Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What are the Linux basic pen test questions?

2025-04-09 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)05/31 Report--

This article mainly explains "what are the Linux basic pen test questions". The content of the article is simple and clear, and it is easy to learn and understand. Please follow the editor's train of thought to study and learn "what are the Linux basic pen test questions".

View the file test.txt and display the line number () A grep-n test.txt B cat test.txt C cat-n test.txt D string-n test.txt

The URL address is http://www.baidu.com/a.html, which is the hostname A baidu.com.cn B a.html C www.baidu.com/a.html D www.baidu.com

In the linux system, which command can view the serial number of the server () A dmidecode B lspci C modinfo D dmesg

In linux system, how to mount a removable hard disk / dev/sdm to the corresponding mount point / mnt? A umount / dev/sdm / mnt B echo "/ dev/sdm / mnt ext4 defaults 00" > > / etc/fstab C mount / mnt / dev/sdm D mount / dev/sdm / mnt

What is the default shell of Linux system A ksh B rsh C bash D csh

Assuming that the symbolic link of the file fileA is fileB, then after deleting the fileA, the following description is correct: a fileB is also deleted B fileB still exists, but it is an invalid file C because the fileB has not been deleted, so the fileA will be automatically re-established by the system and D fileB will be automatically deleted by the system as the fileA is deleted.

Startup scripts for all LINUX services are stored in the () directory A / etc/rc.d/init.d B / etc/init.d C / etc/rc.d/rc D / etc/rc.d

The following mistake about the description of the I node is that the AI node and the file are one-to-one corresponding to the Bi node that can describe the number of blocks occupied by the file. Ci node describes the file size and the pointer D to the data block to realize the conversion of the logical structure and physical structure of the file through the I node.

Linux supports many different file systems through VFS. The default file system for Linux is A VFAT B ISO9660 C Ext Series D NTFS

Which of the following commands supports the breakpoint resume function in linux systems? A rsync B scp C cp D pscp

The valid variable name is A-2-time B _ 2 $3 C trust_no_1 D 2004file.

The Linux file permission has a total length of 10 digits and is divided into four segments. The third paragraph represents the permissions of A file type B file owner C file owner group D other users.

The valid shell variable name in the following variable names is A-2-time B _ 2 $3 C trust_no_1 D 2004file

In command mode in the vi editor, repeat the last action you did on the edited text, using the () command. A up arrow B down arrow C. D *

If the current directory is / home, the command ls-l will display the specific information of A, all files, B, all implied files, C, and all non-implicit D files in the home directory.

16 in a linux system, which of the following commands copies all files under / test/ to another local directory / test1/? A cp / test/ / test1/ B cp / test1/ / test/ C cp-a / test/ / test1/ D cp-a / test1/ / test/

What is wrong with the following description of orphan and zombie processes? An orphan process: if a parent process exits and one or more of its child processes are still running, those child processes will be orphaned. B zombie process: a process uses fork to create a child process. If the child process exits and the parent process does not call wait or waitpid to get the status information of the child process, then the process descriptor of the child process is still saved in the system. This process is called a zombie process. C the orphan process will be adopted by the init process (process number 1), and the init process will collect the status of them. Both orphan processes and zombie processes may prevent the system from generating new processes and should be avoided

The hostname command is used to modify the hostname of the current running state, but cannot be used to permanently modify hostname A correct B error

System average load concern CPU and memory factor A correct B error

How to delete a non-empty subdirectory / tmp A del / tmp/* B rm-rf / tmp C rm-Ra / tmp/* D rm-rf / tmp/*

How to use crontab in linux system to check which scheduled tasks are available under the current user () A crontab-e B crontab-l C crontab-f D crontab-s

Vivek wants to change his login id to viv, which command should be executed () A usermod-l viv vivek B usermod-l vivek viv C usermod-m viv vivek D usermod-m vivek viv

How to quickly switch to A cd @ john B cd # john C cd & john D cd ~ ohn under the home directory of john

What the usermod command cannot achieve is () An account renaming B deleting the specified account and the corresponding directory C locking and unlocking the user account D receiving the user password for locking and unlocking

Among the following network protocols, the connection-oriented protocol is () A transmission control protocol B user packet protocol C Internet control message protocol

Documents needed for resume dynamic routing () A / etc/hosts B / etc/gateways C / etc/resolv.conf

Among the file system mount parameters specified in the / etc/fstab file, the D parameter is generally used to mount A defaults B sw C rw and ro D noauto # noauto on mobile devices such as CD-ROM only under the command

For shell exiting interactive mode, enter A: B ^ q C exit D quit

The kernel program that linux needs to load for startup is located in A / B / boot C / proc D / lib/modules/2.4.20_8/kernel.

How many virtual terminals can Ctrl+ALT+F* switch when running in multi-user mode () A 1 B 3 C 6 D 12

In a linux system, if you find a series of process numbers A lsof-p port B lsof-I port C lsof-d port D lsof port by a port number

The default access permission for the linux user disk quota profile aquota.user is A 644 B 755 C 600 D 700

The function and characteristic of shell is that A pipeline B input and output redirection C executes background process D processor commands

In linux system, which command can be used to view a.log scrolling information in real time A cat a.log B head-f a.log C tail-f a.log D cat-f a.log

In order for a host to communicate with another LAN through the local area network, what needs to be done is A to configure the domain name server B to define a native route to the network C, to define a native route to the network gateway, and to define a local route to the destination network gateway.

The following correct operation on the shell variable NAME is that An assigns a value to the variable: $NAME=apple B displays the value of the variable: name=apple C displays the value of the variable: echo $NAME D determines whether the variable has a value: [- f-$NAME]

If you want to use the process name to end the process, use the command A kill B ps C pss D pstree

How to view the CPU, memory and load of the current linux system. The following description is correct: a can use the top command to analyze CPU, memory usage and load B can use tree to view the overall memory usage C can use cat / proc/meminfo to view the memory in more detail D can use lsof to open the specified port

In linux system, which command can view label tag, uuid, file system and other information A file B df C type D blkid

When using the mkdir command to create a new directory, if the parent directory does not exist, you need to use the option A m B d C f D p

In the linux system, which command can view the disk usage A df-h B du-sm C fdisk D fsck

In shell systems, adding 1 > & 2 after a command means that A standard output redirects to standard error output B standard input redirects to standard error output C standard output redirects to standard input D standard error output redirects to standard input

Which command can intercept the data A cp B dd C fmt D cut of the specified content from each line in the text file

The following description of the file / etc/sysconfig/network-scripts/ifcfg-eth0 is correct: a, he is a system script file, B, he can execute file C, he stores the local name D, he knows the ip address of the local eth0.

There are four methods of variable assignment in shell, among which name=zxhk method is A direct assignment B using read command C using command line parameter D using command output

To trigger a special assignment, cpu assumes in which of the following directories the files to be copied are in the following directory A user directory B home directory C root directory D current directory

Which of the following system directories contains the external devices A / bin B / dev C / boot D / home used by linux

In a linux system, which command can copy t.txt files in batches to multiple physical machines / root/ paths? it is assumed that the physical machine ip address list file is all_ip A cp-h all_ip t.txt / root/ B scp-h all_ip t.txt / root/ C pscp-h all_ip t.txt / root/ D rsync-h all_ip t.txt / root/.

Start the startup process A httpd start B httpd stop C named start D named stop of the DNS service

Reference answer: 1-5: CDADC 6-10: BAACA 11-15:CCCCD 16-20: CDAAB 21-25: BADBA 26-30: BDCBC 31-35: BCDCC 36-40: CAADD 41-45: ADDDA 46-49: DBBC

Thank you for your reading, the above is the content of "what are the Linux basic pen test questions". After the study of this article, I believe you have a deeper understanding of what the Linux basic pen test questions have, and the specific use needs to be verified in practice. Here is, the editor will push for you more related knowledge points of the article, welcome to follow!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report