cit 371

¡Supera tus tareas y exámenes ahora con Quizwiz!

After issuing the history command, you see the following output: 351 pwd 352 ls -l /etc 353 cd .. 354 ls -a 355 cd /etc 356 cat passwd 357 ls /home We want to re-execute instruction 355. Aside from !355, what is the shortest instruction we can enter to re-execute it?

!cd

To start a process from a shell so that the process runs in the background rather than the foreground, you would append which of these characters to your command? a) & b) % c) * d) + e) !

&

Which option would you use with tar to add to an already existing archive? a) -a b) -A c) -add d) -append e) -u

-A

Which option would you use with tar to add to an already existing archive? a) -a b) -A c) -add d) -append e) -u

-A

If /tmp is not given its own partition, it will be part of which partition? a) / b) /home c) /usr d) /var e) swap

/

A logical volume manager can be used to create partitions for most top-level directories but should not be used for which of these? a) / b) /boot c) /dev d) /home e) Swap

/boot

Under which top-level directory will you find the Linux kernel? a) /bin b) /boot c) /dev d) /sbin e) /usr

/boot

Under which top-level directory will you find the Linux kernel? a) /bin b) /boot c) /dev d) /sbin e)/usr

/boot

Which top-level directory contains configuration files and scripts? a) /bin b) /boot c) /dev d) /etc e) /var

/etc

If you want to avoid using a DNS name server, you can establish IP alias to IP address mapping in which of the following files? a) /etc/avoid b) /etc/dns c) /etc/hosts d) /etc/mapper e) /etc/resolv.conf

/etc/hosts

Of the following top-level directories, which should always be on a separate partition from the root partition? a) /bin and /sbin b)/boot c) /home d) /var e)/usr

/home

You are currently in the directory /etc. You enter the command cd /home/foxr. What does the environment variable PWD store? a) /etc b) /home c) /home/foxr d) / e) There is no way to know

/home/foxr

You will find the various .target files in which directory(ies)? (Choose two) a) /etc b) /etc/systemd c) /lib/systemd/system d) /lib/systemd/user e) /run/systemd f) /usr/systemd

/lib/systemd/system /lib/systemd/user

Of the various partitions, which one has a file system that is not physically stored on a storage device? a) / b) /home c) swap d) /proc e) /mnt/stuff

/proc

Assume the following page table: Page Frame Valid 0 16 1 1 -- 0 2 -- 0 3 39 1 4 -- 0 5 63 1 Of the pages of this process, a memory reference to which page(s) would cause a page fault? a) 0 b) 1 c) 2 d) 3 e) 4 f) 5

1 2 4

Assume the following partitioning on a Linux system: Device Size MountPoint Type LVM Volume Group (MB) VolGroup lv_vol00 6000 / ext4 lv_vol01 2000 /var ext4 lv_vol02 2000 /home ext4 lv_vol03 2000 swap Hard Drives sda sda1 500 /boot ext4 sda2 12000 VolGroup What is the size of this computer's hard disk? a) 24,500 MB b) 12,500 MB c) 12,000 MB d) 500 MB

12,500 MB

To set the group permission ID (GUID), you would use which of the following 4-digit permissions in chmod? a) 1755 b) 2755 c) 4755 d) 6755 e) 7755

2755

How many times is bar called in the following code? for((i=0;i<=3;i++)); do foo $i 0; bar $i; done

4

Digital certificates will contain which of the following? a) A symmetric key b) A private key c) A public key d) Both a private and a public key e) None of the above

A public key

Which of the following best describes software emulation and virtual machines? a) A software emulator creates a virtual machine of a specific operating system. b) A virtual machine performs software emulation. c) A virtual machine does not perform software emulation. d) Both terms mean the same thing. e) The two terms have nothing in common.

A virtual machine performs software emulation

What does the ~ character represent? a) Relative path b) Absolute path

Absolute path

A Linux shell allows the user to enter commands and definitions of various types which can be recalled. Which of the following is not something that Linux saves so that you can recall it? a) Aliases b) Commands c) Functions d) Variables e) All of the above are saved and can be recalled

All of the above are saved and can be recalled

Which of the following best describes the regular expression ^[^ ]+$ (there is a blank space after the second ^)? a) Any string that contains at least one blank space b) Any string that starts with at least one blank space c) Any string that consists solely of blank spaces d) Any string that contains no blank spaces e) Any string that contains only ^ (caret symbols) and blank spaces

Any string that contains no blank spaces

The /etc/shadow file contains the following: foxr:...:16104:0:30:5:20:: How often can this user change his password? a) Any time desired b) As much as every day c) Every 30 days d) Every 5 days e) Every 20 days

Any time desired

We view a computer system in layers with the user at the top and hardware at the bottom. Directly underneath the user we would see which layer? a) Application software b) Operating system utilities c) Operating system services Shells d) ROM BIOS

Application software

In Gnome, which top-level menu would you access to run various accessories like gedit or open a terminal window? a) Accessories b) Applications c) Favorites d) Places e) Systems

Applications

Several versions of Unix were created by 1990 based on which earlier version of Unix? a) Unics b) GNU Unix c) AT&T Unix d) BSD Unix e) None of the above, versions of Unix around 1990 were all independently created

BSD Unix

Which of the following forms of memory is volatile? a) SRAM b) DRAM c) ROM d) Both SRAM and DRAM e) All of SRAM, DRAM and ROM

Both SRAM and DRAM

Which programming language was used to develop the initial Unix operating system? a) PDP-11 Assembly Language b) C c) C++ d) FORTRAN e) Java

C

Which of the following would you expect to see in ps for the status of a process that is in uninterruptible sleep? a) D b) R c) S d) s e) T

D

What subdirectories do you expect to find under /proc? a) Directories for every connected device b) Directories for every running process c) Directories for every user of the system who has a home directory d) Directories for every user of the system who does not have a home directory e) Directories for various types of application software

Directories for every running process

The WantedBy directive does not list other units but instead it lists a(n) _________. a) file b) symbolic link c) directory d) dependency

Directory

We denote formatting commands in Latex by a) Using the GUI b) Embedding the commands using notation like \command c) Embedding the commands using notation like {command} d) Embedding the commands using notation like <command> e) None of the above, LaTeX does not permit formatting commands

Embedding the commands using notation like \command

All variables defined in a Bash shell are environment variables, defined from within scripts or other software. (T/F)

False

All versions of Linux are open source and available for free.(T/F)

False

An alias' name must start with a letter, for instance you could not write an alias whose name starts with a punctuation mark. (T/F)

False

Assume A=1, B=5, C=3. Is the condition [[ $((A+B)) -lt $C && $C -gt $A ]] true or false or does it yield an error? a) True b) False c) Error

False

Booting is nothing more than the process of turning on your computer from when it had been shut off.(T/F)

False

In entering the ls command, you can include options but you must include parameters.(T/F)

False

In the IPOS cycle, storage refers only to permanent storage devices like the disk drive. (T/F)

False

Linux is equally popular today as Windows. (T/F)

False

Logging in as root in Linux is the same as the computer running in privileged mode.(T/F)

False

Once a process is started in the foreground, it is not possible to move it to the background.(T/F)

False

Once an environment variable has been defined, a user is unable to alter it.(T/F)

False

Streaming video uses lossless compression.(T/F)

False

The EUID (effective user ID) of a process will always be the same as the UID.(T/F)

False

The Linux Mail program, when invoked by the command mail <enter> (that is, without a specified username) will allow you to send an email to all users in your address book.(T/F)

False

The first completed implementation of Linux was developed by Richard Stallman as part of the GNU Project.(T/F)

False

The initramfs file system includes all of these subdirectories: /dev, /bin, /sbin, /etc and /home.(T/F)

False

The killall command will kill all running processes except for init. (T/F)

False

The regular expression ... will only match any single character that appears three times.(T/F)

False

The regular expression [a-z]{1,3} will match only a finite number of lines in a file.(T/F)

False

The top command will only display processes of the current user. (T/F)

False

When assigning a variable a value, you must include the $ prior to the variable name as in $VAR=0. (T/F)

False

When installing CentOS, you must set up disk partitions from scratch.(T/F)

False

With MAX_MEMBERS_PER_GROUP, a directive from /etc/login.defs, you establish the maximum number of users permitted in any single group. If you attempt to add a user to a group that has reached this limit, you are given an error message.(T/F)

False

With the change from init to systemd, all of the old init-based scripts and directories along with the scripts that control services have all been removed(T/F)

False

openssl is the only encryption software tool available in Linux.(T/F)

False

If FIRST=Frank and LAST=Zappa and we execute echo $FIRST; echo -n $LAST. What is output? a) Frank -n Zappa b) Frank Zappa c) Frank Zappa d)Frank Zappa e)$FIRST $LAST

Frank Zappa

You want to set your computer to dual boot both Red Hat Linux and Windows 7. Between GRUB and LILO, which boot loader should you pick? a) GRUB b) LILO

GRUB

Assume str="Hot Rats". What is the result of echo ${str:-4}?

Hot Rats

The loopback device, lo, is used for which purpose? a) It allows your network interface to communicate with your own computer b) It allows software to communicate with your computer as if the software was sending messages over the network c) It allows your computer to communicate to your subnet rather than the Internet d) It is a troubleshooting device for your network interface e) It is your network interface device

It allows software to communicate with your computer as if the software was sending messages over the network

Which of the following encryption activities does openssl not perform? a) Encrypt a message b) Generate a certificate c) Generate a private key d) Generate a public key e) It can do all of these

It can do all of these

What does the command tar -cf somedir.tar /home/somedir do? a) It outputs the contents of the file somedir.tar to the directory /home/somedir b) It creates a new archive called somedir.tar of the directory /home/somedir c) It appends the contents of /home/somedir to the archive somedir.tar d) It compares the contents of somedir.tar to the contents of /home/somedir to indicate whether content in the directory is newer e) It updates somedir.tar with any newer content from /home/somedir

It creates a new archive called somedir.tar of the directory /home/somedir

Which of the following best describes what vmlinuz is? a) It is a Linux boot loader program b) It is your Linux kernel c) It is your Linux kernel in a compressed and non-executable format d) It is your Linux kernel which is mostly compressed but part of it is an executable that will start loading the kernel e) It is your Linux kernel which is mostly compressed but part of it is an executable that will uncompress and load the remainder of the kernel

It is your Linux kernel which is mostly compressed but part of it is an executable that will uncompress and load the remainder of the kernel

Assume you have declared the variable A as A=(Annie Barbara Christina Karen Rachel). What happens to the array if you execute the instruction A[1]=${A[2]}? a) It replaces the entry Annie to store Barbara, which now appears twice b) It replaces the entry Barbara to store Annie, which now appears twice c) It replaces the entry Barbara to store Christina, which now appears twice I d) t replaces the entry Christina to store Barbara, which now appears twice e) It causes an error

It replaces the entry Barbara to store Christina, which now appears twice

Which of the following steps is not part of the power-on self-test? a) Testing CPU's registers b) Testing interrupt controllers c) Identifying devices connecting to the system bus d) Loading the operating system e) All of these are part of the power-on self-test.

Loading the operating system

Which of these types of computers costs more than a server? a) Desktop b) Laptop c) Mainframe d) Tablet e) None of the above, the server is more expensive than all of these

Mainframe

One of the defaults available specifies GROUP=100. What does this mean? a) New users by default will have a directory that can store 100KB b) New users by default will have a directory that can store 100MB c) New users by default will have an account that lasts only 100 days d) New users who are not given a specified user ID will have an ID generated starting at 100 e) New users who are not given their own private group will be assigned to group 100

New users who are not given their own private group will be assigned to group 100

The operating system can boot off of the following devices except for a) hard disk b) optical disk c) USB d)floppy disk e) None of the above, the operating system can boot from any of these

None of the above, the operating system can boot from any of these

You are currently in the directory /etc. You enter the command cd /home/foxr. Which of the following environment variables would now be storing the value /etc? a) HOME b) OLDPWD c) PWD d) PATH e) None of the above, no environment variable would take on the old directory

OLDPWD

Virtual memory is an extension to a) Cache memory b) Main memory c) Hard disk space d) All of the above e) Registers

Registers

Which of the following features will allow you to enter a portion of a filename, as long as it is unique, in a Linux command and have Bash fill in the full filename for you? a) Brace expansion b) Filename completion c) Filename expansion d) Escape completion e) Tab completion

Tab completion

In top, CPU utilization is provided broken down by different types of processes. What would 3.9%sy represent? a) The CPU is spending 3.9% of its time on user processes b) The CPU is spending 3.9% of its time on idle processes c) The CPU is spending 3.9% of its time on all processes d) The CPU is spending 3.9% of its time on kernel (or system) processes

The CPU is spending 3.9% of its time on kernel (or system) processes

Assume a PAM configuration file consists of the following directives. auth required pam_env.so account sufficient pam_succeed_if.so uid=0 account sufficient pam_unix.so password requisite pam_deny.so session optional pam_console.so close Assume that there is only one module that we want to call for the auth step, what can you conclude about the directives? a) The control flag required should be changed to sufficient b) The control flag required should be changed to requisite c) The control flag required should be changed to optional d) The control flag required should be changed to include e) The module for auth should be changed to pam_succeed_if.so

The control flag required should be changed to requisite

Assume the file foo.txt contains 40 lines and 4000 characters. Which characters are output if you issue the command head -c -1000 foo.txt? a) The first 10 lines of foo.txt b) The first 15 lines of foo.txt c) The first 100 lines of foo.txt d) The first 10 characters of foo.txt e) The first 15 characters of foo.txt f) The first 100 characters of foo.txt g) The first 1000 characters of foo.txt

The first 1000 characters of foo.txt

Under /proc, we see a subdirectory called 5813 which has files cmdline, environ, fd, io, mounts, cwd, exe and root. The file cmdline will be empty under what circumstance(s)? a) The process was started from the command line b) The process was started by root c) The process was started through the GUI d) The process was started by another process e) None of the above, this file will never be empty

The process was started through the GUI

Assume a PAM configuration file consists of the following directives. auth required pam_env.so account sufficient pam_succeed_if.so uid=0 account sufficient pam_unix.so password requisite pam_deny.so session optional pam_console.so close If the pam_console.so module fails, what would be the result? a) The program that uses this configuration file will fail b) The program that uses this configuration file will not fail but it will log an error c) The program that uses this configuration file will not fail but it will call the close command d) The program will try to use another module in place of pam_console.so e) There is no way to know

The program that uses this configuration file will not fail but it will call the close command

You perform man command for some command. Which portion of the man page provides you the syntax for how to use the command by stating the optional and required components of the command? a) The name b) The synopsis c) The description d) Examples e) See also

The synopsis

What is wrong with the following script? #!/bin/bash FIRST=Frank SECOND=Zappa FULL=$FIRST $SECOND echo $FULL a) There should be quote marks around $FIRST $SECOND b) There should be no $ before FIRST, SECOND or FULL c) There should be quote marks around Frank and around Zappa d) You did not declare the variables FIRST, SECOND and FULL e) There is nothing wrong with the script

There should be quote marks around $FIRST $SECOND

Which of the following types of storage would not be part of a file space? a) Magnetic tape b) Optical disk c) RAM disk d) USB drive e) They could all be part of a file space

They could all be part of a file space

Of the four TCP/IP layers, which layer is implemented using either or both TCP and UDP? a) Application layer b) Transport layer c) Internet layer d) Link layer e) Both Application and Transport layers

Transport Layer

All computers have at least one processor. (T/F)

True

All unit files contain a [Unit] section, an [Install] section and a type specific section such as [Service], [Path], [Mount] or [Target].(T/F)

True

Assume FIRST=Frank and LAST=Zappa. There is a difference in the output between echo "$FIRST $LAST" and echo '$FIRST $LAST' but no difference in the output between echo "$FIRST $LAST" and echo $FIRST $LAST.(T/F)

True

Assume the following partitioning on a Linux system: Device Size MountPoint Type LVM Volume Group (MB) VolGroup lv_vol00 6000 / ext4 lv_vol01 2000 /var ext4 lv_vol02 2000 /home ext4 lv_vol03 2000 swap Hard Drives sda sda1 500 /boot ext4 sda2 12000 VolGroup The logical volume consists of four partitions, /, /var, /home, swap.(T/F)

True

By default when creating a new user, the user is given the same user ID as group ID.(T/F)

True

If a program requires access to a character device, the program must wait until the character is transferred, but if a program requires access to a block device, the program does not necessarily have to wait for the block to be transferred before continuing execution.(T/F)

True

In emacs, there is a keystroke command that will convert all of the letters from the cursor to the end of the current word into upper case.(T/F)

True

In the following listing: -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 file1.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 file2.txt drwxr-xr-x. 1 foxr cool 1024 Jul 16 2014 files All three of the items listed here are owned by the same user, foxr. (T/F)

True

In the following listing: -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 file1.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 file2.txt drwxr-xr-x. 1 foxr cool 1024 Jul 16 2014 files All three of the items listed here are owned by the same user, foxr.(T/F)

True

In the following listing: -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 file1.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 file2.txt drwxr-xr-x. 1 foxr cool 1024 Jul 16 2014 files The first character in the output denotes the type of entity, in this case whether the item is a file or a directory.(T/F)

True

Making changes to the firewall, by default, only impacts the running firewall, and restaring the firewall will return it to its permanent settings.(T/F)

True

Run levels are no longer used to indicate which services should be started or stopped at system initialization time in RedHat 7.(T/F)

True

Since most Linux commands accept input from file rather than keyboard, the redirection operator < is seldom used when issued on Linux operations.(T/F)

True

Status information displayed using systemctl gives you more information than what you would have received using service ____ status.(T/F)

True

The desktops KDE and Gnome have different accessory programs but you can run KDE accessories in Gnome if you have both desktops installed in your operating system(T/F)

True

The first implementation of Unix, called Unics at the time, was not platform independent but instead only ran on DEC PDP-11 computers.(T/F)

True

The initramfs is the initial Linux root file system. This is not the same as the Linux root file system that you find once Linux has fully initialized and is ready for use.(T/F)

True

The regular expressions [a-z]+ and [a-z]{1,} will match the same things.(T/F)

True

Through systemctl, you can add targets to Wants= and/or Requires= directives of a given unit file. True (T/F)

True

To communicate over a network, your computer uses a network interface device and not the loopback device.(T/F)

True

To increase a process' priority, you must be root.(T/F)

True

To launch a process or script in the current directory, you add the notation ./ before the process name as in ./foo. This is not necessary if you use a full path or the current directory is part of your PATH variable (T/F)

True

Under the Places top-level menu you will find Home Folder, Desktop, Documents, Music, Pictures, Videos and Downloads. These are all locations of the currently logged in user's file space. (T/F)

True

Under the Places top-level menu you will find Home Folder, Desktop, Documents, Music, Pictures, Videos and Downloads. These are all locations of the currently logged in user's file space.(T/F)

True

Unless you mount or unmount partitions after system initialization, you should find the same information available when looking at /etc/fstab and /etc/mtab.(T/F)

True

Unlike vi, emacs has only one mode.(T/F)

True

Unmounting a file system does not impact mounted file systems' availability.(T/F)

True

Using a logical volume manager to partition your storage devices allows a logical volume (partition) to be divided and placed among multiple hard disks.(T/F)

True

Using virtual machine software, you can have access to a number of different operating systems and their application software from your computer even if those operating systems are not native to the hardware you are using.(T/F)

True

When using systemctl to control a service, you do not need to add the .service extension to the unit's name, but when using systemctl to control any other unit type, you need to add the extension (e.g., .target or .timer) to the unit's name.(T/F)

True

Whereas the service command only operated on services, systemctl can operate on any unit type and can also operate on unit files.(T/F)

True

You are in a Bash shell. Typing in the bash instruction results in the starting of a new shell such that any definitions from the outer shell are "hidden" (unavailable).(T/F)

True

You can enter multiple instructions at once by separating the instructions with a semicolon as in who; pwd; ls <enter>. (T/F)

True

You can specify content negotiation such as preferred language via an HTTP header.(T/F)

True

Of the following unit file directives, which would you expect to find in both .target and .service files? a) EnfironmentFile b) WantedBy c) ExecStart d) PIDFile e) Type

WantedBy

After issuing a sudo command, what happens? a) you are listed in the /etc/sudoers file, the command executes, otherwise an error is output b) If you are listed in the /etc/sudoers file as having access to this command, it executes, otherwise an error is output c)The /etc/sudoers file is updated to indicate that you submitted a sudo command d) The command is logged e)You are asked to enter your password

You are asked to enter your password

When you do a man on a command, it tells you how to use the command. Imagine for some command, you get the following. What does the notation [-aeiou] mean? command [-aeiou] [file]... a) You must use at least one of the options listed (a, e, i, o or u) b) You must use no more than one of the options listed c) You may use as many options as listed but must use at least one of them d) You may use any combination of the options listed including none at all e) You must use the same number of options as files listed so that if you have no files listed, you cannot use any options

You may use any combination of the options listed including none at all

If you see this prompt in the Linux command window, [zappaf@mycomputer foxr]$ And you type "cd ~", which of the following prompts would you most likely see next? a) [~@mycomputer foxr]$ b) [zappaf@~ foxr]$ c) [~@~ foxr]$ d) [zappaf@mycomputer ~]$ e) [~@~ ~]$

[zappaf@mycomputer ~]$

Given the following chain of processes, init \gnome \gnome_terminal \bash \program1 \program2 \program3 which process is the parent for bash? a) \gnome b) \init c) \program1 d) \gnome_terminal

\gnome_terminal

The NetworkManager service can be configured through a) configuration files b) using a text-based helper tool called nmcli t c) hrough a GUI-based helper tool called control-center d) through a GUI-based helper tool called nm-connection-editor e) all of the above

all of the above

Assume X=1, Y=2 and Z=5. What is output from the statement if [ $((X+Y)) -gt $Z ]]; then echo yes; else echo no; fi a) yes b) no c) 3 d) 5 e) an error occurs

an error occurs

Which of the following forms of process management runs without any user interaction? a) Single tasking b) Batch processing c) Multitasking d) Multithreading e) Multiprocessing

batch processing

Which of the following commands would you use after you have processed a LaTeX document to generate its bibliography section? a) biblio b) bibtex c) dvipdf d) latex (the bibliography section is generated at the same time you process the LaTeX file) e) None of the above, LaTeX does not provide a mechanism to generate a bibliography

bibtex

You can place disk quotas on a) individual users b) individual groups c) individual directories d) both individual users and individual groups e) all of individual users, groups and directories

both individual users and individual groups

The target file default.target a) is a symbolic link to the target file used by default to initialize the system b) is a symbolic link to systemd c) is a symbolic link to init d) is a duplicate of graphical.target that allows you to modify the target file so that you do not risk damaging graphical.target e) calls upon either graphical.target or multi-user.target depending on the runlevel

calls upon either graphical.target or multi-user.target depending on the runlevel

In order to determine if a received packet has an error in it, TCP/IP uses which error detection mechanism? a) checksum b) hamming distance codes c) parity bits d) rotation algorithm e) it might use any of the above

checksum

Which of the following chmod commands would set the sticky bit for the directory mystuff? a) chmod 755 mystuff b) chmod 766 mystuff c) chmod 777 mystuff d) chmod 1000 mystuff e) chmod 1777 mystuff

chmod 1777 mystuff

The directory mystuff currently has the sticky bit set. Which of these commands would remove it? a) chmod u-t mystuff b) chmod g-t mystuff c) chmod o-t mystuff d) chmod s-t mystuff e) There is no way to remove it

chmod o-t mystuff

Assume the following listing and that the user zappaf is a member of the group cool and marst is not part of the group cool. -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 filea.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 fileb.txt -rwxrw----. 1 foxr cool 4183 Aug 5 2014 filec.txt -rw-r--r--. 1 foxr foxr 0 Aug 19 2014 filed.txt -rwxr-----. 1 foxr foxr 1183 Aug 20 2014 filee.txt -rw-r-----. 1 foxr cool 431 Sep 12 2014 filef.txt Provide a chmod command so that filea.txt is not executable by owner and is writable by group. Use the ugo+/- method. a) chmod u-x,g+w filea.txt b) chmod u+x,g+x filea.txt c) chmod u-x filea.txt d) chmod u+r,g+x filea.txt

chmod u-x,g+w filea.txt

Which of the following is a block device? a) disk drive b) keyboard c) mouse d) terminal window e) all of these are block devices

disk drive

Which of these built-in zones would be considered the least trustworthy? a) dmz b) drop c) external d) internal e) public

drop

Which vi command is used to delete the word in which the cursor currently lies? a) d b) db c) dd d) dw e) yy

dw

If FIRST=Frank and LAST=Zappa, which of these echo statements properly outputs Frank Zappa? a) echo FIRST LAST b) echo "FIRST LAST" c) echo $FIRST LAST d) echo $FIRST $LAST e) echo '$FIRST $LAST'

echo $FIRST $LAST

The EUID (effective user ID) of a process will always be the same as the UID.

false

The number of inodes in a file system is based on the number of files stored in that file system.

false

The top command will only display processes of the current user.

false

Under /proc, we see a subdirectory called 5813 which has files cmdline, environ, fd, io, mounts, cwd, exe and root. Which of the following files would store information about open files? a) cwd b) envion c) fd d) io e)mounts

fd

Assume the following listing and that the user zappaf is a member of the group cool and marst is not part of the group cool. -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 filea.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 fileb.txt -rwxrw----. 1 foxr cool 4183 Aug 5 2014 filec.txt -rw-r--r--. 1 foxr foxr 0 Aug 19 2014 filed.txt -rwxr-----. 1 foxr foxr 1183 Aug 20 2014 filee.txt -rw-r-----. 1 foxr cool 431 Sep 12 2014 filef.txt Which of the files is zappaf able to write to? a) filea.txt b) fileb.txt c) filec.txt d) filed.txt e) filee.txt f) filef.txt

fileb.txt filec.txt

Write a find command to find all files in the current user's home directory with permissions of 664. a) find ~ permission 664 b) find ~ 664 c) find ~ perm 664 d) find 664 e) find ~ -p 664

find ~ perm 664

An anonymous login is most commonly applied with which of the following programs? a) ftp b) Mail c) openssl d) rsh e) ssh

ftp

We have the following information stored in /etc/fstab. /dev/sda1 / ext4 defaults 1 1 /dev/sda3 /home ext4 defaults 1 2 /dev/sda5 swap swap pri=1000 0 0 /dev/sda4 /var ext3 noexec 0 0 proc /proc proc defaults 0 0 10.11.12.13: /mnt/stuff nfs ro,async 0 0 The notation ro,async listed as an option for the partition /mnt/stuff indicates a) that content in this partition is read only b) that content in this partition is read only and not executable c) that content in this partition is read only and access is not synchronous d) that content in this partition is read only and that access has a lower priority e) that content in this partition is not synchronous

hat content in this partition is read only and access is not synchronous

Which of the following commands could you use to obtain the IP address of a remote computer? a) host b) ip c) ping d) route e) ss

host

Which of the following best describes the roles of init and inittab in RedHat 7? a) they no longer exist b) they exist but do nothing c) init is a symbolic link to systemd, inittab no longer exists d) init is a symbolic link to systemd, inittab contains only comments e) init is still the startup process which launches systemd, inittab contains information about how init runs but this information is all commented out

init is a symbolic link to systemd, inittab contains only comments

One drawback of using dump for backups is a) it can only be used on individual files so that creating a backup of a full partition is unwieldy b) it can only be used on file systems so that you cannot backup individual directories or files c)_ it only allows for full backups, not incremental backups d) to perform incremental backups, you must use another program like find in conjunction with dump e) it is primarily used to copy files across a network, not to storage

it can only be used on file systems so that you cannot backup individual directories or files

Where is a virtual file system stored? a) could be stored on any device b) hard disk under file system storage c) memory d) swap space e)none of these, it is not stored anywhere

memory

What is the purpose of the -m option for the usermod command. a) moves the user's home directory to the directory specified as an option parameter b) specifies that the users home directory should be automatically created under /home c) specifies that the user's home directory should not be created d) creates the user's home directory to the directory specified as an option parameter

moves the user's home directory to the directory specified as an option parameter

Which of the following services is required to be for your computer to communicate via your network interface device? a) dnsmasq b) network c) nfs d) snmp e) xinetd

network

Which of these nmcli instructions provides IP address information much like ip addr? a) nmcli b) nmcli addr c) nmcli connection show d) nmcli show all e) nmcli interface

nmcli connection show

Given the following chain of processes, init \gnome \gnome_terminal \bash \program1 \program2 \program3 Is program1 the parent of program2? a) yes b) no

no

n vi, you have copied an entire line into the buffer and wish to paste it into place below the current line. Which of these keystrokes would you use? a) yy b) p c) P d) control+y e) J

p

Which of the following is not a built-in zone for firewalld in RedHat 7? a) block b) drop c) external d) public e) private

private

The ssh program uses which of the following technologies? a) File transfer b) Hypertext transfer c) IP alias resolution d) Public key encryption e) Private key encryption

public key encryption

The command to create a quota database is a) edquota b) quotacheck c) quotaon d) quotascan e) setquota

quotacheck

With RedHat 7, which of the following target files is used as a replacement to runlevel 1? a) graphical.target b) multi-user.target c) powerofff.target d) reboot.target e) rescue.target

rescue.target

In Linux, the privileged account that can perform system-level operations (like account creation) is called the ______ account. a) absolute b) administrator c) master d) root e) system

root

Which of the following is not a piece of metadata stored about a file? a) creation date/time b) last access date/time c) owner d) permissions e) starting block in storage

starting block in storage

Assume you have issued the command split -d -C 10 foo stuff. What files do you expect to be created? a) fooaa, fooab, fooac, etc b) stuffaa, stuffab, stuffac, etc c) foo00, foo01, foo02, etc d) stuff00, stuff01, stuff02, etc e) There is no way to know

stuff00, stuff01, stuff02, etc

Assume you are allowed to execute the instruction cat /etc/shadow via sudo. Write the sudo command you would use to do this.

sudo cat /etc/shadow

We have the following information stored in /etc/fstab. /dev/sda1 / ext4 defaults 1 1 /dev/sda3 /home ext4 defaults 1 2 /dev/sda5 swap swap pri=1000 0 0 /dev/sda4 /var ext3 noexec 0 0 proc /proc proc defaults 0 0 10.11.12.13: /mnt/stuff nfs ro,async 0 0 Of the above partitions, which does not have a mount point? a) /var b) swap c) /proc d) /mnt/stuff e) all of them have mount points

swap

Which of the following directories is not a virtual file system? a) /dev b) /proc c) /sys d) swap e) all of these are virtual file systems

swap

In a long listing, the notation name1->/somedirectory/name2 indicates that name1 is a a) hard link b) symbolic link c) a file with a hard link pointing at it d) a file with a symbolic link pointing at it e) a named pipe

symbolic link

When viewing directories through the GUI file system folder, you might find some of the items (icons) have an X near them (such as with lost+found shown below). The X means _______. a) that you can view the contents but cannot access the contents b) that you can view the contents and access them but only if you first copy the contents to another location c) that you cannot view the contents at all d) that the directory is empty e) that the directory has been deleted

that you cannot view the contents at all

One entry in /etc/sysconfig/network-sripts/ifcfg-eth0 reads ONBOOT=yes. This means that a) the eth network interface should be automatically started at boot time b) this file should be updated after every boot c) this file will be automatically updated after every boot d) your computer's IP address is static e) your computer's IP address will be obtained at boot time

the eth network interface should be automatically started at boot time

In order to execute a program, the CPU performs an operation over and over. This operation is a) data computation b) data movement c) interrupts d) program compilation e) the fetch-execute cycle

the fetch-execute cycle

As a system administrator for a company, you want to issue all users with a text file containing a list of dos and don'ts in their computer system. You want this file to automatically be placed into every new user's home directory when their account is created. How will you set this up? a) the file should be copied to /etc/skel b) the file should be copied to each user's home directory manually c) the file should be copied to /etc/files d) the file should be copied to /home/skel

the file should be copied to /etc/skel

In a long listing, the second item listed is a number. This number indicates for a file a) the number of soft links pointing at the file b) the number of hard links pointing at the file c) the number of physical copies of the file d) the number of times the file has been modified e) the size of the file

the number of hard links pointing at the file

The difference between a program and a process is a) the process is started by the operating system while the program is started by the user b) the process can run in the background, the program must run in the foreground c) the process is an active entity, the program is a static entity d) the process is executable, the program is not e) none of the above, there is no difference between a program and a process

the process is an active entity, the program is a static entity

Under /proc, we see a subdirectory called 5813 which has files cmdline, environ, fd, io, mounts, cwd, exe and root. The file root will store a) a link to the process' executable code b) the PID of the process that spawned this process c) the UID of the user who started the process d) the root directory of the process e) whether the process was launched by root (1) or a normal user (0)

the root directory of the process

In the following listing: -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 file1.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 file2.txt drwxr-xr-x. 1 foxr cool 1024 Jul 16 2014 files The fifth entry on each line is a) The time that the item was created on the given day b) The number of times the item has been accessed since it was created c)The number of links to the item d) The size of the item e) The owner's ID number

the size of the item

The seek time is a) the time it takes to move the read/write head to the proper disk track b) the time it takes for the proper disk sector to spin underneath the read/write head c) the time it takes to transfer data between disk drive and memory d) the time it takes the operating system to communicate with the disk drive e) a, b and c combined but not d

the time it takes to move the read/write head to the proper disk track

Multiprogramming differs from multitasking in that in multitasking the current process can be forced to surrender the CPU when what event occurs? a) the current process requires I/O b) the current process finishes I/O c) a higher priority process becomes available d) the timer interrupts the CPU e) all of the above

the timer interrupts the CPU

In Ubuntu, the system administration password is not made available to the first user of the /+system (taken to be the administrator). How then can that person execute administration commands? a) the user cannot b) the user must contact the Ubuntu distributors for the password c) the user must contact the Ubuntu programmers for the password d) the user must try to break (crack) the password e) the user uses the sudo command

the user uses the sudo command

Of the programs top, ps and the System Monitor, which two are similar in that they show you changes over time? a) top b) ps c) System Monitor

top system monitor

An interrupt request may be generated by either hardware or software.

true

The reason that both /usr and /usr/local exist is more historic than practical.

true

The microkernel is smaller than the monolithic kernel because the microkernel utilizes lesser _____ to handle some of its duties. a) device drivers b) modules c) services d) servers e) utility programs

utility programs

An orphan is a process a) that has no children b)which has finished executing but cannot leave the system yet because it must report to its children c) which has finished executing but cannot leave the system yet because it must report to its parent d) whose parent has terminated e) whose children have all terminated

whose parent has terminated

Which of the following can you not do to an interface using the nmcli command? a) bring it up b) bring it down c) change its information d) remove it e) you can do all of these

you can do all of these

What happens if you enter the command nmcli with no options or parameters? a) you get an error b) you get status information of your network connectivity c) you get the man page d) you get a list of options, as if you issued nmcli help e) you get no response at all

you get status information of your network connectivity

If you see this prompt in the Linux command window, [zappaf@mycomputer foxr]$ who are you logged in as?

zappaf


Conjuntos de estudio relacionados

FINN 3043 Exam #1 Review Questions

View Set

Pensacola State College: Java Programming COP2800

View Set

stat 1430 - homework/practice midterm/old tests for midterm

View Set

Introduction to Business test terms (March)

View Set

Chapter 19 Quizlet Answered long questions

View Set

Life Span/ Human Growth and Development: Final Study Guide

View Set

Physics Final Exam Chapter 8, 7, 6, 5, 4, 3, 2, 1

View Set

Path 370 - Check your understanding (Ch 44, 45, 47, 51, 52)

View Set

Repetitive Motion Injuries (1.00)

View Set