Verified Test Bank Red Hat-Based Software Management Ch.26 - Answer Key + Test Bank | Linux Essentials 1e Rothwell by William Rothwell. DOCX document preview.
Linux Essentials for Cybersecurity (Rothwell/Kinsey)
Chapter 26 Red Hat-Based Software Management
1) Which of the following is a tool that is commonly used to manage software for Red Hat-based distributions?
A) dnf
B) rpm
C) yum
D) All of the above
2) Which of the following contains a collection of files that make up a complete software program?
A) Metadata
B) Software package
C) Architecture
D) Software repository
3) In the Red Hat package named ntpdate-4.7.6p5-22.fc27.x86_64.rpm, the fc27 component refers to which of the following?
A) Distro
B) Software name
C) Extension
D) Version
4) All software package metadata is stored in which of the following directories?
A) /var/cache
B) /usr/bin
C) /var/lib/rpm
D) /sbin/ldconfig
5) Which of the following distributions use RPM Package Manager?
A) Fedora
B) RHEL
C) CentOS
D) All of the above
6) Which of the following commands displays all installed packages?
A) rpm -q
B) rpm -qa
C) rpm -a
D) rpm -qi
7) Which of the following commands lists the configuration files for a package?
A) rpm -qc pkgname
B) rpm -qi pkgname
C) rpm -ql pkgname
D) rpm -qd pkgname
8) Which of the following is a general-purpose, patent-free, lossless data compression library that is used by many different programs?
A) libwrap
B) rpm
C) zlib
D) vsftpd
9) Software packages often need features, called __________, from other packages.
A) dependencies
B) metadata
C) capabilities
D) precedents
10) Which of the following commands lists what package provides a dependency?
A) rpm -q --whatrequires capability
B) rpm -qa --last
C) rpm -q --provides pkgname
D) rpm -q --whatprovides capability
11) Which of the following installation methods for the rpm command should be used in most cases to install or upgrade a software package?
A) rpm -i
B) rpm -U
C) rpm -F
D) None of the above
12) Which of the following is not true regarding installing a software package obtained from the Internet or via email?
A) Never install a software package from an untrusted source, especially on a critical system.
B) Always look at the content of the software package before installing it.
C) The organization that created the software package always provides a digital signature.
D) Use a virus- or worm-scanning tool on the software before installing the package.
13) Which of the following options should be used with the rpm command to remove a software package?
A) -v
B) -h
C) -e
D) -q
14) Which of the following commands can be used to extract specific files from an RPM file without having to reinstall the entire RPM?
A) rpm
B) rpm2cpio
C) cpio
D) cpio2rpm
15) The YUM utility, which was designed to overcome some drawbacks to the rpm command, stands for which of the following?
A) Yellowdog Upgrade Manager
B) Yellowdog Update, Modified
C) Yellowdog Update Manager
D) Yellowdog Updater, Modified
16) Which of the following is a location, typically network accessible, that contains RPM packages and a small database that describes the relationship between these packages?
A) Repository
B) Plug-in
C) Distro
D) Mirror
17) Which of the following is the primary configuration file for yum commands?
A) /etc/yum.repos.d
B) /etc/yum.conf
C) /var/cache/yum
D) /etc/yum/pluginconf.d
18) Which of the following yum commands removes a specified software package and any dependency packages from the system?
A) groupremove
B) update
C) remove
D) install
19) Which of the following yum plug-ins automatically captures the filesystem during updates?
A) snapshot
B) versionlock
C) fastmirror
D) None of the above
20) Which of the following distributions includes a command-line tool called zypper that works similar to the yum command?
A) Fedora
B) SUSE
C) Red Hat
D) CentOS
Document Information
Connected Book
Answer Key + Test Bank | Linux Essentials 1e Rothwell
By William Rothwell