) { _visible = false; }
Frame 258
stop();
Instance of Symbol 521 MovieClip "answer" in Frame 258
onClipEvent (load) { _visible = false; }
Frame 259
stop();
Instance of Symbol 525 MovieClip "answer" in Frame 259
onClipEvent (load) { _visible = false; }
Frame 260
stop();
Instance of Symbol 529 MovieClip "answer" in Frame 260
onClipEvent (load) { _visible = false; }
Frame 261
stop();
Instance of Symbol 533 MovieClip "answer" in Frame 261
onClipEvent (load) { _visible = false; }
Frame 262
stop();
Instance of Symbol 537 MovieClip "answer" in Frame 262
onClipEvent (load) { _visible = false; }
Frame 263
stop();
Instance of Symbol 541 MovieClip "answer" in Frame 263
onClipEvent (load) { _visible = false; }
Frame 264
stop();
Instance of Symbol 545 MovieClip "answer" in Frame 264
onClipEvent (load) { _visible = false; }
Frame 265
stop();
Instance of Symbol 549 MovieClip "answer" in Frame 265
onClipEvent (load) { _visible = false; }
Frame 266
stop();
Instance of Symbol 553 MovieClip "answer" in Frame 266
onClipEvent (load) { _visible = false; }
Frame 267
stop();
Instance of Symbol 557 MovieClip "answer" in Frame 267
onClipEvent (load) { _visible = false; }
Frame 268
stop();
Instance of Symbol 561 MovieClip "answer" in Frame 268
onClipEvent (load) { _visible = false; }
Frame 269
stop();
Instance of Symbol 565 MovieClip "answer" in Frame 269
onClipEvent (load) { _visible = false; }
Frame 270
stop();
Instance of Symbol 569 MovieClip "answer" in Frame 270
onClipEvent (load) { _visible = false; }
Frame 271
stop();
Instance of Symbol 573 MovieClip "answer" in Frame 271
onClipEvent (load) { _visible = false; }
Frame 272
stop();
Instance of Symbol 577 MovieClip "answer" in Frame 272
onClipEvent (load) { _visible = false; }
Frame 273
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?"; Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature."; Question2 = "What is the major difference between a workstation and a server?"; Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network."; Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?"; Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |."; Question4 = "What command will show you the path of the directory you are currently working in?"; Answer4 = "The pwd command will show you the path of the directory you are currently in."; Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?"; Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories."; Question6 = "What is the purpose of awk?"; Answer6 = "It is a scripting language that provides complex pattern-matching facilities."; Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?"; Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories."; Question8 = "How can PAM be used to help restrict user access?"; Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password."; Question9 = "Why is it dangerous to constantly log in as the root user?"; Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so."; Question10 = "What command can be used to execute a single command with alternative permission?"; Answer10 = "The sudo command can be used to execute a single command with alternative permission."; Question11 = "What utility allows you to edit disk quota information?"; Answer11 = "The edquota utility allows you to edit disk quota information."; Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?"; Answer12 = "The chage command allows you to modify account settings relating to account expiration."; Question13 = "What character does Linux use to symbolize the root directory?"; Answer13 = "The root directory is Linux is represented by /."; Question14 = "Why would a RAID array be useful and what is it?"; Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data."; Question15 = "What programs does Linux use to write to optical media?"; Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord."; Question16 = "What is the purpose of the nice command?"; Answer16 = "It allows you to run a program with a specified priority."; Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?"; Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection."; Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?"; Answer18 = "The route add command is used to add an entry to the routing table."; Question19 = "What is the purpose of creating a baseline?"; Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in."; Question20 = "What does the output of the uptime utility show?"; Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes)."; Question21 = "What type of information is typically included in installation log files?"; Answer21 = "The names of packages installed and error messages"; Question22 = "How many serial ATA devices can fit on a single serial ATA chain?"; Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)"; Question23 = "What command is used to create a filesystem?"; Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer."; Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?"; Answer24 = "Ghostscript"; Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?"; Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code."; Question26 = "What software component determines whether Linux supports a given SCSI host adapter?"; Answer26 = "The Linux kernel"; Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?"; Answer27 = "In the BIOS, which is stored on a chip on the motherboard"; Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?"; Answer28 = "ls /usr/local/bin"; Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?"; Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't."; Question30 = "How can you identify processes that consume an inordinate amount of CPU time?"; Answer30 = "The top utility or the ps utility with appropriate switches"; Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?"; Answer31 = "Type lilo to install a new boot loader that reflects your modifications."; Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?"; Answer32 = "traceroute"; Question33 = "What system associates IP addresses with hostnames?"; Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers"; Question34 = "What's the most common type of local network hardware today?"; Answer34 = "Ethernet"; Question35 = "What program displays information on the jobs in a print queue?"; Answer35 = "lpq"; Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?"; Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions."; Question37 = "What methods are most commonly used to shut down a Linux system?"; Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this."; Question38 = "What types of problems most often generate kernel oops messages?"; Answer38 = "Hardware malfunctions and kernel bugs"; Question39 = "What do the Exim and Postfix programs have in common?"; Answer39 = "They're both SMTP mail servers."; Question40 = "When should you set the root password?"; Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation."; Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?"; Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition."; Question42 = "What is accomplished by the command chmod a+x scriptfile?"; Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable."; Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?"; Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password."; Question44 = "When you configure a system to use a static IP address, what information do you enter manually?"; Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address"; Question45 = "What command can you use to discover how much space is being used by files in a specified directory?"; Answer45 = "du"; Question46 = "How can you locate stray files belonging to a user when deleting that user's account?"; Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504."; Question47 = "In what two forms does Linux swap space generally come?"; Answer47 = "A dedicated swap partition or a swap file within a regular filesystem"; Question48 = "What pull protocols are most commonly used for e-mail retrieval?"; Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)"; Question49 = "Where do network servers typically record error messages?"; Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file"; Question50 = "What OSs can GRUB boot?"; Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS"; Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?"; Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally."; Question52 = "Which common package management systems include support for dependency tracking?"; Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems"; Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?"; Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation."; Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?"; Answer54 = "Samba"; Question55 = "Where can the GRUB boot loader code be installed?"; Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well."; Question56 = "What function does the fsck program serve?"; Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)"; Question57 = "When a user reports a problem in a vague way, what should you do?"; Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself."; Question58 = "What user IDs (UIDs) do ordinary user accounts use?"; Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher."; Question59 = "What types of manipulations can you perform on a password base to make it more secure?"; Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words."; Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?"; Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins."; Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?"; Answer61 = "ifconfig eth0"; Question62 = "How do man pages and HOWTO documents differ?"; Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics."; Question63 = "What is the most common choice of software to implement as a Web server in Linux?"; Answer63 = "Apache"; Question64 = "What type of mouse is ideal for use in Linux?"; Answer64 = "A three-button mouse; many X programs assume three buttons are available."; Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?"; Answer65 = "apt-get"; Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?"; Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC."; Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?"; Answer67 = "Reconfigure the kernel and recompile it from source code."; Question68 = "What modes does the Vi editor support, and what are they for?"; Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text)."; Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?"; Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet."; Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?"; Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS."; Question71 = "Who should have access to password files stored on a floppy disk?"; Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files."; Question72 = "Where is a good place to keep an administrator's logbook?"; Answer72 = "In a paper notebook near the computer"; Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?"; Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly."; Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?"; Answer74 = "$ (preceding the variable name)"; Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?"; Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem."; Question76 = "What method does the locate command use to find files?"; Answer76 = "It searches a database that it updates periodically via cron jobs."; Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?"; Answer77 = "PC Card, aka PCMCIA"; Question78 = "What happens to a process if its parent is killed or exits?"; Answer78 = "It's adopted by another process (typically init)."; Question79 = "Why might you create a separate partition for /usr/local?"; Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks"; Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?"; Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A."; Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?"; Answer81 = "mt"; Question82 = "What devices must be terminated in a SCSI chain?"; Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)"; Question83 = "What command is used to submit a print job in Linux?"; Answer83 = "lpr"; Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?"; Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)"; Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?"; Answer85 = "startx"; Question86 = "What does the mv command accomplish?"; Answer86 = "It moves or renames a file or directory."; Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?"; Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic"; Question88 = "What file directs the Linux boot process after the kernel has loaded?"; Answer88 = "/etc/inittab"; Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?"; Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections."; Question90 = "What major Linux distribution uses binary tarballs for package distribution?"; Answer90 = "Slackware"; Question91 = "What are the two most common busses that connect to plug-in cards?"; Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus."; Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?"; Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers."; Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?"; Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like"; Question94 = "What happens when you try to run a program that requires a library that's not installed?"; Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)"; Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?"; Answer95 = "hdparm, specifically its -X parameter"; Question96 = "What boot methods are commonly used by Linux installers?"; Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows."; Question97 = "How much damage can intruders do if they are given physical access to a computer?"; Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer."; Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?"; Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number."; Question99 = "What does the /etc/inetd.conf file control?"; Answer99 = "The inetd server, which launches other servers only when those servers are needed"; Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?"; Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups"; Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?"; Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)"; Question102 = "What conditions must be met to use DHCP?"; Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network."; Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?"; Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security."; Question104 = "What are the names of two power management protocols common on laptop computers?"; Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)"; Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?"; Answer105 = "Ask your network administrator. Do not configure a system with a random IP address."; Question106 = "Is the 2.6.9 kernel a development or a stable kernel?"; Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series."; Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?"; Answer107 = "Delete george's accounts."; Question108 = "When should you use shadow passwords?"; Answer108 = "Almost always; shadow passwords substantially improve local security."; Question109 = "Who may change the owner of a file?"; Answer109 = "The file's current owner or root"; Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?"; Answer110 = "Patch and recompile your Linux kernel."; Question111 = "What is necessary to give users the choice of using KDE or GNOME?"; Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts."; Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?"; Answer112 = "A switch"; Question113 = "Where can you go to find out if your video card is supported by Linux?"; Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers."; Question114 = "How do you tell kill what process you want to terminate?"; Answer114 = "You pass kill the target process's process ID (PID) number."; Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?"; Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible."; Question116 = "What does the TERM environment variable control?"; Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning"; Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?"; Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options."; Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?"; Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display."; Question119 = "What does the modprobe command do?"; Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends."; Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?"; Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage."; Question121 = "How do you tell Linux to install from a network server?"; Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution."; Question122 = "What command removes a print job from a print queue?"; Answer122 = "lprm"; Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?"; Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely"; Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?"; Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this."; Question125 = "In what file is group membership recorded?"; Answer125 = "/etc/group"; Question126 = "What command do you use to switch the current runlevel?"; Answer126 = "telinit"; Question127 = "Under what circumstances is Telnet a good remote administration tool?"; Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise."; Question128 = "How do you create a user cron job?"; Answer128 = "Use the crontab program."; Question129 = "Why might you want to delay creating user accounts until after installation?"; Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation."; Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?"; Answer130 = "setserial"; Question131 = "What are the most important general-purpose log files on most Linux systems?"; Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)"; Question132 = "What three factors does X use to compute the refresh rate you'll see?"; Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution"; Question133 = "What type of information does the df command return?"; Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems"; Question134 = "What are the settings for serial ATA disks?"; Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically."; Question135 = "Why are SUID root programs rare?"; Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program."; Question136 = "What are some common sources of emergency disk sets?"; Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM"; Question137 = "You want to kill a process by name. What command can you use to do this?"; Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill."; Question138 = "What backup medium is best suited to long-term archival storage, and why?"; Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)"; Question139 = "What tools are most commonly used to install or remove Debian packages?"; Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these"; Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?"; Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller."; Question141 = "What kernel should you use to obtain support for many USB devices?"; Answer141 = "2.2.18 or later, or 2.4.0 or later"; Question142 = "What is the function of the tail command?"; Answer142 = "It displays the last few lines (10 by default) of a file."; Question143 = "What types of errors will leave traces in system log files?"; Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes."; Question144 = "What type of software can block access to any or all network ports on a computer?"; Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)"; Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?"; Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions."; Question146 = "What does the cp command accomplish?"; Answer146 = "It copies one or more files."; Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?"; Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question."; Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?"; Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion."; Question149 = "What is the best way to stop a server that was started through a SysV startup script?"; Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop."; Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?"; Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job."; stop(); stop();
Instance of Symbol 581 MovieClip "answer" in Frame 273
onClipEvent (load) { _visible = false; }
Frame 274
stop();
Instance of Symbol 585 MovieClip "answer" in Frame 274
onClipEvent (load) { _visible = false; }
Frame 275
stop();
Instance of Symbol 589 MovieClip "answer" in Frame 275
onClipEvent (load) { _visible = false; }
Frame 276
stop();
Instance of Symbol 593 MovieClip "answer" in Frame 276
onClipEvent (load) { _visible = false; }
Frame 277
stop();
Instance of Symbol 597 MovieClip "answer" in Frame 277
onClipEvent (load) { _visible = false; }
Frame 278
stop();
Instance of Symbol 601 MovieClip "answer" in Frame 278
onClipEvent (load) { _visible = false; }
Frame 279
stop();
Instance of Symbol 605 MovieClip "answer" in Frame 279
onClipEvent (load) { _visible = false; }
Frame 280
stop();
Instance of Symbol 609 MovieClip "answer" in Frame 280
onClipEvent (load) { _visible = false; }
Frame 281
stop();
Instance of Symbol 613 MovieClip "answer" in Frame 281
onClipEvent (load) { _visible = false; }
Frame 282
stop();
Instance of Symbol 617 MovieClip "answer" in Frame 282
onClipEvent (load) { _visible = false; }
Frame 283
stop();
Instance of Symbol 621 MovieClip "answer" in Frame 283
onClipEvent (load) { _visible = false; }
Frame 284
stop();
Instance of Symbol 625 MovieClip "answer" in Frame 284
onClipEvent (load) { _visible = false; }
Frame 285
stop();
Instance of Symbol 629 MovieClip "answer" in Frame 285
onClipEvent (load) { _visible = false; }
Frame 286
stop();
Instance of Symbol 633 MovieClip "answer" in Frame 286
onClipEvent (load) { _visible = false; }
Frame 287
stop();
Instance of Symbol 637 MovieClip "answer" in Frame 287
onClipEvent (load) { _visible = false; }
Frame 288
stop();
Instance of Symbol 641 MovieClip "answer" in Frame 288
onClipEvent (load) { _visible = false; }
Frame 289
stop();
Instance of Symbol 645 MovieClip "answer" in Frame 289
onClipEvent (load) { _visible = false; }
Frame 290
stop();
Instance of Symbol 649 MovieClip "answer" in Frame 290
onClipEvent (load) { _visible = false; }
Frame 291
stop();
Instance of Symbol 653 MovieClip "answer" in Frame 291
onClipEvent (load) { _visible = false; }
Frame 292
stop();
Instance of Symbol 657 MovieClip "answer" in Frame 292
onClipEvent (load) { _visible = false; }
Frame 293
Question1 = "Traditionally, the Linux kernel has had to reside below what cylinder?"; Answer1 = "Traditionally, the Linux kernel has had to reside below the 1024th cylinder. Recent versions of LILO and GRUB enable new Linux distributions to be installed anywhere on a hard disk if the BIOS supports this feature."; Question2 = "What is the major difference between a workstation and a server?"; Answer2 = "Individuals use workstations for productivity tasks; servers exchange data with other computers over a network."; Question3 = "What can be used to link together multiple programs so that the output of one program becomes the input of another?"; Answer3 = "Pipes enable you to link together multiple programs. At the command line, the pipe character is |."; Question4 = "What command will show you the path of the directory you are currently working in?"; Answer4 = "The pwd command will show you the path of the directory you are currently in."; Question5 = "What command will show you the numeric value currently being subtracted from the default permissions of newly created files?"; Answer5 = "The umask command will show you the numeric value currently being subtracted from the default permissions of newly created files and directories."; Question6 = "What is the purpose of awk?"; Answer6 = "It is a scripting language that provides complex pattern-matching facilities."; Question7 = "What utility can be used to locate files in common binary, documentation, and configuration directories?"; Answer7 = "The whereis utility locates files in common binary, documentation, and configuration directories."; Question8 = "How can PAM be used to help restrict user access?"; Answer8 = "You can add PAM modules to your configuration that can deny any specified user access to the computer based on the user's location or other characteristics, even if the user enters a valid password."; Question9 = "Why is it dangerous to constantly log in as the root user?"; Answer9 = "Overuse of the root account increases the odds that your root password will be discovered. If root mistypes a command, the consequences can be far more damaging than is the case when an ordinary user does so."; Question10 = "What command can be used to execute a single command with alternative permission?"; Answer10 = "The sudo command can be used to execute a single command with alternative permission."; Question11 = "What utility allows you to edit disk quota information?"; Answer11 = "The edquota utility allows you to edit disk quota information."; Question12 = "You want to modify a user's account settings relating to account expiration. What utility should you use?"; Answer12 = "The chage command allows you to modify account settings relating to account expiration."; Question13 = "What character does Linux use to symbolize the root directory?"; Answer13 = "The root directory is Linux is represented by /."; Question14 = "Why would a RAID array be useful and what is it?"; Answer14 = "A RAID array can be used to increase disk speed, disk reliability, or both. The array uses multiple disks to work around individual disk speed limitations or to store duplicate copies of (or checksums for) data."; Question15 = "What programs does Linux use to write to optical media?"; Answer15 = "Linux uses the mkisofs program to create an ISO-9660 filesystem, which is then burned to the disc by cdrecord."; Question16 = "What is the purpose of the nice command?"; Answer16 = "It allows you to run a program with a specified priority."; Question17 = "What utility can you use to send a single packet to a target system, which should reply, confirming the existence of a basic network connection?"; Answer17 = "The ping utility sends a single packet to a target system and can be used to confirm the existence of a basic network connection."; Question18 = "If you are using static routing, what command can you use to add an entry to the routing table?"; Answer18 = "The route add command is used to add an entry to the routing table."; Question19 = "What is the purpose of creating a baseline?"; Answer19 = "A baseline describes how your system normally performs. If a problem develops, the baseline will help you identify the source and verify that a problem really is (or is not) in the subsystem you suspect it's in."; Question20 = "What does the output of the uptime utility show?"; Answer20 = "The output of the uptime utility shows the time the system has been running, as well as three load averages (for the past minute, the past 5 minutes, and the past 15 minutes)."; Question21 = "What type of information is typically included in installation log files?"; Answer21 = "The names of packages installed and error messages"; Question22 = "How many serial ATA devices can fit on a single serial ATA chain?"; Answer22 = "Two. (A computer can support multiple chains, though, and most have two on the motherboard.)"; Question23 = "What command is used to create a filesystem?"; Answer23 = "mkfs. This command actually calls filesystem-specific creation tools like mkfs.ext2 (aka mke2fs), which you can call directly if you prefer."; Question24 = "What program does Linux use to convert PostScript into formats suitable for a wide range of non-PostScript printers?"; Answer24 = "Ghostscript"; Question25 = "What are some common solutions to the problem of an unsatisfied dependency when installing a program package?"; Answer25 = "Force the installation, install/upgrade the required package, install a different version of the target package, or rebuild the target package from source code."; Question26 = "What software component determines whether Linux supports a given SCSI host adapter?"; Answer26 = "The Linux kernel"; Question27 = "What is the physical location of the first code an x86 CPU executes when it starts up?"; Answer27 = "In the BIOS, which is stored on a chip on the motherboard"; Question28 = "What command would you type at a shell prompt to view the contents of the /usr/local/bin directory?"; Answer28 = "ls /usr/local/bin"; Question29 = "Why is NFS generally preferable to SMB/CIFS (Samba) for file sharing between two Linux or Unix computers?"; Answer29 = "NFS supports the ownership, permission, and other Unix-style file features used by Linux, but SMB/CIFS doesn't."; Question30 = "How can you identify processes that consume an inordinate amount of CPU time?"; Answer30 = "The top utility or the ps utility with appropriate switches"; Question31 = "What must you remember to do after you edit /etc/lilo.conf so that your changes will take effect?"; Answer31 = "Type lilo to install a new boot loader that reflects your modifications."; Question32 = "What program can help identify slow or unreliable routers between you and a target system on the Internet?"; Answer32 = "traceroute"; Question33 = "What system associates IP addresses with hostnames?"; Answer33 = "The Domain Name System (DNS), which is a distributed set of name server computers"; Question34 = "What's the most common type of local network hardware today?"; Answer34 = "Ethernet"; Question35 = "What program displays information on the jobs in a print queue?"; Answer35 = "lpq"; Question36 = "On what partition type(s) (primary, extended, or logical) may the Linux root (/) partition reside?"; Answer36 = "Primary or logical; extended partitions are “placeholders” for one or more logical partitions."; Question37 = "What methods are most commonly used to shut down a Linux system?"; Answer37 = "The shutdown command at a command prompt or a shutdown option at a GUI login prompt. The telinit command can also be used to do this."; Question38 = "What types of problems most often generate kernel oops messages?"; Answer38 = "Hardware malfunctions and kernel bugs"; Question39 = "What do the Exim and Postfix programs have in common?"; Answer39 = "They're both SMTP mail servers."; Question40 = "When should you set the root password?"; Answer40 = "During system installation. For distributions that don't give the option at that time, set the root password as soon as possible after installation."; Question41 = "After reconfiguring your boot loader or kernel, you reboot but don't see any Linux-generated messages, or even a partial GRUB or LILO prompt. What is the likely cause?"; Answer41 = "The boot loader isn't installed or the BIOS is configured to try to boot from the wrong partition."; Question42 = "What is accomplished by the command chmod a+x scriptfile?"; Answer42 = "The command adds execute permissions for the owner, group, and world to scriptfile-the file is made executable."; Question43 = "The root user types passwd sandra. Assuming that the user sandra exists, what information will root then have to enter?"; Answer43 = "A new password for sandra, and a repeat of the same password to be sure it was entered correctly. The root user doesn't need to enter the current password."; Question44 = "When you configure a system to use a static IP address, what information do you enter manually?"; Answer44 = "The IP address, the netmask (a.k.a. the network mask or subnet mask), the IP addresses of 1-3 DNS servers, and the gateway (router) address"; Question45 = "What command can you use to discover how much space is being used by files in a specified directory?"; Answer45 = "du"; Question46 = "How can you locate stray files belonging to a user when deleting that user's account?"; Answer46 = "Use the find command with its -uid parameter, as in find / -uid 504, to find all files owned by the user whose UID is 504."; Question47 = "In what two forms does Linux swap space generally come?"; Answer47 = "A dedicated swap partition or a swap file within a regular filesystem"; Question48 = "What pull protocols are most commonly used for e-mail retrieval?"; Answer48 = "Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)"; Question49 = "Where do network servers typically record error messages?"; Answer49 = "In a log file, such as /var/log/messages, or a server-specific log file"; Question50 = "What OSs can GRUB boot?"; Answer50 = "Almost any x86 OS, including Linux, BSD-based Unix variants, the GNU HURD, DOS, Windows, OS/2, and BeOS"; Question51 = "A Linux system is displaying an X desktop, but you want to use a text-based screen to log in as another user. How can you do this?"; Answer51 = "Press Ctrl+Alt+F1 (or use some other function key numbered from 1 to 6) to get a text-mode login prompt, then log in normally."; Question52 = "Which common package management systems include support for dependency tracking?"; Answer52 = "The Red Hat Package Manager (RPM) and Debian package systems"; Question53 = "An administrator wants to delete /home/baduser but mistakenly types rm -r / home/baduser as root (note the extra space). What will be the consequence?"; Answer53 = "This command recursively deletes all the files in the root (/) and home/baduser directories, effectively destroying the entire Linux installation."; Question54 = "Which server would you run to allow Linux to function as a file and print server to Windows and OS/2 systems using their native file-sharing protocols?"; Answer54 = "Samba"; Question55 = "Where can the GRUB boot loader code be installed?"; Answer55 = "The hard disk's MBR, a Linux partition's boot sector, or a floppy disk's boot sector. This code relies on files in the /boot partition as well."; Question56 = "What function does the fsck program serve?"; Answer56 = "It checks a filesystem for errors. (fsck actually calls filesystem-specific helper programs, such as e2fsck, which do the bulk of the work.)"; Question57 = "When a user reports a problem in a vague way, what should you do?"; Answer57 = "Attempt to obtain more precise information about the problem by querying the user further or by investigating the problem yourself."; Question58 = "What user IDs (UIDs) do ordinary user accounts use?"; Answer58 = "Depending on the distribution, ordinary user accounts receive UIDs starting at 100, 500, or 1000, and higher."; Question59 = "What types of manipulations can you perform on a password base to make it more secure?"; Answer59 = "You can insert random numbers and letters into the base, vary the case of the base, and reverse the order of the base or one of its component words."; Question60 = "How do most Linux network servers that require usernames and passwords (such as FTP, Telnet, and SSH servers) verify the user's password?"; Answer60 = "These servers use the standard Linux account database; users provide the same password for remote access as for local logins."; Question61 = "What command would you type in a shell to obtain information on the status of the first Ethernet interface on a Linux computer?"; Answer61 = "ifconfig eth0"; Question62 = "How do man pages and HOWTO documents differ?"; Answer62 = "Man pages are brief summaries describing the function of specific programs, configuration files, and so on. HOWTOs are tutorial documents on topics."; Question63 = "What is the most common choice of software to implement as a Web server in Linux?"; Answer63 = "Apache"; Question64 = "What type of mouse is ideal for use in Linux?"; Answer64 = "A three-button mouse; many X programs assume three buttons are available."; Question65 = "What tool does Debian provide that can be used to keep your system automatically up-to-date with the latest system updates?"; Answer65 = "apt-get"; Question66 = "When is it most appropriate to set the system clock to Coordinated Universal Time (UTC, a.k.a. GMT, Greenwich Mean Time)?"; Answer66 = "When Linux is the only OS installed on the computer. Most x86 OSs assume the hardware clock is set to local time, but Linux can cope with local time or UTC."; Question67 = "Most Linux distributions ship with kernels that include drivers you may or may not need. What must you do to eliminate unnecessary drivers from your kernel?"; Answer67 = "Reconfigure the kernel and recompile it from source code."; Question68 = "What modes does the Vi editor support, and what are they for?"; Answer68 = "Command mode (to enter internal Vi commands), ex mode (to enter external and file-related commands), and edit (aka insert) mode (to edit text)."; Question69 = "What will happen if you enter the incorrect gateway (router) address when you are configuring networking?"; Answer69 = "You'll be able to access systems on your local network, but you won't be able to access systems on other networks or the Internet."; Question70 = "Your computer has a large hard disk and you cannot allow extended downtime doing filesystem checks after a power failure. How can you avoid this?"; Answer70 = "Use a journaling filesystem, such as ReiserFS, ext3fs, XFS, or JFS."; Question71 = "Who should have access to password files stored on a floppy disk?"; Answer71 = "Password files stored on floppy disks pose a security threat themselves. They should be kept under lock and key--ideally in a safe that can be accessed only by system administrators who can ordinarily read the original files."; Question72 = "Where is a good place to keep an administrator's logbook?"; Answer72 = "In a paper notebook near the computer"; Question73 = "You notice a single failed login for a user in a log file, followed immediately by a successful login for that user. What's the most likely explanation?"; Answer73 = "The user mistyped or momentarily forgot the password but then typed it correctly."; Question74 = "What symbol identifies variables when they're used (but not when they're assigned values) in a bash shell script?"; Answer74 = "$ (preceding the variable name)"; Question75 = "On a verify pass of a backup, you discover that /bin/ls, /etc/X11/xorg.conf, and several other files have changed. What does this indicate?"; Answer75 = "There's probably serious corruption in the backup process-data errors on the tape's bus, a bad tape, a bad disk, or some other problem."; Question76 = "What method does the locate command use to find files?"; Answer76 = "It searches a database that it updates periodically via cron jobs."; Question77 = "What type of removable device interface is common on laptop computers but rare on desktops?"; Answer77 = "PC Card, aka PCMCIA"; Question78 = "What happens to a process if its parent is killed or exits?"; Answer78 = "It's adopted by another process (typically init)."; Question79 = "Why might you create a separate partition for /usr/local?"; Answer79 = "To protect it from damage in case of a filesystem failure or system upgrade, or because you have two hard disks and need to split some directories to use both disks"; Question80 = "When you type ifconfig eth0, the output includes the following: HWaddr 00:80:C8:FA:3B:0A. What does this mean?"; Answer80 = "The network card associated with eth0 has a hardware address of 00:80:C8:FA:3B:0A."; Question81 = "What program is used to control a tape drive (to wind a tape past existing backups, erase a tape, and so on)?"; Answer81 = "mt"; Question82 = "What devices must be terminated in a SCSI chain?"; Answer82 = "The devices at the ends of the chain. (One of these may be the SCSI host adapter.)"; Question83 = "What command is used to submit a print job in Linux?"; Answer83 = "lpr"; Question84 = "Where should you install GRUB or LILO if you want to be able to restore its functionality using DOS's FDISK after installing DOS or Windows?"; Answer84 = "A primary Linux partition's boot sector (not the disk's MBR)"; Question85 = "What command can you use to quickly test a new X configuration after performing a reconfiguration in text mode?"; Answer85 = "startx"; Question86 = "What does the mv command accomplish?"; Answer86 = "It moves or renames a file or directory."; Question87 = "What software can you use to make room for Linux on a disk that already contains DOS or Windows?"; Answer87 = "Dynamic partition resizing programs like FIPS, GNU Parted, or PartitionMagic"; Question88 = "What file directs the Linux boot process after the kernel has loaded?"; Answer88 = "/etc/inittab"; Question89 = "Can a single user be simultaneously logged in multiple times to a single Linux computer?"; Answer89 = "Yes. Multiple logins are permitted through the use of virtual terminals, physical terminals on RS-232 serial ports or the like, or through network connections."; Question90 = "What major Linux distribution uses binary tarballs for package distribution?"; Answer90 = "Slackware"; Question91 = "What are the two most common busses that connect to plug-in cards?"; Answer91 = "The most common busses that connect to plug-in cards are the PCI bus and the Advanced Graphics Port (AGP) bus."; Question92 = "When you're installing from a CD-ROM, what is the primary drawback to a GUI installation routine?"; Answer92 = "GUI installations occasionally fail to work with some video hardware, particularly on laptop computers."; Question93 = "Several people report that the supercrunch program is crashing, but the system is otherwise stable. What is the most probable cause of this problem?"; Answer93 = "A program error--a bug, systemwide program configuration error, corruption in software files, or the like"; Question94 = "What happens when you try to run a program that requires a library that's not installed?"; Answer94 = "The program responds with a message saying that it couldn't find a library file. (It may not be visible if the program is launched in a GUI environment.)"; Question95 = "While you are troubleshooting a slow ATA hard disk, you decide to try changing the DMA transfer mode. What Linux tool lets you do this?"; Answer95 = "hdparm, specifically its -X parameter"; Question96 = "What boot methods are commonly used by Linux installers?"; Answer96 = "Floppy and CD-ROM are the most common, but some can start from DOS or Windows."; Question97 = "How much damage can intruders do if they are given physical access to a computer?"; Answer97 = "A great deal; with physical access, intruders can bypass login controls, copy data, or destroy the computer."; Question98 = "A particular model of sound card is on a Linux distribution's supported hardware list. What are your chances of getting the board to work with this model?"; Answer98 = "Your chances are good, but not certain; manufacturers sometimes change their designs without changing the model number."; Question99 = "What does the /etc/inetd.conf file control?"; Answer99 = "The inetd server, which launches other servers only when those servers are needed"; Question100 = "You want to reproduce a computer's configuration on another system. What can you consult to help accomplish this goal?"; Answer100 = "Your administrative logs (which should record important options and changes to the configuration of the first system) and backups"; Question101 = "Under what circumstances may an ordinary (non-root) user mount a filesystem?"; Answer101 = "When the filesystem has an entry in /etc/fstab that includes the user, users, or owner option. (If the option is owner, the user must own the filesystem's device file.)"; Question102 = "What conditions must be met to use DHCP?"; Answer102 = "Your network must include a DHCP server, and your computer must have appropriate hardware to connect to the network."; Question103 = "What is the principal advantage of selecting packages individually rather than in groups when installing the OS?"; Answer103 = "Individual package selection lets you select or deselect individual packages, thus saving disk space and possibly improving the system's security."; Question104 = "What are the names of two power management protocols common on laptop computers?"; Answer104 = "Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI)"; Question105 = "What should you do if your network uses static IP addresses but you don't know the correct one to use for a Linux system?"; Answer105 = "Ask your network administrator. Do not configure a system with a random IP address."; Question106 = "Is the 2.6.9 kernel a development or a stable kernel?"; Answer106 = "Stable; the second number (6) is even, which denotes a stable kernel series."; Question107 = "The user george has left your organization. What security-related actions should you take on any computer on which george had an account?"; Answer107 = "Delete george's accounts."; Question108 = "When should you use shadow passwords?"; Answer108 = "Almost always; shadow passwords substantially improve local security."; Question109 = "Who may change the owner of a file?"; Answer109 = "The file's current owner or root"; Question110 = "You've located a new driver for a device that had not previously been supported. This driver is available as a kernel patch. What must you do to use this driver?"; Answer110 = "Patch and recompile your Linux kernel."; Question111 = "What is necessary to give users the choice of using KDE or GNOME?"; Answer111 = "Install both environments. Users can select which to use at a graphical login or by modifying their X login scripts."; Question112 = "What type of Ethernet device, if used at the core of a network, allows computers to communicate with full duplex speeds?"; Answer112 = "A switch"; Question113 = "Where can you go to find out if your video card is supported by Linux?"; Answer113 = "The XFree86, X.org-X11, or commercial X server Web site or documentation. Some video card and video chipset manufacturers also offer X drivers."; Question114 = "How do you tell kill what process you want to terminate?"; Answer114 = "You pass kill the target process's process ID (PID) number."; Question115 = "A user reports lost or damaged files on a floppy disk. What user error might you suspect as a cause?"; Answer115 = "Ejecting the floppy disk without first unmounting it is the most probable user cause, but other problems, including non-user-related errors, are possible."; Question116 = "What does the TERM environment variable control?"; Answer116 = "The types of codes sent to a terminal (either a local or remote login) to control such features as bold text, colors, and cursor positioning"; Question117 = "A user reports being unable to store files on a Windows partition on a computer that dual-boots between Windows and Linux. How might you correct this problem?"; Answer117 = "Edit /etc/fstab and add uid=UID, gid=GID, and umask=value parameters to the partition's entry. Then remount the partition with the new options."; Question118 = "You want to upgrade the bigserver package on an RPM-based system with a new file called bigserver-4.2.3-3.i386.rpm. What would you type?"; Answer118 = "rpm -Uvh bigserver-4.2.3-3.i386.rpm. The v and h options may be omitted if you don't want a progress display."; Question119 = "What does the modprobe command do?"; Answer119 = "It loads or removes one or more modules, including the module you specify and any on which it depends."; Question120 = "When you create a compressed tarball with a command like tar cvzf tarball.tgz ./, does tar apply compression to the individual files or to the archive as a whole?"; Answer120 = "To the archive as a whole. This produces greater compression than compressing individual files, but it makes the archive more sensitive to damage."; Question121 = "How do you tell Linux to install from a network server?"; Answer121 = "Boot with a network boot image or select a network installation option, depending on the distribution."; Question122 = "What command removes a print job from a print queue?"; Answer122 = "lprm"; Question123 = "Why should you test a new or upgraded application on a test system before installing it on a production system?"; Answer123 = "To verify the program's operation on a disposable system before risking a system on which you or your users rely"; Question124 = "What advantage does using SSH have over using Telnet for initiating a remote X session?"; Answer124 = "SSH can tunnel the X session, thus applying encryption to all X data, including the initial username and password and all data sent via X protocols. Telnet cannot do this."; Question125 = "In what file is group membership recorded?"; Answer125 = "/etc/group"; Question126 = "What command do you use to switch the current runlevel?"; Answer126 = "telinit"; Question127 = "Under what circumstances is Telnet a good remote administration tool?"; Answer127 = "Only within very secure private networks; its lack of encryption makes it very dangerous as a remote administration tool otherwise."; Question128 = "How do you create a user cron job?"; Answer128 = "Use the crontab program."; Question129 = "Why might you want to delay creating user accounts until after installation?"; Answer129 = "Post-installation account-creation tools are usually more flexible than the tools that are provided during installation."; Question130 = "You want to determine what speed a serial port is configured to use. What tool can do this?"; Answer130 = "setserial"; Question131 = "What are the most important general-purpose log files on most Linux systems?"; Answer131 = "/var/log/messages, /var/log/syslog, and /var/log/secure. (Not all distributions use all three of these, though.)"; Question132 = "What three factors does X use to compute the refresh rate you'll see?"; Answer132 = "The monitor's maximum horizontal refresh rate, the monitor's maximum vertical refresh rate, and the resolution"; Question133 = "What type of information does the df command return?"; Answer133 = "The devices and mount points associated with mounted filesystems, those filesystems' sizes, and the used and available space on those filesystems"; Question134 = "What are the settings for serial ATA disks?"; Answer134 = "Each serial ATA disk may be a master or a slave. Modern drives have extra options--one to set master status on single-drive chains and another to set the status automatically."; Question135 = "Why are SUID root programs rare?"; Answer135 = "They're a potential security risk because too-powerful programs or bugs could allow unscrupulous users to abuse the program."; Question136 = "What are some common sources of emergency disk sets?"; Answer136 = "Linux's boot/emergency disk, third-party emergency disks, small distributions on Zip or LS-120 disks, distributions that boot from a CD-ROM"; Question137 = "You want to kill a process by name. What command can you use to do this?"; Answer137 = "Type killall processname. Alternatively, you can use ps to find the process ID (PID) of the process and use kill."; Question138 = "What backup medium is best suited to long-term archival storage, and why?"; Answer138 = "Optical media like CD-R, because they have very long shelf lives (10-100 years, by most estimates)"; Question139 = "What tools are most commonly used to install or remove Debian packages?"; Answer139 = "dselect, dpkg, apt-get, or GUI front ends to these"; Question140 = "What are likely explanations if fsck begins reporting errors on a regular basis even after clean system shutdowns?"; Answer140 = "The hard disk or some related hardware component may be going bad, or your kernel may lack fixes for bugs in your ATA controller."; Question141 = "What kernel should you use to obtain support for many USB devices?"; Answer141 = "2.2.18 or later, or 2.4.0 or later"; Question142 = "What is the function of the tail command?"; Answer142 = "It displays the last few lines (10 by default) of a file."; Question143 = "What types of errors will leave traces in system log files?"; Answer143 = "Errors related to programs that log errors in system log files, such as many servers, the kernel (and hence some hardware problems), and user login processes."; Question144 = "What type of software can block access to any or all network ports on a computer?"; Answer144 = "A firewall (typically implemented in Linux with ipfwadm, ipchains, or iptables)"; Question145 = "Which will benefit more from having SCSI hard disks: a typical workstation or a busy mail server?"; Answer145 = "The mail server will, because this task is very disk intensive, and SCSI disks can provide better speed in some high-usage conditions."; Question146 = "What does the cp command accomplish?"; Answer146 = "It copies one or more files."; Question147 = "How can you locate processes that have open files on a filesystem and are, as a result, preventing you from unmounting the filesystem?"; Answer147 = "lsof displays a list of all open files; you can then pipe lsof's output through grep to search for open files on the filesystem in question."; Question148 = "You notice that an important log file is missing from its normal location. What could this be a symptom of?"; Answer148 = "Intruders often try to cover their tracks by altering or deleting log files. Upon noticing the file missing, you should begin to look for other symptoms of an intrusion."; Question149 = "What is the best way to stop a server that was started through a SysV startup script?"; Answer149 = "Type the startup script's name followed by stop, as in /etc/rc.d/init.d/server stop."; Question150 = "What system utility can you use to periodically check the status of a trouble-prone utility that should normally be running at all times?"; Answer150 = "You can write a script to check and, if necessary, restart the process, and you can call that script in a cron job."; stop(); stop();
Instance of Symbol 661 MovieClip "answer" in Frame 293
onClipEvent (load) { _visible = false; }
Frame 294
stop();
Instance of Symbol 665 MovieClip "answer" in Frame 294
onClipEvent (load) { _visible = false; }
Frame 295
stop();
Instance of Symbol 669 MovieClip "answer" in Frame 295
onClipEvent (load) { _visible = false; }
Frame 296
stop();
Instance of Symbol 673 MovieClip "answer" in Frame 296
onClipEvent (load) { _visible = false; }
Frame 297
stop();
Instance of Symbol 677 MovieClip "answer" in Frame 297
onClipEvent (load) { _visible = false; }
Frame 298
stop();
Instance of Symbol 681 MovieClip "answer" in Frame 298
onClipEvent (load) { _visible = false; }
Frame 299
stop();
Instance of Symbol 685 MovieClip "answer" in Frame 299
onClipEvent (load) { _visible = false; }
Frame 300
stop();
Instance of Symbol 689 MovieClip "answer" in Frame 300
onClipEvent (load) { _visible = false; }
Frame 301
stop();
Instance of Symbol 693 MovieClip "answer" in Frame 301
onClipEvent (load) { _visible = false; }
Frame 302
stop();
Instance of Symbol 697 MovieClip "answer" in Frame 302
onClipEvent (load) { _visible = false; }
Symbol 13 Button
on (release) { gotoAndPlay (3); }
Symbol 18 Button
on (release) { getURL ("http://www.sybex.com", "_blank"); }
Symbol 20 Button
on (release) { getURL ("http://www.sybex.com"); }
Symbol 24 Button
on (release) { gotoAndPlay (1); }
Symbol 28 Button
on (release) { gotoAndPlay (293); }
Symbol 31 Button
on (release) { gotoAndPlay (273); }
Symbol 34 Button
on (release) { gotoAndPlay (253); }
Symbol 37 Button
on (release) { gotoAndPlay (233); }
Symbol 40 Button
on (release) { gotoAndPlay (213); }
Symbol 43 Button
on (release) { gotoAndPlay (193); }
Symbol 46 Button
on (release) { gotoAndPlay (173); }
Symbol 48 Button
on (release) { gotoAndPlay (153); }
Symbol 57 Button
on (release, keyPress "<Enter>") { if (Number(/:nr_in) == 1) { gotoAndStop (3); } else if (Number(/:nr_in) == 2) { gotoAndStop (4); } else if (Number(/:nr_in) == 3) { gotoAndStop (5); } else if (Number(/:nr_in) == 4) { gotoAndStop (6); } else if (Number(/:nr_in) == 5) { gotoAndStop (7); } else if (Number(/:nr_in) == 6) { gotoAndStop (8); } else if (Number(/:nr_in) == 7) { gotoAndStop (9); } else if (Number(/:nr_in) == 8) { gotoAndStop (10); } else if (Number(/:nr_in) == 9) { gotoAndStop (11); } else if (Number(/:nr_in) == 10) { gotoAndStop (12); } else if (Number(/:nr_in) == 11) { gotoAndStop (13); } else if (Number(/:nr_in) == 12) { gotoAndStop (14); } else if (Number(/:nr_in) == 13) { gotoAndStop (15); } else if (Number(/:nr_in) == 14) { gotoAndStop (16); } else if (Number(/:nr_in) == 15) { gotoAndStop (17); } else if (Number(/:nr_in) == 16) { gotoAndStop (18); } else if (Number(/:nr_in) == 17) { gotoAndStop (19); } else if (Number(/:nr_in) == 18) { gotoAndStop (20); } else if (Number(/:nr_in) == 19) { gotoAndStop (21); } else if (Number(/:nr_in) == 20) { gotoAndStop (22); } else if (Number(/:nr_in) == 21) { gotoAndStop (23); } else if (Number(/:nr_in) == 22) { gotoAndStop (24); } else if (Number(/:nr_in) == 23) { gotoAndStop (25); } else if (Number(/:nr_in) == 24) { gotoAndStop (26); } else if (Number(/:nr_in) == 25) { gotoAndStop (27); } else if (Number(/:nr_in) == 26) { gotoAndStop (28); } else if (Number(/:nr_in) == 27) { gotoAndStop (29); } else if (Number(/:nr_in) == 28) { gotoAndStop (30); } else if (Number(/:nr_in) == 29) { gotoAndStop (31); } else if (Number(/:nr_in) == 30) { gotoAndStop (32); } else if (Number(/:nr_in) == 31) { gotoAndStop (33); } else if (Number(/:nr_in) == 32) { gotoAndStop (34); } else if (Number(/:nr_in) == 33) { gotoAndStop (35); } else if (Number(/:nr_in) == 34) { gotoAndStop (36); } else if (Number(/:nr_in) == 35) { gotoAndStop (37); } else if (Number(/:nr_in) == 36) { gotoAndStop (38); } else if (Number(/:nr_in) == 37) { gotoAndStop (39); } else if (Number(/:nr_in) == 38) { gotoAndStop (40); } else if (Number(/:nr_in) == 39) { gotoAndStop (41); } else if (Number(/:nr_in) == 40) { gotoAndStop (42); } else if (Number(/:nr_in) == 41) { gotoAndStop (43); } else if (Number(/:nr_in) == 42) { gotoAndStop (44); } else if (Number(/:nr_in) == 43) { gotoAndStop (45); } else if (Number(/:nr_in) == 44) { gotoAndStop (46); } else if (Number(/:nr_in) == 45) { gotoAndStop (47); } else if (Number(/:nr_in) == 46) { gotoAndStop (48); } else if (Number(/:nr_in) == 47) { gotoAndStop (49); } else if (Number(/:nr_in) == 48) { gotoAndStop (50); } else if (Number(/:nr_in) == 49) { gotoAndStop (51); } else if (Number(/:nr_in) == 50) { gotoAndStop (52); } else if (Number(/:nr_in) == 51) { gotoAndStop (53); } else if (Number(/:nr_in) == 52) { gotoAndStop (54); } else if (Number(/:nr_in) == 53) { gotoAndStop (55); } else if (Number(/:nr_in) == 54) { gotoAndStop (56); } else if (Number(/:nr_in) == 55) { gotoAndStop (57); } else if (Number(/:nr_in) == 56) { gotoAndStop (58); } else if (Number(/:nr_in) == 57) { gotoAndStop (59); } else if (Number(/:nr_in) == 58) { gotoAndStop (60); } else if (Number(/:nr_in) == 59) { gotoAndStop (61); } else if (Number(/:nr_in) == 60) { gotoAndStop (62); } else if (Number(/:nr_in) == 61) { gotoAndStop (63); } else if (Number(/:nr_in) == 62) { gotoAndStop (64); } else if (Number(/:nr_in) == 63) { gotoAndStop (65); } else if (Number(/:nr_in) == 64) { gotoAndStop (66); } else if (Number(/:nr_in) == 65) { gotoAndStop (67); } else if (Number(/:nr_in) == 66) { gotoAndStop (68); } else if (Number(/:nr_in) == 67) { gotoAndStop (69); } else if (Number(/:nr_in) == 68) { gotoAndStop (70); } else if (Number(/:nr_in) == 69) { gotoAndStop (71); } else if (Number(/:nr_in) == 70) { gotoAndStop (72); } else if (Number(/:nr_in) == 71) { gotoAndStop (73); } else if (Number(/:nr_in) == 72) { gotoAndStop (74); } else if (Number(/:nr_in) == 73) { gotoAndStop (75); } else if (Number(/:nr_in) == 74) { gotoAndStop (76); } else if (Number(/:nr_in) == 75) { gotoAndStop (77); } else if (Number(/:nr_in) == 76) { gotoAndStop (78); } else if (Number(/:nr_in) == 77) { gotoAndStop (79); } else if (Number(/:nr_in) == 78) { gotoAndStop (80); } else if (Number(/:nr_in) == 79) { gotoAndStop (81); } else if (Number(/:nr_in) == 80) { gotoAndStop (82); } else if (Number(/:nr_in) == 81) { gotoAndStop (83); } else if (Number(/:nr_in) == 82) { gotoAndStop (84); } else if (Number(/:nr_in) == 83) { gotoAndStop (85); } else if (Number(/:nr_in) == 84) { gotoAndStop (86); } else if (Number(/:nr_in) == 85) { gotoAndStop (87); } else if (Number(/:nr_in) == 86) { gotoAndStop (88); } else if (Number(/:nr_in) == 87) { gotoAndStop (89); } else if (Number(/:nr_in) == 88) { gotoAndStop (90); } else if (Number(/:nr_in) == 89) { gotoAndStop (91); } else if (Number(/:nr_in) == 90) { gotoAndStop (92); } else if (Number(/:nr_in) == 91) { gotoAndStop (93); } else if (Number(/:nr_in) == 92) { gotoAndStop (94); } else if (Number(/:nr_in) == 93) { gotoAndStop (95); } else if (Number(/:nr_in) == 94) { gotoAndStop (96); } else if (Number(/:nr_in) == 95) { gotoAndStop (97); } else if (Number(/:nr_in) == 96) { gotoAndStop (98); } else if (Number(/:nr_in) == 97) { gotoAndStop (99); } else if (Number(/:nr_in) == 98) { gotoAndStop (100); } else if (Number(/:nr_in) == 99) { gotoAndStop (101); } else if (Number(/:nr_in) == 100) { gotoAndStop (102); } else if (Number(/:nr_in) == 101) { gotoAndStop (103); } else if (Number(/:nr_in) == 102) { gotoAndStop (104); } else if (Number(/:nr_in) == 103) { gotoAndStop (105); } else if (Number(/:nr_in) == 104) { gotoAndStop (106); } else if (Number(/:nr_in) == 105) { gotoAndStop (107); } else if (Number(/:nr_in) == 106) { gotoAndStop (108); } else if (Number(/:nr_in) == 107) { gotoAndStop (109); } else if (Number(/:nr_in) == 108) { gotoAndStop (110); } else if (Number(/:nr_in) == 109) { gotoAndStop (111); } else if (Number(/:nr_in) == 110) { gotoAndStop (112); } else if (Number(/:nr_in) == 111) { gotoAndStop (113); } else if (Number(/:nr_in) == 112) { gotoAndStop (114); } else if (Number(/:nr_in) == 113) { gotoAndStop (115); } else if (Number(/:nr_in) == 114) { gotoAndStop (116); } else if (Number(/:nr_in) == 115) { gotoAndStop (117); } else if (Number(/:nr_in) == 116) { gotoAndStop (118); } else if (Number(/:nr_in) == 117) { gotoAndStop (119); } else if (Number(/:nr_in) == 118) { gotoAndStop (120); } else if (Number(/:nr_in) == 119) { gotoAndStop (121); } else if (Number(/:nr_in) == 120) { gotoAndStop (122); } else if (Number(/:nr_in) == 121) { gotoAndStop (123); } else if (Number(/:nr_in) == 122) { gotoAndStop (124); } else if (Number(/:nr_in) == 123) { gotoAndStop (125); } else if (Number(/:nr_in) == 124) { gotoAndStop (126); } else if (Number(/:nr_in) == 125) { gotoAndStop (127); } else if (Number(/:nr_in) == 126) { gotoAndStop (128); } else if (Number(/:nr_in) == 127) { gotoAndStop (129); } else if (Number(/:nr_in) == 128) { gotoAndStop (130); } else if (Number(/:nr_in) == 129) { gotoAndStop (131); } else if (Number(/:nr_in) == 130) { gotoAndStop (132); } else if (Number(/:nr_in) == 131) { gotoAndStop (133); } else if (Number(/:nr_in) == 132) { gotoAndStop (134); } else if (Number(/:nr_in) == 133) { gotoAndStop (135); } else if (Number(/:nr_in) == 134) { gotoAndStop (136); } else if (Number(/:nr_in) == 135) { gotoAndStop (137); } else if (Number(/:nr_in) == 136) { gotoAndStop (138); } else if (Number(/:nr_in) == 137) { gotoAndStop (139); } else if (Number(/:nr_in) == 138) { gotoAndStop (140); } else if (Number(/:nr_in) == 139) { gotoAndStop (141); } else if (Number(/:nr_in) == 140) { gotoAndStop (142); } else if (Number(/:nr_in) == 141) { gotoAndStop (143); } else if (Number(/:nr_in) == 142) { gotoAndStop (144); } else if (Number(/:nr_in) == 143) { gotoAndStop (145); } else if (Number(/:nr_in) == 144) { gotoAndStop (146); } else if (Number(/:nr_in) == 145) { gotoAndStop (147); } else if (Number(/:nr_in) == 146) { gotoAndStop (148); } else if (Number(/:nr_in) == 147) { gotoAndStop (149); } else if (Number(/:nr_in) == 148) { gotoAndStop (150); } else if (Number(/:nr_in) == 149) { gotoAndStop (151); } else if (Number(/:nr_in) == 150) { gotoAndStop (152); } else { gotoAndStop("/:nr_in == x" +1); } }
Symbol 62 MovieClip Frame 1
stop();
Symbol 62 MovieClip Frame 4
stop();
Symbol 67 MovieClip Frame 1
stop();
Symbol 67 MovieClip Frame 6
stop();
Symbol 67 MovieClip Frame 10
stop();
Symbol 73 Button
on (release) { gotoAndPlay (2); }
Symbol 79 Button
on (release) { _root.question.gotoAndPlay("flip"); } on (release) { nextFrame(); }
Symbol 85 Button
on (release) { gotoAndPlay (152); }
Symbol 88 Button
on (release) { _root.answer._visible = true; }
Symbol 90 MovieClip Frame 1
stop();
Symbol 90 MovieClip Frame 4
stop();
Symbol 99 Button
on (release) { _root.question.gotoAndPlay("flip back"); } on (release) { prevFrame(); }
Symbol 105 Button
on (release) { gotoAndPlay (3); }
Symbol 107 MovieClip Frame 1
stop();
Symbol 107 MovieClip Frame 4
stop();
Symbol 111 MovieClip Frame 1
stop();
Symbol 111 MovieClip Frame 4
stop();
Symbol 115 MovieClip Frame 1
stop();
Symbol 115 MovieClip Frame 4
stop();
Symbol 119 MovieClip Frame 1
stop();
Symbol 119 MovieClip Frame 4
stop();
Symbol 123 MovieClip Frame 1
stop();
Symbol 123 MovieClip Frame 4
stop();
Symbol 127 MovieClip Frame 1
stop();
Symbol 127 MovieClip Frame 4
stop();
Symbol 131 MovieClip Frame 1
stop();
Symbol 131 MovieClip Frame 4
stop();
Symbol 135 MovieClip Frame 1
stop();
Symbol 135 MovieClip Frame 4
stop();
Symbol 139 MovieClip Frame 1
stop();
Symbol 139 MovieClip Frame 4
stop();
Symbol 143 MovieClip Frame 1
stop();
Symbol 143 MovieClip Frame 4
stop();
Symbol 147 MovieClip Frame 1
stop();
Symbol 147 MovieClip Frame 4
stop();
Symbol 151 MovieClip Frame 1
stop();
Symbol 151 MovieClip Frame 4
stop();
Symbol 155 MovieClip Frame 1
stop();
Symbol 155 MovieClip Frame 4
stop();
Symbol 159 MovieClip Frame 1
stop();
Symbol 159 MovieClip Frame 4
stop();
Symbol 163 MovieClip Frame 1
stop();
Symbol 163 MovieClip Frame 4
stop();
Symbol 167 MovieClip Frame 1
stop();
Symbol 167 MovieClip Frame 4
stop();
Symbol 171 MovieClip Frame 1
stop();
Symbol 171 MovieClip Frame 4
stop();
Symbol 175 MovieClip Frame 1
stop();
Symbol 175 MovieClip Frame 4
stop();
Symbol 179 MovieClip Frame 1
stop();
Symbol 179 MovieClip Frame 4
stop();
Symbol 183 MovieClip Frame 1
stop();
Symbol 183 MovieClip Frame 4
stop();
Symbol 187 MovieClip Frame 1
stop();
Symbol 187 MovieClip Frame 4
stop();
Symbol 191 MovieClip Frame 1
stop();
Symbol 191 MovieClip Frame 4
stop();
Symbol 195 MovieClip Frame 1
stop();
Symbol 195 MovieClip Frame 4
stop();
Symbol 199 MovieClip Frame 1
stop();
Symbol 199 MovieClip Frame 4
stop();
Symbol 203 MovieClip Frame 1
stop();
Symbol 203 MovieClip Frame 4
stop();
Symbol 207 MovieClip Frame 1
stop();
Symbol 207 MovieClip Frame 4
stop();
Symbol 211 MovieClip Frame 1
stop();
Symbol 211 MovieClip Frame 4
stop();
Symbol 215 MovieClip Frame 1
stop();
Symbol 215 MovieClip Frame 4
stop();
Symbol 219 MovieClip Frame 1
stop();
Symbol 219 MovieClip Frame 4
stop();
Symbol 223 MovieClip Frame 1
stop();
Symbol 223 MovieClip Frame 4
stop();
Symbol 227 MovieClip Frame 1
stop();
Symbol 227 MovieClip Frame 4
stop();
Symbol 231 MovieClip Frame 1
stop();
Symbol 231 MovieClip Frame 4
stop();
Symbol 235 MovieClip Frame 1
stop();
Symbol 235 MovieClip Frame 4
stop();
Symbol 239 MovieClip Frame 1
stop();
Symbol 239 MovieClip Frame 4
stop();
Symbol 243 MovieClip Frame 1
stop();
Symbol 243 MovieClip Frame 4
stop();
Symbol 247 MovieClip Frame 1
stop();
Symbol 247 MovieClip Frame 4
stop();
Symbol 251 MovieClip Frame 1
stop();
Symbol 251 MovieClip Frame 4
stop();
Symbol 255 MovieClip Frame 1
stop();
Symbol 255 MovieClip Frame 4
stop();
Symbol 259 MovieClip Frame 1
stop();
Symbol 259 MovieClip Frame 4
stop();
Symbol 263 MovieClip Frame 1
stop();
Symbol 263 MovieClip Frame 4
stop();
Symbol 267 MovieClip Frame 1
stop();
Symbol 267 MovieClip Frame 4
stop();
Symbol 271 MovieClip Frame 1
stop();
Symbol 271 MovieClip Frame 4
stop();
Symbol 275 MovieClip Frame 1
stop();
Symbol 275 MovieClip Frame 4
stop();
Symbol 279 MovieClip Frame 1
stop();
Symbol 279 MovieClip Frame 4
stop();
Symbol 283 MovieClip Frame 1
stop();
Symbol 283 MovieClip Frame 4
stop();
Symbol 287 MovieClip Frame 1
stop();
Symbol 287 MovieClip Frame 4
stop();
Symbol 291 MovieClip Frame 1
stop();
Symbol 291 MovieClip Frame 4
stop();
Symbol 295 MovieClip Frame 1
stop();
Symbol 295 MovieClip Frame 4
stop();
Symbol 299 MovieClip Frame 1
stop();
Symbol 299 MovieClip Frame 4
stop();
Symbol 303 MovieClip Frame 1
stop();
Symbol 303 MovieClip Frame 4
stop();
Symbol 307 MovieClip Frame 1
stop();
Symbol 307 MovieClip Frame 4
stop();
Symbol 311 MovieClip Frame 1
stop();
Symbol 311 MovieClip Frame 4
stop();
Symbol 315 MovieClip Frame 1
stop();
Symbol 315 MovieClip Frame 4
stop();
Symbol 319 MovieClip Frame 1
stop();
Symbol 319 MovieClip Frame 4
stop();
Symbol 323 MovieClip Frame 1
stop();
Symbol 323 MovieClip Frame 4
stop();
Symbol 327 MovieClip Frame 1
stop();
Symbol 327 MovieClip Frame 4
stop();
Symbol 331 MovieClip Frame 1
stop();
Symbol 331 MovieClip Frame 4
stop();
Symbol 335 MovieClip Frame 1
stop();
Symbol 335 MovieClip Frame 4
stop();
Symbol 339 MovieClip Frame 1
stop();
Symbol 339 MovieClip Frame 4
stop();
Symbol 343 MovieClip Frame 1
stop();
Symbol 343 MovieClip Frame 4
stop();
Symbol 347 MovieClip Frame 1
stop();
Symbol 347 MovieClip Frame 4
stop();
Symbol 351 MovieClip Frame 1
stop();
Symbol 351 MovieClip Frame 4
stop();
Symbol 355 MovieClip Frame 1
stop();
Symbol 355 MovieClip Frame 4
stop();
Symbol 359 MovieClip Frame 1
stop();
Symbol 359 MovieClip Frame 4
stop();
Symbol 363 MovieClip Frame 1
stop();
Symbol 363 MovieClip Frame 4
stop();
Symbol 367 MovieClip Frame 1
stop();
Symbol 367 MovieClip Frame 4
stop();
Symbol 371 MovieClip Frame 1
stop();
Symbol 371 MovieClip Frame 4
stop();
Symbol 375 MovieClip Frame 1
stop();
Symbol 375 MovieClip Frame 4
stop();
Symbol 379 MovieClip Frame 1
stop();
Symbol 379 MovieClip Frame 4
stop();
Symbol 383 MovieClip Frame 1
stop();
Symbol 383 MovieClip Frame 4
stop();
Symbol 387 MovieClip Frame 1
stop();
Symbol 387 MovieClip Frame 4
stop();
Symbol 391 MovieClip Frame 1
stop();
Symbol 391 MovieClip Frame 4
stop();
Symbol 395 MovieClip Frame 1
stop();
Symbol 395 MovieClip Frame 4
stop();
Symbol 399 MovieClip Frame 1
stop();
Symbol 399 MovieClip Frame 4
stop();
Symbol 403 MovieClip Frame 1
stop();
Symbol 403 MovieClip Frame 4
stop();
Symbol 407 MovieClip Frame 1
stop();
Symbol 407 MovieClip Frame 4
stop();
Symbol 411 MovieClip Frame 1
stop();
Symbol 411 MovieClip Frame 4
stop();
Symbol 415 MovieClip Frame 1
stop();
Symbol 415 MovieClip Frame 4
stop();
Symbol 419 MovieClip Frame 1
stop();
Symbol 419 MovieClip Frame 4
stop();
Symbol 423 MovieClip Frame 1
stop();
Symbol 423 MovieClip Frame 4
stop();
Symbol 427 MovieClip Frame 1
stop();
Symbol 427 MovieClip Frame 4
stop();
Symbol 431 MovieClip Frame 1
stop();
Symbol 431 MovieClip Frame 4
stop();
Symbol 435 MovieClip Frame 1
stop();
Symbol 435 MovieClip Frame 4
stop();
Symbol 439 MovieClip Frame 1
stop();
Symbol 439 MovieClip Frame 4
stop();
Symbol 443 MovieClip Frame 1
stop();
Symbol 443 MovieClip Frame 4
stop();
Symbol 447 MovieClip Frame 1
stop();
Symbol 447 MovieClip Frame 4
stop();
Symbol 451 MovieClip Frame 1
stop();
Symbol 451 MovieClip Frame 4
stop();
Symbol 455 MovieClip Frame 1
stop();
Symbol 455 MovieClip Frame 4
stop();
Symbol 459 MovieClip Frame 1
stop();
Symbol 459 MovieClip Frame 4
stop();
Symbol 465 MovieClip Frame 1
stop();
Symbol 465 MovieClip Frame 4
stop();
Symbol 469 MovieClip Frame 1
stop();
Symbol 469 MovieClip Frame 4
stop();
Symbol 473 MovieClip Frame 1
stop();
Symbol 473 MovieClip Frame 4
stop();
Symbol 477 MovieClip Frame 1
stop();
Symbol 477 MovieClip Frame 4
stop();
Symbol 481 MovieClip Frame 1
stop();
Symbol 481 MovieClip Frame 4
stop();
Symbol 485 MovieClip Frame 1
stop();
Symbol 485 MovieClip Frame 4
stop();
Symbol 489 MovieClip Frame 1
stop();
Symbol 489 MovieClip Frame 4
stop();
Symbol 493 MovieClip Frame 1
stop();
Symbol 493 MovieClip Frame 4
stop();
Symbol 497 MovieClip Frame 1
stop();
Symbol 497 MovieClip Frame 4
stop();
Symbol 501 MovieClip Frame 1
stop();
Symbol 501 MovieClip Frame 4
stop();
Symbol 505 MovieClip Frame 1
stop();
Symbol 505 MovieClip Frame 4
stop();
Symbol 509 MovieClip Frame 1
stop();
Symbol 509 MovieClip Frame 4
stop();
Symbol 513 MovieClip Frame 1
stop();
Symbol 513 MovieClip Frame 4
stop();
Symbol 517 MovieClip Frame 1
stop();
Symbol 517 MovieClip Frame 4
stop();
Symbol 521 MovieClip Frame 1
stop();
Symbol 521 MovieClip Frame 4
stop();
Symbol 525 MovieClip Frame 1
stop();
Symbol 525 MovieClip Frame 4
stop();
Symbol 529 MovieClip Frame 1
stop();
Symbol 529 MovieClip Frame 4
stop();
Symbol 533 MovieClip Frame 1
stop();
Symbol 533 MovieClip Frame 4
stop();
Symbol 537 MovieClip Frame 1
stop();
Symbol 537 MovieClip Frame 4
stop();
Symbol 541 MovieClip Frame 1
stop();
Symbol 541 MovieClip Frame 4
stop();
Symbol 545 MovieClip Frame 1
stop();
Symbol 545 MovieClip Frame 4
stop();
Symbol 549 MovieClip Frame 1
stop();
Symbol 549 MovieClip Frame 4
stop();
Symbol 553 MovieClip Frame 1
stop();
Symbol 553 MovieClip Frame 4
stop();
Symbol 557 MovieClip Frame 1
stop();
Symbol 557 MovieClip Frame 4
stop();
Symbol 561 MovieClip Frame 1
stop();
Symbol 561 MovieClip Frame 4
stop();
Symbol 565 MovieClip Frame 1
stop();
Symbol 565 MovieClip Frame 4
stop();
Symbol 569 MovieClip Frame 1
stop();
Symbol 569 MovieClip Frame 4
stop();
Symbol 573 MovieClip Frame 1
stop();
Symbol 573 MovieClip Frame 4
stop();
Symbol 577 MovieClip Frame 1
stop();
Symbol 577 MovieClip Frame 4
stop();
Symbol 581 MovieClip Frame 1
stop();
Symbol 581 MovieClip Frame 4
stop();
Symbol 585 MovieClip Frame 1
stop();
Symbol 585 MovieClip Frame 4
stop();
Symbol 589 MovieClip Frame 1
stop();
Symbol 589 MovieClip Frame 4
stop();
Symbol 593 MovieClip Frame 1
stop();
Symbol 593 MovieClip Frame 4
stop();
Symbol 597 MovieClip Frame 1
stop();
Symbol 597 MovieClip Frame 4
stop();
Symbol 601 MovieClip Frame 1
stop();
Symbol 601 MovieClip Frame 4
stop();
Symbol 605 MovieClip Frame 1
stop();
Symbol 605 MovieClip Frame 4
stop();
Symbol 609 MovieClip Frame 1
stop();
Symbol 609 MovieClip Frame 4
stop();
Symbol 613 MovieClip Frame 1
stop();
Symbol 613 MovieClip Frame 4
stop();
Symbol 617 MovieClip Frame 1
stop();
Symbol 617 MovieClip Frame 4
stop();
Symbol 621 MovieClip Frame 1
stop();
Symbol 621 MovieClip Frame 4
stop();
Symbol 625 MovieClip Frame 1
stop();
Symbol 625 MovieClip Frame 4
stop();
Symbol 629 MovieClip Frame 1
stop();
Symbol 629 MovieClip Frame 4
stop();
Symbol 633 MovieClip Frame 1
stop();
Symbol 633 MovieClip Frame 4
stop();
Symbol 637 MovieClip Frame 1
stop();
Symbol 637 MovieClip Frame 4
stop();
Symbol 641 MovieClip Frame 1
stop();
Symbol 641 MovieClip Frame 4
stop();
Symbol 645 MovieClip Frame 1
stop();
Symbol 645 MovieClip Frame 4
stop();
Symbol 649 MovieClip Frame 1
stop();
Symbol 649 MovieClip Frame 4
stop();
Symbol 653 MovieClip Frame 1
stop();
Symbol 653 MovieClip Frame 4
stop();
Symbol 657 MovieClip Frame 1
stop();
Symbol 657 MovieClip Frame 4
stop();
Symbol 661 MovieClip Frame 1
stop();
Symbol 661 MovieClip Frame 4
stop();
Symbol 665 MovieClip Frame 1
stop();
Symbol 665 MovieClip Frame 4
stop();
Symbol 669 MovieClip Frame 1
stop();
Symbol 669 MovieClip Frame 4
stop();
Symbol 673 MovieClip Frame 1
stop();
Symbol 673 MovieClip Frame 4
stop();
Symbol 677 MovieClip Frame 1
stop();
Symbol 677 MovieClip Frame 4
stop();
Symbol 681 MovieClip Frame 1
stop();
Symbol 681 MovieClip Frame 4
stop();
Symbol 685 MovieClip Frame 1
stop();
Symbol 685 MovieClip Frame 4
stop();
Symbol 689 MovieClip Frame 1
stop();
Symbol 689 MovieClip Frame 4
stop();
Symbol 693 MovieClip Frame 1
stop();
Symbol 693 MovieClip Frame 4
stop();
Symbol 697 MovieClip Frame 1
stop();
Symbol 697 MovieClip Frame 4
stop();

Library Items

Symbol 1 BitmapUsed by:2 19
Symbol 2 GraphicUses:1Used by:Timeline
Symbol 3 FontUsed by:4 5 6 7 8 10 21 22 26 29 30 33 36 39 42 45 47 49 50 51 54 68 69 70 71 75 81 87 95 101
Symbol 4 TextUses:3Used by:Timeline
Symbol 5 TextUses:3Used by:Timeline
Symbol 6 TextUses:3Used by:Timeline
Symbol 7 TextUses:3Used by:Timeline
Symbol 8 TextUses:3Used by:Timeline
Symbol 9 GraphicUsed by:13
Symbol 10 TextUses:3Used by:13
Symbol 11 GraphicUsed by:13 31 34 37 40 43 46 48 88
Symbol 12 GraphicUsed by:13 31 34 37 40 43 46 48 88
Symbol 13 ButtonUses:9 10 11 12Used by:Timeline
Symbol 14 GraphicUsed by:18 20
Symbol 15 GraphicUsed by:18 20
Symbol 16 GraphicUsed by:18 20
Symbol 17 GraphicUsed by:18 20
Symbol 18 ButtonUses:14 15 16 17Used by:Timeline
Symbol 19 GraphicUses:1Used by:Timeline
Symbol 20 ButtonUses:14 15 16 17Used by:Timeline
Symbol 21 TextUses:3Used by:24
Symbol 22 TextUses:3Used by:24
Symbol 23 GraphicUsed by:24
Symbol 24 ButtonUses:21 22 23Used by:Timeline
Symbol 25 GraphicUsed by:28 31 48
Symbol 26 TextUses:3Used by:28
Symbol 27 GraphicUsed by:28
Symbol 28 ButtonUses:25 26 27Used by:Timeline
Symbol 29 TextUses:3Used by:31
Symbol 30 TextUses:3Used by:31
Symbol 31 ButtonUses:25 29 11 12 30Used by:Timeline
Symbol 32 GraphicUsed by:34
Symbol 33 TextUses:3Used by:34
Symbol 34 ButtonUses:32 33 11 12Used by:Timeline
Symbol 35 GraphicUsed by:37
Symbol 36 TextUses:3Used by:37
Symbol 37 ButtonUses:35 36 11 12Used by:Timeline
Symbol 38 GraphicUsed by:40
Symbol 39 TextUses:3Used by:40
Symbol 40 ButtonUses:38 39 11 12Used by:Timeline
Symbol 41 GraphicUsed by:43
Symbol 42 TextUses:3Used by:43
Symbol 43 ButtonUses:41 42 11 12Used by:Timeline
Symbol 44 GraphicUsed by:46
Symbol 45 TextUses:3Used by:46
Symbol 46 ButtonUses:44 45 11 12Used by:Timeline
Symbol 47 TextUses:3Used by:48
Symbol 48 ButtonUses:25 47 11 12Used by:Timeline
Symbol 49 TextUses:3Used by:Timeline
Symbol 50 TextUses:3Used by:Timeline
Symbol 51 TextUses:3Used by:Timeline
Symbol 52 GraphicUsed by:Timeline
Symbol 53 GraphicUsed by:57
Symbol 54 TextUses:3Used by:57
Symbol 55 GraphicUsed by:57
Symbol 56 GraphicUsed by:57
Symbol 57 ButtonUses:53 54 55 56Used by:Timeline
Symbol 58 FontUsed by:59
Symbol 59 EditableTextUses:58Used by:Timeline
Symbol 60 FontUsed by:61 89 91 106 108 110 112 114 116 118 120 122 124 126 128 130 132 134 136 138 140 142 144 146 148 150 152 154 156 158 160 162 164 166 168 170 172 174 176 178 180 182 184 186 188 190 192 194 196 198 200 202 204 206 208 210 212 214 216 218 220 222 224 226 228 230 232 234 236 238 240 242 244 246 248 250 252 254 256 258 260 262 264 266 268 270 272 274 276 278 280 282 284 286 288 290 292 294 296 298 300 302 304 306 308 310 312 314 316 318 320 322 324 326 328 330 332 334 336 338 340 342 344 346 348 350 352 354 356 358 360 362 364 366 368 370 372 374 376 378 380 382 384 386 388 390 392 394 396 398 400 402 404 406 408 410 412 414 416 418 420 422 424 426 428 430 432 434 436 438 440 442 444 446 448 450 452 454 456 458 460 462 464 466 468 470 472 474 476 478 480 482 484 486 488 490 492 494 496 498 500 502 504 506 508 510 512 514 516 518 520 522 524 526 528 530 532 534 536 538 540 542 544 546 548 550 552 554 556 558 560 562 564 566 568 570 572 574 576 578 580 582 584 586 588 590 592 594 596 598 600 602 604 606 608 610 612 614 616 618 620 622 624 626 628 630 632 634 636 638 640 642 644 646 648 650 652 654 656 658 660 662 664 666 668 670 672 674 676 678 680 682 684 686 688 690 692 694 696 698
Symbol 61 EditableTextUses:60Used by:62
Symbol 62 MovieClipUses:61Used by:Timeline
Symbol 63 GraphicUsed by:67  Timeline
Symbol 64 GraphicUsed by:Timeline
Symbol 65 FontUsed by:66 93 109 113 117 121 125 129 133 137 141 145 149 153 157 161 165 169 173 177 181 185 189 193 197 201 205 209 213 217 221 225 229 233 237 241 245 249 253 257 261 265 269 273 277 281 285 289 293 297 301 305 309 313 317 321 325 329 333 337 341 345 349 353 357 361 365 369 373 377 381 385 389 393 397 401 405 409 413 417 421 425 429 433 437 441 445 449 453 457 461 463 467 471 475 479 483 487 491 495 499 503 507 511 515 519 523 527 531 535 539 543 547 551 555 559 563 567 571 575 579 583 587 591 595 599 603 607 611 615 619 623 627 631 635 639 643 647 651 655 659 663 667 671 675 679 683 687 691 695
Symbol 66 TextUses:65Used by:Timeline
Symbol 67 MovieClipUses:63Used by:Timeline
Symbol 68 TextUses:3Used by:Timeline
Symbol 69 TextUses:3Used by:Timeline
Symbol 70 TextUses:3Used by:73
Symbol 71 TextUses:3Used by:73
Symbol 72 GraphicUsed by:73
Symbol 73 ButtonUses:70 71 72Used by:Timeline
Symbol 74 GraphicUsed by:79
Symbol 75 TextUses:3Used by:79
Symbol 76 GraphicUsed by:79
Symbol 77 GraphicUsed by:79
Symbol 78 GraphicUsed by:79
Symbol 79 ButtonUses:74 75 76 77 78Used by:Timeline
Symbol 80 GraphicUsed by:85
Symbol 81 TextUses:3Used by:85
Symbol 82 GraphicUsed by:85
Symbol 83 GraphicUsed by:85
Symbol 84 GraphicUsed by:85
Symbol 85 ButtonUses:80 81 82 83 84Used by:Timeline
Symbol 86 GraphicUsed by:88
Symbol 87 TextUses:3Used by:88
Symbol 88 ButtonUses:86 87 11 12Used by:Timeline
Symbol 89 EditableTextUses:60Used by:90
Symbol 90 MovieClipUses:89Used by:Timeline
Symbol 91 EditableTextUses:60Used by:Timeline
Symbol 92 GraphicUsed by:Timeline
Symbol 93 TextUses:65Used by:Timeline
Symbol 94 GraphicUsed by:99
Symbol 95 TextUses:3Used by:99
Symbol 96 GraphicUsed by:99
Symbol 97 GraphicUsed by:99
Symbol 98 GraphicUsed by:99
Symbol 99 ButtonUses:94 95 96 97 98Used by:Timeline
Symbol 100 GraphicUsed by:105
Symbol 101 TextUses:3Used by:105
Symbol 102 GraphicUsed by:105
Symbol 103 GraphicUsed by:105
Symbol 104 GraphicUsed by:105
Symbol 105 ButtonUses:100 101 102 103 104Used by:Timeline
Symbol 106 EditableTextUses:60Used by:107
Symbol 107 MovieClipUses:106Used by:Timeline
Symbol 108 EditableTextUses:60Used by:Timeline
Symbol 109 TextUses:65Used by:Timeline
Symbol 110 EditableTextUses:60Used by:111
Symbol 111 MovieClipUses:110Used by:Timeline
Symbol 112 EditableTextUses:60Used by:Timeline
Symbol 113 TextUses:65Used by:Timeline
Symbol 114 EditableTextUses:60Used by:115
Symbol 115 MovieClipUses:114Used by:Timeline
Symbol 116 EditableTextUses:60Used by:Timeline
Symbol 117 TextUses:65Used by:Timeline
Symbol 118 EditableTextUses:60Used by:119
Symbol 119 MovieClipUses:118Used by:Timeline
Symbol 120 EditableTextUses:60Used by:Timeline
Symbol 121 TextUses:65Used by:Timeline
Symbol 122 EditableTextUses:60Used by:123
Symbol 123 MovieClipUses:122Used by:Timeline
Symbol 124 EditableTextUses:60Used by:Timeline
Symbol 125 TextUses:65Used by:Timeline
Symbol 126 EditableTextUses:60Used by:127
Symbol 127 MovieClipUses:126Used by:Timeline
Symbol 128 EditableTextUses:60Used by:Timeline
Symbol 129 TextUses:65Used by:Timeline
Symbol 130 EditableTextUses:60Used by:131
Symbol 131 MovieClipUses:130Used by:Timeline
Symbol 132 EditableTextUses:60Used by:Timeline
Symbol 133 TextUses:65Used by:Timeline
Symbol 134 EditableTextUses:60Used by:135
Symbol 135 MovieClipUses:134Used by:Timeline
Symbol 136 EditableTextUses:60Used by:Timeline
Symbol 137 TextUses:65Used by:Timeline
Symbol 138 EditableTextUses:60Used by:139
Symbol 139 MovieClipUses:138Used by:Timeline
Symbol 140 EditableTextUses:60Used by:Timeline
Symbol 141 TextUses:65Used by:Timeline
Symbol 142 EditableTextUses:60Used by:143
Symbol 143 MovieClipUses:142Used by:Timeline
Symbol 144 EditableTextUses:60Used by:Timeline
Symbol 145 TextUses:65Used by:Timeline
Symbol 146 EditableTextUses:60Used by:147
Symbol 147 MovieClipUses:146Used by:Timeline
Symbol 148 EditableTextUses:60Used by:Timeline
Symbol 149 TextUses:65Used by:Timeline
Symbol 150 EditableTextUses:60Used by:151
Symbol 151 MovieClipUses:150Used by:Timeline
Symbol 152 EditableTextUses:60Used by:Timeline
Symbol 153 TextUses:65Used by:Timeline
Symbol 154 EditableTextUses:60Used by:155
Symbol 155 MovieClipUses:154Used by:Timeline
Symbol 156 EditableTextUses:60Used by:Timeline
Symbol 157 TextUses:65Used by:Timeline
Symbol 158 EditableTextUses:60Used by:159
Symbol 159 MovieClipUses:158Used by:Timeline
Symbol 160 EditableTextUses:60Used by:Timeline
Symbol 161 TextUses:65Used by:Timeline
Symbol 162 EditableTextUses:60Used by:163
Symbol 163 MovieClipUses:162Used by:Timeline
Symbol 164 EditableTextUses:60Used by:Timeline
Symbol 165 TextUses:65Used by:Timeline
Symbol 166 EditableTextUses:60Used by:167
Symbol 167 MovieClipUses:166Used by:Timeline
Symbol 168 EditableTextUses:60Used by:Timeline
Symbol 169 TextUses:65Used by:Timeline
Symbol 170 EditableTextUses:60Used by:171
Symbol 171 MovieClipUses:170Used by:Timeline
Symbol 172 EditableTextUses:60Used by:Timeline
Symbol 173 TextUses:65Used by:Timeline
Symbol 174 EditableTextUses:60Used by:175
Symbol 175 MovieClipUses:174Used by:Timeline
Symbol 176 EditableTextUses:60Used by:Timeline
Symbol 177 TextUses:65Used by:Timeline
Symbol 178 EditableTextUses:60Used by:179
Symbol 179 MovieClipUses:178Used by:Timeline
Symbol 180 EditableTextUses:60Used by:Timeline
Symbol 181 TextUses:65Used by:Timeline
Symbol 182 EditableTextUses:60Used by:183
Symbol 183 MovieClipUses:182Used by:Timeline
Symbol 184 EditableTextUses:60Used by:Timeline
Symbol 185 TextUses:65Used by:Timeline
Symbol 186 EditableTextUses:60Used by:187
Symbol 187 MovieClipUses:186Used by:Timeline
Symbol 188 EditableTextUses:60Used by:Timeline
Symbol 189 TextUses:65Used by:Timeline
Symbol 190 EditableTextUses:60Used by:191
Symbol 191 MovieClipUses:190Used by:Timeline
Symbol 192 EditableTextUses:60Used by:Timeline
Symbol 193 TextUses:65Used by:Timeline
Symbol 194 EditableTextUses:60Used by:195
Symbol 195 MovieClipUses:194Used by:Timeline
Symbol 196 EditableTextUses:60Used by:Timeline
Symbol 197 TextUses:65Used by:Timeline
Symbol 198 EditableTextUses:60Used by:199
Symbol 199 MovieClipUses:198Used by:Timeline
Symbol 200 EditableTextUses:60Used by:Timeline
Symbol 201 TextUses:65Used by:Timeline
Symbol 202 EditableTextUses:60Used by:203
Symbol 203 MovieClipUses:202Used by:Timeline
Symbol 204 EditableTextUses:60Used by:Timeline
Symbol 205 TextUses:65Used by:Timeline
Symbol 206 EditableTextUses:60Used by:207
Symbol 207 MovieClipUses:206Used by:Timeline
Symbol 208 EditableTextUses:60Used by:Timeline
Symbol 209 TextUses:65Used by:Timeline
Symbol 210 EditableTextUses:60Used by:211
Symbol 211 MovieClipUses:210Used by:Timeline
Symbol 212 EditableTextUses:60Used by:Timeline
Symbol 213 TextUses:65Used by:Timeline
Symbol 214 EditableTextUses:60Used by:215
Symbol 215 MovieClipUses:214Used by:Timeline
Symbol 216 EditableTextUses:60Used by:Timeline
Symbol 217 TextUses:65Used by:Timeline
Symbol 218 EditableTextUses:60Used by:219
Symbol 219 MovieClipUses:218Used by:Timeline
Symbol 220 EditableTextUses:60Used by:Timeline
Symbol 221 TextUses:65Used by:Timeline
Symbol 222 EditableTextUses:60Used by:223
Symbol 223 MovieClipUses:222Used by:Timeline
Symbol 224 EditableTextUses:60Used by:Timeline
Symbol 225 TextUses:65Used by:Timeline
Symbol 226 EditableTextUses:60Used by:227
Symbol 227 MovieClipUses:226Used by:Timeline
Symbol 228 EditableTextUses:60Used by:Timeline
Symbol 229 TextUses:65Used by:Timeline
Symbol 230 EditableTextUses:60Used by:231
Symbol 231 MovieClipUses:230Used by:Timeline
Symbol 232 EditableTextUses:60Used by:Timeline
Symbol 233 TextUses:65Used by:Timeline
Symbol 234 EditableTextUses:60Used by:235
Symbol 235 MovieClipUses:234Used by:Timeline
Symbol 236 EditableTextUses:60Used by:Timeline
Symbol 237 TextUses:65Used by:Timeline
Symbol 238 EditableTextUses:60Used by:239
Symbol 239 MovieClipUses:238Used by:Timeline
Symbol 240 EditableTextUses:60Used by:Timeline
Symbol 241 TextUses:65Used by:Timeline
Symbol 242 EditableTextUses:60Used by:243
Symbol 243 MovieClipUses:242Used by:Timeline
Symbol 244 EditableTextUses:60Used by:Timeline
Symbol 245 TextUses:65Used by:Timeline
Symbol 246 EditableTextUses:60Used by:247
Symbol 247 MovieClipUses:246Used by:Timeline
Symbol 248 EditableTextUses:60Used by:Timeline
Symbol 249 TextUses:65Used by:Timeline
Symbol 250 EditableTextUses:60Used by:251
Symbol 251 MovieClipUses:250Used by:Timeline
Symbol 252 EditableTextUses:60Used by:Timeline
Symbol 253 TextUses:65Used by:Timeline
Symbol 254 EditableTextUses:60Used by:255
Symbol 255 MovieClipUses:254Used by:Timeline
Symbol 256 EditableTextUses:60Used by:Timeline
Symbol 257 TextUses:65Used by:Timeline
Symbol 258 EditableTextUses:60Used by:259
Symbol 259 MovieClipUses:258Used by:Timeline
Symbol 260 EditableTextUses:60Used by:Timeline
Symbol 261 TextUses:65Used by:Timeline
Symbol 262 EditableTextUses:60Used by:263
Symbol 263 MovieClipUses:262Used by:Timeline
Symbol 264 EditableTextUses:60Used by:Timeline
Symbol 265 TextUses:65Used by:Timeline
Symbol 266 EditableTextUses:60Used by:267
Symbol 267 MovieClipUses:266Used by:Timeline
Symbol 268 EditableTextUses:60Used by:Timeline
Symbol 269 TextUses:65Used by:Timeline
Symbol 270 EditableTextUses:60Used by:271
Symbol 271 MovieClipUses:270Used by:Timeline
Symbol 272 EditableTextUses:60Used by:Timeline
Symbol 273 TextUses:65Used by:Timeline
Symbol 274 EditableTextUses:60Used by:275
Symbol 275 MovieClipUses:274Used by:Timeline
Symbol 276 EditableTextUses:60Used by:Timeline
Symbol 277 TextUses:65Used by:Timeline
Symbol 278 EditableTextUses:60Used by:279
Symbol 279 MovieClipUses:278Used by:Timeline
Symbol 280 EditableTextUses:60Used by:Timeline
Symbol 281 TextUses:65Used by:Timeline
Symbol 282 EditableTextUses:60Used by:283
Symbol 283 MovieClipUses:282Used by:Timeline
Symbol 284 EditableTextUses:60Used by:Timeline
Symbol 285 TextUses:65Used by:Timeline
Symbol 286 EditableTextUses:60Used by:287
Symbol 287 MovieClipUses:286Used by:Timeline
Symbol 288 EditableTextUses:60Used by:Timeline
Symbol 289 TextUses:65Used by:Timeline
Symbol 290 EditableTextUses:60Used by:291
Symbol 291 MovieClipUses:290Used by:Timeline
Symbol 292 EditableTextUses:60Used by:Timeline
Symbol 293 TextUses:65Used by:Timeline
Symbol 294 EditableTextUses:60Used by:295
Symbol 295 MovieClipUses:294Used by:Timeline
Symbol 296 EditableTextUses:60Used by:Timeline
Symbol 297 TextUses:65Used by:Timeline
Symbol 298 EditableTextUses:60Used by:299
Symbol 299 MovieClipUses:298Used by:Timeline
Symbol 300 EditableTextUses:60Used by:Timeline
Symbol 301 TextUses:65Used by:Timeline
Symbol 302 EditableTextUses:60Used by:303
Symbol 303 MovieClipUses:302Used by:Timeline
Symbol 304 EditableTextUses:60Used by:Timeline
Symbol 305 TextUses:65Used by:Timeline
Symbol 306 EditableTextUses:60Used by:307
Symbol 307 MovieClipUses:306Used by:Timeline
Symbol 308 EditableTextUses:60Used by:Timeline
Symbol 309 TextUses:65Used by:Timeline
Symbol 310 EditableTextUses:60Used by:311
Symbol 311 MovieClipUses:310Used by:Timeline
Symbol 312 EditableTextUses:60Used by:Timeline
Symbol 313 TextUses:65Used by:Timeline
Symbol 314 EditableTextUses:60Used by:315
Symbol 315 MovieClipUses:314Used by:Timeline
Symbol 316 EditableTextUses:60Used by:Timeline
Symbol 317 TextUses:65Used by:Timeline
Symbol 318 EditableTextUses:60Used by:319
Symbol 319 MovieClipUses:318Used by:Timeline
Symbol 320 EditableTextUses:60Used by:Timeline
Symbol 321 TextUses:65Used by:Timeline
Symbol 322 EditableTextUses:60Used by:323
Symbol 323 MovieClipUses:322Used by:Timeline
Symbol 324 EditableTextUses:60Used by:Timeline
Symbol 325 TextUses:65Used by:Timeline
Symbol 326 EditableTextUses:60Used by:327
Symbol 327 MovieClipUses:326Used by:Timeline
Symbol 328 EditableTextUses:60Used by:Timeline
Symbol 329 TextUses:65Used by:Timeline
Symbol 330 EditableTextUses:60Used by:331
Symbol 331 MovieClipUses:330Used by:Timeline
Symbol 332 EditableTextUses:60Used by:Timeline
Symbol 333 TextUses:65Used by:Timeline
Symbol 334 EditableTextUses:60Used by:335
Symbol 335 MovieClipUses:334Used by:Timeline
Symbol 336 EditableTextUses:60Used by:Timeline
Symbol 337 TextUses:65Used by:Timeline
Symbol 338 EditableTextUses:60Used by:339
Symbol 339 MovieClipUses:338Used by:Timeline
Symbol 340 EditableTextUses:60Used by:Timeline
Symbol 341 TextUses:65Used by:Timeline
Symbol 342 EditableTextUses:60Used by:343
Symbol 343 MovieClipUses:342Used by:Timeline
Symbol 344 EditableTextUses:60Used by:Timeline
Symbol 345 TextUses:65Used by:Timeline
Symbol 346 EditableTextUses:60Used by:347
Symbol 347 MovieClipUses:346Used by:Timeline
Symbol 348 EditableTextUses:60Used by:Timeline
Symbol 349 TextUses:65Used by:Timeline
Symbol 350 EditableTextUses:60Used by:351
Symbol 351 MovieClipUses:350Used by:Timeline
Symbol 352 EditableTextUses:60Used by:Timeline
Symbol 353 TextUses:65Used by:Timeline
Symbol 354 EditableTextUses:60Used by:355
Symbol 355 MovieClipUses:354Used by:Timeline
Symbol 356 EditableTextUses:60Used by:Timeline
Symbol 357 TextUses:65Used by:Timeline
Symbol 358 EditableTextUses:60Used by:359
Symbol 359 MovieClipUses:358Used by:Timeline
Symbol 360 EditableTextUses:60Used by:Timeline
Symbol 361 TextUses:65Used by:Timeline
Symbol 362 EditableTextUses:60Used by:363
Symbol 363 MovieClipUses:362Used by:Timeline
Symbol 364 EditableTextUses:60Used by:Timeline
Symbol 365 TextUses:65Used by:Timeline
Symbol 366 EditableTextUses:60Used by:367
Symbol 367 MovieClipUses:366Used by:Timeline
Symbol 368 EditableTextUses:60Used by:Timeline
Symbol 369 TextUses:65Used by:Timeline
Symbol 370 EditableTextUses:60Used by:371
Symbol 371 MovieClipUses:370Used by:Timeline
Symbol 372 EditableTextUses:60Used by:Timeline
Symbol 373 TextUses:65Used by:Timeline
Symbol 374 EditableTextUses:60Used by:375
Symbol 375 MovieClipUses:374Used by:Timeline
Symbol 376 EditableTextUses:60Used by:Timeline
Symbol 377 TextUses:65Used by:Timeline
Symbol 378 EditableTextUses:60Used by:379
Symbol 379 MovieClipUses:378Used by:Timeline
Symbol 380 EditableTextUses:60Used by:Timeline
Symbol 381 TextUses:65Used by:Timeline
Symbol 382 EditableTextUses:60Used by:383
Symbol 383 MovieClipUses:382Used by:Timeline
Symbol 384 EditableTextUses:60Used by:Timeline
Symbol 385 TextUses:65Used by:Timeline
Symbol 386 EditableTextUses:60Used by:387
Symbol 387 MovieClipUses:386Used by:Timeline
Symbol 388 EditableTextUses:60Used by:Timeline
Symbol 389 TextUses:65Used by:Timeline
Symbol 390 EditableTextUses:60Used by:391
Symbol 391 MovieClipUses:390Used by:Timeline
Symbol 392 EditableTextUses:60Used by:Timeline
Symbol 393 TextUses:65Used by:Timeline
Symbol 394 EditableTextUses:60Used by:395
Symbol 395 MovieClipUses:394Used by:Timeline
Symbol 396 EditableTextUses:60Used by:Timeline
Symbol 397 TextUses:65Used by:Timeline
Symbol 398 EditableTextUses:60Used by:399
Symbol 399 MovieClipUses:398Used by:Timeline
Symbol 400 EditableTextUses:60Used by:Timeline
Symbol 401 TextUses:65Used by:Timeline
Symbol 402 EditableTextUses:60Used by:403
Symbol 403 MovieClipUses:402Used by:Timeline
Symbol 404 EditableTextUses:60Used by:Timeline
Symbol 405 TextUses:65Used by:Timeline
Symbol 406 EditableTextUses:60Used by:407
Symbol 407 MovieClipUses:406Used by:Timeline
Symbol 408 EditableTextUses:60Used by:Timeline
Symbol 409 TextUses:65Used by:Timeline
Symbol 410 EditableTextUses:60Used by:411
Symbol 411 MovieClipUses:410Used by:Timeline
Symbol 412 EditableTextUses:60Used by:Timeline
Symbol 413 TextUses:65Used by:Timeline
Symbol 414 EditableTextUses:60Used by:415
Symbol 415 MovieClipUses:414Used by:Timeline
Symbol 416 EditableTextUses:60Used by:Timeline
Symbol 417 TextUses:65Used by:Timeline
Symbol 418 EditableTextUses:60Used by:419
Symbol 419 MovieClipUses:418Used by:Timeline
Symbol 420 EditableTextUses:60Used by:Timeline
Symbol 421 TextUses:65Used by:Timeline
Symbol 422 EditableTextUses:60Used by:423
Symbol 423 MovieClipUses:422Used by:Timeline
Symbol 424 EditableTextUses:60Used by:Timeline
Symbol 425 TextUses:65Used by:Timeline
Symbol 426 EditableTextUses:60Used by:427
Symbol 427 MovieClipUses:426Used by:Timeline
Symbol 428 EditableTextUses:60Used by:Timeline
Symbol 429 TextUses:65Used by:Timeline
Symbol 430 EditableTextUses:60Used by:431
Symbol 431 MovieClipUses:430Used by:Timeline
Symbol 432 EditableTextUses:60Used by:Timeline
Symbol 433 TextUses:65Used by:Timeline
Symbol 434 EditableTextUses:60Used by:435
Symbol 435 MovieClipUses:434Used by:Timeline
Symbol 436 EditableTextUses:60Used by:Timeline
Symbol 437 TextUses:65Used by:Timeline
Symbol 438 EditableTextUses:60Used by:439
Symbol 439 MovieClipUses:438Used by:Timeline
Symbol 440 EditableTextUses:60Used by:Timeline
Symbol 441 TextUses:65Used by:Timeline
Symbol 442 EditableTextUses:60Used by:443
Symbol 443 MovieClipUses:442Used by:Timeline
Symbol 444 EditableTextUses:60Used by:Timeline
Symbol 445 TextUses:65Used by:Timeline
Symbol 446 EditableTextUses:60Used by:447
Symbol 447 MovieClipUses:446Used by:Timeline
Symbol 448 EditableTextUses:60Used by:Timeline
Symbol 449 TextUses:65Used by:Timeline
Symbol 450 EditableTextUses:60Used by:451
Symbol 451 MovieClipUses:450Used by:Timeline
Symbol 452 EditableTextUses:60Used by:Timeline
Symbol 453 TextUses:65Used by:Timeline
Symbol 454 EditableTextUses:60Used by:455
Symbol 455 MovieClipUses:454Used by:Timeline
Symbol 456 EditableTextUses:60Used by:Timeline
Symbol 457 TextUses:65Used by:Timeline
Symbol 458 EditableTextUses:60Used by:459
Symbol 459 MovieClipUses:458Used by:Timeline
Symbol 460 EditableTextUses:60Used by:Timeline
Symbol 461 TextUses:65Used by:Timeline
Symbol 462 EditableTextUses:60Used by:Timeline
Symbol 463 TextUses:65Used by:Timeline
Symbol 464 EditableTextUses:60Used by:465
Symbol 465 MovieClipUses:464Used by:Timeline
Symbol 466 EditableTextUses:60Used by:Timeline
Symbol 467 TextUses:65Used by:Timeline
Symbol 468 EditableTextUses:60Used by:469
Symbol 469 MovieClipUses:468Used by:Timeline
Symbol 470 EditableTextUses:60Used by:Timeline
Symbol 471 TextUses:65Used by:Timeline
Symbol 472 EditableTextUses:60Used by:473
Symbol 473 MovieClipUses:472Used by:Timeline
Symbol 474 EditableTextUses:60Used by:Timeline
Symbol 475 TextUses:65Used by:Timeline
Symbol 476 EditableTextUses:60Used by:477
Symbol 477 MovieClipUses:476Used by:Timeline
Symbol 478 EditableTextUses:60Used by:Timeline
Symbol 479 TextUses:65Used by:Timeline
Symbol 480 EditableTextUses:60Used by:481
Symbol 481 MovieClipUses:480Used by:Timeline
Symbol 482 EditableTextUses:60Used by:Timeline
Symbol 483 TextUses:65Used by:Timeline
Symbol 484 EditableTextUses:60Used by:485
Symbol 485 MovieClipUses:484Used by:Timeline
Symbol 486 EditableTextUses:60Used by:Timeline
Symbol 487 TextUses:65Used by:Timeline
Symbol 488 EditableTextUses:60Used by:489
Symbol 489 MovieClipUses:488Used by:Timeline
Symbol 490 EditableTextUses:60Used by:Timeline
Symbol 491 TextUses:65Used by:Timeline
Symbol 492 EditableTextUses:60Used by:493
Symbol 493 MovieClipUses:492Used by:Timeline
Symbol 494 EditableTextUses:60Used by:Timeline
Symbol 495 TextUses:65Used by:Timeline
Symbol 496 EditableTextUses:60Used by:497
Symbol 497 MovieClipUses:496Used by:Timeline
Symbol 498 EditableTextUses:60Used by:Timeline
Symbol 499 TextUses:65Used by:Timeline
Symbol 500 EditableTextUses:60Used by:501
Symbol 501 MovieClipUses:500Used by:Timeline
Symbol 502 EditableTextUses:60Used by:Timeline
Symbol 503 TextUses:65Used by:Timeline
Symbol 504 EditableTextUses:60Used by:505
Symbol 505 MovieClipUses:504Used by:Timeline
Symbol 506 EditableTextUses:60Used by:Timeline
Symbol 507 TextUses:65Used by:Timeline
Symbol 508 EditableTextUses:60Used by:509
Symbol 509 MovieClipUses:508Used by:Timeline
Symbol 510 EditableTextUses:60Used by:Timeline
Symbol 511 TextUses:65Used by:Timeline
Symbol 512 EditableTextUses:60Used by:513
Symbol 513 MovieClipUses:512Used by:Timeline
Symbol 514 EditableTextUses:60Used by:Timeline
Symbol 515 TextUses:65Used by:Timeline
Symbol 516 EditableTextUses:60Used by:517
Symbol 517 MovieClipUses:516Used by:Timeline
Symbol 518 EditableTextUses:60Used by:Timeline
Symbol 519 TextUses:65Used by:Timeline
Symbol 520 EditableTextUses:60Used by:521
Symbol 521 MovieClipUses:520Used by:Timeline
Symbol 522 EditableTextUses:60Used by:Timeline
Symbol 523 TextUses:65Used by:Timeline
Symbol 524 EditableTextUses:60Used by:525
Symbol 525 MovieClipUses:524Used by:Timeline
Symbol 526 EditableTextUses:60Used by:Timeline
Symbol 527 TextUses:65Used by:Timeline
Symbol 528 EditableTextUses:60Used by:529
Symbol 529 MovieClipUses:528Used by:Timeline
Symbol 530 EditableTextUses:60Used by:Timeline
Symbol 531 TextUses:65Used by:Timeline
Symbol 532 EditableTextUses:60Used by:533
Symbol 533 MovieClipUses:532Used by:Timeline
Symbol 534 EditableTextUses:60Used by:Timeline
Symbol 535 TextUses:65Used by:Timeline
Symbol 536 EditableTextUses:60Used by:537
Symbol 537 MovieClipUses:536Used by:Timeline
Symbol 538 EditableTextUses:60Used by:Timeline
Symbol 539 TextUses:65Used by:Timeline
Symbol 540 EditableTextUses:60Used by:541
Symbol 541 MovieClipUses:540Used by:Timeline
Symbol 542 EditableTextUses:60Used by:Timeline
Symbol 543 TextUses:65Used by:Timeline
Symbol 544 EditableTextUses:60Used by:545
Symbol 545 MovieClipUses:544Used by:Timeline
Symbol 546 EditableTextUses:60Used by:Timeline
Symbol 547 TextUses:65Used by:Timeline
Symbol 548 EditableTextUses:60Used by:549
Symbol 549 MovieClipUses:548Used by:Timeline
Symbol 550 EditableTextUses:60Used by:Timeline
Symbol 551 TextUses:65Used by:Timeline
Symbol 552 EditableTextUses:60Used by:553
Symbol 553 MovieClipUses:552Used by:Timeline
Symbol 554 EditableTextUses:60Used by:Timeline
Symbol 555 TextUses:65Used by:Timeline
Symbol 556 EditableTextUses:60Used by:557
Symbol 557 MovieClipUses:556Used by:Timeline
Symbol 558 EditableTextUses:60Used by:Timeline
Symbol 559 TextUses:65Used by:Timeline
Symbol 560 EditableTextUses:60Used by:561
Symbol 561 MovieClipUses:560Used by:Timeline
Symbol 562 EditableTextUses:60Used by:Timeline
Symbol 563 TextUses:65Used by:Timeline
Symbol 564 EditableTextUses:60Used by:565
Symbol 565 MovieClipUses:564Used by:Timeline
Symbol 566 EditableTextUses:60Used by:Timeline
Symbol 567 TextUses:65Used by:Timeline
Symbol 568 EditableTextUses:60Used by:569
Symbol 569 MovieClipUses:568Used by:Timeline
Symbol 570 EditableTextUses:60Used by:Timeline
Symbol 571 TextUses:65Used by:Timeline
Symbol 572 EditableTextUses:60Used by:573
Symbol 573 MovieClipUses:572Used by:Timeline
Symbol 574 EditableTextUses:60Used by:Timeline
Symbol 575 TextUses:65Used by:Timeline
Symbol 576 EditableTextUses:60Used by:577
Symbol 577 MovieClipUses:576Used by:Timeline
Symbol 578 EditableTextUses:60Used by:Timeline
Symbol 579 TextUses:65Used by:Timeline
Symbol 580 EditableTextUses:60Used by:581
Symbol 581 MovieClipUses:580Used by:Timeline
Symbol 582 EditableTextUses:60Used by:Timeline
Symbol 583 TextUses:65Used by:Timeline
Symbol 584 EditableTextUses:60Used by:585
Symbol 585 MovieClipUses:584Used by:Timeline
Symbol 586 EditableTextUses:60Used by:Timeline
Symbol 587 TextUses:65Used by:Timeline
Symbol 588 EditableTextUses:60Used by:589
Symbol 589 MovieClipUses:588Used by:Timeline
Symbol 590 EditableTextUses:60Used by:Timeline
Symbol 591 TextUses:65Used by:Timeline
Symbol 592 EditableTextUses:60Used by:593
Symbol 593 MovieClipUses:592Used by:Timeline
Symbol 594 EditableTextUses:60Used by:Timeline
Symbol 595 TextUses:65Used by:Timeline
Symbol 596 EditableTextUses:60Used by:597
Symbol 597 MovieClipUses:596Used by:Timeline
Symbol 598 EditableTextUses:60Used by:Timeline
Symbol 599 TextUses:65Used by:Timeline
Symbol 600 EditableTextUses:60Used by:601
Symbol 601 MovieClipUses:600Used by:Timeline
Symbol 602 EditableTextUses:60Used by:Timeline
Symbol 603 TextUses:65Used by:Timeline
Symbol 604 EditableTextUses:60Used by:605
Symbol 605 MovieClipUses:604Used by:Timeline
Symbol 606 EditableTextUses:60Used by:Timeline
Symbol 607 TextUses:65Used by:Timeline
Symbol 608 EditableTextUses:60Used by:609
Symbol 609 MovieClipUses:608Used by:Timeline
Symbol 610 EditableTextUses:60Used by:Timeline
Symbol 611 TextUses:65Used by:Timeline
Symbol 612 EditableTextUses:60Used by:613
Symbol 613 MovieClipUses:612Used by:Timeline
Symbol 614 EditableTextUses:60Used by:Timeline
Symbol 615 TextUses:65Used by:Timeline
Symbol 616 EditableTextUses:60Used by:617
Symbol 617 MovieClipUses:616Used by:Timeline
Symbol 618 EditableTextUses:60Used by:Timeline
Symbol 619 TextUses:65Used by:Timeline
Symbol 620 EditableTextUses:60Used by:621
Symbol 621 MovieClipUses:620Used by:Timeline
Symbol 622 EditableTextUses:60Used by:Timeline
Symbol 623 TextUses:65Used by:Timeline
Symbol 624 EditableTextUses:60Used by:625
Symbol 625 MovieClipUses:624Used by:Timeline
Symbol 626 EditableTextUses:60Used by:Timeline
Symbol 627 TextUses:65Used by:Timeline
Symbol 628 EditableTextUses:60Used by:629
Symbol 629 MovieClipUses:628Used by:Timeline
Symbol 630 EditableTextUses:60Used by:Timeline
Symbol 631 TextUses:65Used by:Timeline
Symbol 632 EditableTextUses:60Used by:633
Symbol 633 MovieClipUses:632Used by:Timeline
Symbol 634 EditableTextUses:60Used by:Timeline
Symbol 635 TextUses:65Used by:Timeline
Symbol 636 EditableTextUses:60Used by:637
Symbol 637 MovieClipUses:636Used by:Timeline
Symbol 638 EditableTextUses:60Used by:Timeline
Symbol 639 TextUses:65Used by:Timeline
Symbol 640 EditableTextUses:60Used by:641
Symbol 641 MovieClipUses:640Used by:Timeline
Symbol 642 EditableTextUses:60Used by:Timeline
Symbol 643 TextUses:65Used by:Timeline
Symbol 644 EditableTextUses:60Used by:645
Symbol 645 MovieClipUses:644Used by:Timeline
Symbol 646 EditableTextUses:60Used by:Timeline
Symbol 647 TextUses:65Used by:Timeline
Symbol 648 EditableTextUses:60Used by:649
Symbol 649 MovieClipUses:648Used by:Timeline
Symbol 650 EditableTextUses:60Used by:Timeline
Symbol 651 TextUses:65Used by:Timeline
Symbol 652 EditableTextUses:60Used by:653
Symbol 653 MovieClipUses:652Used by:Timeline
Symbol 654 EditableTextUses:60Used by:Timeline
Symbol 655 TextUses:65Used by:Timeline
Symbol 656 EditableTextUses:60Used by:657
Symbol 657 MovieClipUses:656Used by:Timeline
Symbol 658 EditableTextUses:60Used by:Timeline
Symbol 659 TextUses:65Used by:Timeline
Symbol 660 EditableTextUses:60Used by:661
Symbol 661 MovieClipUses:660Used by:Timeline
Symbol 662 EditableTextUses:60Used by:Timeline
Symbol 663 TextUses:65Used by:Timeline
Symbol 664 EditableTextUses:60Used by:665
Symbol 665 MovieClipUses:664Used by:Timeline
Symbol 666 EditableTextUses:60Used by:Timeline
Symbol 667 TextUses:65Used by:Timeline
Symbol 668 EditableTextUses:60Used by:669
Symbol 669 MovieClipUses:668Used by:Timeline
Symbol 670 EditableTextUses:60Used by:Timeline
Symbol 671 TextUses:65Used by:Timeline
Symbol 672 EditableTextUses:60Used by:673
Symbol 673 MovieClipUses:672Used by:Timeline
Symbol 674 EditableTextUses:60Used by:Timeline
Symbol 675 TextUses:65Used by:Timeline
Symbol 676 EditableTextUses:60Used by:677
Symbol 677 MovieClipUses:676Used by:Timeline
Symbol 678 EditableTextUses:60Used by:Timeline
Symbol 679 TextUses:65Used by:Timeline
Symbol 680 EditableTextUses:60Used by:681
Symbol 681 MovieClipUses:680Used by:Timeline
Symbol 682 EditableTextUses:60Used by:Timeline
Symbol 683 TextUses:65Used by:Timeline
Symbol 684 EditableTextUses:60Used by:685
Symbol 685 MovieClipUses:684Used by:Timeline
Symbol 686 EditableTextUses:60Used by:Timeline
Symbol 687 TextUses:65Used by:Timeline
Symbol 688 EditableTextUses:60Used by:689
Symbol 689 MovieClipUses:688Used by:Timeline
Symbol 690 EditableTextUses:60Used by:Timeline
Symbol 691 TextUses:65Used by:Timeline
Symbol 692 EditableTextUses:60Used by:693
Symbol 693 MovieClipUses:692Used by:Timeline
Symbol 694 EditableTextUses:60Used by:Timeline
Symbol 695 TextUses:65Used by:Timeline
Symbol 696 EditableTextUses:60Used by:697
Symbol 697 MovieClipUses:696Used by:Timeline
Symbol 698 EditableTextUses:60Used by:Timeline

Instance Names

"question"Frame 3Symbol 67 MovieClip
"answer"Frame 3Symbol 90 MovieClip
"answer"Frame 4Symbol 107 MovieClip
"answer"Frame 5Symbol 111 MovieClip
"answer"Frame 6Symbol 115 MovieClip
"answer"Frame 7Symbol 119 MovieClip
"answer"Frame 8Symbol 123 MovieClip
"answer"Frame 9Symbol 127 MovieClip
"answer"Frame 10Symbol 131 MovieClip
"answer"Frame 11Symbol 135 MovieClip
"answer"Frame 12Symbol 139 MovieClip
"answer"Frame 13Symbol 143 MovieClip
"answer"Frame 14Symbol 147 MovieClip
"answer"Frame 15Symbol 151 MovieClip
"answer"Frame 16Symbol 155 MovieClip
"answer"Frame 17Symbol 159 MovieClip
"answer"Frame 18Symbol 163 MovieClip
"answer"Frame 19Symbol 167 MovieClip
"answer"Frame 20Symbol 171 MovieClip
"answer"Frame 21Symbol 175 MovieClip
"answer"Frame 22Symbol 179 MovieClip
"answer"Frame 23Symbol 183 MovieClip
"answer"Frame 24Symbol 187 MovieClip
"answer"Frame 25Symbol 191 MovieClip
"answer"Frame 26Symbol 195 MovieClip
"answer"Frame 27Symbol 199 MovieClip
"answer"Frame 28Symbol 203 MovieClip
"answer"Frame 29Symbol 207 MovieClip
"answer"Frame 30Symbol 211 MovieClip
"answer"Frame 31Symbol 215 MovieClip
"answer"Frame 32Symbol 219 MovieClip
"answer"Frame 33Symbol 223 MovieClip
"answer"Frame 34Symbol 227 MovieClip
"answer"Frame 35Symbol 231 MovieClip
"answer"Frame 36Symbol 235 MovieClip
"answer"Frame 37Symbol 239 MovieClip
"answer"Frame 38Symbol 243 MovieClip
"answer"Frame 39Symbol 247 MovieClip
"answer"Frame 40Symbol 251 MovieClip
"answer"Frame 41Symbol 255 MovieClip
"answer"Frame 42Symbol 259 MovieClip
"answer"Frame 43Symbol 263 MovieClip
"answer"Frame 44Symbol 267 MovieClip
"answer"Frame 45Symbol 271 MovieClip
"answer"Frame 46Symbol 275 MovieClip
"answer"Frame 47Symbol 279 MovieClip
"answer"Frame 48Symbol 283 MovieClip
"answer"Frame 49Symbol 287 MovieClip
"answer"Frame 50Symbol 291 MovieClip
"answer"Frame 51Symbol 295 MovieClip
"answer"Frame 52Symbol 299 MovieClip
"answer"Frame 53Symbol 303 MovieClip
"answer"Frame 54Symbol 307 MovieClip
"answer"Frame 55Symbol 311 MovieClip
"answer"Frame 56Symbol 315 MovieClip
"answer"Frame 57Symbol 319 MovieClip
"answer"Frame 58Symbol 323 MovieClip
"answer"Frame 59Symbol 327 MovieClip
"answer"Frame 60Symbol 331 MovieClip
"answer"Frame 61Symbol 335 MovieClip
"answer"Frame 62Symbol 339 MovieClip
"answer"Frame 63Symbol 343 MovieClip
"answer"Frame 64Symbol 347 MovieClip
"answer"Frame 65Symbol 351 MovieClip
"answer"Frame 66Symbol 355 MovieClip
"answer"Frame 67Symbol 359 MovieClip
"answer"Frame 68Symbol 363 MovieClip
"answer"Frame 69Symbol 367 MovieClip
"answer"Frame 70Symbol 371 MovieClip
"answer"Frame 71Symbol 375 MovieClip
"answer"Frame 72Symbol 379 MovieClip
"answer"Frame 73Symbol 383 MovieClip
"answer"Frame 74Symbol 387 MovieClip
"answer"Frame 75Symbol 391 MovieClip
"answer"Frame 76Symbol 395 MovieClip
"answer"Frame 77Symbol 399 MovieClip
"answer"Frame 78Symbol 403 MovieClip
"answer"Frame 79Symbol 407 MovieClip
"answer"Frame 80Symbol 411 MovieClip
"answer"Frame 81Symbol 415 MovieClip
"answer"Frame 82Symbol 419 MovieClip
"answer"Frame 83Symbol 423 MovieClip
"answer"Frame 84Symbol 427 MovieClip
"answer"Frame 85Symbol 431 MovieClip
"answer"Frame 86Symbol 435 MovieClip
"answer"Frame 87Symbol 439 MovieClip
"answer"Frame 88Symbol 443 MovieClip
"answer"Frame 89Symbol 447 MovieClip
"answer"Frame 90Symbol 451 MovieClip
"answer"Frame 91Symbol 455 MovieClip
"answer"Frame 92Symbol 459 MovieClip
"answer"Frame 93Symbol 62 MovieClip
"answer"Frame 94Symbol 465 MovieClip
"answer"Frame 95Symbol 469 MovieClip
"answer"Frame 96Symbol 473 MovieClip
"answer"Frame 97Symbol 477 MovieClip
"answer"Frame 98Symbol 481 MovieClip
"answer"Frame 99Symbol 485 MovieClip
"answer"Frame 100Symbol 489 MovieClip
"answer"Frame 101Symbol 493 MovieClip
"answer"Frame 102Symbol 497 MovieClip
"answer"Frame 103Symbol 501 MovieClip
"answer"Frame 104Symbol 505 MovieClip
"answer"Frame 105Symbol 509 MovieClip
"answer"Frame 106Symbol 513 MovieClip
"answer"Frame 107Symbol 517 MovieClip
"answer"Frame 108Symbol 521 MovieClip
"answer"Frame 109Symbol 525 MovieClip
"answer"Frame 110Symbol 529 MovieClip
"answer"Frame 111Symbol 533 MovieClip
"answer"Frame 112Symbol 537 MovieClip
"answer"Frame 113Symbol 541 MovieClip
"answer"Frame 114Symbol 545 MovieClip
"answer"Frame 115Symbol 549 MovieClip
"answer"Frame 116Symbol 553 MovieClip
"answer"Frame 117Symbol 557 MovieClip
"answer"Frame 118Symbol 561 MovieClip
"answer"Frame 119Symbol 565 MovieClip
"answer"Frame 120Symbol 569 MovieClip
"answer"Frame 121Symbol 573 MovieClip
"answer"Frame 122Symbol 577 MovieClip
"answer"Frame 123Symbol 581 MovieClip
"answer"Frame 124Symbol 585 MovieClip
"answer"Frame 125Symbol 589 MovieClip
"answer"Frame 126Symbol 593 MovieClip
"answer"Frame 127Symbol 597 MovieClip
"answer"Frame 128Symbol 601 MovieClip
"answer"Frame 129Symbol 605 MovieClip
"answer"Frame 130Symbol 609 MovieClip
"answer"Frame 131Symbol 613 MovieClip
"answer"Frame 132Symbol 617 MovieClip
"answer"Frame 133Symbol 621 MovieClip
"answer"Frame 134Symbol 625 MovieClip
"answer"Frame 135Symbol 629 MovieClip
"answer"Frame 136Symbol 633 MovieClip
"answer"Frame 137Symbol 637 MovieClip
"answer"Frame 138Symbol 641 MovieClip
"answer"Frame 139Symbol 645 MovieClip
"answer"Frame 140Symbol 649 MovieClip
"answer"Frame 141Symbol 653 MovieClip
"answer"Frame 142Symbol 657 MovieClip
"answer"Frame 143Symbol 661 MovieClip
"answer"Frame 144Symbol 665 MovieClip
"answer"Frame 145Symbol 669 MovieClip
"answer"Frame 146Symbol 673 MovieClip
"answer"Frame 147Symbol 677 MovieClip
"answer"Frame 148Symbol 681 MovieClip
"answer"Frame 149Symbol 685 MovieClip
"answer"Frame 150Symbol 689 MovieClip
"answer"Frame 151Symbol 693 MovieClip
"answer"Frame 152Symbol 697 MovieClip
"question"Frame 153Symbol 67 MovieClip
"answer"Frame 153Symbol 90 MovieClip
"answer"Frame 154Symbol 107 MovieClip
"answer"Frame 155Symbol 111 MovieClip
"answer"Frame 156Symbol 115 MovieClip
"answer"Frame 157Symbol 119 MovieClip
"answer"Frame 158Symbol 123 MovieClip
"answer"Frame 159Symbol 127 MovieClip
"answer"Frame 160Symbol 131 MovieClip
"answer"Frame 161Symbol 135 MovieClip
"answer"Frame 162Symbol 139 MovieClip
"answer"Frame 163Symbol 143 MovieClip
"answer"Frame 164Symbol 147 MovieClip
"answer"Frame 165Symbol 151 MovieClip
"answer"Frame 166Symbol 155 MovieClip
"answer"Frame 167Symbol 159 MovieClip
"answer"Frame 168Symbol 163 MovieClip
"answer"Frame 169Symbol 167 MovieClip
"answer"Frame 170Symbol 171 MovieClip
"answer"Frame 171Symbol 175 MovieClip
"answer"Frame 172Symbol 179 MovieClip
"question"Frame 173Symbol 67 MovieClip
"answer"Frame 173Symbol 183 MovieClip
"answer"Frame 174Symbol 187 MovieClip
"answer"Frame 175Symbol 191 MovieClip
"answer"Frame 176Symbol 195 MovieClip
"answer"Frame 177Symbol 199 MovieClip
"answer"Frame 178Symbol 203 MovieClip
"answer"Frame 179Symbol 207 MovieClip
"answer"Frame 180Symbol 211 MovieClip
"answer"Frame 181Symbol 215 MovieClip
"answer"Frame 182Symbol 219 MovieClip
"answer"Frame 183Symbol 223 MovieClip
"answer"Frame 184Symbol 227 MovieClip
"answer"Frame 185Symbol 231 MovieClip
"answer"Frame 186Symbol 235 MovieClip
"answer"Frame 187Symbol 239 MovieClip
"answer"Frame 188Symbol 243 MovieClip
"answer"Frame 189Symbol 247 MovieClip
"answer"Frame 190Symbol 251 MovieClip
"answer"Frame 191Symbol 255 MovieClip
"answer"Frame 192Symbol 259 MovieClip
"question"Frame 193Symbol 67 MovieClip
"answer"Frame 193Symbol 263 MovieClip
"answer"Frame 194Symbol 267 MovieClip
"answer"Frame 195Symbol 271 MovieClip
"answer"Frame 196Symbol 275 MovieClip
"answer"Frame 197Symbol 279 MovieClip
"answer"Frame 198Symbol 283 MovieClip
"answer"Frame 199Symbol 287 MovieClip
"answer"Frame 200Symbol 291 MovieClip
"answer"Frame 201Symbol 295 MovieClip
"answer"Frame 202Symbol 299 MovieClip
"answer"Frame 203Symbol 303 MovieClip
"answer"Frame 204Symbol 307 MovieClip
"answer"Frame 205Symbol 311 MovieClip
"answer"Frame 206Symbol 315 MovieClip
"answer"Frame 207Symbol 319 MovieClip
"answer"Frame 208Symbol 323 MovieClip
"answer"Frame 209Symbol 327 MovieClip
"answer"Frame 210Symbol 331 MovieClip
"answer"Frame 211Symbol 335 MovieClip
"answer"Frame 212Symbol 339 MovieClip
"question"Frame 213Symbol 67 MovieClip
"answer"Frame 213Symbol 343 MovieClip
"answer"Frame 214Symbol 347 MovieClip
"answer"Frame 215Symbol 351 MovieClip
"answer"Frame 216Symbol 355 MovieClip
"answer"Frame 217Symbol 359 MovieClip
"answer"Frame 218Symbol 363 MovieClip
"answer"Frame 219Symbol 367 MovieClip
"answer"Frame 220Symbol 371 MovieClip
"answer"Frame 221Symbol 375 MovieClip
"answer"Frame 222Symbol 379 MovieClip
"answer"Frame 223Symbol 383 MovieClip
"answer"Frame 224Symbol 387 MovieClip
"answer"Frame 225Symbol 391 MovieClip
"answer"Frame 226Symbol 395 MovieClip
"answer"Frame 227Symbol 399 MovieClip
"answer"Frame 228Symbol 403 MovieClip
"answer"Frame 229Symbol 407 MovieClip
"answer"Frame 230Symbol 411 MovieClip
"answer"Frame 231Symbol 415 MovieClip
"answer"Frame 232Symbol 419 MovieClip
"question"Frame 233Symbol 67 MovieClip
"answer"Frame 233Symbol 423 MovieClip
"answer"Frame 234Symbol 427 MovieClip
"answer"Frame 235Symbol 431 MovieClip
"answer"Frame 236Symbol 435 MovieClip
"answer"Frame 237Symbol 439 MovieClip
"answer"Frame 238Symbol 443 MovieClip
"answer"Frame 239Symbol 447 MovieClip
"answer"Frame 240Symbol 451 MovieClip
"answer"Frame 241Symbol 455 MovieClip
"answer"Frame 242Symbol 459 MovieClip
"answer"Frame 243Symbol 62 MovieClip
"answer"Frame 244Symbol 465 MovieClip
"answer"Frame 245Symbol 469 MovieClip
"answer"Frame 246Symbol 473 MovieClip
"answer"Frame 247Symbol 477 MovieClip
"answer"Frame 248Symbol 481 MovieClip
"answer"Frame 249Symbol 485 MovieClip
"answer"Frame 250Symbol 489 MovieClip
"answer"Frame 251Symbol 493 MovieClip
"answer"Frame 252Symbol 497 MovieClip
"question"Frame 253Symbol 67 MovieClip
"answer"Frame 253Symbol 501 MovieClip
"answer"Frame 254Symbol 505 MovieClip
"answer"Frame 255Symbol 509 MovieClip
"answer"Frame 256Symbol 513 MovieClip
"answer"Frame 257Symbol 517 MovieClip
"answer"Frame 258Symbol 521 MovieClip
"answer"Frame 259Symbol 525 MovieClip
"answer"Frame 260Symbol 529 MovieClip
"answer"Frame 261Symbol 533 MovieClip
"answer"Frame 262Symbol 537 MovieClip
"answer"Frame 263Symbol 541 MovieClip
"answer"Frame 264Symbol 545 MovieClip
"answer"Frame 265Symbol 549 MovieClip
"answer"Frame 266Symbol 553 MovieClip
"answer"Frame 267Symbol 557 MovieClip
"answer"Frame 268Symbol 561 MovieClip
"answer"Frame 269Symbol 565 MovieClip
"answer"Frame 270Symbol 569 MovieClip
"answer"Frame 271Symbol 573 MovieClip
"answer"Frame 272Symbol 577 MovieClip
"question"Frame 273Symbol 67 MovieClip
"answer"Frame 273Symbol 581 MovieClip
"answer"Frame 274Symbol 585 MovieClip
"answer"Frame 275Symbol 589 MovieClip
"answer"Frame 276Symbol 593 MovieClip
"answer"Frame 277Symbol 597 MovieClip
"answer"Frame 278Symbol 601 MovieClip
"answer"Frame 279Symbol 605 MovieClip
"answer"Frame 280Symbol 609 MovieClip
"answer"Frame 281Symbol 613 MovieClip
"answer"Frame 282Symbol 617 MovieClip
"answer"Frame 283Symbol 621 MovieClip
"answer"Frame 284Symbol 625 MovieClip
"answer"Frame 285Symbol 629 MovieClip
"answer"Frame 286Symbol 633 MovieClip
"answer"Frame 287Symbol 637 MovieClip
"answer"Frame 288Symbol 641 MovieClip
"answer"Frame 289Symbol 645 MovieClip
"answer"Frame 290Symbol 649 MovieClip
"answer"Frame 291Symbol 653 MovieClip
"answer"Frame 292Symbol 657 MovieClip
"question"Frame 293Symbol 67 MovieClip
"answer"Frame 293Symbol 661 MovieClip
"answer"Frame 294Symbol 665 MovieClip
"answer"Frame 295Symbol 669 MovieClip
"answer"Frame 296Symbol 673 MovieClip
"answer"Frame 297Symbol 677 MovieClip
"answer"Frame 298Symbol 681 MovieClip
"answer"Frame 299Symbol 685 MovieClip
"answer"Frame 300Symbol 689 MovieClip
"answer"Frame 301Symbol 693 MovieClip
"answer"Frame 302Symbol 697 MovieClip

Special Tags

Protect (24)Timeline Frame 131 bytes "..$1$lj$eGO.w1ONNqy8XmskVuHHQ.."

Labels

"mainmenu"Frame 1
"option"Frame 2
"question1"Frame 3
"question2"Frame 4
"question3"Frame 5
"question4"Frame 6
"question5"Frame 7
"question6"Frame 8
"question7"Frame 9
"question8"Frame 10
"question9"Frame 11
"question10"Frame 12
"question11"Frame 13
"question12"Frame 14
"question13"Frame 15
"question14"Frame 16
"question15"Frame 17
"question16"Frame 18
"question17"Frame 19
"question18"Frame 20
"question19"Frame 21
"question20"Frame 22
"question21"Frame 23
"question22"Frame 24
"question23"Frame 25
"question24"Frame 26
"question25"Frame 27
"question26"Frame 28
"question27"Frame 29
"question28"Frame 30
"question29"Frame 31
"question30"Frame 32
"question31"Frame 33
"question32"Frame 34
"question33"Frame 35
"question34"Frame 36
"question35"Frame 37
"question36"Frame 38
"question37"Frame 39
"question38"Frame 40
"question39"Frame 41
"question40"Frame 42
"question41"Frame 43
"question42"Frame 44
"question43"Frame 45
"question44"Frame 46
"question45"Frame 47
"question46"Frame 48
"question47"Frame 49
"question48"Frame 50
"question49"Frame 51
"question50"Frame 52
"question51"Frame 53
"question52"Frame 54
"question53"Frame 55
"question54"Frame 56
"question55"Frame 57
"question56"Frame 58
"question57"Frame 59
"question58"Frame 60
"question59"Frame 61
"question60"Frame 62
"question61"Frame 63
"question62"Frame 64
"question63"Frame 65
"question64"Frame 66
"question65"Frame 67
"question66"Frame 68
"question67"Frame 69
"question68"Frame 70
"question69"Frame 71
"question70"Frame 72
"question71"Frame 73
"question72"Frame 74
"question73"Frame 75
"question74"Frame 76
"question75"Frame 77
"question76"Frame 78
"question77"Frame 79
"question78"Frame 80
"question79"Frame 81
"question80"Frame 82
"question81"Frame 83
"question82"Frame 84
"question83"Frame 85
"question84"Frame 86
"question85"Frame 87
"question86"Frame 88
"question87"Frame 89
"question88"Frame 90
"question89"Frame 91
"question90"Frame 92
"question91"Frame 93
"question92"Frame 94
"question93"Frame 95
"question94"Frame 96
"question95"Frame 97
"question96"Frame 98
"question97"Frame 99
"question98"Frame 100
"question99"Frame 101
"question100"Frame 102
"question101"Frame 103
"question102"Frame 104
"question103"Frame 105
"question104"Frame 106
"question105"Frame 107
"question106"Frame 108
"question107"Frame 109
"question108"Frame 110
"question109"Frame 111
"question110"Frame 112
"question111"Frame 113
"question112"Frame 114
"question113"Frame 115
"question114"Frame 116
"question115"Frame 117
"question116"Frame 118
"question117"Frame 119
"question118"Frame 120
"question119"Frame 121
"question120"Frame 122
"question121"Frame 123
"question122"Frame 124
"question123"Frame 125
"question124"Frame 126
"question125"Frame 127
"question126"Frame 128
"question127"Frame 129
"question128"Frame 130
"question129"Frame 131
"question130"Frame 132
"question131"Frame 133
"question132"Frame 134
"question133"Frame 135
"question134"Frame 136
"question135"Frame 137
"question136"Frame 138
"question137"Frame 139
"question138"Frame 140
"question139"Frame 141
"question140"Frame 142
"question141"Frame 143
"question142"Frame 144
"question143"Frame 145
"question144"Frame 146
"question145"Frame 147
"question146"Frame 148
"question147"Frame 149
"question148"Frame 150
"question149"Frame 151
"question150"Frame 152
"question1"Frame 153
"question2"Frame 154
"question3"Frame 155
"question4"Frame 156
"question5"Frame 157
"question6"Frame 158
"question7"Frame 159
"question8"Frame 160
"question9"Frame 161
"question10"Frame 162
"question11"Frame 163
"question12"Frame 164
"question13"Frame 165
"question14"Frame 166
"question15"Frame 167
"question16"Frame 168
"question17"Frame 169
"question18"Frame 170
"question19"Frame 171
"question20"Frame 172
"question21"Frame 173
"question22"Frame 174
"question23"Frame 175
"question24"Frame 176
"question25"Frame 177
"question26"Frame 178
"question27"Frame 179
"question28"Frame 180
"question29"Frame 181
"question30"Frame 182
"question31"Frame 183
"question32"Frame 184
"question33"Frame 185
"question34"Frame 186
"question35"Frame 187
"question36"Frame 188
"question37"Frame 189
"question38"Frame 190
"question39"Frame 191
"question40"Frame 192
"question41"Frame 193
"question42"Frame 194
"question43"Frame 195
"question44"Frame 196
"question45"Frame 197
"question46"Frame 198
"question47"Frame 199
"question48"Frame 200
"question49"Frame 201
"question50"Frame 202
"question51"Frame 203
"question52"Frame 204
"question53"Frame 205
"question54"Frame 206
"question55"Frame 207
"question56"Frame 208
"question57"Frame 209
"question58"Frame 210
"question59"Frame 211
"question60"Frame 212
"question61"Frame 213
"question62"Frame 214
"question63"Frame 215
"question64"Frame 216
"question65"Frame 217
"question66"Frame 218
"question67"Frame 219
"question68"Frame 220
"question69"Frame 221
"question70"Frame 222
"question71"Frame 223
"question72"Frame 224
"question73"Frame 225
"question74"Frame 226
"question75"Frame 227
"question76"Frame 228
"question77"Frame 229
"question78"Frame 230
"question79"Frame 231
"question80"Frame 232
"question81"Frame 233
"question82"Frame 234
"question83"Frame 235
"question84"Frame 236
"question85"Frame 237
"question86"Frame 238
"question87"Frame 239
"question88"Frame 240
"question89"Frame 241
"question90"Frame 242
"question91"Frame 243
"question92"Frame 244
"question93"Frame 245
"question94"Frame 246
"question95"Frame 247
"question96"Frame 248
"question97"Frame 249
"question98"Frame 250
"question99"Frame 251
"question100"Frame 252
"question101"Frame 253
"question102"Frame 254
"question103"Frame 255
"question104"Frame 256
"question105"Frame 257
"question106"Frame 258
"question107"Frame 259
"question108"Frame 260
"question109"Frame 261
"question110"Frame 262
"question111"Frame 263
"question112"Frame 264
"question113"Frame 265
"question114"Frame 266
"question115"Frame 267
"question116"Frame 268
"question117"Frame 269
"question118"Frame 270
"question119"Frame 271
"question120"Frame 272
"question121"Frame 273
"question122"Frame 274
"question123"Frame 275
"question124"Frame 276
"question125"Frame 277
"question126"Frame 278
"question127"Frame 279
"question128"Frame 280
"question129"Frame 281
"question130"Frame 282
"question131"Frame 283
"question132"Frame 284
"question133"Frame 285
"question134"Frame 286
"question135"Frame 287
"question136"Frame 288
"question137"Frame 289
"question138"Frame 290
"question139"Frame 291
"question140"Frame 292
"question141"Frame 293
"question142"Frame 294
"question143"Frame 295
"question144"Frame 296
"question145"Frame 297
"question146"Frame 298
"question147"Frame 299
"question148"Frame 300
"question149"Frame 301
"question150"Frame 302
"answer"Symbol 62 MovieClip Frame 2
"flip"Symbol 67 MovieClip Frame 2
"flip back"Symbol 67 MovieClip Frame 7
"answer"Symbol 90 MovieClip Frame 2
"answer"Symbol 107 MovieClip Frame 2
"answer"Symbol 111 MovieClip Frame 2
"answer"Symbol 115 MovieClip Frame 2
"answer"Symbol 119 MovieClip Frame 2
"answer"Symbol 123 MovieClip Frame 2
"answer"Symbol 127 MovieClip Frame 2
"answer"Symbol 131 MovieClip Frame 2
"answer"Symbol 135 MovieClip Frame 2
"answer"Symbol 139 MovieClip Frame 2
"answer"Symbol 143 MovieClip Frame 2
"answer"Symbol 147 MovieClip Frame 2
"answer"Symbol 151 MovieClip Frame 2
"answer"Symbol 155 MovieClip Frame 2
"answer"Symbol 159 MovieClip Frame 2
"answer"Symbol 163 MovieClip Frame 2
"answer"Symbol 167 MovieClip Frame 2
"answer"Symbol 171 MovieClip Frame 2
"answer"Symbol 175 MovieClip Frame 2
"answer"Symbol 179 MovieClip Frame 2
"answer"Symbol 183 MovieClip Frame 2
"answer"Symbol 187 MovieClip Frame 2
"answer"Symbol 191 MovieClip Frame 2
"answer"Symbol 195 MovieClip Frame 2
"answer"Symbol 199 MovieClip Frame 2
"answer"Symbol 203 MovieClip Frame 2
"answer"Symbol 207 MovieClip Frame 2
"answer"Symbol 211 MovieClip Frame 2
"answer"Symbol 215 MovieClip Frame 2
"answer"Symbol 219 MovieClip Frame 2
"answer"Symbol 223 MovieClip Frame 2
"answer"Symbol 227 MovieClip Frame 2
"answer"Symbol 231 MovieClip Frame 2
"answer"Symbol 235 MovieClip Frame 2
"answer"Symbol 239 MovieClip Frame 2
"answer"Symbol 243 MovieClip Frame 2
"answer"Symbol 247 MovieClip Frame 2
"answer"Symbol 251 MovieClip Frame 2
"answer"Symbol 255 MovieClip Frame 2
"answer"Symbol 259 MovieClip Frame 2
"answer"Symbol 263 MovieClip Frame 2
"answer"Symbol 267 MovieClip Frame 2
"answer"Symbol 271 MovieClip Frame 2
"answer"Symbol 275 MovieClip Frame 2
"answer"Symbol 279 MovieClip Frame 2
"answer"Symbol 283 MovieClip Frame 2
"answer"Symbol 287 MovieClip Frame 2
"answer"Symbol 291 MovieClip Frame 2
"answer"Symbol 295 MovieClip Frame 2
"answer"Symbol 299 MovieClip Frame 2
"answer"Symbol 303 MovieClip Frame 2
"answer"Symbol 307 MovieClip Frame 2
"answer"Symbol 311 MovieClip Frame 2
"answer"Symbol 315 MovieClip Frame 2
"answer"Symbol 319 MovieClip Frame 2
"answer"Symbol 323 MovieClip Frame 2
"answer"Symbol 327 MovieClip Frame 2
"answer"Symbol 331 MovieClip Frame 2
"answer"Symbol 335 MovieClip Frame 2
"answer"Symbol 339 MovieClip Frame 2
"answer"Symbol 343 MovieClip Frame 2
"answer"Symbol 347 MovieClip Frame 2
"answer"Symbol 351 MovieClip Frame 2
"answer"Symbol 355 MovieClip Frame 2
"answer"Symbol 359 MovieClip Frame 2
"answer"Symbol 363 MovieClip Frame 2
"answer"Symbol 367 MovieClip Frame 2
"answer"Symbol 371 MovieClip Frame 2
"answer"Symbol 375 MovieClip Frame 2
"answer"Symbol 379 MovieClip Frame 2
"answer"Symbol 383 MovieClip Frame 2
"answer"Symbol 387 MovieClip Frame 2
"answer"Symbol 391 MovieClip Frame 2
"answer"Symbol 395 MovieClip Frame 2
"answer"Symbol 399 MovieClip Frame 2
"answer"Symbol 403 MovieClip Frame 2
"answer"Symbol 407 MovieClip Frame 2
"answer"Symbol 411 MovieClip Frame 2
"answer"Symbol 415 MovieClip Frame 2
"answer"Symbol 419 MovieClip Frame 2
"answer"Symbol 423 MovieClip Frame 2
"answer"Symbol 427 MovieClip Frame 2
"answer"Symbol 431 MovieClip Frame 2
"answer"Symbol 435 MovieClip Frame 2
"answer"Symbol 439 MovieClip Frame 2
"answer"Symbol 443 MovieClip Frame 2
"answer"Symbol 447 MovieClip Frame 2
"answer"Symbol 451 MovieClip Frame 2
"answer"Symbol 455 MovieClip Frame 2
"answer"Symbol 459 MovieClip Frame 2
"answer"Symbol 465 MovieClip Frame 2
"answer"Symbol 469 MovieClip Frame 2
"answer"Symbol 473 MovieClip Frame 2
"answer"Symbol 477 MovieClip Frame 2
"answer"Symbol 481 MovieClip Frame 2
"answer"Symbol 485 MovieClip Frame 2
"answer"Symbol 489 MovieClip Frame 2
"answer"Symbol 493 MovieClip Frame 2
"answer"Symbol 497 MovieClip Frame 2
"answer"Symbol 501 MovieClip Frame 2
"answer"Symbol 505 MovieClip Frame 2
"answer"Symbol 509 MovieClip Frame 2
"answer"Symbol 513 MovieClip Frame 2
"answer"Symbol 517 MovieClip Frame 2
"answer"Symbol 521 MovieClip Frame 2
"answer"Symbol 525 MovieClip Frame 2
"answer"Symbol 529 MovieClip Frame 2
"answer"Symbol 533 MovieClip Frame 2
"answer"Symbol 537 MovieClip Frame 2
"answer"Symbol 541 MovieClip Frame 2
"answer"Symbol 545 MovieClip Frame 2
"answer"Symbol 549 MovieClip Frame 2
"answer"Symbol 553 MovieClip Frame 2
"answer"Symbol 557 MovieClip Frame 2
"answer"Symbol 561 MovieClip Frame 2
"answer"Symbol 565 MovieClip Frame 2
"answer"Symbol 569 MovieClip Frame 2
"answer"Symbol 573 MovieClip Frame 2
"answer"Symbol 577 MovieClip Frame 2
"answer"Symbol 581 MovieClip Frame 2
"answer"Symbol 585 MovieClip Frame 2
"answer"Symbol 589 MovieClip Frame 2
"answer"Symbol 593 MovieClip Frame 2
"answer"Symbol 597 MovieClip Frame 2
"answer"Symbol 601 MovieClip Frame 2
"answer"Symbol 605 MovieClip Frame 2
"answer"Symbol 609 MovieClip Frame 2
"answer"Symbol 613 MovieClip Frame 2
"answer"Symbol 617 MovieClip Frame 2
"answer"Symbol 621 MovieClip Frame 2
"answer"Symbol 625 MovieClip Frame 2
"answer"Symbol 629 MovieClip Frame 2
"answer"Symbol 633 MovieClip Frame 2
"answer"Symbol 637 MovieClip Frame 2
"answer"Symbol 641 MovieClip Frame 2
"answer"Symbol 645 MovieClip Frame 2
"answer"Symbol 649 MovieClip Frame 2
"answer"Symbol 653 MovieClip Frame 2
"answer"Symbol 657 MovieClip Frame 2
"answer"Symbol 661 MovieClip Frame 2
"answer"Symbol 665 MovieClip Frame 2
"answer"Symbol 669 MovieClip Frame 2
"answer"Symbol 673 MovieClip Frame 2
"answer"Symbol 677 MovieClip Frame 2
"answer"Symbol 681 MovieClip Frame 2
"answer"Symbol 685 MovieClip Frame 2
"answer"Symbol 689 MovieClip Frame 2
"answer"Symbol 693 MovieClip Frame 2
"answer"Symbol 697 MovieClip Frame 2

Dynamic Text Variables

nr_inSymbol 59 EditableText""
_root.answer91Symbol 61 EditableText" "
_root.answer1Symbol 89 EditableText" "
question1Symbol 91 EditableText" "
_root.answer2Symbol 106 EditableText" "
question2Symbol 108 EditableText" "
_root.answer3Symbol 110 EditableText" "
question3Symbol 112 EditableText" "
_root.answer4Symbol 114 EditableText" "
question4Symbol 116 EditableText" "
_root.answer5Symbol 118 EditableText" "
question5Symbol 120 EditableText" "
_root.answer6Symbol 122 EditableText" "
question6Symbol 124 EditableText" "
_root.answer7Symbol 126 EditableText" "
question7Symbol 128 EditableText" "
_root.answer8Symbol 130 EditableText" "
question8Symbol 132 EditableText" "
_root.answer9Symbol 134 EditableText" "
question9Symbol 136 EditableText" "
_root.answer10Symbol 138 EditableText" "
question10Symbol 140 EditableText" "
_root.answer11Symbol 142 EditableText" "
question11Symbol 144 EditableText" "
_root.answer12Symbol 146 EditableText" "
question12Symbol 148 EditableText" "
_root.answer13Symbol 150 EditableText" "
question13Symbol 152 EditableText" "
_root.answer14Symbol 154 EditableText" "
question14Symbol 156 EditableText" "
_root.answer15Symbol 158 EditableText" "
question15Symbol 160 EditableText" "
_root.answer16Symbol 162 EditableText" "
question16Symbol 164 EditableText" "
_root.answer17Symbol 166 EditableText" "
question17Symbol 168 EditableText" "
_root.answer18Symbol 170 EditableText" "
question18Symbol 172 EditableText" "
_root.answer19Symbol 174 EditableText" "
question19Symbol 176 EditableText" "
_root.answer20Symbol 178 EditableText" "
question20Symbol 180 EditableText" "
_root.answer21Symbol 182 EditableText" "
question21Symbol 184 EditableText" "
_root.answer22Symbol 186 EditableText" "
question22Symbol 188 EditableText" "
_root.answer23Symbol 190 EditableText" "
question23Symbol 192 EditableText""
_root.answer24Symbol 194 EditableText" "
question24Symbol 196 EditableText" "
_root.answer25Symbol 198 EditableText" "
question25Symbol 200 EditableText" "
_root.answer26Symbol 202 EditableText" "
question26Symbol 204 EditableText" "
_root.answer27Symbol 206 EditableText" "
question27Symbol 208 EditableText" "
_root.answer28Symbol 210 EditableText" "
question28Symbol 212 EditableText" "
_root.answer29Symbol 214 EditableText" "
question29Symbol 216 EditableText""
_root.answer30Symbol 218 EditableText" "
question30Symbol 220 EditableText""
_root.answer31Symbol 222 EditableText" "
question31Symbol 224 EditableText" "
_root.answer32Symbol 226 EditableText" "
question32Symbol 228 EditableText" "
_root.answer33Symbol 230 EditableText" "
question33Symbol 232 EditableText" "
_root.answer34Symbol 234 EditableText" "
question34Symbol 236 EditableText" "
_root.answer35Symbol 238 EditableText" "
question35Symbol 240 EditableText" "
_root.answer36Symbol 242 EditableText" "
question36Symbol 244 EditableText" "
_root.answer37Symbol 246 EditableText" "
question37Symbol 248 EditableText" "
_root.answer38Symbol 250 EditableText" "
question38Symbol 252 EditableText""
_root.answer39Symbol 254 EditableText" "
question39Symbol 256 EditableText" "
_root.answer40Symbol 258 EditableText" "
question40Symbol 260 EditableText""
_root.answer41Symbol 262 EditableText" "
question41Symbol 264 EditableText""
_root.answer42Symbol 266 EditableText" "
question42Symbol 268 EditableText""
_root.answer43Symbol 270 EditableText" "
question43Symbol 272 EditableText""
_root.answer44Symbol 274 EditableText" "
question44Symbol 276 EditableText" "
_root.answer45Symbol 278 EditableText" "
question45Symbol 280 EditableText""
_root.answer46Symbol 282 EditableText" "
question46Symbol 284 EditableText" "
_root.answer47Symbol 286 EditableText" "
question47Symbol 288 EditableText""
_root.answer48Symbol 290 EditableText" "
question48Symbol 292 EditableText""
_root.answer49Symbol 294 EditableText" "
question49Symbol 296 EditableText" "
_root.answer50Symbol 298 EditableText" "
question50Symbol 300 EditableText""
_root.answer51Symbol 302 EditableText" "
question51Symbol 304 EditableText""
_root.answer52Symbol 306 EditableText" "
question52Symbol 308 EditableText""
_root.answer53Symbol 310 EditableText" "
question53Symbol 312 EditableText""
_root.answer54Symbol 314 EditableText" "
question54Symbol 316 EditableText" "
_root.answer55Symbol 318 EditableText" "
question55Symbol 320 EditableText""
_root.answer56Symbol 322 EditableText" "
question56Symbol 324 EditableText""
_root.answer57Symbol 326 EditableText" "
question57Symbol 328 EditableText""
_root.answer58Symbol 330 EditableText" "
question58Symbol 332 EditableText""
_root.answer59Symbol 334 EditableText" "
question59Symbol 336 EditableText" "
_root.answer60Symbol 338 EditableText" "
question60Symbol 340 EditableText""
_root.answer61Symbol 342 EditableText" "
question61Symbol 344 EditableText""
_root.answer62Symbol 346 EditableText" "
question62Symbol 348 EditableText""
_root.answer63Symbol 350 EditableText" "
question63Symbol 352 EditableText""
_root.answer64Symbol 354 EditableText" "
question64Symbol 356 EditableText""
_root.answer65Symbol 358 EditableText" "
question65Symbol 360 EditableText""
_root.answer66Symbol 362 EditableText" "
question66Symbol 364 EditableText""
_root.answer67Symbol 366 EditableText" "
question67Symbol 368 EditableText""
_root.answer68Symbol 370 EditableText" "
question68Symbol 372 EditableText""
_root.answer69Symbol 374 EditableText" "
question69Symbol 376 EditableText""
_root.answer70Symbol 378 EditableText" "
question70Symbol 380 EditableText""
_root.answer71Symbol 382 EditableText" "
question71Symbol 384 EditableText""
_root.answer72Symbol 386 EditableText" "
question72Symbol 388 EditableText""
_root.answer73Symbol 390 EditableText" "
question73Symbol 392 EditableText""
_root.answer74Symbol 394 EditableText" "
question74Symbol 396 EditableText""
_root.answer75Symbol 398 EditableText" "
question75Symbol 400 EditableText""
_root.answer76Symbol 402 EditableText" "
question76Symbol 404 EditableText" "
_root.answer77Symbol 406 EditableText" "
question77Symbol 408 EditableText""
_root.answer78Symbol 410 EditableText" "
question78Symbol 412 EditableText""
_root.answer79Symbol 414 EditableText" "
question79Symbol 416 EditableText""
_root.answer80Symbol 418 EditableText" "
question80Symbol 420 EditableText""
_root.answer81Symbol 422 EditableText" "
question81Symbol 424 EditableText""
_root.answer82Symbol 426 EditableText" "
question82Symbol 428 EditableText""
_root.answer83Symbol 430 EditableText" "
question83Symbol 432 EditableText" "
_root.answer84Symbol 434 EditableText" "
question84Symbol 436 EditableText""
_root.answer85Symbol 438 EditableText" "
question85Symbol 440 EditableText""
_root.answer86Symbol 442 EditableText" "
question86Symbol 444 EditableText""
_root.answer87Symbol 446 EditableText" "
question87Symbol 448 EditableText""
_root.answer88Symbol 450 EditableText" "
question88Symbol 452 EditableText""
_root.answer89Symbol 454 EditableText" "
question89Symbol 456 EditableText""
_root.answer90Symbol 458 EditableText" "
question90Symbol 460 EditableText""
question91Symbol 462 EditableText""
_root.answer92Symbol 464 EditableText" "
question92Symbol 466 EditableText""
_root.answer93Symbol 468 EditableText" "
question93Symbol 470 EditableText""
_root.answer94Symbol 472 EditableText" "
question94Symbol 474 EditableText""
_root.answer95Symbol 476 EditableText" "
question95Symbol 478 EditableText""
_root.answer96Symbol 480 EditableText" "
question96Symbol 482 EditableText""
_root.answer97Symbol 484 EditableText" "
question97Symbol 486 EditableText" "
_root.answer98Symbol 488 EditableText" "
question98Symbol 490 EditableText""
_root.answer99Symbol 492 EditableText" "
question99Symbol 494 EditableText""
_root.answer100Symbol 496 EditableText" "
question100Symbol 498 EditableText""
_root.answer101Symbol 500 EditableText" "
question101Symbol 502 EditableText""
_root.answer102Symbol 504 EditableText" "
question102Symbol 506 EditableText""
_root.answer103Symbol 508 EditableText" "
question103Symbol 510 EditableText""
_root.answer104Symbol 512 EditableText" "
question104Symbol 514 EditableText""
_root.answer105Symbol 516 EditableText" "
question105Symbol 518 EditableText" "
_root.answer106Symbol 520 EditableText" "
question106Symbol 522 EditableText""
_root.answer107Symbol 524 EditableText" "
question107Symbol 526 EditableText" "
_root.answer108Symbol 528 EditableText" "
question108Symbol 530 EditableText""
_root.answer109Symbol 532 EditableText" "
question109Symbol 534 EditableText""
_root.answer110Symbol 536 EditableText" "
question110Symbol 538 EditableText""
_root.answer111Symbol 540 EditableText" "
question111Symbol 542 EditableText""
_root.answer112Symbol 544 EditableText" "
question112Symbol 546 EditableText""
_root.answer113Symbol 548 EditableText" "
question113Symbol 550 EditableText""
_root.answer114Symbol 552 EditableText" "
question114Symbol 554 EditableText""
_root.answer115Symbol 556 EditableText" "
question115Symbol 558 EditableText""
_root.answer116Symbol 560 EditableText" "
question116Symbol 562 EditableText""
_root.answer117Symbol 564 EditableText" "
question117Symbol 566 EditableText" "
_root.answer118Symbol 568 EditableText" "
question118Symbol 570 EditableText" "
_root.answer119Symbol 572 EditableText" "
question119Symbol 574 EditableText""
_root.answer120Symbol 576 EditableText" "
question120Symbol 578 EditableText""
_root.answer121Symbol 580 EditableText" "
question121Symbol 582 EditableText""
_root.answer122Symbol 584 EditableText" "
question122Symbol 586 EditableText""
_root.answer123Symbol 588 EditableText" "
question123Symbol 590 EditableText""
_root.answer124Symbol 592 EditableText" "
question124Symbol 594 EditableText""
_root.answer125Symbol 596 EditableText" "
question125Symbol 598 EditableText""
_root.answer126Symbol 600 EditableText" "
question126Symbol 602 EditableText""
_root.answer127Symbol 604 EditableText" "
question127Symbol 606 EditableText" "
_root.answer128Symbol 608 EditableText" "
question128Symbol 610 EditableText""
_root.answer129Symbol 612 EditableText" "
question129Symbol 614 EditableText""
_root.answer130Symbol 616 EditableText" "
question130Symbol 618 EditableText""
_root.answer131Symbol 620 EditableText" "
question131Symbol 622 EditableText" "
_root.answer132Symbol 624 EditableText" "
question132Symbol 626 EditableText" "
_root.answer133Symbol 628 EditableText" "
question133Symbol 630 EditableText""
_root.answer134Symbol 632 EditableText" "
question134Symbol 634 EditableText""
_root.answer135Symbol 636 EditableText" "
question135Symbol 638 EditableText""
_root.answer136Symbol 640 EditableText" "
question136Symbol 642 EditableText""
_root.answer137Symbol 644 EditableText" "
question137Symbol 646 EditableText""
_root.answer138Symbol 648 EditableText" "
question138Symbol 650 EditableText""
_root.answer139Symbol 652 EditableText" "
question139Symbol 654 EditableText""
_root.answer140Symbol 656 EditableText" "
question140Symbol 658 EditableText" "
_root.answer141Symbol 660 EditableText" "
question141Symbol 662 EditableText""
_root.answer142Symbol 664 EditableText" "
question142Symbol 666 EditableText""
_root.answer143Symbol 668 EditableText" "
question143Symbol 670 EditableText""
_root.answer144Symbol 672 EditableText" "
question144Symbol 674 EditableText""
_root.answer145Symbol 676 EditableText" "
question145Symbol 678 EditableText""
_root.answer146Symbol 680 EditableText" "
question146Symbol 682 EditableText""
_root.answer147Symbol 684 EditableText" "
question147Symbol 686 EditableText""
_root.answer148Symbol 688 EditableText" "
question148Symbol 690 EditableText""
_root.answer149Symbol 692 EditableText" "
question149Symbol 694 EditableText""
_root.answer150Symbol 696 EditableText" "
question150Symbol 698 EditableText""




http://swfchan.com/2/6593/info.shtml
Created: 13/6 -2019 22:26:32 Last modified: 13/6 -2019 22:26:32 Server time: 22/12 -2024 04:04:04