CST 130 Final Exam

Which command can be used to fine-tune the vsync and hsync of a video card for use in X Windows?

xvidtune

Which of the following statement is true?
a. The GRUB boot loader is stored in the /usr/grub directory.
b. LILO needs to be reinstalled after it has been modified.
c. The GRUB2 boot loader is often used on legacy Linux systems.
d. GRUB needs to be reinsta

LILO needs to be reinstalled after it has been modified.

Which directory stores most UNIX SysV rc scripts?

/etc/rc.d

Which runlevel halts the system?

0

Which file does the UNIX SysV init daemon reference on startup to determine the default runlevel?

/etc/inittab

Which command can be used to start X Windows, the window manager, and the default desktop environment?

startx

Which of the following statements is true?
a. The boot loader points to the MBR/GPT
b. Either the MBR/GPT or the active partition can contain the boot loader
c. Both the MBR/GPT and the active partition point to the boot loader
d. The boot loader points t

Either the MBR/GPT or the active partition can contain the boot loader

Which of the following indicates the second partition on the third hard disk drive to GRUB?

(hd2,1)

Which two implementations of X Windows are commonly used in Linux? (Choose two answers.)

X.org and XFree86

What is the name of the directory that contains symbolic links to UNIX SysV rc scripts for runlevel 2?

/etc/rc2.d

In what directory is Stage2 of the GRUB2 boot loader stored?

/boot

The first daemon loaded on a Linux system is _________.

init

Which command cause the system to enter Single User Mode?

init 1

The timeout value in the GRUB configuration file is measured in?

seconds

You have recently modified the options within the /etc/default/grub file. What command can you use next to rebuild the GRUB2 configuration file?

grub2-mkconfig

You wish to configure the runlevels that a particular upstart daemon is started in. What should you do?

Modify the daemon configuration file within the /etc/init directory

Which of the following Systemd commands can be used to stop a daemon called lala?

systemctl stop lala.service

Which of the following commands can be used to start a UNIX SysV daemon called lala in runlevels 1, 2, and 3?

chkconfig --level 123 lala on

What Systemd target corresponds to runlevel 5?

graphical.target

What keyword can be specified within a boot loader to force the system to boot to Single User Mode?

single

When no window has the focus, the keyboard is connected to the first window that was opened. True or False?

False

Which command do you execute to make the Ctrl+Alt+Del key combination perform a shutdown?

ln -s -f poweroff.target ctrl-alt-del.target

Which xterm program should you run add title bars and controls to windows?

metacity

What type of program should you use in X Window to display title bars in windows?

Window manager

Which command runs xcalc in an X server screen and returns to the command prompt?

xcalc &

Which command runs metacity in the background?

metacity &

Which command sets your system to runlevel 3?

init 3

Which command shows you the default runlevel?

systemctl get-default

What's the quickest way to have changes to the Ctrl+Alt+Del key take effect?

Type kill -HUP 1.

Which option do you use to set the title on a program's title bar?

-title "title goes here

Which command-line option specifies an application's window size and location onscreen?

-geometry

Where is the ctrl-alt-del.target file located?

/usr/lib/system/system

Which command sets the default runlevel to 5?

systemctl set-default graphical.target

When you run only an X server, you can display a menu by right-clicking the desktop. True or False?

False

Which runlevel starts the system in graphical mode?

5

What happens by default when you press the Ctrl+Alt+Del key combination?

The computer restarts.

Which command-line option is used to set a window's foreground color?

-fg

Moving the mouse cursor over a window makes it the active window, which means which of the following?

The keyboard is logically connected to the window.

The killall command terminates _________.

all instances of a process with the same name

The term used to describe a process spawning or initiating another process is referred to as_____.

forking

Which command can be used to see processes running in the background?

jobs

As daemon processes are not associated with terminals, you must use the -e switch with the ps command to view them. True or False?

True

A runaway process that is faulty and consuming mass amounts of system resources ________.

is a rogue process

Every process has a process ID and a_______.

parent process ID

The at command is used to _______________.

schedule processes to run at a single instance in the future

Which of the following commands will most likely increase the chance of a process receiving more time slices?

renice -12

Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system?

/var/spool/cron/(the user's login name)

Which process will always have a PID of 1 and a PPID of 0?

init

What command is used to view and modify user jobs scheduled to run with cron?

crontab

How can you bypass the wait function and send a user process to the background?

You can use the Ctrl+z key combination and the bg command.

What is the name given to a process not associated with a terminal?

daemon process

Which command is used to gain real-time information about processes running on the system with the most processor-intensive processes listed at the beginning of the list?

top

When you run the ps command, how are daemon processes recognized?

There is a question mark in the TTY column.

Which of the following statements is true? (Choose all that apply.)
1.
If /etc/at.allow exists, only users listed in it can use the at command.
2.
If /etc/cron.allow exists, only users listed in it can use the cron command.
3.
If /etc/cron.deny exists and

If /etc/at.allow exists, only users listed in it can use the at command.
If /etc/cron.allow exists, only users listed in it can use the cron command.
If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can us

To kill a process running in the background, you must place a % character before its process ID. True or False?

False

Nice values are used to affect process priorities using a range between _____________. 0 and 20 0 and -19

-20 and 19

What kill level signal cannot be trapped?

9

Which command entered without arguments is used to display a list of processes running in the current shell?

ps

When you run a process in the background using the & symbol at the end of the command, it displays the process ID. True or False?

True

Which command can change the scheduling priority of a running process?

renice

Which process is the parent or ancestor of all other processes?

system

Which column in ps output identifies parent processes?

PPID

If you want to see information about a process named myproc that was started in another terminal window, which command do you use?

ps ax | grep myproc

Which command is equivalent to ps -e in terms of what processes are displayed?

ps ax

Which command shows parent-child process relationships by indenting child processes?

ps -eH

A running process that top shows with the PR value 0 runs faster than a process with the PR value 10. True or False?

True

If you want to run commands as root, which command do you run first?

su

Which command do you use to run a script named myscript in your current directory?

./myscript

Which of these options should you use with a user-defined format to display the command that started the process?

cmd

Which option causes top to display only active processes?

i

If you want to start an infinite loop in the BASH shell, which command do you use?

while :

To see all system processes, you must be logged in as root. True or False?

False

Which command displays the status of a process?

ps

After you create a script, what must you do before you can run it?

Set the executable permission.

Which command displays a user-defined format?

ps -o pid,cmd

To see PIDs of processes when using the pstree command, type pstree -ID. True or False?

False

Which command displays all processes?

ps -e

Which of the following scheduling priority values (nice values) causes a process to run the fastest?

-19

Which command would you use to unlock a user account?

usermod -U username

Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)
1.
lp -d Printer1 file
2.
lp Printer1 file
3.
lp file
4.
lp -m Printer1 file

lp -d Printer1 file, lp file

Most log files on the system are found in which directory?

/var/log

Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry. True or False?

False

When a printer is rejecting requests,____________.

the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove the

cancel -u Printer1-17 Printer1-21

Which command can you use to lock a user account?

usermod -L username

What command can you use to view journald log entries on a system that uses Systemd?

journalctl

You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

True

Which command can be used to alter the primary group associated with a given user temporarily?

newgrp

When a printer is disabled, ________.

the print queue does accept jobs into the print queue and holds them there until the printer is enabled again

What is the name of the utility used to rotate log files?

...

...

logrotate

Which command is used to delete a user account?

userdel username

When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information.

facility, priority

You can clear a log file simply by redirecting nothing in to it. True or False?

True

What is the name used to describe a user providing a user name and password to log in to a system?

authentication

UIDs and GIDs are unique to the system and once used can never be reused. True or False?

False

The process of sending print jobs from the print queue to the printer is called?

printing

What is the name of the file that contains a listing of all users on the system and their home directories?

/etc/passwd

Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?

/etc/login.defs

When you're the root user and use the su command to become another user, you must enter the user's password. True or False?

False

Which of the following is the highest message priority?

alert

Which command do you run to change the default shell a new user account is assigned to?

useradd -D -s

Which file do you view to see which shell is assigned to a particular user?

/etc/passwd

When you modify a file's contents, which time is changed?

All of the above

Everyone can read and write unowned files that have -rw-rw--- permissions. True or False?

False

Which command sends a message for the mail facility with the info priority?

logger -p mail.info This is a test

Which time is changed when you use the command touch file9?

ctime, mtime, atime

Which command displays the last few lines of the syslog file?

tail /var/log/syslog

Which command displays mtime?

ls -l

Which command finds and displays any broken symbolic links in the file system?

symlinks -r / | grep dangling

Which priority messages are sent to all users that are logged in to the system?

crit

If you change a file's permissions with chmod, which time is changed?

ctime

Which command can you run to see the default shell for the logged on user?

echo $SHELL

Which default user value do you change to specify when an account is disabled after the password expires?

INACTIVE

In Linux Mint, if you run the command logger -p mail.info This is a test of mail.info, the message will be logged to both mail.log and to syslog. True or False?

True

You can change the default shell for new users to /bin/sh. True or False?

True

Which command displays all files that have no user owners in the file system?

find / -nouser

When you read a file's contents, which time is changed?

atime

When you list files with the ls -l

The UID and GID of the most recent user owner

Which dump level indicates a full backup?

0

When compiling source code into a binary program, which command does the compiling using the GNU C Compiler?

make

The Debian Package Manager (DPM) is the default package manager used by Fedora 20. True or False?

False

Which command can be used to remove the test DPM package, including any test configuration files?

apt-get purge test

Which option to the dpkg command can be used to list the files that comprise a package?

-L

Most source code is available on the Internet in tarball format. True or False?

True

The bzip2 and gzip utilities use similar compression algorithms. True or False?

False

Which command can be used to remove the test DPM package, including any test configuration files?

rpm -qi packagename

Which of the following commands can be used to search for packages that contain the word oobla on RPM software repositories?

yum search oobla

When compiling source code into a binary program, which command performs a system check and creates the Makefile?

./configure

You have created a full backup and four incremental backups. In which order must you restore these backups?

0, 1, 2, 3, 4

The -9 option to the gzip utility results in a higher compression ratio. True or False?

True

Which of the following commands creates an archive?

tar -zcvf /dev/st0 *

To install a new program from RPM software repositories on the Internet, you can use the yum update programname command. True or False?

False

Files that have been compressed using the compress utility typically have the ______ extension.

.Z

Which filename extension indicates a tarball?

.tar.gz

Which file contains full and incremental back-up information for use with the dump/restore utility?

/etc/dumpdates

Which of the following represents the first nonrewinding SCSI tape device on a system?

/dev/nst0

Which of the following commands extracts an archive?

cpio -vicdu -I /dev/fd0

Which option to the rpm command can be used to remove a package from the system?

e

If you filter files through gzip using the tar command, you will always get about a 90% compression ratio. True or False?

False

Which command displays information about the words-2-17 package?

rpm -qi words-2-17

Which command displays all packages installed on your computer?

rpm -qa

Which command creates an uncompressed tar file of the /lib directory in /mnt/backup?

tar -cvf /mnt/backup/libback.tar /lib

Which command shows you files that are part of a package but not installed on the hard disk?

rpm -V words-2-17

The z option in the tar command filters the archive through bzip2. True or False?

False

The gzexe command enables you to convert a compressed program into its original uncompressed state. True or False?

True

The default installation of yum allows you to verify package installations. True or False?

False

A compressed binary program loads just as fast as the same uncompressed program. True or False?

False

Which command shows a list of repositories yum can use to find packages to install and update?

yum repolist

Which command installs the blivet-2.3 package using yum?

yum install blivet*

Write the command that mounts a SAMBA share named reports located on a server named operations to the /mnt/reports directory.

mount -t cifs //operations/reports /mnt/reports

A grayscale jpeg file is usually larger than a color bmp file. True or False?

False

Which command compresses Linux binary programs and allows them to run in a compressed form?

gzexe

Which command shows you the files that are part of a package?

rpm -ql words-2-17

Which command mounts a SAMBA share named mydocs that is located on a server named accounting into the /mnt/docs directory?

mount -t cifs //accounting/mydocs /mnt/docs

If files are deleted from the words-2-17 package, you can use yum reinstall words-2-17 to solve the problem. True or False?

True

Which command displays the names of all installed packages starting with y?

rpm -qp y*

Which command tells you whether a file with the extension .bmp is really a bitmap image?

file

Which command can convert a bitmap image to a compressed image file?

convert

Write the command that will show a list of files that have a jpeg extension that includes the file size.

ls -l test.jpg

When you issue the time cp /bin/rpm ./ command, what's the meaning of the output real 0m1.100s?

The cp program took 1.1 seconds to finish running.

To add a repository at http://repoexample/example.repo for yum to use, type yum --config http://repoexample/example.repo. True or False?

False

What result does the time command display if a program takes 2 hours to run?

120m0.000s

Why might you want to convert bitmap files to jpeg files?

To conserve space and bandwidth

Which file would you modify to permanently change the TCP/IP address of the first wired NIC on a Fedora 20 system?

/etc/sysconfig/network-scripts/ifcfg-eth0

To test DNS configuration by resolving a host name to IP address, which command or commands can you use? (Choose all that apply.)
1.
nslookup hostname
2.
dig hostname
3.
host hostname
4.
resolve hostname

nslookup hostname
dig hostname
host hostname

Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the NIC?

/etc/resolv.conf

What devices are used to transfer information from one network to another?

routers

Which of the following are graphical remote administration technologies? (Choose all that apply.)
1.
telnet
2.
ssh -X
3.
ssh
4.
VNC

ssh -X
VNC

The line that configures the host name for the computer at boot time can be found in /etc/sysconfig/network. True or False?

True

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

True

Standalone daemons are started on demand using inetd or xinetd. True or False?

False

Before a computer can use a router, what configuration information must it be provided?

default gateway

The daemons associated with network services listen for network traffic associated with a particular _____.

port

Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)
1.
route
2.
ipconfig
3.
ip
4.
traceroute

route and ip

What are two means available to resolve a host name to the appropriate TCP/IP address? (Choose two answers.)
1.
DHCP
2.
DNS
3.
/etc/hosts
4.
/etc/resolve.conf

DNS
/etc/hosts

Which of the following port numbers is associated with telnet?

23

The TCP/IP address of 127.0.0.1 is also referred to as the _____.

loopback address

Which command would be used to activate the NIC aliased as eth0?

ifup eth0

Which Windows program is often used to connect to a Linux server via SSH?

Putty

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False?

True

Which of the following are stand-alone daemons? (Choose all that apply.)
1.
Apache (httpd)
2.
Washington University FTP (in.ftpd)
3.
telnet (in.telnetd)
4.
DNS (named)

Apache (httpd) and DNS (named)

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)
1.
ifconfig
2.
ipconfig
3.
ping ?
4.
netstat -i

ifconfig
ping ?
netstat -i

Which command uses TCP and starts reporting trace information at the third router?

traceroute -T -f 3

Which ping option prevents transmitting very large packets?

-M do

What's the consequence of disabling ARP on an interface?

The interface can no longer find MAC addresses.

What command do you use to disconnect from the FTP server but not exit the FTP client?

close

What command do you use to connect to an FTP server if you are at the ftp> prompt and not currently connected to a server?

open

An IP alias is used only for internal testing; you can't actually send packets to the IP address assigned to the alias and get a response. True or False?

False

When a user logs in as an ordinary (nonanonymous) user, the working directory is /var/ftp. True or False?

False

To shut down the first Ethernet interface, which command should you use?

ifconfig eth0 down

An Ethernet card's MAC address can be changed with the route command. True or False?

False

When you shut down a physical interface, you must specify the IP address, subnet mask, and broadcast address again when you restart the interface. True or False?

False

What command do you use to see the contents of the ARP cache?

ip neighbor

Which command is used to set the default gateway?

route

You can't assign IP aliases to the local loopback (lo) interface. True or False?

False

Which of these commands configures an IP alias?

ifconfig eth0:0 192.0.2.1

How many IP aliases can be created?

Up to 256 per physical interface

When a user logs in as anonymous, the working directory is /ftp/anonymous. True or False?

False

Which of the following reasons explains why NcFTPd performs better than WuFTP?

It uses a different transport protocol from other FTP programs.

What's the name of the first Ethernet interface?

eth0

Which Linux command is used to change the subnet mask?

ifconfig

By default, IP packets that exceed the MTU aren't fragmented. True or False?

False

NIS clients use NIS records to access their configuration information. True or False?

False

You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it can not be delivered. What should you do?

Run the newaliases command.

Which file stores the Apache configuration in Fedora 20?

/etc/httpd/conf/httpd.conf

NFS can be used to share files natively with computers running the Microsoft Windows operating system. True or False?

False

Which command can be used to connect to a remote Windows share called data on the server called fileserver?

smbclient //fileserver/data

Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?

True

DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?

True

The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?

True

Which SQL statement key word can be used to delete a record within a table?

DELETE

Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.)
1.
The CREATE DATABASE statement within the PostgreSQL utility.
2.
The ADD DATABASE statement within the PostgreSQL utility.
3.
The adddb command.
4.
The c

The CREATE DATABASE statement within the PostgreSQL utility.

What must you do in order to become a DNS server? (Choose all that apply.)
1.
Create zone files.
2.
Create resource records for DNS lookups.
3.
Create NIS maps.
4.
Run the name daemon (named).

Create zone files.,
Run the name daemon (named).

your telnet session to start an email session? (Choose all that apply.)
1.
START
2.
HELO
3.
EHLO
4.
WAZUP

HELO, EHLO

Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?

False

Which DNS resource record is an alias to other records?

CNAME

Which command can you use to synchronize ntpd with an NTP time source?

ntpq

What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 14.04 FTP server?

/srv/ftp

Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?

Restart the DHCP daemon.

Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?

testparm

Which command within the command-line FTP utility can be used to change the current directory on the local computer?

lcd

Which of the following must you perform to share a directory using NFS? (Choose all that apply.)
1.
Edit the /etc/exports file.
2.
Mount the directory to the /etc/exports directory using the mountcommand.
3.
Run the exportfs -a command.
4.
Start or restar

Edit the /etc/exports file.
Run the exportfs -a command.
Start or restart the NFS daemons.

Which file do you edit to determine which hosts can access NIS databases?

/etc/ypserv.conf

Which command specifies the NIS domain name as MyDomain?

domainname MyDomain

Telnet is a good choice when you need a secure remote terminal session. True or False?

False

You can change firewall settings with an ordinary user's privileges. True or False?

False

Which command installs the Telnet server package with the yum package manager?

yum install telnet-server

By default, a Telnet server is installed and ready to use in Fedora 13 Linux. True or False?

True

Which command causes the ypserv service to start when the system starts?

systemctl enable ypserv.service

Which file determines the network that NIS clients can connect from?

makefile13

Which of the following is the default active zone?

Public

Which of the following is true about the Telnet server in Fedora 13 Linux?

Outside connections are blocked by the firewall.

Which command lists all the services supported by the firewall-cmd command.

firewall-cmd --get-services

What command do you use to block all traffic in the default zone?

firewall-cmd --panic-on

What's the purpose of the NIS service?

Synchronizes files, such as passwd and hosts

You have just installed the telnet-server package and tested it by logging in from the local computer. Are there any additional steps to take before you can log in remotely?

Enable the telnet service on the firewall.

What command do you use to find out if the dns service is enabled for the default zone?

firewall-cmd --query-service=dns

What will the command sar -W 3 50 do?

Take 50 swap statistics every 3 seconds.

Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? (Choose all that apply.)
1.
AIDE
2.
SWATCH
3.
tripwire
4.
Snort

AIDE
tripwire

Which of the following files is likely to be found in the /var/log/sa directory on a Fedora 20 system over time?

sa19

Which of the following actions should you first take to secure your Linux computer against network attacks?

Ensure that only necessary services are running.

What are best practices for securing a local Linux server? (Choose all that apply.)
1.
Lock the server in a server closet.
2.
Ensure that you are logged in as the root user to the server at all times.
3.
Ensure that SELinux or AppArmor is used to protect

Lock the server in a server closet.
Ensure that SELinux or AppArmor is used to protect key services.

When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad?

bad, because the processor is idle 10% of the time and perhaps a faster CPU is required

Which file contains information regarding the users, computers, and commands used by the sudo command?

/etc/sudoers

Which command can increase the number of filehandles that programs can open in a shell?

ulimit

Which of the following commands can be used to display memory statistics? (Choose all that apply.)
1.
free
2.
sar
3.
vmstat
4.
iostat

free
sar
vmstat

When the fsck command cannot repair a nonroot filesystem, you should immediately restore all data from tape backup. True or False?

False

Which command indicates the shared libraries required by a certain executable program?

ldd

Which of the following are common assistive technologies? (Choose all that apply.)
1.
Mouse keys
2.
High contrast
3.
Sticky keys
4.
On-screen keyboard

Mouse keys
High contrast
Sticky keys
On-screen keyboard

On which part of the maintenance cycle do Linux administrators spend the most time?

monitoring

The private key is used when creating a digital signature. True or False?

True

What type of iptables chain targets traffic that is destined for the local computer?

INPUT

Which of the following commands can be used to scan the available ports on computers within your organization?

nmap

Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?

firewall-cmd --add-service ssh --permanent

The lspci command can be used to isolate problems with X Windows. True or False?

False

Which of the following steps is not a common troubleshooting procedure?

Delegate responsibility.

RSA is a common symmetric encryption algorithm used by SSH and GPG. True or False?

False

Which command decrypts a file?

gpg --decrypt secret.gpg

Which command displays a key ring?

gpg -list-keys

What's the size of the RSA fingerprint?

128 bits

Before you can establish an SSH connection, you must run the ssh daemon on the client computer. True or False?

False

Instead of "hash," md5sum uses which term?

Checksum

Which of the following commands compares the hash value of a file named myfile to a stored hash value?

md5sum --check myfile.md5

Which command exports a key in ASCII format?

gpg -a -export

By default, keys expire in one year. True or False?

False

Users who want to exchange data by using public key encryption must have each other's private keys on their key rings. True or False?

False

The md5sum command produces a cryptographic hash consisting of how many characters?

32

When you decrypt a file, you can send its contents to a file with the --file option. True or False?

False

When you encrypt a file, gpg deletes the original (unencrypted) file automatically. True or False?

False

If you lose your key or think it has been compromised, what should you do?

Submit a revocation certificate (prepared in advance) to a key server and generate a new certificate.

Which command encrypts the financial file?

gpg --encrypt financial

The md5sum command can check only binary files to see whether they're genuine. True or False?

False

When you use the gpg --exportcommand, you're exporting private keys. True or False?

False

If a host key changes, what's the easiest way to place the new key in your known_hosts file?

Re-create it by logging in again with SSH.

A shared file containing host key information is found at /ssh/known_hosts.

False

The comment you enter when generating your key is visible only to you. True or False?

False

The md5sum command outputs its hash to STDOUT by default. True or False?

True

What's the minimum size key you can generate with the gpg command?

1024

What's the default key size generated with the gpg command?

2048

Where is the known_hosts file stored?

~/.ssh

When you encrypt a file to send to another user, you use your private key to encrypt it. True or False?

False